January 2012
Wu’s algorithm and its possible application in cryptanalysis
In this paper we reviewed Wu’s algorithm and introduced it as a cryptanalysis technique. This study reveals that when Wu’s algorithm is used for cryptanalysis it simplifies. This is true because Wu’s algorithm has to be applied to binary polynomials only, when used for cryptanalysis. To summarize, we gave a full description of Wu’s algorithm in the binary case and also a...
January 2012
Egoists dilemma with fuzzy data
In this paper, we investigate the problems of consensus–making among individuals or organizations with multiple criteria for evaluating performance when the players are supposed to be egoistic and the score for each criterion for a player is supposed to be fuzzy number. We deal with problems with fuzzy parameters from the viewpoint of experts’ imprecise or fuzzy understanding of the...
January 2012
On three-dimensional generalized sasakian space – forms
The object of the present paper is to study locally j –symmetric three-dimensional generalized Sasakian space forms and such manifolds with Ricci semi symmetric, h -parallel Ricci tensor and cyclic Ricci tensor. Such space forms with non-null concircular vector field are also considered. Key words: Generalized sasakian space forms, cosymplectic, locally-j -symmetric, h -parallel ricci...
Advertisement
Advertisement