Efficient Calculation of the Weight. Distributions for Linear Codes over. Large Finite Fields

Size: px
Start display at page:

Download "Efficient Calculation of the Weight. Distributions for Linear Codes over. Large Finite Fields"

Transcription

1 Contemporary Engineering Sciences, Vol. 9, 0, no. 3, 09-7 HIKARI Ltd, Efficient Calculation of the Weight Distributions for Linear Codes over Large Finite Fields Sunghyu Han School of Liberal Arts & HRD KoreaTech, South Korea Hee Suk Seo Department of Computer Science and Engineering KoreaTech, South Korea Corresponding author Seunghwan Ju Department of Computer Science and Engineering KoreaTech, South Korea Copyright 0 Sunghyu Han, Hee Suk Seo and Seunghwan Ju. This is article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract In an error correcting code, the performance of a specific linear code is dependent on the minimum weight and the weight distribution of the code. Therefore it is very importance to know or calculate the minimum weight and the weight distribution of a code. In this paper we propose a very efficient calculation method for the minimum weight and the weight distribution for linear codes over large finite fields. Computation results show that our algorithm is much faster than Magma, the computational algebra system, for the minimum weight and the weight distribution of specific random linear codes over large finite fields. Keywords: Linear codes, Minimum weight, Weight distributions

2 0 Sunghyu Han et al. Introduction Error correcting codes are very important in data communication. There are various types of error correcting codes. Among them, linear codes over finite fields are basic and fundamental. Also they have strong application in data communication. The performance of a specific linear code is dependent on the minimum weight and the weight distribution of the code. In 978, Berlekamp, McEliece and van Tilborg proved that the computation of weight distribution of linear codes over GF() is NP-complete [], and in 997, Alexander Vardy proved that the computation of minimum weight of linear codes over GF() is also NPcomplete []. Therefore, we cannot expect a polynomial-time algorithm for these computation unless P = NP. Many scientists investigated the problem of the computation for minimum weight and the weight distribution. A lot of them were not published and used in personal purpose. A. E. Brouwer and K.-H. immerman proposed an algorithm for minimum weight and the algorithm is implemented in Magma [, 3]. They used many different generator matrices. In [0], Leon also proposed an algorithm for minimum weight, which is probabilistic, and the algorithm is used in GUAVA []. In [], I. Bouyukliev and V. Bakoev proposed an algorithm for the weight distribution using a sequence of different generator matrices. In [9], S. Han proposed an algorithm for the weight distribution and using the algorithm calculated the weight distribution of the proections of the -adic Golay code of length to e. The purpose of this paper is to suggest an efficient calculation method for the minimum weight and the weight distribution of linear codes over finite fields. The key idea of our algorithm is based on the idea in [9]. In this paper, we investigate the complexity of the algorithm, and apply the algorithm to random linear codes over large finite fields. Our calculation results show that our method is much faster than Magma [] for random linear codes over large finite fields. This paper is organized in the following way. First we describe the previous well known basic method in Previous Method, and our algorithm is given in Proposed Method with detailed complexity discussion of the algorithm. In Computation time, we give calculation results of our algorithm and Magma. All the computations of this paper were done using a laptop (GHz, 8GB RAM) and Magma(V.9-). Previous Method. Method Let C be an [n, k] linear code over Fq with a k n generator matrix G. Our obect is to calculate the number of codewords of C with given weight w. To do this, we consider the following linear combinations. c ag ag a k G k ()

3 Efficient calculation of the weight distributions Where ai Fq and Gi is the i-th row of G, ( i k). We only have to calculate the codewords in Eqn. () of weight w. The number of linear combinations of Eqn. () is k q () For each linear combination, we require nk multiplications and n(k ) additions over Fq. Therefore the total multiplication and total additions are q k nk, q k n(k ), respectively.. Method Above method can be improved if we using a standard generator matrix. We can obtain G = [I A], where I is a k k identity matrix, using a Gauss-Jordan elimination and column permutation. Let C be the linear code generated by G. Then C and C are equivalent and have the same weight distribution. Therefore without loss of generality, we can assume that C has a standard generator G = [I A]. Let s consider the following linear combinations c ag ag ag i i t, (3) where a F q, (F q = Fq {0}, t), i < i < < it k, and t min{k,w}. Let c = (u u), where u is the first k coordinates and u is the last n k * coordinates of c. Since ai F, the weight of q u is t. Therefore we have to count the codeword c of weight wt(u) = w t, where wt(u) means the weight of u. This fact leads to the following linear combinations. i t u aa a A aa i i t, () i t where a F q, ( t), A is the -th row of A. We only have to calculate the number of u in Eqn. () of weight w t. The total number of linear combinations in Eqn. () is k k min{ k, w} k tk () ( q ) ( q ) ( q ) ( q ) min{, kw} tmin{ k, w} We can reduce the number of linear combinations in Eqn. () by the following observation. Let ' a at u u Ai Ai A () i a a a t Then the weight of u is the same as the weight of u. Therefore in Eqn. (), we restrict a =, and then calculate the number of codewords u of weight w-t, and then we multiply the number by q-. This fact leads to the following computational complexity for the number of linear combinations. t

