Results 1 to 10 of about 496,846 (263)
From Permutation Patterns to the Periodic Table [PDF]
(The above abstract has been extracted by the translator from the original article (L. Pudwell, From Permutation Patterns to the Periodic Table, Notices of the American Mathematical Society, 67 994–1001.))Abstract: Permutation patterns is a burgeoning ...
Saeid Alikhani, Maryam Safazadeh
doaj +1 more source
Peer Reviewed ; http://deepblue.lib.umich.edu/bitstream/2027.42/31724/1/0000662 ...
Farris, James S. +3 more
openaire +4 more sources
Permutations on the Random Permutation [PDF]
The random permutation is the Fraïssé limit of the class of finite structures with two linear orders. Answering a problem stated by Peter Cameron in 2002, we use a recent Ramsey-theoretic technique to show that there exist precisely 39 closed supergroups of the automorphism group of the random permutation, and thereby expose all symmetries of this ...
Linman, Julie, Pinsker, Michael
openaire +3 more sources
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement.
Jameel Arif +6 more
doaj +1 more source
Motivated by the problem of constructing bijective maps with low differential uniformity, we introduce the notion of permutation resemblance of a function, which looks to measure the distance a given map is from being a permutation. We prove several results concerning permutation resemblance and show how it can be used to produce low differentially ...
Li-An Chen, Robert S. Coulter
openaire +2 more sources
Updated with minor corrections reflecting referee comments.
Elizalde, Sergi, Roichman, Yuval
openaire +2 more sources
Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion
Images, as a crucial information carrier in the era of big data, are constantly generated, stored, and transmitted. Determining how to guarantee the security of images is a hot topic in the information security community. Image encryption is a simple and
Wei Fan, Taiyong Li, Jianan Wu, Jiang Wu
doaj +1 more source
Permutations, Signs, and Sum Ranges
The sum range SRx;X, for a sequence x=(xn)n∈N of elements of a topological vector space X, is defined as the set of all elements s∈X for which there exists a bijection (=permutation) π:N→N, such that the sequence of partial sums (∑k=1nxπ(k))n∈N converges
Sergei Chobanyan +3 more
doaj +1 more source
Generating biometric random cryptographic key based on unique fingerprint features [PDF]
This paper uses the unique biometric features of fingerprints to generate random cryptographic keys. The main aspects of the security of the generated key include the privacy of the fingerprint and the randomness and complexity of the key generation ...
Bahram Rashidi, Ali Goudarzi
doaj +1 more source
The concept of prolificity was previously introduced by the authors in the context of compositions of integers. We give a general interpretation of prolificity that applies across a range of relational structures defined in terms of counting embeddings.
Albert, Michael, Tannock, Murray
openaire +1 more source

