• Title/Summary/Keyword: Primitive

Search Result 1,232, Processing Time 0.022 seconds

PRIMITIVE IDEMPOTENTS IN THE RING F4[x]/〈xpn-1〉 AND CYCLOTOMIC Q CODES

  • Batra, Sudhir;Mathur, Rekha
    • Bulletin of the Korean Mathematical Society
    • /
    • v.55 no.3
    • /
    • pp.971-997
    • /
    • 2018
  • The parity of cyclotomic numbers of order 2, 4 and 6 associated with 4-cyclotomic cosets modulo an odd prime p are obtained. Hence the explicit expressions of primitive idempotents of minimal cyclic codes of length $p^n$, $n{\geq}1$ over the quaternary field $F_4$ are obtained. These codes are observed to be subcodes of Q codes of length $p^n$. Some orthogonal properties of these subcodes are discussed. The minimal cyclic codes of length 17 and 43 are also discussed and it is observed that the minimal cyclic codes of length 17 are two weight codes. Further, it is shown that a Q code of prime length is always cyclotomic like a binary duadic code and it seems that there are infinitely many prime lengths for which cyclotomic Q codes of order 6 exist.

Direct Carotid Cavernous Fistula of an Adult-Type Persistent Primitive Trigeminal Artery with Multiple Vascular Variations

  • Jin, Sung-Chul;Park, Hyun;Kwon, Do-Hoon;Choi, Choong-Gon
    • Journal of Korean Neurosurgical Society
    • /
    • v.49 no.4
    • /
    • pp.226-228
    • /
    • 2011
  • We report a case of spontaneous right carotid-cavernous fistula (CCF) in a proximal segment of persistent primitive trigeminal artery (PPTA) and combined vascular anomalies such as left duplicated hypoplastic proximal posterior cerebral arteries and a variation of anterior choroidal artery supplying temporal and occipital lobe. A 45-year-old male presented with progressive right exophthalmos, diplopia, and ocular pain. With manual compression of the internal carotid artery, a cerebral angiography revealed a right CCF from a PPTA. Treatment involved the placement of detachable non-fibered and fibered coils, and use of a hyperglide balloon to protect against coil herniation into the internal carotid artery. A final angiograph revealed complete occlusion of PPTA resulted in no contrast filling of CCF.

ON HOPF ALGEBRAS IN ENTROPIC JÓNSSON-TARSKI VARIETIES

  • ROMANOWSKA, ANNA B.;SMITH, JONATHAN D.H.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.5
    • /
    • pp.1587-1606
    • /
    • 2015
  • Comonoid, bi-algebra, and Hopf algebra structures are studied within the universal-algebraic context of entropic varieties. Attention focuses on the behavior of setlike and primitive elements. It is shown that entropic $J{\acute{o}}nsson$-Tarski varieties provide a natural universal-algebraic setting for primitive elements and group quantum couples (generalizations of the group quantum double). Here, the set of primitive elements of a Hopf algebra forms a Lie algebra, and the tensor algebra on any algebra is a bi-algebra. If the tensor algebra is a Hopf algebra, then the underlying $J{\acute{o}}nsson$-Tarski monoid of the generating algebra is cancellative. The problem of determining when the $J{\acute{o}}nsson$-Tarski monoid forms a group is open.

The Structure Type Introduced in Java (Java 언어에 structure type의 도입)

  • Lee, Ho-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.7
    • /
    • pp.1883-1895
    • /
    • 1998
  • Java 프로그램밍 언어는 general-purpose concurrent object-oriented 언어로 알려져 있다. Java 언어는 개념과 구문 모두가 매우 간결하고 통일되어 있으며 인터넷 환경에서 최대한 활용되도록 하기 위하여 가상기계 개념을 도입하여 목적코드를 생성한다. 프로그래밍 언어에서 가장 중요한 부분이 data type 부분이다. Java 언어는 primitive type과 reference type을 지원한다. Primitive type과 reference type을 지원한다. Primitive type에는 boolean type integral type이 있다. Integral type에는 character, byte, short integer, integer, long integer, single-precision 과 double-precision floating point number가 있다. Reference type에는 class type, interface type, array type이 있다. 그러나 Java 언어는 general-purpose 프로그래밍 언어가 일반적으로 지원하는 structure type을 지원하지 않는다. 대신에 class type이 structure type을 포함하여 지원하는 구조로 되어 있다. 그러나 class type과 structure type은 서로 상이한 data type으로 판단된다. 따라서 Java 언어가 general-purpose의 성격을 가지기 위해서는 structure type을 명시적으로 지원하는 것이 바람직하다고 생각된다. 이 논문은 structure type을 Java 언어에 포함시킬 것을 제안한다.