4 Sunghyu Han et al. k k ( q ) ( q ) min{ k, w } min{ k, w } tmin{ k, w } k ( q ) t k t (7) Now we calculate the number of multiplication and addition of Fq in Eqn. () with a =. The number is (t-)*(n-k) for both multiplication and addition. Using this fact and Eqn. (7) we have the total number of multiplication and the total number of addition over Fq by the following. ( n k ) t min{ k, w } ( q ) t k ( t ) t (8) 3 Proposed method 3. Method 3 Let C be an [n, k] linear code over Fq with a k n generator matrix G. Our obect is to calculate the number of codewords of C with given weight w. First, we consider the null space of each column vector of G. T k i Null(( G i ) ) { v F vg 0},( i,,, n ) (9) i q where G i is the i-th column vector of G. The number of codewords of C with given weight w is given by the following formula. f( G, w ) I{,,, n }, I n w I I (0) Note that if v ( I I ) and c = vg = (c, c,, cn) then c = 0 for I and c 0 for I. Therefore wt(c) = w. In other words, in Eqn. (0), I corresponds to the zero components of a codeword and I corresponds to the nonzero components of a codeword. The number of zero components is I = n-w and the number of nonzero components is I C = w. Therefore the weight of a codeword is w. The number of terms of the summation in Eqn. (0) is n n w w n () For each term of the summation, we have to calculate the value I I. In the first, I can be calculated by Gauss-Jordan Elimination. The complexity of multiplication and addition of Gauss-Jordan Elimination is 3 k k k, 3 k k k, respectively, for k k matrix. For each element v C I we have to check that v for all I. This can be done by checking C C vg 0 for I. Therefore the number of multiplication is k for each I and

5 Efficient calculation of the weight distributions 3 C the number of addition is k- for each I. Since I C is w, the the number of multiplication and addition is kw and (k-)w, respectively. The complexity depends on the number of elements of, i.e.,. This value depends I I on the rank of G I, where G I is the column submatrix of G consists of the G, I. Let r( be the rank of G I. Then I = q k - r(. For checking vg 0, we only have to check for a normalized vector v, i.e., the first nonzero component is k r(, the total multiplication is q kw and the total addition q k r( is q ( k ) w. Finally, the number of multiplication of f(g, w) is q I{,,, n }, I n w the number of addition of f(g, w) is I{,,, n }, I n w 3 ( k k 3 3 ( k k 3 k r( q k ) kw 3 q k r( q k ) ( k ) w q. (). (3) 3. Method Combining Method and Method 3, we give Method. We start with Method. Let s consider the following linear combinations c ag ag ag i i t, () where a F q, (F q = Fq {0}, t), i < i < < it k, and t min{k,w}. Let c = (u u), where u is the first k coordinates and u is the last n k * coordinates of c. Since ai F, the weight of q u is t. Therefore we have to count the codeword c of weight wt(u) = w t, where wt(u) means the weight of u. This fact leads to the following linear combinations. i t u a A a A a A i i t, () where a F q, ( t), A is the -th row of A. We only have to calculate the number of u in Eqn. () of weight w t. Now we follow Method 3. The number of u in Eqn. (8) of weight w-t can be written by the following formula. f( A({ i i t * *, it }), w t) (), i, I{,,, n k }, I ( n k ) ( w t) I I where A({i, i,, it}) be the t (n-k) submatrix of A with i ( t) rows of A and * * t { v ( F q ) va ({ i, i,, it }) 0}, ( =,,,n-k) and A({i, i,, it}) is the -th column vector of A({i, i,, it}).

6 Sunghyu Han et al. Then the number of codewords of weight w in C is f ( G, w ) f( A {{ i, i,...}, it w t} (7) t min{ k, w }{ i, i,...} it S ( k, t) where S(k, t) is the set of all subsets of {,,, k} with size t. Therefore the total complexity for multiplication is the following. min{ k, w } t { i, i,...} i S ( k, t) I{,,, n k }, I ( n k ) ( w t) tr( 3 q O ( t ) t ( w t) q (8) And the total complexity for addition is the following. min{ k, w } t { i, i,...} i S ( k, t) I{,,, n k }, I ( n k ) ( w t) tr( 3 q O ( t ) ( t ) ( w t) q (9) There are many factors for the complexity. But we focus on the size of q. We assume that q is very large and the other factors are small, i.e., we assume that S(k, t) and n k are small. In this case, the main factor is q t - r(. Therefore if w t t-r( is small, Method has better performance than previous algorithms. Computation time In this section, we compare our proposed method with the method in Magma. We have two kinds of computations. First one is the computation of minimum weight. Second one is the computation of partial weight distribution. For this purpose, we generate random linear codes over GF(q) for various values of q. More specifically, we make random matrix 7 matrix A over GF(q) and then we make generator matrix [I,A] for the random linear [, 7, d] codes over GF(q). The computation results are summarized in Table and Table. In Table, we give the calculation time for the minimum weight. For example, for a random linear [, 7, d] codes over GF( 3 ) (in this case the minimum weight is d = ), our proposed Method takes 0.0 seconds but the Magma built-in function takes seconds. In Table, we give the calculation time for the minimum weight and the partial weight distribution up to minimum weight. For example, for a random linear [, 7, d] codes over GF( 0 ) (in this case the minimum weight is d = and the number of minimum weight codewords is # = 9), our proposed Method takes seconds for the minimum weight and 0. seconds for the number of minimum weight codewords. But the Magma built-in function takes.73 seconds for the minimum weight and more than 00 seconds for the number of minimum weight codewords. From the Table and Table, our method is more efficient than the Magma method.

