A New Construction Method of Digital Signature Algorithms
|
|
- Laureen Parker
- 6 years ago
- Views:
Transcription
1 IJCSNS Iteratioal Joural o Computer Sciece ad Network Security VOL.6 No. December 06 A New Costructio Method o Diital Siature Alorithms Thuy Nuye Đuc ad Du Luu Ho Faculty o Iormatio Techoloy Ho Chi Mih City Techical ad coomic Collee Faculty o Iormatio Techoloy Military Techical Academy Summary The article presets a ew costructio method o diital siature alorithms based o diiculty o the discrete loarithm problem. From the proposed method the dieret siature schemes ca be deployed to choose suitably or applicatios i practice. Key words: Diital siature; Diital siature alorithm; Discrete loarithm problem.. Problem Curretly the diital siature has bee widely applied to the ields o e-govermet e-commerce... i the world ad has bee iitially deployed applicatios i Vietam to meet the autheticatio reuiremets or the orii ad the iterity o iormatio i electroic trasactios. However the iitiative research - developmet o ew diital siature schemes to meet the reuiremets or product saety euipmet desi - mauacture ad iormatio security i the coutry has always bee essetial problem arisi. I the coutry a umber o research results i this ield have bee published [] [] [] [] ad implemeted i practical applicatios. I this article the authors propose a ew costructio method o siature schemes based o diiculty o the discrete loarithm problem i the ield o iite elemets. As well as methods that have bee proposed i [] [] [] [] a advataes o the ewly proposed method here is that it ca be used or the purpose o developi dieret diital siature schemes to choose suitably to the reuiremets o applicatios i practice.. Costructio o diital siature alorithm. Costructio method This ewly proposed sheme is built up based o diiculty o the Discrete Loarithm Problem []. Discrete loarithm problem DLP(p ca be stated as ollows: Let p be prime umber r is the birth particle o the roup Zp*. For each positive iteer y Zp* id x satisyi the euatio: x = y Here the discrete loarithm problem is used as a oe-way uctio i ormatio o the key o etities i the same system with the commo parameter set {p}. It is easy to see that i x is a secret parameter calculatio o the public parameter y rom x ad systematic parameters {p} is absolutely easy. However the opposite is very diicult to implemet ie rom y ad {p} the calculatio o the secret parameter x is ueasible i practical applicatios. It should be oted that accordi to [6] ad [7] i order or discrete loarithm problem to be diicult p selected must be lare eouh with: p bit. Alorithm or the problem DLP(p ca be writte as a uctio calculati alorithm DLP(p(. with the iput variable y ad uctio value is the root x o the euatio: x = DLP ( p ( y This siature scheme built up based o the ewly proposed method allows etities sii i the same system to share the parameter set {p} where each member U o the system chooses oesel the secret key x satisyi: < x < ( p calculate ad disclosure the parameter: x It also should be oted that the secret parameter x must be chose so that the calculatio o DLP(p (y is diicult. With the above stated choice oly the sier U kows the value o x so the perso who kows x is eouh to autheticate is U. Assumi that the secret key o the sier x is radomized i the rae (p ad the correspodi public key y is ormed rom x i accordace with: x (. Here p is the chose prime umber so that solutio o the problem DLP(p (y is diicult is the birth particle o the roup Zp* has the deree o with (p-. Assume that (r is the siature o the messae M u is oe value i the rae ( ad r is calculated rom u by the ormula: r u (. Ad s calculated rom v by the ormula: s v (. Here: v is also oe value i the rae (. Also assume that the veriyi euatio o the scheme is Mauscript received December 06 Mauscript revised December 0 06
2 IJCSNS Iteratioal Joural o Computer Sciece ad Network Security VOL.6 No. December 06 s ( M ( r ( M ( r ( M ( r r y With ( r is the uctio o r ad s. Cosider the case: ( r = r s (. Where k is a radomly chose value i the rae (. Set: k = Z (. The the veriyi euatio ca be take to the orm: ( M Z ( M Z ( M Z s r y (.6 From (. (. (. ad (.6 we have: ( M Z u ( M Z x. ( M Z. (.7 From (.7 ier: v ( [ u ( So: x ( ]mod v = ( u ( ( (.8 x ( ( mod (.9 O the other had rom (. (. ad (. we have: ( v u mod = k (.0 From (.9 ad (.0 we have: [ u ( ( Or: x ( = k = k From (. ier: [ u ( ( x ( u = [( ( ( k x ( ( u]mod ( ( ]mod ( ( ]mod (. (. From (. the irst compoet o siature is calculated by (.: r u ad the secod compoet is calculated by (.: s v with v calculated by (.9: v = [ u ( ( x ( ( ]mod From here a orm o siature scheme correspodi to the case: ( r = r s k is show as Table Table ad Table below. Table. Alorithm or ormatio parameter ad key Iput: p x. Output: y. []. select h: <h<p ( p / []. h []. i ( = the o to [] y x []. retur {y} (i p: primes satisyi coditios: p = N N=. (ii xy: secret public keys o sii object U. Table. Alorithm or ormatio o siature Iput: p x M. Output: (r. []. select k: <k< []. []. []. w w mod w w mod u ( w ( k x w mod [8]. [9]. r u v u w x s v ( w mod [0]. []. []. retur (r (i M: the messae to be sied with: (ii (r: siature o U o M. M Table. Alorithm or veriyi siature Iput: p y {M(r}. []. Z ( r []. []. w ( w ( []. A s w B w w r y i (A=B the {retur true} else {retur alse} {0 } (i M (r: the messaes siature eed veriyi..
