identity mapping
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 23)

H-INDEX

7
(FIVE YEARS 2)

Author(s):  
QiaoYun Zhu ◽  
HanHua Bai ◽  
Yi Wu ◽  
YuJia Zhou ◽  
Qianjin Feng
Keyword(s):  

2021 ◽  
Author(s):  
Yoo-Kyung Lee ◽  
Dong-Hwan Lee ◽  
Jae-Hun Choi ◽  
Jang-Hee Yoo ◽  
Seung-Ik Lee
Keyword(s):  

Author(s):  
Maryam Mohammadi Saem ◽  
Peter Lewintan ◽  
Patrizio Neff

We show under some natural smoothness assumptions that pure in-plane drill rotations as deformation mappings of a C 2 -smooth regular shell surface to another one parametrized over the same domain are impossible provided that the rotations are fixed at a portion of the boundary. Put otherwise, if the tangent vectors of the new surface are obtained locally by only rotating the given tangent vectors, and if these rotations have a rotation axis which coincides everywhere with the normal of the initial surface, then the two surfaces are equal provided they coincide at a portion of the boundary. In the language of differential geometry of surfaces, we show that any isometry which leaves normals invariant and which coincides with the given surface at a portion of the boundary is the identity mapping.


Author(s):  
Abdelaziz Ben Yahya

Let ℒ be a topologically simple ℒ ∗ -algebra of arbitrary dimension. In this paper, we introduce the notion of semi-inner biderivation in order to prove that every continuous commuting linear mapping on ℒ is a scalar multiple of the identity mapping.


Author(s):  
Chun Guo ◽  
François-Xavier Standaert ◽  
Weijia Wang ◽  
Xiao Wang ◽  
Yu Yu

Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study their underlying structure partial SPNs, i.e., Substitution-Permutation Networks (SPNs) with parts of the substitution layer replaced by an identity mapping, and put forward the first provable security analysis for such partial SPNs built upon dedicated linear layers. For different instances of partial SPNs using MDS linear layers, we establish strong pseudorandom security as well as practical provable security against impossible differential attacks. By extending the well-established MDS code-based idea, we also propose the first principled design of linear layers that ensures optimal differential propagation. Our results formally confirm the conjecture that partial SPNs achieve the same security as normal SPNs while consuming less non-linearity, in a well-established framework.


2021 ◽  
Vol 19 (1) ◽  
pp. 184-197
Author(s):  
Wieslaw A. Dudek ◽  
Robert A. R. Monzo

Abstract Any pentagonal quasigroup Q Q is proved to have the product x y = φ ( x ) + y − φ ( y ) xy=\varphi \left(x)+y-\varphi (y) , where ( Q , + ) \left(Q,+) is an Abelian group, φ \varphi is its regular automorphism satisfying φ 4 − φ 3 + φ 2 − φ + ε = 0 {\varphi }^{4}-{\varphi }^{3}+{\varphi }^{2}-\varphi +\varepsilon =0 and ε \varepsilon is the identity mapping. All Abelian groups of order n < 100 n\lt 100 inducing pentagonal quasigroups are determined. The variety of commutative, idempotent, medial groupoids satisfying the pentagonal identity ( x y ⋅ x ) y ⋅ x = y \left(xy\cdot x)y\cdot x=y is proved to be the variety of commutative, pentagonal quasigroups, whose spectrum is { 1 1 n : n = 0 , 1 , 2 , … } \left\{1{1}^{n}:n=0,1,2,\ldots \right\} . We prove that the only translatable commutative pentagonal quasigroup is x y = ( 6 x + 6 y ) ( mod 11 ) xy=\left(6x+6y)\left({\rm{mod}}\hspace{0.33em}11) . The parastrophes of a pentagonal quasigroup are classified according to well-known types of idempotent translatable quasigroups. The translatability of a pentagonal quasigroup induced by the group Z n {{\mathbb{Z}}}_{n} and its automorphism φ ( x ) = a x \varphi \left(x)=ax is proved to determine the value of a a and the range of values of n n .


2021 ◽  
Vol 20 ◽  
pp. 160940692110586
Author(s):  
Friday I. Joseph ◽  
Jane Earland ◽  
Maryam A. Ahmed

Studies conducted by outsider researchers, who do not share the participants’ culture, language or other traits, are often complex. The positionalities of participants are rarely considered in qualitative research literature but their influence defines how they engage with the researchers and their research. There is little within the literature specifically written for novice qualitative researchers working as an outsider. In this article, the experience of conducting research on breastfeeding in Nigeria with Hausa–Fulani Muslim women has been used to reflect upon the challenges of researching as an outsider. Drawing upon this work, a guide has been developed for researchers working with a group from a different cultural, ethnic or socioeconomic background to their own. The guide includes social identity mapping of both researcher and participants, a consideration of the sensitivity, vulnerability and cultural identity lenses through which the identity of the researcher, participants, and context intersect to influence the study, and reflexive questions. Considering these questions before conducting a study can help researchers to anticipate and proactively develop mitigation strategies to address common methodological and ethical dilemmas they may encounter.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
A. Kandil ◽  
S. A. El-Sheikh ◽  
M. Hosny ◽  
M. Raafat

In this paper, we introduce the concept of mapping on hesitant fuzzy soft multisets and present some results for this type of mappings. The notions of inverse image and identity mapping are defined, and their basic properties are investigated. Hence, kinds of mappings and the composition of two hesitant fuzzy soft multimapping with the same dimension are presented. The concept of hesitant fuzzy soft multitopology is defined, and certain types of hesitant fuzzy soft multimapping such as continuity, open, closed, and homeomorphism are presented in detail. Also, their properties and results are studied. In addition, the concept of hesitant fuzzy soft multiconnected spaces is introduced.


Sign in / Sign up

Export Citation Format

Share Document