7 Efficient calculation of the weight distributions Table : Minimum weight calculation time for random linear [, 7, d] codes over GF(q) q d Method Magma Table : Minimum weight calculation time for random linear [, 7, d] codes over GF(q) q d # min. cw. Method for d Method for # Magma for d Magma for # >00

8 Sunghyu Han et al. Conclusion In this paper, we proposed an efficient algorithm for computations of the minimum weight and the weight distribution of linear codes over finite fields. Our method is very efficient if the size of finite field is large. In this case, our algorithm is much faster than Magma. In the future work, it is worth while to find another application of our algorithm. For example, we can investigate whether our algorithm can be applied to the computation of the minimum weight and the weight distribution of quadratic residue codes. Acknowledgements. This work (Grants No. C0383) was partially supported by Business for Cooperative R&D between Industry, Academy, and Research Institute funded Korea Small and Medium Business Administration in 0. This paper was partially supported by the Education and Research Promotion Program of KOREATECH. References [] E.R. Berlekamp, R.J. McEliece, H.C. van Tilborg, On the inherent intractability of certain coding problems, IEEE Trans. Inform. Theory, (978), [] W. Bosma, J. Cannon and C. Playoust, The Magma Algebra System I: The User Language, J. Symbolic Comput., (997), [3] A. Betten, H. Fripertinger, A. Kerber, A. Wassermann, K.-H. immermann, Codierungstheorie Konstruktion und Anwendung linearer Codes, Springer-Verlag, Berlin, Heidelberg, New York, [] I. Bouyukliev, V. Bakoev, A method for efficiently computing the number of codewords of fixed weights in linear codes, Discrete Applied Mathematics, (008), [] A.R. Calderbank, N.J.A. Sloane, Modular and p-adic Cyclic Codes, Designs, Codes Cryptogr., (99), [] J. Cramwinckel, E. Roiackers, R. Baart, E. Minkes, L. Ruscio, D. Joyner, GAP package GUAVA.

9 Efficient calculation of the weight distributions 7 [7] S.T. Dougherty, S.Y. Kim, Y.H. Park, Lifted codes and their weight enumerators, Discr. Math., 30 (00), [8] P. Gaborit, C.-S. Nedeloaia, A. Wassermann, On the Weight Enumerators of Duadic and Quadratic Residue Codes, IEEE Trans. Inf. Theory, (00), [9] S. Han, On the Weight Enumerators of the Proections of the -adic Golay Code of Length to e, Chapter in Mathematical Software - ICMS 0, 0, -. [0] J. Leon, A probabilistic algorithm for computing minimum weights of large error-correcting codes, IEEE Trans. Inform. Theory, 3 (988), [] A. Vardy, The intractability of computing the minimum distance of a code, IEEE Trans. Inform. Theory, 3 (997), no., Received: April, 0; Published: June, 0

Solving Homogeneous Systems with Sub-matrices

Solving Homogeneous Systems with Sub-matrices Pure Mathematical Sciences, Vol 7, 218, no 1, 11-18 HIKARI Ltd, wwwm-hikaricom https://doiorg/112988/pms218843 Solving Homogeneous Systems with Sub-matrices Massoud Malek Mathematics, California State

More information

On Symmetric Bi-Multipliers of Lattice Implication Algebras

On Symmetric Bi-Multipliers of Lattice Implication Algebras International Mathematical Forum, Vol. 13, 2018, no. 7, 343-350 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/imf.2018.8423 On Symmetric Bi-Multipliers of Lattice Implication Algebras Kyung Ho

More information

Formally self-dual additive codes over F 4

Formally self-dual additive codes over F 4 Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University

More information

A Note on Finite Groups in which C-Normality is a Transitive Relation

A Note on Finite Groups in which C-Normality is a Transitive Relation International Mathematical Forum, Vol. 8, 2013, no. 38, 1881-1887 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/imf.2013.39168 A Note on Finite Groups in which C-Normality is a Transitive Relation

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

An Improved Hybrid Algorithm to Bisection Method and Newton-Raphson Method

An Improved Hybrid Algorithm to Bisection Method and Newton-Raphson Method Applied Mathematical Sciences, Vol. 11, 2017, no. 56, 2789-2797 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2017.710302 An Improved Hybrid Algorithm to Bisection Method and Newton-Raphson

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

p-class Groups of Cyclic Number Fields of Odd Prime Degree

p-class Groups of Cyclic Number Fields of Odd Prime Degree International Journal of Algebra, Vol. 10, 2016, no. 9, 429-435 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.6753 p-class Groups of Cyclic Number Fields of Odd Prime Degree Jose Valter

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

On the Computation of the Adjoint Ideal of Curves with Ordinary Singularities

On the Computation of the Adjoint Ideal of Curves with Ordinary Singularities Applied Mathematical Sciences Vol. 8, 2014, no. 136, 6805-6812 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.49697 On the Computation of the Adjoint Ideal of Curves with Ordinary Singularities