3 IJCSNS Iteratioal Joural o Computer Sciece ad Network Security VOL.6 No. December 06 (ii I the retur is true the iterity ad orii o M are coirmed. Coversely i the retur is alse M is deied the orii ad iterity. It should be oted that the siature created here is ot ecessarily the pair o (r. From the Table shows that the value v ca be selected as the secod compoet o the siature istead o s thus reduce oe calculatio step i the procedure or ormatio o siature. Ideed i the hypothesis o the veriyi euatio o the scheme is ( M ( r ( M ( r ( M ( r r y (. ad: v k ( r = r (. Set: k = Z The rom (. (. ad (. we also have: ( M ( r u ( M ( r x. ( M ( r. From here alorithms or ormatio ad veriyi siature o the orm o the scheme correspodi to ew assumptios ive i Table ad Table as ollows: Table. Alorithm or ormatio o siature Iput: p x M. Output: (r. []. select k: <k< []. k []. []. w ( w w w mod ( w w mod u ( w ( k x w mod [8]. [9]. r u v u w x []. retur (r ( w mod [0]. Table. Alorithm or veriyi siature Iput: p y {M(r}. []. Z ( r []. []. w []. A B w w r y i ( B A = the {retur true }. Several alorithms or siature built up uder the proposed method.. The irst scheme a Structure ad operatio The irst siature scheme proposed here - symbols LD is built up uder Table ad i sectio A with selectios: ( = H ( M ( = Z ( = H ( M. Alorithms or ormatio o parameter ad key alorithm or siature ad veriyi siature o the scheme are described i the Table 6 Table 7 ad Table 8 below. Table 6. Alorithm or ormatio o parameter ad key Iput: p x. Output: y H(.. []. select h: <h<p []. ( p / h []. i ( = the oto [] [] y. (. { 0} H : Z []. select retur {yh(.} - H(.: Hash uctio (SHA MD... < < Table 7. Alorithm or sii messaes Iput: p H(. x M. Output: (r. []. = H (M []. select k: <k< [] k u Z k x mod ( ( p (. []. r (. v ( u Z x mod (. s (. [8]. retur (r Table 8. Alorithm or veriyi siature Iput: p H(. y M (r. []. = H (M []. A s (.6 []. w r s (.7 w B r y (.8 []. i ( A = B the {retur true } b Correctess o the scheme LD The thi to be proved is: Let p are primes with (p- H : { 0} Z < < p < k x <
4 6 IJCSNS Iteratioal Joural o Computer Sciece ad Network Security VOL.6 No. December 06 x = H ( M ( Z ( k x mod ( u Z x mod Z k u = r u s =. I: w = r s A = s w B = r y the: A = B. Correctess o the ewly proposed scheme is proved as ollows: From (. (. ad (.6 we have: A = s (. Z x. = Z x. (.9 From (. (. (.7 ad (.8 we also have: w B = r y ( r. s Z x. x. Z x. (.0 From (.9 ad (.0 ier the thi to be proved: A = B Saety level o the scheme LD I orm o the ewly proposed scheme the public key is ormed rom the secret key based o diiculty o the discrete loarithm problem DLP(p. Thereore i the parameters {p} is selected or the problem DLP(p to be diicult the saety level o the ewly proposed scheme i terms o resistace to attacks disclosi secret key will be assessed by the level o diiculty o the problem DLP(p. It should be oted that i order or DLP(p to be diicult the parameters {p} ca be selected similarly to DSA [6] or GOST R.0-9 [7] with: p bit 60bit 60bit. The Alorithm or veriyi siature (Table 8 o the scheme LD shows ay pair o (r will be recoized as a valid siature o U o a messae M i it meets the coditio: ( s. r s r y (. Here: U is sii object owi a public key y ad = H (M are represetative value o the messae M to be veriied. To id (r rom (. the irst way is to select a value or r i advace the calculate s. The (. will be s b a s (. Or i the secod way is select s i advace the calculate r. The (. will be r r = b (. I both two cases a ad b costats. It is easy to see that solutios o (. ad (. to id s ad r is more diicult tha solutio o the