Results 21 to 30 of about 4,185 (152)

The distribution of spacings of real‐valued lacunary sequences modulo one [PDF]

open access: yesMathematika, 2021
Let (an)n=1∞$(a_{n})_{n=1}^{\infty }$ be a lacunary sequence of positive real numbers. Rudnick and Technau showed that for almost all α∈R$\alpha \in \mathbb {R}$ , the pair correlation of (αan)n=1∞$(\alpha a_{n})_{n=1}^{\infty }$ mod 1 is Poissonian.
Sneha Chaubey, Nadav Yesha
semanticscholar   +1 more source

Book Review: Distribution modulo one and Diophantine approximation [PDF]

open access: yesBulletin of the American Mathematical Society, 2014
J. Allouche
openaire   +2 more sources

ON THE DISTRIBUTION OF TORSION POINTS MODULO PRIMES [PDF]

open access: yesBulletin of the Australian Mathematical Society, 2012
AbstractLet $\Bbb A$ be a commutative algebraic group defined over a number field K. For a prime ℘ in K where $\Bbb A$ has good reduction, let N℘,n be the number of n-torsion points of the reduction of $\Bbb A$ modulo ℘ where n is a positive integer. When $\Bbb A$ is of dimension one and n is relatively prime to a fixed finite set of primes depending ...
Chen, Yen-Mei J., Kuan, Yen-Liang
openaire   +1 more source

Tangential forces in the contact area of upper road layer with the base

open access: yesMATEC Web of Conferences, 2018
Low-temperature cracking is one of the main reasons for the deterioration of the upper layer of roads in regions with cold winters. A large number of works focused on deterioration prevention are known, however the interdisciplinary problem of low ...
Gavrilov Timmo   +2 more
doaj   +1 more source

Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting

open access: yesAdvanced Engineering Research, 2017
Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals.
Larisa V. Cherkesova   +3 more
doaj   +1 more source

Perfect secrecy cryptosystem with nonuniform distribution of keys

open access: yesTongxin xuebao, 2018
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj   +2 more sources

Snow water equivalent retrieval and analysis over Altay using 12 d repeat-pass Sentinel-1 interferometry [PDF]

open access: yesThe Cryosphere
Accurate Snow Water Equivalent (SWE) estimation is significant for understanding global climate change, surface energy balance, and regional water cycles.
J. Zhou   +12 more
doaj   +1 more source

The Quantum Electromagnetic Field in the Weyl–Wigner Representation

open access: yesUniverse
The quantum electromagnetic (EM) field is formulated in the Weyl–Wigner representation (WW), which is equivalent to the standard Hilbert space one (HS).
Emilio Santos
doaj   +1 more source

On the Distribution of ap Modulo One

open access: yesJournal of Number Theory, 1993
AbstractIn this paper, we prove: "Suppose α is an irrational number and let ||y|| denote the smallest distance of y from an integer. Then, for any real number β, there are infinitely many primes p such that ||αp − β|| < p−4/13."
openaire   +1 more source

On the distribution of inverses modulo p (II) [PDF]

open access: yesActa Arithmetica, 2001
Using \textit{E. Bombieri}'s estimates on exponential sums [Am. J. Math. 88, 71--105 (1966; Zbl 0171.41504)], the author shows that for fixed \(k\), the distance between the least residues of \(a^k\bmod p\) and \(a^{-k}\bmod p\), divided by \(p\), as \(a\) runs through \(1,2,\dots, p-1\), behaves like independent random variables on \([0,1]\).
openaire   +2 more sources

Home - About - Disclaimer - Privacy