More information

Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 22, HIKARI Ltd,

Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 22, HIKARI Ltd, Advanced Studies in Theoretical Physics Vol. 8, 204, no. 22, 977-982 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.2988/astp.204.499 Some Identities of Symmetry for the Higher-order Carlitz Bernoulli

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

Diophantine Equations. Elementary Methods

Diophantine Equations. Elementary Methods International Mathematical Forum, Vol. 12, 2017, no. 9, 429-438 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/imf.2017.7223 Diophantine Equations. Elementary Methods Rafael Jakimczuk División Matemática,

More information

A Generalization of Generalized Triangular Fuzzy Sets

A Generalization of Generalized Triangular Fuzzy Sets International Journal of Mathematical Analysis Vol, 207, no 9, 433-443 HIKARI Ltd, wwwm-hikaricom https://doiorg/02988/ijma2077350 A Generalization of Generalized Triangular Fuzzy Sets Chang Il Kim Department

More information

Construction of quasi-cyclic self-dual codes

Construction of quasi-cyclic self-dual codes Construction of quasi-cyclic self-dual codes Sunghyu Han, Jon-Lark Kim, Heisook Lee, and Yoonjin Lee December 17, 2011 Abstract There is a one-to-one correspondence between l-quasi-cyclic codes over a

More information

Direct Product of BF-Algebras

Direct Product of BF-Algebras International Journal of Algebra, Vol. 10, 2016, no. 3, 125-132 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.614 Direct Product of BF-Algebras Randy C. Teves and Joemar C. Endam Department

More information

Efficient representation of binary nonlinear codes: constructions and minimum distance computation

Efficient representation of binary nonlinear codes: constructions and minimum distance computation Noname manuscript No. (will be inserted by the editor) Efficient representation of binary nonlinear codes: constructions and minimum distance computation Mercè Villanueva Fanxuan Zeng Jaume Pujol Received:

More information

On the Power of Standard Polynomial to M a,b (E)

On the Power of Standard Polynomial to M a,b (E) International Journal of Algebra, Vol. 10, 2016, no. 4, 171-177 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.6214 On the Power of Standard Polynomial to M a,b (E) Fernanda G. de Paula

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

Hyperbolic Functions and. the Heat Balance Integral Method

Hyperbolic Functions and. the Heat Balance Integral Method Nonl. Analysis and Differential Equations, Vol. 1, 2013, no. 1, 23-27 HIKARI Ltd, www.m-hikari.com Hyperbolic Functions and the Heat Balance Integral Method G. Nhawu and G. Tapedzesa Department of Mathematics,

More information

On a 3-Uniform Path-Hypergraph on 5 Vertices

On a 3-Uniform Path-Hypergraph on 5 Vertices Applied Mathematical Sciences, Vol. 10, 2016, no. 30, 1489-1500 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2016.512742 On a 3-Uniform Path-Hypergraph on 5 Vertices Paola Bonacini Department

More information

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40 A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr

More information

Improvements in Newton-Rapshon Method for Nonlinear Equations Using Modified Adomian Decomposition Method

Improvements in Newton-Rapshon Method for Nonlinear Equations Using Modified Adomian Decomposition Method International Journal of Mathematical Analysis Vol. 9, 2015, no. 39, 1919-1928 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2015.54124 Improvements in Newton-Rapshon Method for Nonlinear

More information

Symmetric Identities of Generalized (h, q)-euler Polynomials under Third Dihedral Group

Symmetric Identities of Generalized (h, q)-euler Polynomials under Third Dihedral Group Applied Mathematical Sciences, vol. 8, 2014, no. 145, 7207-7212 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.49701 Symmetric Identities of Generalized (h, )-Euler Polynomials under

More information

Explicit Expressions for Free Components of. Sums of the Same Powers

Explicit Expressions for Free Components of. Sums of the Same Powers Applied Mathematical Sciences, Vol., 27, no. 53, 2639-2645 HIKARI Ltd, www.m-hikari.com https://doi.org/.2988/ams.27.79276 Explicit Expressions for Free Components of Sums of the Same Powers Alexander

More information

A Practical Method for Decomposition of the Essential Matrix

A Practical Method for Decomposition of the Essential Matrix Applied Mathematical Sciences, Vol. 8, 2014, no. 176, 8755-8770 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410877 A Practical Method for Decomposition of the Essential Matrix Georgi

More information

A Present Position-Dependent Conditional Fourier-Feynman Transform and Convolution Product over Continuous Paths

A Present Position-Dependent Conditional Fourier-Feynman Transform and Convolution Product over Continuous Paths International Journal of Mathematical Analysis Vol. 9, 05, no. 48, 387-406 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.988/ijma.05.589 A Present Position-Dependent Conditional Fourier-Feynman Transform

More information

New Generalized Sub Class of Cyclic-Goppa Code

New Generalized Sub Class of Cyclic-Goppa Code International Journal of Contemporary Mathematical Sciences Vol., 206, no. 7, 333-34 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.2988/ijcms.206.6632 New Generalized Sub Class of Cyclic-Goppa Code

More information

Basins of Attraction for Optimal Third Order Methods for Multiple Roots

Basins of Attraction for Optimal Third Order Methods for Multiple Roots Applied Mathematical Sciences, Vol., 6, no., 58-59 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.988/ams.6.65 Basins of Attraction for Optimal Third Order Methods for Multiple Roots Young Hee Geum Department

