Results 21 to 30 of about 93,941 (183)
On the Distribution of αp Modulo One in Quadratic Number Fields [PDF]
Abstract We investigate the distribution of αp modulo one in quadratic number fields 𝕂 with class number one, where p is restricted to prime elements in the ring of integers of 𝕂. Here we improve the relevant exponent 1/4 obtained by the first- and third-named authors for imaginary quadratic number fields [On the distribution of αp ...
Baier, Stephan +2 more
openaire +2 more sources
Tangential forces in the contact area of upper road layer with the base
Low-temperature cracking is one of the main reasons for the deterioration of the upper layer of roads in regions with cold winters. A large number of works focused on deterioration prevention are known, however the interdisciplinary problem of low ...
Gavrilov Timmo +2 more
doaj +1 more source
Bounds on supremum norms for Hecke eigenfunctions of quantized cat maps [PDF]
We study extreme values of desymmetrized eigenfunctions (so called Hecke eigenfunctions) for the quantized cat map, a quantization of a hyperbolic linear map of the torus.
Kurlberg, Par
core +3 more sources
Distribution Modulo One of αpγ + β for Special Classes of Primes
Let α,β∈R with α≠0, and let γ∈(0,5/6). Define the set M1 to consist of primes p such that p+2 is almost prime, and let M2 be the set of primes of the form p=a2+b2+1.
Atanaska Georgieva, Tatiana L. Todorova
doaj +1 more source
Binomial-coefficient multiples of irrationals [PDF]
Denote by $x$ a random infinite path in the graph of Pascal's triangle (left and right turns are selected independently with fixed probabilities) and by $d_n(x)$ the binomial coefficient at the $n$'th level along the path $x$. Then for a dense $G_{\delta}
Adams, Terrence M., Petersen, Karl E.
core +5 more sources
Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals.
Larisa V. Cherkesova +3 more
doaj +1 more source
Perfect secrecy cryptosystem with nonuniform distribution of keys
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj +2 more sources
Snow water equivalent retrieval and analysis over Altay using 12 d repeat-pass Sentinel-1 interferometry [PDF]
Accurate Snow Water Equivalent (SWE) estimation is significant for understanding global climate change, surface energy balance, and regional water cycles.
J. Zhou +12 more
doaj +1 more source
Tensor models can be interpreted as theory of dynamical fuzzy spaces. In this paper, I study numerically the fluctuation spectra around a Gaussian classical solution of a tensor model, which represents a fuzzy flat space in arbitrary dimensions.
Connes A. +5 more
core +1 more source
On Gaps Between Primitive Roots in the Hamming Metric [PDF]
We consider a modification of the classical number theoretic question about the gaps between consecutive primitive roots modulo a prime $p$, which by the well-known result of Burgess are known to be at most $p^{1/4+o(1)}$. Here we measure the distance in
Dietmann, Rainer +2 more
core +1 more source