discrete loarithm problem DLP(p... The secod scheme a Structure ad operatio The secod siature scheme - symbols LD is built up uder the method stated i Table ad i sectio A with selectios: (MZ = Z (MZ = H(M (MZ = H(M. The alorithm or ormatio o parameter ad key is similar to that i the scheme LD (Table 6 alorithms or siature ad veriyi siature o the scheme are described i Table 8 ad Table 0 below. Table 9. Alorithm or sii messaes Iput: p H(. x M. Output: (r. []. select k: <k< []. (. []. = H (M (. w = Z mod (. []. u ( w ( k x w mod (. r (. v w ( u x mod (.6 [8]. retur (r Table 0. Alorithm or veriyi siature Iput: p H(. y M (r. []. = H(M []. w r v w []. A []. B ( r y i ( A = B the {retur true } (.7 (.8 (.9 b Correctess o the scheme LD The thi to be proved is: Let p are primes with H : { 0} Z (p- < < p < k x < x Z k = = H ( M w = Z mod u = ( w ( k x w mod r u v = w ( u x mod. I: w r v w = A B = ( r y the: A = B. Correctess o the ewly proposed scheme is proved as ollows: From (.7 ad (.8 we have: w A v ( r. = Z Z.. x. Z x. (.0
5 IJCSNS Iteratioal Joural o Computer Sciece ad Network Security VOL.6 No. December 06 7 From (. (. ad (.9 we also have: B = r y ( x. (. From (.0 ad (. ier the thi to be proved: A = B. c Saety level o the scheme LD From the Alorithm or veriyi siature (Table 0 o the scheme LD shows that ay pair o (r will be recoized as a valid siature i the scheme eerated rom a messae M i it meets the coditio: ( v r. ( r y (. Similarly (. to id r ad v rom solutio o (. is more diicult tha solutio o the problem DLP (p.. Coclusio Produce ad check procedures o lectroic Diital Siature based o Asymmetric Cryptoraphic Alorithm. Govermet Committee o the Russia or Stadards (i Russia. Thuy N.D received the B.S rom HUFLIT Uiversity i 00 ad M.S deree rom Faculty o Iormatio Techoloy Military Techical Academy i 0. My research iterests iclude cryptoraphy commuicatio ad etwork security. Du L.H is a lecture at the Military Techical Academy (Ha Noi Viet Nam. He received the lectroics ieer deree (989 ad Ph.D (0 rom the Military Techical Academy. The article proposes a method o diital siature scheme desi based o diiculty discrete loarithm problem. A advataes o the ewly proposed method is that it ca be used or developi dieret diital siature schemes to choose suitably or applicatios i practice. Siature schemes o LD ad LD preseted here has somewhat showed the easibility o the ewly proposed method. Reereces [] Luu Ho Du Le Dih So Ho Nhat Qua Nuye Duc Thuy DVLOPING DIGITAL SIGNATUR SCHMS BASD ON DISCRT LOGARITHM PROBLM the ihth Natioal Scietiic Meeti o Basic Research ad Iormatio Techoloy Applicatios (FAIR 0 ISBN: [] Luu Ho Du Hoa Thi Mai Nuye Huu Mo A orm o siature scheme built up based o the diital aalysis problem the ihth Natioal Scietiic Meeti o Basic Research ad Iormatio Techoloy Applicatios (FAIR 0 ISBN: [] Luu Ho Du Ho Noc Duy Nuye Tie Gia Nuye Thi Thu Thuy Developmet o a ew orm o diital siature scheme the Proceedis o the Sixteeth Natioal Semiar: Some Selected Issues o Iormatio Techoloy ad Commuicatio - Da Na. [] Hoa Thi Mai Luu Ho Du A orm o siature scheme built up based o the diital aalysis problem ad the suare root problem Joural o Sciece ad ieeri - Military Techical Academy No. 7 (Joural o IT ad Commuicatio No.7-0/0 pae:. ISSN: [] T. lgamal A public key cryptosystem ad a siature scheme based o discrete loarithms I Trasactios o Iormatio Theory Vol. IT- No.. pp [6] Natioal Istitute o Stadards ad Techoloy. NIST FIPS PUB 86-(0. Diital Siature Stadard U.S. Departmet o Commerce. [7] GOST R.0-9. Russia Federatio Stadard. Iormatio Techoloy. Cryptoraphic data Security.
Growth of Functions. Chapter 3. CPTR 430 Algorithms Growth of Functions 1
Growth o Fuctios Chapter 3 CPTR 430 Alorithms Growth o Fuctios 1 Asymptotic Eiciecy o Alorithms Idea: Look at iput sizes lare eouh to make rui time order o rowth relevat How does the rui time o a alorithm
More informationAN EXTENSION OF A RESULT ABOUT THE ORDER OF CONVERGENCE
Bulleti o Mathematical Aalysis ad Applicatios ISSN: 8-9, URL: http://www.bmathaa.or Volume 3 Issue 3), Paes 5-34. AN EXTENSION OF A RESULT ABOUT THE ORDER OF CONVERGENCE COMMUNICATED BY HAJRUDIN FEJZIC)
More informationCS537. Numerical Analysis and Computing
CS57 Numerical Aalysis ad Computig Lecture Locatig Roots o Equatios Proessor Ju Zhag Departmet o Computer Sciece Uiversity o Ketucky Leigto KY 456-6 Jauary 9 9 What is the Root May physical system ca be
More informationGeneralized H-codes and type II codes over GF(4)
THE JOURNA OF CHINA UNIVERSITIES OF POSTS AND TEECOMMUNICATIONS Volume 15, Issue 2, Jue 28 IN i-qi, WEN ia-mi, ZHENG Wei Geeralized H-codes ad type II codes over GF(4) CC umber O1574 Documet A Article
More informationSome Variants of Newton's Method with Fifth-Order and Fourth-Order Convergence for Solving Nonlinear Equations
Copyright, Darbose Iteratioal Joural o Applied Mathematics ad Computatio Volume (), pp -6, 9 http//: ijamc.darbose.com Some Variats o Newto's Method with Fith-Order ad Fourth-Order Covergece or Solvig
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationCS321. Numerical Analysis and Computing
CS Numerical Aalysis ad Computig Lecture Locatig Roots o Equatios Proessor Ju Zhag Departmet o Computer Sciece Uiversity o Ketucky Leigto KY 456-6 September 8 5 What is the Root May physical system ca
More informationREPRESENTING MARKOV CHAINS WITH TRANSITION DIAGRAMS
Joural o Mathematics ad Statistics, 9 (3): 49-54, 3 ISSN 549-36 3 Sciece Publicatios doi:.38/jmssp.3.49.54 Published Olie 9 (3) 3 (http://www.thescipub.com/jmss.toc) REPRESENTING MARKOV CHAINS WITH TRANSITION
More informationENGI 4430 Advanced Calculus for Engineering Faculty of Engineering and Applied Science Problem Set 4 Solutions [Numerical Methods]
ENGI 3 Advaced Calculus or Egieerig Facult o Egieerig ad Applied Sciece Problem Set Solutios [Numerical Methods]. Use Simpso s rule with our itervals to estimate I si d a, b, h a si si.889 si 3 si.889
More informationThe Information Criterion
Joural o Moder Applied Statistical Methods Volume 3 Issue Article 5-04 The Iormatio Criterio Masume Ghahramai Departmet o Statistics, Payam Noor Uiversity, Ira, mhdataila@mail.com Follow this ad additioal
More informationModification of Weerakoon-Fernando s Method with Fourth-Order of Convergence for Solving Nonlinear Equation
ISSN: 50-08 Iteratioal Joural o AdvacedResearch i Sciece, Egieerig ad Techology Vol. 5, Issue 8, August 018 Modiicatio o Weerakoo-Ferado s Method with Fourth-Order o Covergece or Solvig Noliear Equatio
More informationTIME-PERIODIC SOLUTIONS OF A PROBLEM OF PHASE TRANSITIONS
Far East Joural o Mathematical Scieces (FJMS) 6 Pushpa Publishig House, Allahabad, Idia Published Olie: Jue 6 http://dx.doi.org/.7654/ms99947 Volume 99, umber, 6, Pages 947-953 ISS: 97-87 Proceedigs o
More informationInternational Journal of Mathematical Archive-3(12), 2012, Available online through ISSN
Iteratioal Joural o Mathematical Archive-, 0, 489-4897 Available olie throuh www.ijma.io ISSN 9 5046 NEW ITERATIVE NUMERICAL ALGORITHMS FOR MINIMIZATION OF NONLINEAR FUNCTIONS K. Karthikea* School o Advaced
More informationFuzzy n-normed Space and Fuzzy n-inner Product Space
Global Joural o Pure ad Applied Matheatics. ISSN 0973-768 Volue 3, Nuber 9 (07), pp. 4795-48 Research Idia Publicatios http://www.ripublicatio.co Fuzzy -Nored Space ad Fuzzy -Ier Product Space Mashadi
More informationA Block Cipher Using Linear Congruences
Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &
More informationInternational Journal of Mathematical Archive-4(9), 2013, 1-5 Available online through ISSN
Iteratioal Joural o Matheatical Archive-4(9), 03, -5 Available olie through www.ija.io ISSN 9 5046 THE CUBIC RATE OF CONVERGENCE OF GENERALIZED EXTRAPOLATED NEWTON RAPHSON METHOD FOR SOLVING NONLINEAR
More informationAlgorithm of Superposition of Boolean Functions Given with Truth Vectors
IJCSI Iteratioal Joural of Computer Sciece Issues, Vol 9, Issue 4, No, July ISSN (Olie: 694-84 wwwijcsiorg 9 Algorithm of Superpositio of Boolea Fuctios Give with Truth Vectors Aatoly Plotikov, Aleader
More informationNumerical Integration Formulas
Numerical Itegratio Formulas Berli Che Departmet o Computer Sciece & Iormatio Egieerig Natioal Taiwa Normal Uiversity Reerece: 1. Applied Numerical Methods with MATLAB or Egieers, Chapter 19 & Teachig
More informationA novel plant growth simulation algorithm and its application. Jun Lu, Yueguang Li
Iteratioal Coerece o Advaces i Mechaical Egieerig ad Idustrial Iormatics (AMEII 05 A ovel plat growth simulatio algorithm ad its applicatio Ju Lu, Yueguag Li Gasu political sciece ad law istitute, Lazhou,
More informationCSE 1400 Applied Discrete Mathematics Number Theory and Proofs
CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of
More informationFLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University
Iteratioal Joural of Pure ad Applied Mathematics Volume 95 No. 2 2014, 123-129 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v95i2.1
More informationResearch Article A New Second-Order Iteration Method for Solving Nonlinear Equations
Abstract ad Applied Aalysis Volume 2013, Article ID 487062, 4 pages http://dx.doi.org/10.1155/2013/487062 Research Article A New Secod-Order Iteratio Method for Solvig Noliear Equatios Shi Mi Kag, 1 Arif
More informationRecurrence Relations
Recurrece Relatios Aalysis of recursive algorithms, such as: it factorial (it ) { if (==0) retur ; else retur ( * factorial(-)); } Let t be the umber of multiplicatios eeded to calculate factorial(). The
More informationResearch Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences
Discrete Dyamics i Nature ad Society Article ID 210761 4 pages http://dxdoiorg/101155/2014/210761 Research Article A Uified Weight Formula for Calculatig the Sample Variace from Weighted Successive Differeces
More informationSolving third order boundary value problem with fifth order block method
Matematical Metods i Egieerig ad Ecoomics Solvig tird order boudary value problem wit it order bloc metod A. S. Abdulla, Z. A. Majid, ad N. Seu Abstract We develop a it order two poit bloc metod or te
More informationMon Apr Second derivative test, and maybe another conic diagonalization example. Announcements: Warm-up Exercise:
Math 2270-004 Week 15 otes We will ot ecessarily iish the material rom a give day's otes o that day We may also add or subtract some material as the week progresses, but these otes represet a i-depth outlie
More informationJ. Stat. Appl. Pro. Lett. 2, No. 1, (2015) 15
J. Stat. Appl. Pro. Lett. 2, No. 1, 15-22 2015 15 Joural of Statistics Applicatios & Probability Letters A Iteratioal Joural http://dx.doi.org/10.12785/jsapl/020102 Martigale Method for Rui Probabilityi
More informationOn maximally nonlinear and extremal balanced Boolean functions
O imally oliear ad extremal balaced Boolea uctios Michel Mitto DCSSI/SDS/Crypto.Lab. 18, rue du docteur Zameho 9131 Issy-les-Moulieaux cedex, Frace e-mail: michelmitto@compuserve.com Abstract. We prove
More informationSeed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers
IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationTAYLOR AND MACLAURIN SERIES
Calculus TAYLOR AND MACLAURIN SERIES Give a uctio ( ad a poit a, we wish to approimate ( i the eighborhood o a by a polyomial o degree. c c ( a c( a c( a P ( c ( a We have coeiciets to choose. We require
More informationLAZHAR S INEQUALITIES AND THE S-CONVEX PHENOMENON. I.M.R. Pinheiro
NEW ZEALAND JOURNAL OF MATHEMATICS Volume 38 008, 57 6 LAZHAR S INEQUALITIES AND THE S-CONVEX PHENOMENON IMR Piheiro Received December 007 Abstract I this urther little article, we simply exted Lazhar
More informationCHAPTER 6c. NUMERICAL INTERPOLATION
CHAPTER 6c. NUMERICAL INTERPOLATION A. J. Clark School o Egieerig Departmet o Civil ad Evirometal Egieerig y Dr. Irahim A. Assakka Sprig ENCE - Computatio Methods i Civil Egieerig II Departmet o Civil
More informationPOWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS
Joural of Applied Mathematics ad Computatioal Mechaics 4 3(3) 3-8 POWER SERIES SOLUION OF FIRS ORDER MARIX DIFFERENIAL EQUAIONS Staisław Kukla Izabela Zamorska Istitute of Mathematics Czestochowa Uiversity
More informationTopic 9 - Taylor and MacLaurin Series
Topic 9 - Taylor ad MacLauri Series A. Taylors Theorem. The use o power series is very commo i uctioal aalysis i act may useul ad commoly used uctios ca be writte as a power series ad this remarkable result
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationResearch Article Some E-J Generalized Hausdorff Matrices Not of Type M
Abstract ad Applied Aalysis Volume 2011, Article ID 527360, 5 pages doi:10.1155/2011/527360 Research Article Some E-J Geeralized Hausdorff Matrices Not of Type M T. Selmaogullari, 1 E. Savaş, 2 ad B. E.
More informationgcd(n, k) = 1 Kwang Ho Kim 1 and Sihem Mesnager 2 Pyongyang, Democratic People s Republic of Korea
Solvig x 2k + + x + a = 0 i F 2 gcd, k = with Kwag Ho Kim ad Sihem Mesager 2 Istitute of Mathematics, State Academy of Scieces ad PGItech Corp., Pyogyag, Democratic People s Republic of Korea khk.cryptech@gmail.com
More informationMath 25 Solutions to practice problems
Math 5: Advaced Calculus UC Davis, Sprig 0 Math 5 Solutios to practice problems Questio For = 0,,, 3,... ad 0 k defie umbers C k C k =! k!( k)! (for k = 0 ad k = we defie C 0 = C = ). by = ( )... ( k +
More informationCSE 4095/5095 Topics in Big Data Analytics Spring 2017; Homework 1 Solutions
CSE 09/09 Topics i ig Data Aalytics Sprig 2017; Homework 1 Solutios Note: Solutios to problems,, ad 6 are due to Marius Nicolae. 1. Cosider the followig algorithm: for i := 1 to α log e do Pick a radom
More informationFast Power Flow Methods 1.0 Introduction
Fast ower Flow Methods. Itroductio What we have leared so far is the so-called full- ewto-raphso R power flow alorithm. The R alorithm is perhaps the most robust alorithm i the sese that it is most liely
More information5. Fast NLMS-OCF Algorithm
5. Fast LMS-OCF Algorithm The LMS-OCF algorithm preseted i Chapter, which relies o Gram-Schmidt orthogoalizatio, has a compleity O ( M ). The square-law depedece o computatioal requiremets o the umber
More informationPAijpam.eu ON TENSOR PRODUCT DECOMPOSITION
Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314
More informationContinuous Random Variables: Conditioning, Expectation and Independence
Cotiuous Radom Variables: Coditioig, Expectatio ad Idepedece Berli Che Departmet o Computer ciece & Iormatio Egieerig Natioal Taiwa Normal Uiversit Reerece: - D.. Bertsekas, J. N. Tsitsiklis, Itroductio
More informationConcavity Solutions of Second-Order Differential Equations
Proceedigs of the Paista Academy of Scieces 5 (3): 4 45 (4) Copyright Paista Academy of Scieces ISSN: 377-969 (prit), 36-448 (olie) Paista Academy of Scieces Research Article Cocavity Solutios of Secod-Order
More informationμ are complex parameters. Other
A New Numerical Itegrator for the Solutio of Iitial Value Problems i Ordiary Differetial Equatios. J. Suday * ad M.R. Odekule Departmet of Mathematical Scieces, Adamawa State Uiversity, Mubi, Nigeria.
More informationOpen Access Nonlinear Correction of Sensor Based on Immunization Programs
Sed Orders or Reprits to reprits@bethamsciece.ae The Ope Automatio ad Cotrol Systems Joural, 2014, 6, 1705-1709 1705 Ope Access Noliear Correctio o Sesor Based o Immuizatio Programs Lirog Lu 1, Xiaodog
More informationNewton s Method. y f x 1 x x 1 f x 1. Letting y 0 and solving for x produces. x x 1 f x 1. x 1. x 2 x 1 f x 1. f x 1. x 3 x 2 f x 2 f x 2.
460_008.qd //04 :7 PM Page 9 SECTION.8 Newto s Method 9 (a) a a Sectio.8 (, ( )) (, ( )) Taget lie c Taget lie c b (b) The -itercept o the taget lie approimates the zero o. Figure.60 b Newto s Method Approimate
More informationCS284A: Representations and Algorithms in Molecular Biology
CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by
More informationStability of fractional positive nonlinear systems
Archives of Cotrol Scieces Volume 5(LXI), 15 No. 4, pages 491 496 Stability of fractioal positive oliear systems TADEUSZ KACZOREK The coditios for positivity ad stability of a class of fractioal oliear
More informationA NEW CLASS OF 2-STEP RATIONAL MULTISTEP METHODS
Jural Karya Asli Loreka Ahli Matematik Vol. No. (010) page 6-9. Jural Karya Asli Loreka Ahli Matematik A NEW CLASS OF -STEP RATIONAL MULTISTEP METHODS 1 Nazeeruddi Yaacob Teh Yua Yig Norma Alias 1 Departmet
More informationComparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series
Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series
More informationTHE SYSTEMATIC AND THE RANDOM. ERRORS - DUE TO ELEMENT TOLERANCES OF ELECTRICAL NETWORKS
R775 Philips Res. Repts 26,414-423, 1971' THE SYSTEMATIC AND THE RANDOM. ERRORS - DUE TO ELEMENT TOLERANCES OF ELECTRICAL NETWORKS by H. W. HANNEMAN Abstract Usig the law of propagatio of errors, approximated
More informationMaclaurin and Taylor series
At the ed o the previous chapter we looed at power series ad oted that these were dieret rom other iiite series as they were actually uctios o a variable R: a a + + a + a a Maclauri ad Taylor series +
More informationPhys. 201 Mathematical Physics 1 Dr. Nidal M. Ershaidat Doc. 12
Physics Departmet, Yarmouk Uiversity, Irbid Jorda Phys. Mathematical Physics Dr. Nidal M. Ershaidat Doc. Fourier Series Deiitio A Fourier series is a expasio o a periodic uctio (x) i terms o a iiite sum
More informationFactoring Algorithms and Other Attacks on the RSA 1/12
Factorig Algorithms ad Other Attacks o the RSA T-79550 Cryptology Lecture 8 April 8, 008 Kaisa Nyberg Factorig Algorithms ad Other Attacks o the RSA / The Pollard p Algorithm Let B be a positive iteger
More informationSolution of Differential Equation from the Transform Technique
Iteratioal Joural of Computatioal Sciece ad Mathematics ISSN 0974-3189 Volume 3, Number 1 (2011), pp 121-125 Iteratioal Research Publicatio House http://wwwirphousecom Solutio of Differetial Equatio from
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim
More informationHashing and Amortization
Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,
More informationOn Some Properties of Digital Roots
Advaces i Pure Mathematics, 04, 4, 95-30 Published Olie Jue 04 i SciRes. http://www.scirp.org/joural/apm http://dx.doi.org/0.436/apm.04.46039 O Some Properties of Digital Roots Ilha M. Izmirli Departmet
More informationRecursive Algorithms. Recurrences. Recursive Algorithms Analysis
Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects
More informationCSE 191, Class Note 05: Counting Methods Computer Sci & Eng Dept SUNY Buffalo
Coutig Methods CSE 191, Class Note 05: Coutig Methods Computer Sci & Eg Dept SUNY Buffalo c Xi He (Uiversity at Buffalo CSE 191 Discrete Structures 1 / 48 Need for Coutig The problem of coutig the umber
More informationa 2 +b 2 +c 2 ab+bc+ca.