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Riesz Representation Theorem on Generalized n-inner Product Spaces

Riesz Representation Theorem on Generalized n-inner Product Spaces Int. Journal of Math. Analysis, Vol. 7, 2013, no. 18, 873-882 HIKARI Ltd, www.m-hikari.com Riesz Representation Theorem on Generalized n-inner Product Spaces Pudji Astuti Faculty of Mathematics and Natural

More information

Sequences from Heptagonal Pyramid Corners of Integer

Sequences from Heptagonal Pyramid Corners of Integer International Mathematical Forum, Vol 13, 2018, no 4, 193-200 HIKARI Ltd, wwwm-hikaricom https://doiorg/1012988/imf2018815 Sequences from Heptagonal Pyramid Corners of Integer Nurul Hilda Syani Putri,

More information

Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices

Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Advances in Mathematical Physics Volume 2010, Article ID 469124, 12 pages doi:10.1155/2010/469124 Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Ying Guo, Guihu

More information

Group Inverse for a Class of. Centrosymmetric Matrix

Group Inverse for a Class of. Centrosymmetric Matrix International athematical Forum, Vol. 13, 018, no. 8, 351-356 HIKARI Ltd, www.m-hikari.com https://doi.org/10.1988/imf.018.8530 Group Inverse for a Class of Centrosymmetric atrix ei Wang and Junqing Wang

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois Rings

Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois Rings International Journal of Algebra, Vol. 7, 2013, no. 17, 803-807 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2013.310100 Skew Cyclic and Quasi-Cyclic Codes of Arbitrary Length over Galois

More information

Ideals over a Non-Commutative Ring and their Application in Cryptology

Ideals over a Non-Commutative Ring and their Application in Cryptology Ideals over a Non-Commutative Ring and their Application in Cryptology E. M. Gabidulin, A. V. Paramonov and 0. V. Tretjakov Moscow Institute of Physics and Technology 141700 Dolgoprudnii Moscow Region,

More information

Mappings of the Direct Product of B-algebras

Mappings of the Direct Product of B-algebras International Journal of Algebra, Vol. 10, 2016, no. 3, 133-140 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.615 Mappings of the Direct Product of B-algebras Jacel Angeline V. Lingcong

More information

Hyers-Ulam-Rassias Stability of a Quadratic-Additive Type Functional Equation on a Restricted Domain

Hyers-Ulam-Rassias Stability of a Quadratic-Additive Type Functional Equation on a Restricted Domain Int. Journal of Math. Analysis, Vol. 7, 013, no. 55, 745-75 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.013.394 Hyers-Ulam-Rassias Stability of a Quadratic-Additive Type Functional Equation

More information

Convex Sets Strict Separation in Hilbert Spaces

Convex Sets Strict Separation in Hilbert Spaces Applied Mathematical Sciences, Vol. 8, 2014, no. 64, 3155-3160 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.44257 Convex Sets Strict Separation in Hilbert Spaces M. A. M. Ferreira 1

More information

QUADRATIC RESIDUE CODES OVER Z 9

QUADRATIC RESIDUE CODES OVER Z 9 J. Korean Math. Soc. 46 (009), No. 1, pp. 13 30 QUADRATIC RESIDUE CODES OVER Z 9 Bijan Taeri Abstract. A subset of n tuples of elements of Z 9 is said to be a code over Z 9 if it is a Z 9 -module. In this

More information

Cyclic Codes and Self-Dual Codes Over

Cyclic Codes and Self-Dual Codes Over 1250 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 4, MAY 1999 Cyclic Codes and Self-Dual Codes Over A. Bonnecaze and P. Udaya TABLE I MULTIPLICATION AND ADDITION TABLES FOR THE RING F 2 + uf 2

More information

Enumerating subgroups of the symmetric group

Enumerating subgroups of the symmetric group Contemporary Mathematics Enumerating subgroups of the symmetric group Derek F. Holt Abstract. We announce our successful computation of a list of representatives of the conjugacy classes of subgroups of

More information

Identities of Symmetry for Generalized Higher-Order q-euler Polynomials under S 3

Identities of Symmetry for Generalized Higher-Order q-euler Polynomials under S 3 Applied Mathematical Sciences, Vol. 8, 204, no. 3, 559-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.2988/ams.204.4755 Identities of Symmetry for Generalized Higher-Order q-euler Polynomials under

More information

Block-Transitive 4 (v, k, 4) Designs and Suzuki Groups

Block-Transitive 4 (v, k, 4) Designs and Suzuki Groups International Journal of Algebra, Vol. 10, 2016, no. 1, 27-32 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2016.51277 Block-Transitive 4 (v, k, 4) Designs and Suzuki Groups Shaojun Dai Department

More information

On Positive Stable Realization for Continuous Linear Singular Systems

On Positive Stable Realization for Continuous Linear Singular Systems Int. Journal of Math. Analysis, Vol. 8, 2014, no. 8, 395-400 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.4246 On Positive Stable Realization for Continuous Linear Singular Systems

More information

On Symmetric Property for q-genocchi Polynomials and Zeta Function

On Symmetric Property for q-genocchi Polynomials and Zeta Function Int Journal of Math Analysis, Vol 8, 2014, no 1, 9-16 HIKARI Ltd, wwwm-hiaricom http://dxdoiorg/1012988/ijma2014311275 On Symmetric Property for -Genocchi Polynomials and Zeta Function J Y Kang Department

