Javascript must be enabled to continue!
A Comprehensive Overview on the Formation of Homomorphic Copies in Coset Graphs for the Modular Group
View through CrossRef
This work deals with the well-known group-theoretic graphs called coset graphs for the modular group G and its applications. The group action of G on real quadratic fields forms infinite coset graphs. These graphs are made up of closed paths. When M acts on the finite field Zp, the coset graph appears through the contraction of the vertices of these infinite graphs. Thus, finite coset graphs are composed of homomorphic copies of closed paths in infinite coset graphs. In this work, we have presented a comprehensive overview of the formation of homomorphic copies.
Title: A Comprehensive Overview on the Formation of Homomorphic Copies in Coset Graphs for the Modular Group
Description:
This work deals with the well-known group-theoretic graphs called coset graphs for the modular group G and its applications.
The group action of G on real quadratic fields forms infinite coset graphs.
These graphs are made up of closed paths.
When M acts on the finite field Zp, the coset graph appears through the contraction of the vertices of these infinite graphs.
Thus, finite coset graphs are composed of homomorphic copies of closed paths in infinite coset graphs.
In this work, we have presented a comprehensive overview of the formation of homomorphic copies.
Related Results
Development Paillier's library of fully homomorphic encryption
Development Paillier's library of fully homomorphic encryption
One of the new areas of cryptography considered-homomorphic cryptography. The article presents the main areas of application of homomorphic encryption. An analysis of existing deve...
Homomorphic Encryption and its Application to Blockchain
Homomorphic Encryption and its Application to Blockchain
The concept, method, algorithm and application of the advanced field of cryptography, homomorphic encryption, as well as its application to the field of blockchain are discussed in...
Power of Homomorphic Encryption in Secure Data Processing
Power of Homomorphic Encryption in Secure Data Processing
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. This paper presents a detailed discuss...
Computing the Energy of Certain Graphs based on Vertex Status
Computing the Energy of Certain Graphs based on Vertex Status
Background:
The concept of Hückel molecular orbital theory is used to compute the graph energy numerically and graphically on the base of the status of a vertex.
Objective:
Our a...
Data Analytics on Graphs Part I: Graphs and Spectra on Graphs
Data Analytics on Graphs Part I: Graphs and Spectra on Graphs
The area of Data Analytics on graphs promises a paradigm shift, as we approach information processing of new classes of data which are typically acquired on irregular but structure...
Modular Construction: A Comprehensive Review
Modular Construction: A Comprehensive Review
Modular construction has the potential to transform the construction industry, as most (80–95%) of the modules, which are considered prefabricated buildings, are manufactured off-s...
Design features of modular buildings
Design features of modular buildings
The paper is devoted to modular buildings as а current topic of modern construction. A significant number of studies on this topic have appeared both in Russia and abroad in last y...
The Absence of Smart Technology as One of The Key Factors of Transportation in Modular Construction: A Case Study in Malaysia
The Absence of Smart Technology as One of The Key Factors of Transportation in Modular Construction: A Case Study in Malaysia
Modular construction is a new method introduced to meet the modernisation agenda in the Malaysian construction industry. It provides various benefits to the construction industry, ...