All Problems o the Prize Exams Sprig 205 The source for each problem is listed below whe available; but eve whe the source is give, the formulatio of the problem may have bee chaged. Solutios for the problems
More informationA Hadamard-type lower bound for symmetric diagonally dominant positive matrices
A Hadamard-type lower boud for symmetric diagoally domiat positive matrices Christopher J. Hillar, Adre Wibisoo Uiversity of Califoria, Berkeley Jauary 7, 205 Abstract We prove a ew lower-boud form of
More informationb are constants determined by r, for M > 0. lim rn a and log
Raju et al. Iteratioal Joural o Advaced Egieerig Techology E-ISSN 976-945 Research Paper A NOVEL APPLICATION OF DIFFERENCE EQUATION FOR FERN LEAF DEVELOPER AS AN INVERSE PROBLEM M.Raju * B.Selvaraj M.Thiyagaraja
More informationA New Simulation Model of Rician Fading Channel Xinxin Jin 1,2,a, Yu Zhang 1,3,b, Changyong Pan 4,c
6 Iteratioal Coferece o Iformatio Egieerig ad Commuicatios Techology (IECT 6 ISB: 978--6595-375-5 A ew Simulatio Model of Ricia Fadig Chael Xixi Ji,,a, Yu Zhag,3,b, Chagyog Pa 4,c Tsighua atioal Laboratory
More informationAs stated by Laplace, Probability is common sense reduced to calculation.
Note: Hadouts DO NOT replace the book. I most cases, they oly provide a guidelie o topics ad a ituitive feel. The math details will be covered i class, so it is importat to atted class ad also you MUST
More informationFIR Filter Design: Part I
EEL3: Discrete-Time Sigals ad Systems FIR Filter Desig: Part I. Itroductio FIR Filter Desig: Part I I this set o otes, we cotiue our exploratio o the requecy respose o FIR ilters. First, we cosider some
More informationDisjoint Systems. Abstract
Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio
More informationQuantum Annealing for Heisenberg Spin Chains
LA-UR # - Quatum Aealig for Heiseberg Spi Chais G.P. Berma, V.N. Gorshkov,, ad V.I.Tsifriovich Theoretical Divisio, Los Alamos Natioal Laboratory, Los Alamos, NM Istitute of Physics, Natioal Academy of
More informationCalculation of Inharmonicities in Musical Instruments
UIUC Physics 406POM/Physics 93POM Physics o Music/Musical Istrumets Calculatio o Iharmoicities i Musical Istrumets As we have discussed i the POM lectures, real -dimesioal musical istrumets do ot have
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationA METHOD TO COMPARE TWO COMPLEXITY FUNCTIONS USING COMPLEXITY CLASSES
UPB Sci Bull, Series A, Vol 7, Iss, ISSN 3-77 A METHOD TO COMPARE TWO COMPLEXITY FUNCTIONS USING COMPLEXITY CLASSES Adrei-Horia MOGOS, Adia Magda FLOREA Complexitatea uui algoritm poate i exprimată ca
More informationNewton s Method. Video
SECTION 8 Newto s Method 9 (a) a a Sectio 8 (, ( )) (, ( )) Taget lie c Taget lie c b (b) The -itercept o the taget lie approimates the zero o Figure 60 b Newto s Method Approimate a zero o a uctio usig
More informationPs(X) E PnSn x (1.2) PS (x) Po=0, and A k,n k > -I we get summablllty A, summabllity (L) and A method of summability respectively.
