Results 21 to 30 of about 93,941 (183)

On the Distribution of αp Modulo One in Quadratic Number Fields [PDF]

open access: yesUniform distribution theory, 2021
Abstract We investigate the distribution of αp modulo one in quadratic number fields 𝕂 with class number one, where p is restricted to prime elements in the ring of integers of 𝕂. Here we improve the relevant exponent 1/4 obtained by the first- and third-named authors for imaginary quadratic number fields [On the distribution of αp ...
Baier, Stephan   +2 more
openaire   +2 more sources

Tangential forces in the contact area of upper road layer with the base

open access: yesMATEC Web of Conferences, 2018
Low-temperature cracking is one of the main reasons for the deterioration of the upper layer of roads in regions with cold winters. A large number of works focused on deterioration prevention are known, however the interdisciplinary problem of low ...
Gavrilov Timmo   +2 more
doaj   +1 more source

Bounds on supremum norms for Hecke eigenfunctions of quantized cat maps [PDF]

open access: yes, 2006
We study extreme values of desymmetrized eigenfunctions (so called Hecke eigenfunctions) for the quantized cat map, a quantization of a hyperbolic linear map of the torus.
Kurlberg, Par
core   +3 more sources

Distribution Modulo One of αpγ + β for Special Classes of Primes

open access: yesAxioms
Let α,β∈R with α≠0, and let γ∈(0,5/6). Define the set M1 to consist of primes p such that p+2 is almost prime, and let M2 be the set of primes of the form p=a2+b2+1.
Atanaska Georgieva, Tatiana L. Todorova
doaj   +1 more source

Binomial-coefficient multiples of irrationals [PDF]

open access: yes, 1998
Denote by $x$ a random infinite path in the graph of Pascal's triangle (left and right turns are selected independently with fixed probabilities) and by $d_n(x)$ the binomial coefficient at the $n$'th level along the path $x$. Then for a dense $G_{\delta}
Adams, Terrence M., Petersen, Karl E.
core   +5 more sources

Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting

open access: yesAdvanced Engineering Research, 2017
Introduction . One of the tasks arising in cryptography is to ensure the safe and honest conduct of e-voting. This procedure provides that voters submit their votes electronically - for example, through electronic terminals.
Larisa V. Cherkesova   +3 more
doaj   +1 more source

Perfect secrecy cryptosystem with nonuniform distribution of keys

open access: yesTongxin xuebao, 2018
More strictly mathematical concepts of infinite perfect secrecy and random “one-time pad” cryptosystem in theory were presented,and the whole secure communication system was divided into two stages:design of a basic cryptosystem and one of its ...
Chuanjun TIAN
doaj   +2 more sources

Snow water equivalent retrieval and analysis over Altay using 12 d repeat-pass Sentinel-1 interferometry [PDF]

open access: yesThe Cryosphere
Accurate Snow Water Equivalent (SWE) estimation is significant for understanding global climate change, surface energy balance, and regional water cycles.
J. Zhou   +12 more
doaj   +1 more source

The fluctuation spectra around a Gaussian classical solution of a tensor model and the general relativity

open access: yes, 2007
Tensor models can be interpreted as theory of dynamical fuzzy spaces. In this paper, I study numerically the fluctuation spectra around a Gaussian classical solution of a tensor model, which represents a fuzzy flat space in arbitrary dimensions.
Connes A.   +5 more
core   +1 more source

On Gaps Between Primitive Roots in the Hamming Metric [PDF]

open access: yes, 2012
We consider a modification of the classical number theoretic question about the gaps between consecutive primitive roots modulo a prime $p$, which by the well-known result of Burgess are known to be at most $p^{1/4+o(1)}$. Here we measure the distance in
Dietmann, Rainer   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy