首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
1.Intr0ductionandPreliminariesNonlinearpermutations0fGF(2")withstrongcryptographicpropertieshaveimportantaPplicationsincryptol0gysuchasDES-likeblockciphers,hushfunctionsandstreamciphers.TheStrictAvalancheCriterion(SAC)wasiotroducedbyWebsterandTaVresl2]inc…  相似文献   

2.
In this paper, we investigate the growth of meromorphic solutions of higher order linear differential equation f^(k) +Ak-1 (z)e^Pk-1^(z) f^(k-1) +…+A1 (z)e^P1(z) f′ +Ao(z)e^Po(z) f = 0 (k ≤ 2), where Pj(z) (j = 0, 1,..., k - 1) are nonconstant polynomials such that deg Pj = n (j = 0, 1,..., k - 1) and Aj(z)(≠ 0) (j = 0, 1,..., k - 1) are meromorphic functions with order p(Aj) 〈 n (j = 0, 1,..., k - 1).  相似文献   

3.
Let be the set of trees on 2k+1 vertices with nearly perfect matchings, and let be the set of trees on 2k + 2 vertices with perfect matchings. The largest Laplacian spectral radii of trees in and and the corresponding trees were given by Guo (2003). In this paper, the authors determine the second to the sixth largest Laplacian spectral radii among all trees in and give the corresponding trees. This research is supported by the National Natural Science Foundation of China under Grant No. 10331020.  相似文献   

4.
This paper presents a new algorithm for computing the extended Hensel construction(EHC) of multivariate polynomials in main variable x and sub-variables u_1, u_2, ···, u_m over a number field K. This algorithm first constructs a set by using the resultant of two initial coprime factors w.r.t. x, and then obtains the Hensel factors by comparing the coefficients of x~i on both sides of an equation. Since the Hensel factors are polynomials of the main variable with coefficients in fraction field K(u_1, u_2, ···, u_m), the computation cost of handling rational functions can be high. Therefore,the authors use a method which multiplies resultant and removes the denominators of the rational functions. Unlike previously-developed algorithms that use interpolation functions or Gr?bner basis, the algorithm relies little on polynomial division, and avoids multiplying by different factors when removing the denominators of Hensel factors. All algorithms are implemented using Magma, a computational algebra system and experiments indicate that our algorithm is more efficient.  相似文献   

5.
This paper is devoted to the study of semi-bent functions with several parameters flexible on the finite field F2n.Boolean functions defined on F2n of the form f(r)ab(x) =Trn1(axr(2m-1))+Tr41(bx(2n-1)/5) and the form g(rs)abcd(x)=Trn1(axr(2m-1))+Tr41(bx(2n-1)/5)+Trn1(cx(2m-1)1/2+1)+Trn1(dx(2m-1)s+1) where n = 2m,m = 2(mod 4),a,c ∈ F2n,and b ∈ F(16),d ∈ F2,are investigated in constructing new classes of semi-bent functions.Some characteristic sums such as Kloosterman sums and Weil sums are employed to determine whether the above functions are semi-bent or not.  相似文献   

6.
The trace inverse functions Tr(λx~(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx~(-1)).However,currently only some bounds on algebraic immunity of Tr(λx~(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx~(-1)) over F_(2~n),that is,AI(Tr(λx~(-1))) =[2n~(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx~(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx~(-1)) against fast algebraic attacks.  相似文献   

7.
We study two-weight norm inequality for imaginary powers of a Laplace operator in R^n, n ≥ 1, especially from weighted Lebesgue space Lv^p(R^n) to weighted Lebesgue space Lμ^p(R^n), where 1 〈 p 〈 ∞. We prove that the two-weighted norm inequality holds whenever for some t 〉 1, (μ^t, v^t) ∈ Ap, or if (μ, v) ∈Ap, where μ and v^-1/(p-1) satisfy the growth condition and reverse doubling property.  相似文献   

