Results 21 to 30 of about 531 (50)

A Reduction Method for Higher Order Variational Equations of Hamiltonian Systems [PDF]

open access: yes, 2011
Let $\mathbf{k}$ be a differential field and let $[A]\,:\,Y'=A\,Y$ be a linear differential system where $A\in\mathrm{Mat}(n\,,\,\mathbf{k})$. We say that $A$ is in a reduced form if $A\in\mathfrak{g}(\bar{\mathbf{k}})$ where $\mathfrak{g}$ is the Lie ...
Aparicio, Ainhoa, Weil, Jacques-Arthur
core   +2 more sources

A generalization of Kruskal–Katona’s theorem

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2020
Let K be a field, E the exterior algebra of a finite dimensional K-vector space, and F a finitely generated graded free E-module with homogeneous basis g1, . . ., gr such that deg g1 ≤ deg g2 ≤ · · · ≤ deg gr.
Amata Luca, Crupi Marilena
doaj   +1 more source

Computing abelian subalgebras for linear algebras of upper-triangular matrices from an algorithmic perspective

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2016
In this paper, the maximal abelian dimension is algorithmically and computationally studied for the Lie algebra hn, of n×n upper-triangular matrices. More concretely, we define an algorithm to compute abelian subalgebras of hn besides programming its ...
Ceballos Manuel   +2 more
doaj   +1 more source

Cryptanalysis of matrix conjugation schemes

open access: yesJournal of Mathematical Cryptology, 2014
In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao.
Myasnikov Alex D., Ushakov Alexander
doaj   +1 more source

An extension of Turán's inequality

open access: yes, 2015
Let pm(x) = P (λ) m (x)/P (λ) m (1) be the m -th ultraspherical polynomial normalized by pm(1) = 1 . We prove the inequality |x|pn(x)− pn−1(x)pn+1(x) 0 , x ∈ [−1,1] , for −1/2 < λ 1/2 .
G. Nikolov, V. Pillwein
semanticscholar   +1 more source

Analysis of a key exchange protocol based on tropical matrix algebra

open access: yesJournal of Mathematical Cryptology, 2018
In this paper, we consider a two party key-exchange protocol proposed in [D. Grigoriev and V. Shpilrain, Tropical cryptography, Comm. Algebra 43 (2014), 2624–2632, Section 2], which uses tropical matrix algebra as the platform.
Kotov Matvei, Ushakov Alexander
doaj   +1 more source

Isomorphism and isotopism classes of filiform Lie algebras of dimension up to seven

open access: yes, 2015
Since the introduction of the concept of isotopism of algebras by Albert in 1942, a prolific literature on the subject has been developed for distinct types of algebras.
Falcón, O. J.   +2 more
core   +1 more source

Smarandache Sequences: Explorations and Discoveries with a Computer Algebra System [PDF]

open access: yes, 2003
We study Smarandache sequences of numbers, and related problems, via a Computer Algebra System. Solutions are discovered, and some conjectures presented.Comment: To appear in the 2003 December issue of the Smarandache Notions ...
Gouveia, Paulo D. F.   +1 more
core   +2 more sources

Computing Dynamic Output Feedback Laws

open access: yes, 2003
The pole placement problem asks to find laws to feed the output of a plant governed by a linear system of differential equations back to the input of the plant so that the resulting closed-loop system has a desired set of eigenvalues.
Verschelde, Jan, Wang, Yusong
core   +2 more sources

Splitting the structured paths in stratified graphs. Application in Natural Language Generation

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2014
The concept of labeled stratified graph (LSG) introduces some method of knowledge representation. The inference process developed for this structures uses the paths of the stratified graphs, an order between the elementary arcs of a path and some results
Dănciulescu Dana, Colhon Mihaela
doaj   +1 more source

Home - About - Disclaimer - Privacy