Results 1 to 10 of about 13,417,782 (227)

Algebraic group actions on normal varieties [PDF]

open access: yes, 2017
Let $G$ be a connected algebraic $k$-group acting on a normal $k$-variety, where $k$ is a field. We show that $X$ is covered by open $G$-stable quasi-projective subvarieties; moreover, any such subvariety admits an equivariant embedding into the ...
M. Brion
semanticscholar   +4 more sources

Algebraic group-varieties [PDF]

open access: gold, 1956
Let $G$ be a linear algebraic group of dimension $r$. We propose to study the brational type of $G$ as an algebraic variety, $i$ . $e$ . the structure of the field $\mathfrak{R}(G)$ of rational functions on $G$ . In his “ Trait\’e d’analyse “ (vol. 3, p.
Iacopo Barsotti
openalex   +2 more sources

The impact of various teaching methods on the knowledge of students of different genders: The case of mathematics word problems abstract [PDF]

open access: yesHeliyon
Despite significant progress in recent years, there is still evidence of gender differences and underrepresentation of women in leadership positions in mathematics.
Iris Schreiber, Hagit Ashkenazi
doaj   +2 more sources

The Quantum States of a Graph

open access: yesMathematics, 2023
Quantum codes are crucial building blocks of quantum computers. With a self-dual quantum code is attached, canonically, a unique stabilised quantum state. Improving on a previous publication, we show how to determine the coefficients on the basis of kets
Mohd Arif Raza   +8 more
doaj   +1 more source

Algebraic Geometry

open access: yesWiley Encyclopedia of Computer Science and Engineering, 2022
We compute the fundamental group of an algebraic link. To cite this article: O. Neto, P.C. Silva, C. R. Acad. Sci. Paris, Ser. I 340 (2005).  2004 Académie des sciences. Published by Elsevier SAS. All rights reserved.
David A. Cox
semanticscholar   +1 more source

A New Code Based Signature Scheme for Blockchain Technology

open access: yesMathematics, 2023
Blockchain is a method of recording information that makes it not feasible for the system to be replaced, attacked, or manipulated. A blockchain is equipped with a notebook that copies and processes the various procedures across the network of computers ...
Adel Alahmadi   +5 more
doaj   +1 more source

There are no Carmichael numbers of the form $2^np+1$ with $p$ prime

open access: yesComptes Rendus. Mathématique, 2022
In this paper, we prove the theorem announced in the title.
Alahmadi, Adel, Luca, Florian
doaj   +1 more source

DNA Code Design Based on the Cosets of Codes over Z4

open access: yesMathematics, 2023
DNA code design is a challenging problem, and it has received great attention in the literature due to its applications in DNA data storage, DNA origami, and DNA computing. The primary focus of this paper is in constructing new DNA codes using the cosets
Adel N. Alahmadi   +2 more
doaj   +1 more source

On dynamical finiteness properties of algebraic group shifts [PDF]

open access: yesIsrael Journal of Mathematics, 2020
Let G be a group and let V be an algebraic group over an algebraically closed field. We introduce algebraic group subshifts Σ ⊂ V G which generalize both the class of algebraic sofic subshifts of V G and the class of closed group subshifts over finite ...
Xuan Kien Phung
semanticscholar   +1 more source

Connections between Linear Complementary Dual Codes, Permanents and Geometry

open access: yesMathematics, 2023
Linear codes with complementary duals, or LCD codes, have recently been applied to side-channel and fault injection attack-resistant cryptographic countermeasures.
Adel N. Alahmadi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy