Results 1 to 10 of about 310,373 (322)

Adjointness of Suspension and Shape Path Functors [PDF]

open access: yesMathematics Interdisciplinary Research, 2021
In this paper, we introduce a subcategory ∼Sh* of Sh* and obtain some results in this subcategory. First we show that there is a natural bijection Sh(∑(X, x), (Y,y))≅Sh((X,x),Sh((I, Ī),(Y,y))), for every (Y,y)∈ ~Sh* and (X,x)∈ Sh*. By this fact, we prove
Tayyebe Nasri   +2 more
doaj   +1 more source

The Quantum States of a Graph

open access: yesMathematics, 2023
Quantum codes are crucial building blocks of quantum computers. With a self-dual quantum code is attached, canonically, a unique stabilised quantum state. Improving on a previous publication, we show how to determine the coefficients on the basis of kets
Mohd Arif Raza   +8 more
doaj   +1 more source

Total Product and Total Edge Product Cordial Labelings of Dragonfly Graph Dgn

open access: yesJournal of Mathematics, 2022
In this paper, we study the total product and total edge product cordial labeling for dragonfly graph Dgn. We also define generalized dragonfly graph and find product cordial and total product cordial labeling for this family of graphs.
N. Inayah, A. Erfanian, M. Korivand
doaj   +1 more source

The structure of algebraic Baer ∗-algebras

open access: yesPacific Journal of Mathematics, 2022
The purpose of this note is to describe when a general complex algebraic $^*$-algebra is pre-$C^*$-normed, and to investigate their structure when the $^*$-algebras are Baer $^*$-rings in addition to algebraicity. As a main result we prove the following theorem for complex algebraic Baer $^*$-algebras: every $^*$-algebra of this kind can be decomposed ...
Szűcs, Zsolt, Takács, Balázs
openaire   +2 more sources

A New Code Based Signature Scheme for Blockchain Technology

open access: yesMathematics, 2023
Blockchain is a method of recording information that makes it not feasible for the system to be replaced, attacked, or manipulated. A blockchain is equipped with a notebook that copies and processes the various procedures across the network of computers ...
Adel Alahmadi   +5 more
doaj   +1 more source

ON THE CAPACITY OF EILENBERG-MACLANE AND MOORE SPACES [PDF]

open access: yesJournal of Algebraic Systems, 2019
K. Borsuk in 1979, at the Topological Conference in Moscow, introduced concept of the capacity of a compactum and asked some questions concerning properties of the capacity ofcompacta.
Mojtaba Mohareri   +2 more
doaj   +1 more source

Vector weighted Stirling numbers and an application in graph theory

open access: yesElectronic Journal of Graph Theory and Applications, 2021
We introduce \textit{vector weighted Stirling numbers}, which are a generalization of ordinary Stirling numbers and restricted Stirling numbers. Some relations between vector weighted Stirling numbers and ordinary Stirling numbers and some of their ...
Fahimeh Esmaeeli   +2 more
doaj   +1 more source

There are no Carmichael numbers of the form $2^np+1$ with $p$ prime

open access: yesComptes Rendus. Mathématique, 2022
In this paper, we prove the theorem announced in the title.
Alahmadi, Adel, Luca, Florian
doaj   +1 more source

DNA Code Design Based on the Cosets of Codes over Z4

open access: yesMathematics, 2023
DNA code design is a challenging problem, and it has received great attention in the literature due to its applications in DNA data storage, DNA origami, and DNA computing. The primary focus of this paper is in constructing new DNA codes using the cosets
Adel N. Alahmadi   +2 more
doaj   +1 more source

Some Notes on Relative Commutators

open access: yesInPrime, 2020
Let G be a group and α ϵ Aut(G).  An α-commutator of elements x, y ϵ G is defined as [x, y]α = x-1y-1xyα. In 2015, Barzegar et al. introduced an α-commutator of elements of G and defined a new generalization of nilpotent groups by using the definition of
Masoumeh Ganjali, Ahmad Erfanian
doaj   +1 more source

Home - About - Disclaimer - Privacy