Javascript must be enabled to continue!
A Comprehensive Overview on the Formation of Homomorphic Copies in Coset Graphs for the Modular Group
View through CrossRef
This work deals with the well-known group-theoretic graphs called coset graphs for the modular group G and its applications. The group action of G on real quadratic fields forms infinite coset graphs. These graphs are made up of closed paths. When M acts on the finite field Zp, the coset graph appears through the contraction of the vertices of these infinite graphs. Thus, finite coset graphs are composed of homomorphic copies of closed paths in infinite coset graphs. In this work, we have presented a comprehensive overview of the formation of homomorphic copies.
Title: A Comprehensive Overview on the Formation of Homomorphic Copies in Coset Graphs for the Modular Group
Description:
This work deals with the well-known group-theoretic graphs called coset graphs for the modular group G and its applications.
The group action of G on real quadratic fields forms infinite coset graphs.
These graphs are made up of closed paths.
When M acts on the finite field Zp, the coset graph appears through the contraction of the vertices of these infinite graphs.
Thus, finite coset graphs are composed of homomorphic copies of closed paths in infinite coset graphs.
In this work, we have presented a comprehensive overview of the formation of homomorphic copies.
Related Results
Development Paillier's library of fully homomorphic encryption
Development Paillier's library of fully homomorphic encryption
One of the new areas of cryptography considered-homomorphic cryptography. The article presents the main areas of application of homomorphic encryption. An analysis of existing deve...
Homomorphic Encryption and its Application to Blockchain
Homomorphic Encryption and its Application to Blockchain
The concept, method, algorithm and application of the advanced field of cryptography, homomorphic encryption, as well as its application to the field of blockchain are discussed in...
Power of Homomorphic Encryption in Secure Data Processing
Power of Homomorphic Encryption in Secure Data Processing
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. This paper presents a detailed discuss...
Modular Construction: A Comprehensive Review
Modular Construction: A Comprehensive Review
Modular construction has the potential to transform the construction industry, as most (80–95%) of the modules, which are considered prefabricated buildings, are manufactured off-s...
Design features of modular buildings
Design features of modular buildings
The paper is devoted to modular buildings as а current topic of modern construction. A significant number of studies on this topic have appeared both in Russia and abroad in last y...
The Absence of Smart Technology as One of The Key Factors of Transportation in Modular Construction: A Case Study in Malaysia
The Absence of Smart Technology as One of The Key Factors of Transportation in Modular Construction: A Case Study in Malaysia
Modular construction is a new method introduced to meet the modernisation agenda in the Malaysian construction industry. It provides various benefits to the construction industry, ...
Effects of herbal tea (Platostoma palustre) on the Hyperlipidemia in vivo
Effects of herbal tea (Platostoma palustre) on the Hyperlipidemia in vivo
Platostoma palustre jelly is a traditional food. Platostoma palustre has been used as folk medicine and is effective against heat-shock, hypertension and diabetes. Therefore, the a...
Twilight graphs
Twilight graphs
AbstractThis paper deals primarily with countable, simple, connected graphs and the following two conditions which are trivially satisfied if the graphs are finite:(a) there is an ...