More information

Remarks on Fuglede-Putnam Theorem for Normal Operators Modulo the Hilbert-Schmidt Class

Remarks on Fuglede-Putnam Theorem for Normal Operators Modulo the Hilbert-Schmidt Class International Mathematical Forum, Vol. 9, 2014, no. 29, 1389-1396 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/imf.2014.47141 Remarks on Fuglede-Putnam Theorem for Normal Operators Modulo the

More information

Algebraic Combinatorics, Computability and Complexity Syllabus for the TEMPUS-SEE PhD Course

Algebraic Combinatorics, Computability and Complexity Syllabus for the TEMPUS-SEE PhD Course Algebraic Combinatorics, Computability and Complexity Syllabus for the TEMPUS-SEE PhD Course Dragan Marušič 1 and Stefan Dodunekov 2 1 Faculty of Mathematics Natural Sciences and Information Technologies

More information

Generalized Boolean and Boolean-Like Rings

Generalized Boolean and Boolean-Like Rings International Journal of Algebra, Vol. 7, 2013, no. 9, 429-438 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2013.2894 Generalized Boolean and Boolean-Like Rings Hazar Abu Khuzam Department

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

A Family of Optimal Multipoint Root-Finding Methods Based on the Interpolating Polynomials

A Family of Optimal Multipoint Root-Finding Methods Based on the Interpolating Polynomials Applied Mathematical Sciences, Vol. 8, 2014, no. 35, 1723-1730 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.4127 A Family of Optimal Multipoint Root-Finding Methods Based on the Interpolating

More information

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES MICHAEL BRAUN, AXEL KOHNERT AND ALFRED WASSERMANN 1. INTRODUCTION For the purpose of error correcting linear codes over a finite field GF (q) and fixed

More information

On a Diophantine Equation 1

On a Diophantine Equation 1 International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 2, 73-81 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.728 On a Diophantine Equation 1 Xin Zhang Department

More information

A Generalization of p-rings

A Generalization of p-rings International Journal of Algebra, Vol. 9, 2015, no. 8, 395-401 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2015.5848 A Generalization of p-rings Adil Yaqub Department of Mathematics University

More information

KKM-Type Theorems for Best Proximal Points in Normed Linear Space

KKM-Type Theorems for Best Proximal Points in Normed Linear Space International Journal of Mathematical Analysis Vol. 12, 2018, no. 12, 603-609 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijma.2018.81069 KKM-Type Theorems for Best Proximal Points in Normed

More information

New Inequalities for q-ary Constant-Weight Codes

New Inequalities for q-ary Constant-Weight Codes New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

More information

Cryptanalysis of the Wu}Dawson Public Key Cryptosystem

Cryptanalysis of the Wu}Dawson Public Key Cryptosystem Finite Fields and Their Applications 5, 386}392 (1999) Article ID!ta.1999.0264, available online at http://www.idealibrary.com on Cryptanalysis of the Wu}Dawson Public Key Cryptosystem Peter Roelse Philips

More information

A Novel Approach: Soft Groups

A Novel Approach: Soft Groups International Journal of lgebra, Vol 9, 2015, no 2, 79-83 HIKRI Ltd, wwwm-hikaricom http://dxdoiorg/1012988/ija2015412121 Novel pproach: Soft Groups K Moinuddin Faculty of Mathematics, Maulana zad National

More information

Construction of some new families of nested orthogonal arrays

Construction of some new families of nested orthogonal arrays isid/ms/2017/01 April 7, 2017 http://www.isid.ac.in/ statmath/index.php?module=preprint Construction of some new families of nested orthogonal arrays Tian-fang Zhang, Guobin Wu and Aloke Dey Indian Statistical

More information

Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40

Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40 Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40 Stefka Bouyuklieva, Iliya Bouyukliev and Masaaki Harada October 17, 2012 Abstract In this paper, binary extremal singly even self-dual

More information

Construction of Pseudorandom Binary Sequences Using Chaotic Maps

Construction of Pseudorandom Binary Sequences Using Chaotic Maps Applied Mathematical Sciences, Vol. 9, 2015, no. 78, 3847-3853 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2015.52149 Construction of Pseudorandom Binary Sequences Using Chaotic Maps Dimo

More information

Error-correcting codes and Cryptography

Error-correcting codes and Cryptography Error-correcting codes and Cryptography Henk van Tilborg Code-based Cryptography Workshop Eindhoven, May -2, 2 /45 CONTENTS I II III IV V Error-correcting codes; the basics Quasi-cyclic codes; codes generated

More information

A Note on Linearly Independence over the Symmetrized Max-Plus Algebra

A Note on Linearly Independence over the Symmetrized Max-Plus Algebra International Journal of Algebra, Vol. 12, 2018, no. 6, 247-255 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ija.2018.8727 A Note on Linearly Independence over the Symmetrized Max-Plus Algebra

More information

A Short Note on Universality of Some Quadratic Forms

A Short Note on Universality of Some Quadratic Forms International Mathematical Forum, Vol. 8, 2013, no. 12, 591-595 HIKARI Ltd, www.m-hikari.com A Short Note on Universality of Some Quadratic Forms Cherng-tiao Perng Department of Mathematics Norfolk State