8.
This paper studies variational discretization for the optimal control problem governed by parabolic equations with control constraints.First of all,the authors derive a priori error estimates where |||u-U(h|||L∞(J;L2(Ω))=O(h2+k).It is much better than a priori error estimates of standard finite element and backward Euler method where |||μ-Uh|||(L∞(J;L2(Ω))=O(h+ k).Secondly,the authors obtain a posteriori error estimates of residual type.Finally,the authors present some numerical algorithms for the optimal control problem and do some numerical experiments to illustrate their theoretical results.  相似文献   

9.
It has been observed in laboratory experiments that when nonlinear dispersive waves are forced periodically from one end of undisturbed stretch of the medium of propagation, the signal eventually becomes temporally periodic at each spatial point. The observation has been confirmed mathematically in the context of the damped Korteweg-de Vries (KdV) equation and the damped Benjamin-Bona-Mahony (BBM) equation. In this paper we intend to show the same results hold for the pure KdV equation (without the damping terms) posed on a finite domain. Consideration is given to the initial-boundary-value problem {ut+ux+uux+uxxx=0, u(x,0)=φ(x), 0〈x〈1, t〉0,u(0,t)=h(t), u(1,t) = 0, ux(1,t) = 0, t〉0.It is shown that if the boundary forcing h is periodic with small ampitude, then the small amplitude solution u of (*) becomes eventually time-periodic. Viewing (*) (without the initial condition) as an infinite-dimensional dynamical system in the Hilbert space L^2(0, 1), we also demonstrate that for a given periodic boundary forcing with small amplitude, the system (*) admits a (locally) unique limit cycle, or forced oscillation, which is locally exponentially stable. A list of open problems are included for the interested readers to conduct further investigations.  相似文献   

10.
This paper deduces the structure of LCD negacyclic codes over the finite field Fq, where q is an odd prime power. Based on the study of q-cyclotomic cosets modulo 2 n, the authors obtain the parameters of LCD negacyclic codes of lengths n =(q+1)/2,(q~m-1)/2(q-1)and q~(t·2~τ)-1/2(q~t +1), respectively. And many optimal codes are given. Moreover, the authors research two special classes of MDS LCD negacyclic codes of length n |(q-1)/2 and n |(q+1)2, respectively.  相似文献   

11.
Given a real-valued separable M-type 2 Banach space X with the p-th power of the norm of C2-class, the almost sure asymptotic upper bounds of the solutions of the Ornstein-Uhlenbeck Processes described by the following equations {dz(t)=A(t,z(t))dt+σ(t,z(t))dW(t),z(0)=z0∈X,are investigated. This study generalizes the corresponding well-known finite dimensional results of Lapeyre (1989) and Mao (1992).  相似文献   

12.
This study is concerned with the stabilization issue of nonlinear systems subject to parameter uncertainties. An interval type-2 T-S fuzzy model is used to represent the nonlinear systems subject to parameter uncertainties. An interval type-2 fuzzy static output feedback controller is designed to synthesize the interval type-2 T-S fuzzy systems. The membership-function-dependent stability conditions are derived by utilizing the information of upper and lower membership functions. The proposed stability conditions are presented in the form of linear matrix inequalities (LMIs). LMI-based stability conditions for interval type-2 fuzzy static output feedback H control synthesis are also developed. Several simulation examples are given to show the superiority of the proposed approach.  相似文献   

13.
Let F=C(x1,x2,…,xe,xe+1,…,xm), where x1, x2,… , xe are differential variables, and xe+1,…,xm are shift variables. We show that a hyperexponential function, which is algebraic over F,is of form g(x1, x2, …,xm)q(x1,x2,…,xe)^1/lwe+1^xe+1…wm^xm, where g∈ F, q ∈ C(x1,x2,…,xe),t∈Z^+ and we+1,…,wm are roots of unity. Furthermore,we present an algorithm for determining whether a hyperexponential function is algebraic over F.  相似文献   