  • PDF

Lithium Ion Conductivity in $Li_{3x}La_{(2/3-x)}TiO_3$ system ($Li_{3x}La_{(2/3-x)}TiO_3$계의 리튬 이온전도특성)

  • 정훈택;정태석;김호기
    • Journal of the Korean Ceramic Society
    • /
    • v.33 no.3
    • /
    • pp.293-298
    • /
    • 1996
  • Room temperature Li+ ion conductivities of Li3xLa(2/3-x)TiO3 system with x=0.117~0.317 were measured by complex impedance method. ICP, SEM and XRD analysis were conducted to study the main factor which influence the Li+ ion conductivity. Li+ ion conductivity seems to have a close relationship with the crystal structure of primitive cell increase as the primitive cell as close to cubic.

  • PDF

Control Program for Dexterous Manipulation by Robotic Hand (물체의 안정한 조작을 위한 동작의 계획과 운동의 실현)

  • Hwang Chang-Soon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.29 no.4 s.235
    • /
    • pp.540-554
    • /
    • 2005
  • This paper presents a motion planning and control method for the dexterous manipulation with a robotic hand. For a given trajectory of an object, a simulation system calculates the necessary joint displacements and contact forces at the fingertip surfaces. These joint displacements and contact forces are the reference inputs to the control loops of the robotic fingers. A task is decomposed into a set of primitive motions, and each primitive motion is executed using the planned output of the simulation system as the reference. Force sensors and dynamic tactile sensors are used to adapt to errors and uncertainties encountered during manipulation. Several experimental results are presented.

Definition of hierarchical attributed random graph and proposal of its applications (계층적 속성 랜덤 그래프의 정의 및 이를 이용한 여러 응용들의 소개)

  • 성동수
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.8
    • /
    • pp.79-87
    • /
    • 1997
  • For the representation of a complex object, the object is decomposed into several parts, and it is described by these decomposed parts and their relations. In genral, the parts can be the primitive elements that can not be decomposed further, or can be decomposed into their subparts. Therefore, the hierarchical description method is very natural and it si represented by a hierarchical attributed graph whose vertieces represent either primitive elements or graphs. This graphs also have verties which contain primitive elements or graphs. When some uncertainty exists in the hierarchical description of a complex object either due to noise or minor deformation, a probabilistic description of the object ensemble is necessary. For this purpose, in this paper, we formally define the hierarchical attributed random graph which is extention of the hierarchical random graph, and erive the equations for the entropy calculation of the hierarchical attributed random graph, and derive the equations for the entropy calculation of the hierarchical attributed random graph. Finally, we propose the application areas to use these concepts.

  • PDF

DIAMETER OF THE DIRECT PRODUCT OF WIELANDT GRAPH

  • Kim, Sooyeon;Song, Byung Chul
    • Korean Journal of Mathematics
    • /
    • v.20 no.4
    • /
    • pp.395-402
    • /
    • 2012
  • A digraph D is primitive if there is a positive integer $k$ such that there is a walk of length $k$ between arbitrary two vertices of D. The exponent of a primitive digraph is the least such $k$. Wielandt graph $W_n$ of order $n$ is known as the digraph whose exponent is $n^2-2n+2$, which is the maximum of all the exponents of the primitive digraphs of order n. It is known that the diameter of the multiple direct product of a digraph $W_n$ strictly increases according to the multiplicity of the product. And it stops when it attains to the exponent of $W_n$. In this paper, we find the diameter of the direct product of Wielandt graphs.

LINEAR OPERATORS THAT PRESERVE SETS OF PRIMITIVE MATRICES

  • Beasley, Leroy B.;Kang, Kyung-Tae;Song, Seok-Zun
    • Journal of the Korean Mathematical Society
    • /
    • v.51 no.4
    • /
    • pp.773-789
    • /
    • 2014
  • We consider linear operators on square matrices over antinegative semirings. Let ${\varepsilon}_k$ denote the set of all primitive matrices of exponent k. We characterize those linear operators which preserve the set ${\varepsilon}_1$ and the set ${\varepsilon}_2$, and those that preserve the set ${\varepsilon}_{n^2-2n+2}$ and the set ${\varepsilon}_{n^2-2n+1}$. We also characterize those linear operators that strongly preserve ${\varepsilon}_2$, ${\varepsilon}_{n^2-2n+2}$ or ${\varepsilon}_{n^2-2n+1}$.

A COUNTER-BASED MAC REVISITED: WEAKENING THE UNDERLYING ASSUMPTION

  • Lee, Eon-Kyung;Lee, Sang-Jin
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.461-470
    • /
    • 2007
  • In CRYPTO 1995, Bellare, $Gu\'{e}rin$, and Rogaway proposed a very efficient message authentication scheme. This scheme is secure against adaptive chosen message attacks, under the assumption that its underlying primitive is a pseudorandom function. This article studies how to weaken that assumption. For an adaptive chosen message attack, we take into account two scenarios. On the one hand, the adversary intercepts the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier does not receive them. On the other hand, the adversary can only eavesdrop the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier receives them. We modify the original scheme. In the first scenario, our scheme is secure if the underlying primitive is a pseudorandom function. In the second scenario, our scheme is still secure under a weaker assumption that the underlying primitive is an indistinguishable-uniform function.