More information

7.5 Operations with Matrices. Copyright Cengage Learning. All rights reserved.

7.5 Operations with Matrices. Copyright Cengage Learning. All rights reserved. 7.5 Operations with Matrices Copyright Cengage Learning. All rights reserved. What You Should Learn Decide whether two matrices are equal. Add and subtract matrices and multiply matrices by scalars. Multiply

More information

A Signed-Rank Test Based on the Score Function

A Signed-Rank Test Based on the Score Function Applied Mathematical Sciences, Vol. 10, 2016, no. 51, 2517-2527 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2016.66189 A Signed-Rank Test Based on the Score Function Hyo-Il Park Department

More information

A Note on the Carlitz s Type Twisted q-tangent. Numbers and Polynomials

A Note on the Carlitz s Type Twisted q-tangent. Numbers and Polynomials Applied Mathematical Sciences, Vol. 12, 2018, no. 15, 731-738 HIKARI Ltd www.m-hikari.com https://doi.org/10.12988/ams.2018.8585 A Note on the Carlitz s Type Twisted q-tangent Numbers and Polynomials Cheon

More information

On the Security of Some Cryptosystems Based on Error-correcting Codes

On the Security of Some Cryptosystems Based on Error-correcting Codes On the Security of Some Cryptosystems Based on Error-correcting Codes Florent Chabaud * Florent.Chabaud~ens.fr Laboratoire d'informatique de FENS ** 45, rue d'ulm 75230 Paris Cedex 05 FRANCE Abstract.

More information

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal

Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Design of Non-Binary Quasi-Cyclic LDPC Codes by Absorbing Set Removal Behzad Amiri Electrical Eng. Department University of California, Los Angeles Los Angeles, USA Email: amiri@ucla.edu Jorge Arturo Flores

More information

New Quantum Error-Correcting Codes from Hermitian Self-Orthogonal Codes over GF(4)

New Quantum Error-Correcting Codes from Hermitian Self-Orthogonal Codes over GF(4) New Quantum Error-Correcting Codes from Hermitian Self-Orthogonal Codes over GF(4) Jon-Lark Kim Department of Mathematics, Statistics, and Computer Science, 322 SEO(M/C 249), University of Illinois Chicago,

More information

Construction X for quantum error-correcting codes

Construction X for quantum error-correcting codes Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from

More information

Analysis of Forward Collision Warning System. Based on Vehicle-mounted Sensors on. Roads with an Up-Down Road gradient

Analysis of Forward Collision Warning System. Based on Vehicle-mounted Sensors on. Roads with an Up-Down Road gradient Contemporary Engineering Sciences, Vol. 7, 2014, no. 22, 1139-1145 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49142 Analysis of Forward Collision Warning System Based on Vehicle-mounted

More information

The Endomorphism Ring of a Galois Azumaya Extension

The Endomorphism Ring of a Galois Azumaya Extension International Journal of Algebra, Vol. 7, 2013, no. 11, 527-532 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ija.2013.29110 The Endomorphism Ring of a Galois Azumaya Extension Xiaolong Jiang

More information

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 ROBERT S. COULTER AND PAMELA KOSICK Abstract. This note summarises a recent search for commutative semifields of order 243 and 3125. For each of these two orders,

More information

Note About a Combinatorial Sum

Note About a Combinatorial Sum Int. J. Contemp. Math. Sciences, Vol. 8, 203, no. 8, 349-353 HIKARI Ltd, www.m-hiari.com Note About a Combinatorial Sum Laurenţiu Modan Spiru Haret University, Academy of Economic Studies Department of

More information

Toric Deformation of the Hankel Variety

Toric Deformation of the Hankel Variety Applied Mathematical Sciences, Vol. 10, 2016, no. 59, 2921-2925 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2016.6248 Toric Deformation of the Hankel Variety Adelina Fabiano DIATIC - Department

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

Double Circulant Codes over Z 4 and Even Unimodular Lattices

Double Circulant Codes over Z 4 and Even Unimodular Lattices Journal of Algebraic Combinatorics 6 (997), 9 3 c 997 Kluwer Academic Publishers. Manufactured in The Netherlands. Double Circulant Codes over Z and Even Unimodular Lattices A.R. CALDERBANK rc@research.att.com

More information

Learning Module 1 - Basic Algebra Review (Appendix A)

Learning Module 1 - Basic Algebra Review (Appendix A) Learning Module 1 - Basic Algebra Review (Appendix A) Element 1 Real Numbers and Operations on Polynomials (A.1, A.2) Use the properties of real numbers and work with subsets of the real numbers Determine

More information

Cryptographie basée sur les codes correcteurs d erreurs et arithmétique

Cryptographie basée sur les codes correcteurs d erreurs et arithmétique with Cryptographie basée sur les correcteurs d erreurs et arithmétique with with Laboratoire Hubert Curien, UMR CNRS 5516, Bâtiment F 18 rue du professeur Benoît Lauras 42000 Saint-Etienne France pierre.louis.cayrel@univ-st-etienne.fr

More information

Random generation of linear codes

Random generation of linear codes Aequationes Math. 58 (1999) 192 202 0001-9054/99/020192-11 $ 1.50+0.20/0 c Birkhäuser Verlag, Basel, 1999 Aequationes Mathematicae Random generation of linear codes Harald Fripertinger Dedicated to Professor