14.
On-Line Scheduling with Rejection on Identical Parallel Machines   总被引:1,自引:0,他引:1  
In this paper, we consider the on-line scheduling of unit time jobs with rejection on rn identical parallel machines. The objective is to minimize the total completion time of the accepted jobs plus the total penalty of the rejected jobs. We give an on-line algorithm for the problem with competitive ratio 1/2 (2 +√3) ≈ 1.86602.  相似文献   

15.
In generalized linear models with fixed design, under the assumption λ↑_n→∞ and other regularity conditions, the asymptotic normality of maximum quasi-likelihood estimator ^↑βn, which is the root of the quasi-likelihood equation with natural link function ∑i=1^n Xi(yi -μ(Xi′β)) = 0, is obtained, where λ↑_n denotes the minimum eigenvalue of ∑i=1^nXiXi′, Xi are bounded p × q regressors, and yi are q × 1 responses.  相似文献   

16.
This paper is devoted to the construction of one-Lee weight codes and two-Lee weight codes over F p + vF p (v 2 = v) with type \({p^{2{k_1}}}{p^{{k_2}}}{p^{{k_3}}}\) based on two different distance-preserving Gray maps from ((F p + vF p ) n , Lee weight) to (F p 2n , Hamming weight), where p is a prime. Moreover, the authors prove that the obtained two-Lee weight codes are projective only when p = 2.  相似文献   

17.
This paper considers the Rosenau equation with a moving control?t u + ?_t?_x~4 u + ?_xu + u?x u = a(x + ct)h(x, t), c = 0, x ∈ T = R/(2πZ), t 0.The authors prove that the Rosenau equation with a moving control is locally exact controllable in Hs(T) with s ≥ 0 and globally exponential stable in H~s(T) with s ≥ 2. The two results nontrivially extend the work of(Rosier L and Zhang B Y, 2013) from the BBM equation to the Rosenau equation.  相似文献   

18.
The purpose of this paper is to present a general iterative scheme as below:
and to prove that, if {α n } and {r n } satisfy appropriate conditions, then iteration sequences {x n } and {u n } converge strongly to a common element of the set of solutions of an equilibrium problem and the set of fixed points of a nonexpansive mapping and the set of solution of a variational inequality, too. Furthermore, by using the above result, we can also obtain an iterative algorithm for solution of an optimization problem , where h(x) is a convex and lower semicontinuous functional defined on a closed convex subset C of a Hilbert space H. The results presented in this paper extend, generalize and improve the results of Combettes and Hirstoaga, Wittmann, S.Takahashi, Giuseppe Marino, Hong-Kun Xu, and some others. This research is supported by the National Natural Science Foundation of China under Grant No. 10771050.  相似文献   

19.
Sequences with ideal correlation functions have important applications in communications such as CDMA, FDMA, etc. It has been shown that difference sets can be used to construct such sequences. The author extends Pott and Bradley's method to a much broader case by proposing the concept of generalized difference sets. Some necessary conditions for the existence of generalized difference sets are established by means of some Diophantine equations. The author also provides an algorithm to determine the existence of generalized difference sets in the cyclic group Zv. Some examples are presented to illustrate that our method works.  相似文献   

20.
In this paper, the authors consider an on-line scheduling problem of m (m ≥ 3) identical machines with common maintenance time interval and nonresumable availability. For the case that the length of maintenance time interval is larger than the largest processing time of jobs, the authors prove that any on-line algorithm has not a constant competitive ratio. For the case that the length of maintenance time interval is less than or equal to the largest processing time of jobs, the authors prove a lower bound of 3 on the competitive ratio. The authors give an on-line algorithm with competitive ratio $4 - \tfrac{1} {m} $ . In particular, for the case of m = 3, the authors prove the competitive ratio of the on-line algorithm is $\tfrac{{10}} {3} $ .  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号