• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 65
  • 8
  • 8
  • 5
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 106
  • 45
  • 30
  • 29
  • 27
  • 18
  • 15
  • 12
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Méthodes algorithmiques pour les réseaux algébriques / Algorithmic methods for algebraic lattices

Camus, Thomas 10 July 2017 (has links)
Les travaux présentés dans ce mémoire concernent les réseaux, qui sont des objets mathématiques fondamentaux pour de nombreux domaines tel que théorie des nombres et la cryptographie.Nous proposons dans un premier temps une généralisation et une implantation de l'algorithme de réduction de Lenstra, Lenstra et Lov'asz (algorithme LLL) dans le cadre algébrique simple des réseaux sur les anneaux d'entiers quadratiques, imaginaires et euclidiens.Nous nous attachons ensuite à présenter les notions de réseaux algébriques et de formes de Humbert, qui sont des généralisations dans un cadre algébrique aussi large que possible des notions classiques de réseaux euclidiens et de formes quadratiques. L'introduction de ces objets nous permet de présenter une adaptation et une implantation de l'algorithme de Plesken et Souvignier permettant de traiter efficacement les problèmes de l'isométrie et de la détermination des automorphismes pour les réseaux algébriques.Nous proposons finalement une étude détaillée de la complexité de ces deux problèmes. Nous montrons notamment qu'ils sont intiment reliés à des problèmes similaires sur les graphes. Cette réduction nous permet d'exhiber des bornes de complexité inédites. / This thesis deals with lattices, which are fundamental objects in many fields, such as number theory and cryptography.As a first step, we propose a generalization and an implantation of the Lenstra, Lenstra and Lov'asz algorithm (LLL algorithm) in the simple algebraic setting of lattices over quadratic imaginary and euclidean ring of integers.Then, we present the notions of algebraic lattices and Humbert forms, which are extensions of euclidean lattices and quadratic forms in a large algebraic setting. Introducing these objects leads us to develop and implant modifications of the Plesken and Souvignier algorithm. This algorithm efficiently solves the isometric lattices problem and the automorphism group computation problem for algebraic lattices.Eventually, we analyze in depth the complexity of this two algorithmic problems. We show that they are intimately related to similar problems on graphs. This reduction leads us to express unprecedented complexity bounds.
52

Využití struktur v automatickém plánování / Exploiting Structures in Automated Planning

Kuckir, Ivan January 2017 (has links)
This thesis focuses on improving the process of automated planing through symmetry breaking. The aim is to describe symmetries, which are often observed by human programmers, but haven't been properly theoretically formalized. After an analysis of available research, there are new definitions of symmetries proposed in context of classical planning, such as state equivalence, T1 automorphisms and more general automorphisms of constants. Several theorems are proved about new symmetries. As a result, an algorithm for detecting a special symmetry class is proposed, together with a method of exploiting such class during planning. Experimens are made to show the effect of symmetry breaking on the performance of the planner. Powered by TCPDF (www.tcpdf.org)
53

Codes Related to and Derived from Hamming Graphs

Muthivhi, Thifhelimbilu Ronald January 2013 (has links)
Masters of Science / Codes Related to and Derived from Hamming Graphs T.R Muthivhi M.Sc thesis, Department of Mathematics, University of Western Cape For integers n; k 1; and k n; the graph 􀀀k n has vertices the 2n vectors of Fn2 and adjacency de ned by two vectors being adjacent if they di er in k coordinate positions. In particular, 􀀀1 n is the classical n-cube, usually denoted by H1(n; 2): This study examines the codes (both binary and p-ary for p an odd prime) of the row span of adjacency and incidence matrices of these graphs. We rst examine codes of the adjacency matrices of the n-cube. These have been considered in [14]. We then consider codes generated by both incidence and adjacency matrices of the Hamming graphs H1(n; 3) [12]. We will also consider codes of the line graphs of the n-cube as in [13]. Further, the automorphism groups of the codes, designs and graphs will be examined, highlighting where there is an interplay. Where possible, suitable permutation decoding sets will be given.
54

Stabilizers of direct composition series

Droste, Manfred, Göbel, Rüdiger 13 December 2018 (has links)
Let R be a domain, V a left R-module, and L a composition series of direct summands of V. Our main results show that if U is a stabilizer group of L containing the McLain-group associated with L , then U determines the chain (L,⊆) uniquely up to isomorphism or anti-isomorphism.
55

Automorphism Groups And Chern Bounds of Fibrations

Christopher E Creighton (9189347) 30 July 2020 (has links)
In this thesis, I study two problems. First, I generalize a result by H-Y Chen to show that if $X$ is a smooth variety of general type and irregularity $q\geq 1$ that embeds into its Albanese variety as a smooth variety $Y$ of general type with codimension one or two, then $|Aut(X)|\leq |Aut(F_{min})||Aut(Y)|$ where $F_{min}$ is the minimal model of a general fiber. Then I describe a special type of fibration called a K-Fibration as a generalization to Kodaira Fibrations where we can compute its Chern numbers in dimensions 2 and 3. K-Fibrations act as an initial step in constructing examples of varieties that satisfy the generalization with the goal of computing their automorphism group explicitly.
56

