DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 162
1.
Full text
Available for: UL
2.
  • Representations of the rank... Representations of the rank two Racah algebra and orthogonal multivariate polynomials
    Crampé, Nicolas; Frappat, Luc; Ragoucy, Eric Linear algebra and its applications, 05/2023, Volume: 664
    Journal Article
    Peer reviewed
    Open access

    The algebraic structure of the rank two Racah algebra is studied in detail. We provide an automorphism group of this algebra, which is isomorphic to the permutation group of five elements. This group ...
Full text
Available for: UL
3.
  • Determinants and Permanents... Determinants and Permanents of Hessenberg Matrices with Perrin’s Bivariate Complex Polynomials and Its Application
    Kantalo, Jirawat WSEAS Transactions Mathematics, 5/2023, Volume: 22
    Journal Article
    Open access

    In this paper, we define some n x n Hessenberg matrices and then we obtain determinants and permanents of their matrices that give the odd and even terms of bivariate complex Perrin polynomials. ...
Full text
Available for: UL
4.
  • Big Data-Enabled Authentica... Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using Drones
    Vangala, Anusha; Agrawal, Saurabh; Das, Ashok Kumar ... IEEE transactions on vehicular technology, 07/2024, Volume: 73, Issue: 7
    Journal Article
    Peer reviewed

    The maritime transportation industry is a prime target for cybersecurity attacks due to the inherent risks of transmitting sensitive information required for its smooth operation. The introduction of ...
Full text
Available for: UL
5.
Full text

PDF
6.
  • A (t, n) Threshold Quantum ... A (t, n) Threshold Quantum Secret Sharing Scheme with Fairness
    Li, Fulin; Chen, Tingyan; Zhu, Shixin International journal of theoretical physics, 06/2023, Volume: 62, Issue: 6
    Journal Article
    Peer reviewed

    Quantum secret sharing is an important technique of quantum cryptography. A ( t ,  n ) threshold quantum secret sharing scheme with fairness is proposed. Firstly, the proposed scheme only requires ...
Full text
Available for: UL
7.
  • Bounded-Input Bounded-Outpu... Bounded-Input Bounded-Output Stability Tests for Two-Dimensional Continuous-Time Systems
    Bistritz, Yuval IEEE transactions on circuits and systems. I, Regular papers, 05/2021, Volume: 68, Issue: 5
    Journal Article
    Peer reviewed

    This paper presents two efficient algorithms to determine whether a bivariate polynomial, possibly with complex coefficients, does not vanish in the cross product of two closed right-half planes (is ...
Full text
Available for: UL
8.
Full text
Available for: UL

PDF
9.
Full text
Available for: UL

PDF
10.
  • Zero sets of bivariate Herm... Zero sets of bivariate Hermite polynomials
    Area, Iván; Dimitrov, Dimitar K.; Godoy, Eduardo Journal of mathematical analysis and applications, 01/2015, Volume: 421, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    We establish various properties for the zero sets of three families of bivariate Hermite polynomials. Special emphasis is given to those bivariate orthogonal polynomials introduced by Hermite by ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 162

Load filters