More information

A Generalized Fermat Equation with an Emphasis on Non-Primitive Solutions

A Generalized Fermat Equation with an Emphasis on Non-Primitive Solutions International Mathematical Forum, Vol. 12, 2017, no. 17, 835-840 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/imf.2017.78701 A Generalized Fermat Equation with an Emphasis on Non-Primitive Solutions

More information

A Disaggregation Approach for Solving Linear Diophantine Equations 1

A Disaggregation Approach for Solving Linear Diophantine Equations 1 Applied Mathematical Sciences, Vol. 12, 2018, no. 18, 871-878 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ams.2018.8687 A Disaggregation Approach for Solving Linear Diophantine Equations 1 Baiyi

More information

Codes from lattice and related graphs, and permutation decoding

Codes from lattice and related graphs, and permutation decoding Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical

More information

Some Reviews on Ranks of Upper Triangular Block Matrices over a Skew Field

Some Reviews on Ranks of Upper Triangular Block Matrices over a Skew Field International Mathematical Forum, Vol 13, 2018, no 7, 323-335 HIKARI Ltd, wwwm-hikaricom https://doiorg/1012988/imf20188528 Some Reviews on Ranks of Upper Triangular lock Matrices over a Skew Field Netsai

More information

Stability of a Functional Equation Related to Quadratic Mappings

Stability of a Functional Equation Related to Quadratic Mappings International Journal of Mathematical Analysis Vol. 11, 017, no., 55-68 HIKARI Ltd, www.m-hikari.com https://doi.org/10.1988/ijma.017.610116 Stability of a Functional Equation Related to Quadratic Mappings

More information

On Annihilator Small Intersection Graph

On Annihilator Small Intersection Graph International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 283-289 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7931 On Annihilator Small Intersection Graph Mehdi

More information

On Powers of General Tridiagonal Matrices

On Powers of General Tridiagonal Matrices Applied Mathematical Sciences, Vol. 9, 5, no., 583-59 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.988/ams.5.49 On Powers of General Tridiagonal Matrices Qassem M. Al-Hassan Department of Mathematics

More information

Order-theoretical Characterizations of Countably Approximating Posets 1

Order-theoretical Characterizations of Countably Approximating Posets 1 Int. J. Contemp. Math. Sciences, Vol. 9, 2014, no. 9, 447-454 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijcms.2014.4658 Order-theoretical Characterizations of Countably Approximating Posets

More information

Symmetric Properties for the (h, q)-tangent Polynomials

Symmetric Properties for the (h, q)-tangent Polynomials Adv. Studies Theor. Phys., Vol. 8, 04, no. 6, 59-65 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.988/astp.04.43 Symmetric Properties for the h, q-tangent Polynomials C. S. Ryoo Department of Mathematics

More information

HILBERT l-class FIELD TOWERS OF. Hwanyup Jung

HILBERT l-class FIELD TOWERS OF. Hwanyup Jung Korean J. Math. 20 (2012), No. 4, pp. 477 483 http://dx.doi.org/10.11568/kjm.2012.20.4.477 HILBERT l-class FIELD TOWERS OF IMAGINARY l-cyclic FUNCTION FIELDS Hwanyup Jung Abstract. In this paper we study

More information

Characterization of Weakly Primary Ideals over Non-commutative Rings

Characterization of Weakly Primary Ideals over Non-commutative Rings International Mathematical Forum, Vol. 9, 2014, no. 34, 1659-1667 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/imf.2014.49155 Characterization of Weakly Primary Ideals over Non-commutative Rings

More information

The Rainbow Connection of Windmill and Corona Graph

The Rainbow Connection of Windmill and Corona Graph Applied Mathematical Sciences, Vol. 8, 2014, no. 128, 6367-6372 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.48632 The Rainbow Connection of Windmill and Corona Graph Yixiao Liu Department

More information

Solving Systems of Linear Equations Using Matrices

Solving Systems of Linear Equations Using Matrices Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.

More information

Poincaré`s Map in a Van der Pol Equation

Poincaré`s Map in a Van der Pol Equation International Journal of Mathematical Analysis Vol. 8, 014, no. 59, 939-943 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.014.411338 Poincaré`s Map in a Van der Pol Equation Eduardo-Luis

More information

2-Semi-Norms and 2*-Semi-Inner Product

2-Semi-Norms and 2*-Semi-Inner Product International Journal of Mathematical Analysis Vol. 8, 01, no. 5, 601-609 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.1988/ima.01.103 -Semi-Norms and *-Semi-Inner Product Samoil Malčesi Centre for

More information

New feasibility conditions for directed strongly regular graphs

New feasibility conditions for directed strongly regular graphs New feasibility conditions for directed strongly regular graphs Sylvia A. Hobart Jason Williford Department of Mathematics University of Wyoming Laramie, Wyoming, U.S.A sahobart@uwyo.edu, jwillif1@uwyo.edu

More information

Nonexistence of Limit Cycles in Rayleigh System

Nonexistence of Limit Cycles in Rayleigh System International Journal of Mathematical Analysis Vol. 8, 014, no. 49, 47-431 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.014.4883 Nonexistence of Limit Cycles in Rayleigh System Sandro-Jose

More information