Codes Related to and Derived from Hamming Graphs

Muthivhi, Thifhelimbilu Ronald January 2013 (has links)
>Magister Scientiae - MSc / For integers n, k 2:: 1, and k ~ n, the graph r~has vertices the 2n vectors of lF2 and adjacency defined by two vectors being adjacent if they differ in k coordinate positions. In particular, r~is the classical n-cube, usually denoted by Hl (n, 2). This study examines the codes (both binary and p-ary for p an odd prime) of the row span of adjacency and incidence matrices of these graphs. We first examine codes of the adjacency matrices of the n-cube. These have been considered in [14]. We then consider codes generated by both incidence and adjacency matrices of the Hamming graphs Hl(n,3) [12]. We will also consider codes of the line graphs of the n-cube as in [13]. Further, the automorphism groups of the codes, designs and graphs will be examined, highlighting where there is an interplay. Where possible, suitable permutation decoding sets will be given.
57

Orbit parametrizations of theta characteristics on hypersurfaces / 超曲面上のシータ・キャラクタリスティックの軌道によるパラメータ付け

Ishitsuka, Yasuhiro 23 March 2015 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(理学) / 甲第18766号 / 理博第4024号 / 新制||理||1580(附属図書館) / 31717 / 京都大学大学院理学研究科数学・数理解析専攻 / (主査)准教授 伊藤 哲史, 教授 上田 哲生, 教授 雪江 明彦 / 学位規則第4条第1項該当 / Doctor of Science / Kyoto University / DFAM
58

On the Automorphism Groups of Almost All Circulant Graphs and Digraphs

Bhoumik, Soumya 17 August 2013 (has links)
We attempt to determine the structure of the automorphism group of a generic circulant graph. We first show that almost all circulant graphs have automorphism groups as small as possible. Dobson has conjectured that almost all of the remaining circulant (di)graphs (those whose automorphism groups are not as small as possible) are normal circulant (di)graphs. We show this conjecture is not true in general, but is true if we consider only those circulant (di)graphs whose orders are in a “large” subset of integers. We note that all non-normal circulant (di)graphs can be classified into two natural classes (generalized wreath products, and deleted wreath type), and show that neither of these classes contains almost every non-normal circulant digraph.
59

Topological Properties of Invariant Sets for Anosov Maps with Holes

Simmons, Skyler C. 10 November 2011 (has links) (PDF)
We begin by studying various topological properties of invariant sets of hyperbolic toral automorphisms in the linear case. Results related to cardinality, local maximality, entropy, and dimension are presented. Where possible, we extend the results to the case of hyperbolic toral automorphisms in higher dimensions, and further to general Anosov maps.
60

Attacks On Difficult Instances Of Graph Isomorphism: Sequential And Parallel Algorithms

Tener, Greg 01 January 2009 (has links)
The graph isomorphism problem has received a great deal of attention on both theoretical and practical fronts. However, a polynomial algorithm for the problem has yet to be found. Even so, the best of the existing algorithms perform well in practice; so well that it is challenging to find hard instances for them. The most efficient algorithms, for determining if a pair of graphs are isomorphic, are based on the individualization-refinement paradigm, pioneered by Brendan McKay in 1981 with his algorithm nauty. Nauty and various improved descendants of nauty, such as bliss and saucy, solve the graph isomorphism problem by determining a canonical representative for each of the graphs. The graphs are isomorphic if and only if their canonical representatives are identical. These algorithms also detect the symmetries in a graph which are used to speed up the search for the canonical representative--an approach that performs well in practice. Yet, several families of graphs have been shown to exist which are hard for nauty-like algorithms. This dissertation investigates why these graph families pose difficulty for individualization-refinement algorithms and proposes several techniques for circumventing these limitations. The first technique we propose addresses a fundamental problem pointed out by Miyazaki in 1993. He constructed a family of colored graphs which require exponential time for nauty (and nauty's improved descendants). We analyze Miyazaki's construction to determine the source of difficulty and identify a solution. We modify the base individualization-refinement algorithm by exploiting the symmetries discovered in a graph to guide the search for its canonical representative. This is accomplished with the help of a novel data structure called a guide tree. As a consequence, colored Miyazaki graphs are processed in polynomial time--thus obviating the only known exponential upper-bound on individualization-refinement algorithms (which has stood for the last 16 years). The preceding technique can only help if a graph has enough symmetry to exploit. It cannot be used for another family of hard graphs that have a high degree of regularity, but possess few actual symmetries. To handle these instances, we introduce an adaptive refinement method which utilizes the guide-tree data structure of the preceding technique to use a stronger vertex-invariant, but only when needed. We show that adaptive refinement is very effective, and it can result in dramatic speedups. We then present a third technique ideally suited for large graphs with a preponderance of sparse symmetries. A method was devised by Darga et al. for dealing with these large and highly symmetric graphs, which can reduce runtime by an order of magnitude. We explain the method and show how to incorporate it into our algorithm. Finally, we develop and implement a parallel algorithm for detecting the symmetries in, and finding a canonical representative of a graph. Our novel parallel algorithm divides the search for the symmetries and canonical representative among each processor, allowing for a high degree of scalability. The parallel algorithm is benchmarked on the hardest problem instances, and shown to be effective in subdividing the search space.

Page generated in 0.0301 seconds