On the Pólya Enumeration Theorem

来源 :智能信息管理(英文) | 被引量 : 0次 | 上传用户:fionwy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Simple formulas for the number of different cyclic and dihedral necklaces containing nj beads of the j-th color, and , are derived, using the Pólya enumeration theorem.
其他文献
计划经济时期,广西的社会经济得到了较为快速的发展,工业化进程开始起步,但是随之而来的是水旱灾害的频发及其破坏程度的加剧。这一背景下,如何应对水旱灾害的严重威胁成为广
Collaborative platform on clustering applications for governments consists of six large-scale systems, including the clustering Government Internet portal syste
This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A pro
南京国民政府时期的县长制度有着深刻的政治背景和理论渊源,它在北洋政府县制改革的基础上,进一步规范了县长的选任和管理制度,它是以落实孙中山关于县自治思想为原则,根据国
20世纪50年代,中国共产党借鉴苏联建设宣传员的经验进行宣传网建设,读报小组是其中的重要一环。读报小组是中国共产党教育群众和联系群众的有效工具,也是群众性宣传队伍的基
根据地方基础教育改革和发展对物理教师人才的需求与学校定位,以未来地方基础教育物理教师所具备的物理学科专业能力和教师教育专业能力培养为目标,构建了"综合素质实践平台、
Intuitionistic Fuzzy Set (IFS) can be used as a general tool for modeling problems of decision making under uncertainty where, the degree of rejection is define
Cognitive machine learning refers to the combination of machine learning and brain cognitive mechanism, specifically, combining machine learning with mind model
Based on the graphic theory and improved genetic algorithm,an improved genetic algorithm to search the minimum spanning trees is given . The algorithm uses bina
The image security problem is an important area in information security, and image encryption plays a vital role in this day. To protect the image encryption fr