This paper discusses how to express a finite group as a graph, specifically about the identity graph of a cyclic group. The term chosen for the graph is an identity graph, because it is the identity element of the group that holds the key in forming the identity graph. Through the identity graph, it can be seen which elements are inverse of themselves and other properties of the group. We will look for the characteristics of identity graph of the finite cyclic group, for both cases of odd and even order.
In online learning, giving an objective assessment is quite tricky task. Most of exams in online learning are done as take-home exams. Unlike in face-to-face onsite class, in which the students can be observed directly when doing the exam, in online class the students have chance to cheat and work together to gain unfair advantage. To tackle this, the teachers need to modify the exam format. One possible solution is to create some variations of exam questions and distribute them to the students such that they do not get the same set of questions. However, we cannot create too many variations since it would make the grading process more difficult for the teacher. Thus, we need to find an optimal way to do so. In this article, we will discuss how Maximum Separable Distance (MDS) Codes in coding theory can be applied to provide a solution for this problem. Moreover, distribution patterns for class of size 27, 64 and 125 students will also be presented.
The minimum spanning tree is one of the applications of graph theory in various fields. There are several algorithms for determining the minimum spanning tree of a weighted graph, such as Kruskal's algorithm and Prim's algorithm. These two algorithms are not really easy to teach to students in general. Therefore in this paper presented an alternative algorithm called the algorithm "Destroy All Sikel", which is more intuitive and easier to understand. Furthermore, there are also examples of implementation and comparison with two other algorithms.
Differential privacy is a privacy scheme in which a database is modified such that each user's personal data are protected without affecting significantly the characteristics of the whole data. Example of such mechanism is Randomized Aggregatable Privacy-Preserving Ordinal Response (RAPPOR). Later it is found that the interpretations of privacy, accuracy and utility parameters in differential privacy are not totally clear. Therefore in this article an alternative definition of privacy aspect are proposed, where they are measured in term of Shannon entropy. Here Shannon entropy can be interpreted as number of binary questions an aggregator needs to ask in order to learn information from a modified database. Then privacy leakage of a differentially private mechanism is defined as mutual information between original distribution of an attribute in a database and its modified version. Furthermore, some simulations using the MATLAB software for special cases in RAPPOR are also presented to show that this alternative definition does make sense.
Homomorfisma gelanggang merupakan salah satu topik yang dipelajari dalam perkuliahan aljabar abstrak untuk jenjang S1. Definisi dari homomorfisma gelanggang merupakan perluasan dari definisi homomorfisma grup, dengan sifat “mengawetkan struktur” berlaku untuk kedua operasi binernya. Karena aksiomanya lebih banyak, akan lebih sulit untuk mencari contoh-contoh dari homomorfisma gelanggang daripada contoh-contoh homomorfisma grup. Dalam makalah ini akan dikaji suatu karakterisasi dari homomorfisma gelanggang untuk kasus spesifik dari Z_m ke Z_n, yang ternyata berkaitan erat dengan elemen idempoten di gelanggang Z_n. Karakterisasi lebih detail untuk berbagai macam kemungkinan keterkaitan antara nilai m dan n juga akan dipaparkan. Dengan menggunakan karakterisasi-karakterisasi tersebut, akan lebih mudah bagi para dosen pengampu mata kuliah aljabar abstrak dalam memberikan contoh-contoh homomorfisma gelanggang.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.