In this paper, we present the division algorithm (DA) for the computation of b = c/a over GF(2(m)) in two aspects. First, we derive a new formulation for the discrete-tine Wiener-Hopf equation (DTWHE) Ab = c in GF(2) ...
详细信息
In this paper, we present the division algorithm (DA) for the computation of b = c/a over GF(2(m)) in two aspects. First, we derive a new formulation for the discrete-tine Wiener-Hopf equation (DTWHE) Ab = c in GF(2) over any basis. Symmetry of the matrix A is observed on some special bases and a three-step procedure is developed to solve the symmetric DTWHE. Secondly;we extend a variant of Stein's binary algorithm and propose a novel iterative division algorithm EB*. Owing to its structural simplicity;this algorithm can be mapped onto a systolic array with high speed and low area complexity.
This note develops and implements the theory of polynomial asymptotes to (graphs of) rational functions, as a generalization of the classical topics of horizontal asymptotes and oblique/slant asymptotes. Applications ...
详细信息
This note develops and implements the theory of polynomial asymptotes to (graphs of) rational functions, as a generalization of the classical topics of horizontal asymptotes and oblique/slant asymptotes. Applications are given to hyperbolic asymptotes. Prerequisites include the division algorithm for polynomials with coefficients in the field of real numbers and the elementary limit theorems from calculus. This note could be used as enrichment material in courses ranging from Calculus to Real Analysis to Abstract Algebra.
The physical parameters of control systems are uncertain and are accompanied by nonlinearity. The state space equation and the characteristic polynomial of the control system should, therefore, be expressed by an inte...
详细信息
ISBN:
(纸本)0780383524
The physical parameters of control systems are uncertain and are accompanied by nonlinearity. The state space equation and the characteristic polynomial of the control system should, therefore, be expressed by an interval set of parameters. This paper examines the robust stability of that type of control system based on the characteristic roots which exist in a sectorial area on the left half s-plane. A sufficient condition for the robust stability is given by applying a division algorithm (Sturm's theorem) to the four corner polynomials, that is, a Kharitonov-like rectangle which covers all extreme points of the polytopic polynomial.
In order to solve the parallel algorithm for Petri nets system with concurrent function, to realize the parallel control and execution of the Petri nets, the Petri nets parallel subnets conditions were proposed, that ...
详细信息
ISBN:
(纸本)9780769550602
In order to solve the parallel algorithm for Petri nets system with concurrent function, to realize the parallel control and execution of the Petri nets, the Petri nets parallel subnets conditions were proposed, that provides the theory basis for judging P- invariant whether was the parallel subnet. Firstly, we according to the concurrent character of Petri net model, to analyze the parallelism of Petri net system, P-invariants the solving process and it's subnet division were given;Secondly, the Petri nets parallel subnets conditions were proposed, gives P- invariant constituted of Petri net parallel subnets decision theorem, and the theoretical proof and example verification;Finally, A Petri net parallel subnet division algorithm based on P- invariants were given. Theoretical validate and experimental result shows that Petri nets parallel subnets conditions set and divided algorithm were correct and effective.
Theoretical problems in physical, biological and economical fields may require the solving of algebraic equations. However, the meaning of the solution of an algebraic equation has changed with the rapid improvement i...
详细信息
ISBN:
(纸本)9789806560727
Theoretical problems in physical, biological and economical fields may require the solving of algebraic equations. However, the meaning of the solution of an algebraic equation has changed with the rapid improvement in computer performance. Usually, the roots of an algebraic equation will be calculated numerically (even for a quadratic equation?). Of course, any problem in science and engineering that involves algebraic equations can be solved numerically. However, knowledge on the analytical properties of an algebraic equation is also important. In this paper, we reconsider the analytical properties of quadratic, cubic and general algebraic equa tions based on the classic Sturm concept because of its educational value and its usefulness for analyzing and designing a real system with some uncertainty. The set of roots (infinite set) of algebraic equations with uncertain (interval set) coefficients cannot be determined numerically by finite calculations. We. will present a discussion dealing with these problems from an educational point of view, and we will communicate the classic Sturm concept to the students and the audience at the conference.
The main purpose of this note is to present and justify proof via iteration as an intuitive, creative and empowering method that is often available and preferable as an alternative to proofs via either mathematical in...
详细信息
The main purpose of this note is to present and justify proof via iteration as an intuitive, creative and empowering method that is often available and preferable as an alternative to proofs via either mathematical induction or the well-ordering principle. The method of iteration depends only on the fact that any strictly decreasing sequence of positive integers must terminate in finitely many steps. Four examples are presented using the method of iteration. These examples concern the factorization of integers or polynomials into products of primes, the calculation of quotients and remainders via the division algorithm (and, hence, of greatest common divisors via the Euclidean algorithm) and the rank of matrices via elementary row and column operations. We also justify the method of proof by iteration by showing that its validity is a logical consequence of the method of mathematical induction. Various parts of this material would be suitable for courses on Precalculus, Discrete Mathematics, Abstract Algebra or Matrix Theory/Linear Algebra.
We define generalized quasi-cyclic (GQC) codes as linear codes with nontrivial automorphism groups. Therefore, GQC codes, unlike quasi-cyclic codes, can include many important codes such as Hermitian and projective ge...
详细信息
ISBN:
(纸本)9781424434343
We define generalized quasi-cyclic (GQC) codes as linear codes with nontrivial automorphism groups. Therefore, GQC codes, unlike quasi-cyclic codes, can include many important codes such as Hermitian and projective geometry (PG) codes;this capability is important in practical applications. Further, we propose the echelon canonical form algorithm for computing Grobner bases from their parity check matrices. Consequently, by applying Grobner base theory, GQC codes can be systematically encoded and implemented with simple feedback shift registers. Our algorithm is based on Gaussian elimination and requires a sufficiently small number of finite-field operations, which is related to the third power of code-length. In order to demonstrate our encoder's efficiency, we prove that the number of circuit elements in the encoder architecture is proportional to the code-length for finite geometry (FG) LDPC codes (a class of GQC codes). We show that the hardware complexity of a serial-in-serial-out encoder architecture for FG-LDPC codes is related to the linear order of the code-length;less than 2n adder and 2n memory elements are required to encode a binary codeword of length n.
Information security is of vital importance in today's internet world. Classified data such as military and government information are constantly transmitted over the internet. Among this, top secret data are imag...
详细信息
ISBN:
(纸本)9788132225263;9788132225256
Information security is of vital importance in today's internet world. Classified data such as military and government information are constantly transmitted over the internet. Among this, top secret data are images such as maps and surveillance footage. It is thus necessary to secure such visual data against unauthorized access. Visual secret sharing is the process of distributing "shares" of a secret image among a group of individuals. Only when all the shares have been combined, can the original secret image be obtained. In this paper, we have proposed a visual secret sharing scheme, using a simple division algorithm, for group authentication systems. This method has the advantage of being both time efficient and devoid of any pixel expansion. It can be applied to both grayscale as well as colour images and, as illustrated further ahead, ensures complete secrecy and regeneration of the original image from all the shares.
This note uses the analytic notion of asymptotic functions to study when a function is asymptotic to a polynomial function. Along with associated existence and uniqueness results, this kind of asymptotic behaviour is ...
详细信息
This note uses the analytic notion of asymptotic functions to study when a function is asymptotic to a polynomial function. Along with associated existence and uniqueness results, this kind of asymptotic behaviour is related to the type of asymptote that was recently defined in a more geometric way. Applications are given to rational functions and conics. Prerequisites include the division algorithm for polynomials with coefficients in the field of real numbers and elementary facts about limits from calculus. This note could be used as enrichment material in courses ranging from Calculus to Real Analysis to Abstract Algebra.
The division algorithm theorem is expressed in a form that permits it to serve as the basis for devising division operations that produce both quotient and remainder in complement form. algorithms for division yieldin...
详细信息
暂无评论