Iterat. J. Math. & Math. Sci. VOL. 12 NO. (1989) 99106 99 ON (J,p) SUMMABILITY OF FOURIER SERIES S.M. MAZHAR Departmet of Mathematics Kuwait Uiversity P.O. BOX 5969 13060, Safat, Kuwait (Received December
More information1 Duality revisited. AM 221: Advanced Optimization Spring 2016
AM 22: Advaced Optimizatio Sprig 206 Prof. Yaro Siger Sectio 7 Wedesday, Mar. 9th Duality revisited I this sectio, we will give a slightly differet perspective o duality. optimizatio program: f(x) x R
More informationA Note on Matrix Rigidity
A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices
More informationLECTURE 17: Linear Discriminant Functions
LECURE 7: Liear Discrimiat Fuctios Perceptro leari Miimum squared error (MSE) solutio Least-mea squares (LMS) rule Ho-Kashyap procedure Itroductio to Patter Aalysis Ricardo Gutierrez-Osua exas A&M Uiversity
More informationHigher-order iterative methods by using Householder's method for solving certain nonlinear equations
Math Sci Lett, No, 7- ( 7 Mathematical Sciece Letters A Iteratioal Joural http://dxdoiorg/785/msl/5 Higher-order iterative methods by usig Householder's method for solvig certai oliear equatios Waseem
More informationAn Extension of the Szász-Mirakjan Operators
A. Şt. Uiv. Ovidius Costaţa Vol. 7(), 009, 37 44 A Extesio o the Szász-Mirakja Operators C. MORTICI Abstract The paper is devoted to deiig a ew class o liear ad positive operators depedig o a certai uctio
More informationTest One (Answer Key)
CS395/Ma395 (Sprig 2005) Test Oe Name: Page 1 Test Oe (Aswer Key) CS395/Ma395: Aalysis of Algorithms This is a closed book, closed otes, 70 miute examiatio. It is worth 100 poits. There are twelve (12)
More informationA NUMERICAL METHOD OF SOLVING CAUCHY PROBLEM FOR DIFFERENTIAL EQUATIONS BASED ON A LINEAR APPROXIMATION
U.P.B. Sci. Bull., Series A, Vol. 79, Iss. 4, 7 ISSN -77 A NUMERICAL METHOD OF SOLVING CAUCHY PROBLEM FOR DIFFERENTIAL EQUATIONS BASED ON A LINEAR APPROXIMATION Cristia ŞERBĂNESCU, Marius BREBENEL A alterate
More informationElement sampling: Part 2
Chapter 4 Elemet samplig: Part 2 4.1 Itroductio We ow cosider uequal probability samplig desigs which is very popular i practice. I the uequal probability samplig, we ca improve the efficiecy of the resultig
More informationMcGill University Math 354: Honors Analysis 3 Fall 2012 Solutions to selected problems. x y
McGill Uiversity Math 354: Hoors Aalysis 3 Fall 212 Assigmet 3 Solutios to selected problems Problem 1. Lipschitz uctios. Let M K be the set o all uctios cotiuous uctios o [, 1] satisyig a Lipschitz coditio
More informationTeaching Mathematics Concepts via Computer Algebra Systems
Iteratioal Joural of Mathematics ad Statistics Ivetio (IJMSI) E-ISSN: 4767 P-ISSN: - 4759 Volume 4 Issue 7 September. 6 PP-- Teachig Mathematics Cocepts via Computer Algebra Systems Osama Ajami Rashaw,
More informationR. van Zyl 1, A.J. van der Merwe 2. Quintiles International, University of the Free State
Bayesia Cotrol Charts for the Two-parameter Expoetial Distributio if the Locatio Parameter Ca Take o Ay Value Betwee Mius Iity ad Plus Iity R. va Zyl, A.J. va der Merwe 2 Quitiles Iteratioal, ruaavz@gmail.com
More informationModified Decomposition Method by Adomian and. Rach for Solving Nonlinear Volterra Integro- Differential Equations
Noliear Aalysis ad Differetial Equatios, Vol. 5, 27, o. 4, 57-7 HIKARI Ltd, www.m-hikari.com https://doi.org/.2988/ade.27.62 Modified Decompositio Method by Adomia ad Rach for Solvig Noliear Volterra Itegro-
More informationDesign and Analysis of Algorithms
Desig ad Aalysis of Algorithms Probabilistic aalysis ad Radomized algorithms Referece: CLRS Chapter 5 Topics: Hirig problem Idicatio radom variables Radomized algorithms Huo Hogwei 1 The hirig problem
More informationECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.
ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.
More informationIP Reference guide for integer programming formulations.
IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more
More informationResearch Article Approximate Riesz Algebra-Valued Derivations
Abstract ad Applied Aalysis Volume 2012, Article ID 240258, 5 pages doi:10.1155/2012/240258 Research Article Approximate Riesz Algebra-Valued Derivatios Faruk Polat Departmet of Mathematics, Faculty of
More information1. ARITHMETIC OPERATIONS IN OBSERVER'S MATHEMATICS
1. ARITHMETIC OPERATIONS IN OBSERVER'S MATHEMATICS We cosider a ite well-ordered system of observers, where each observer sees the real umbers as the set of all iite decimal fractios. The observers are
More informationCS / MCS 401 Homework 3 grader solutions
CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of
More informationOn Nonsingularity of Saddle Point Matrices. with Vectors of Ones
Iteratioal Joural of Algebra, Vol. 2, 2008, o. 4, 197-204 O Nosigularity of Saddle Poit Matrices with Vectors of Oes Tadeusz Ostrowski Istitute of Maagemet The State Vocatioal Uiversity -400 Gorzów, Polad
More informationCS583 Lecture 02. Jana Kosecka. some materials here are based on E. Demaine, D. Luebke slides
CS583 Lecture 02 Jaa Kosecka some materials here are based o E. Demaie, D. Luebke slides Previously Sample algorithms Exact ruig time, pseudo-code Approximate ruig time Worst case aalysis Best case aalysis
More informationApproximate solutions for an acoustic plane wave propagation in a layer with high sound speed gradient
Proceedigs o Acoustics Victor Harbor 7- ovember, Victor Harbor, Australia Approximate solutios or a acoustic plae wave propagatio i a layer with high soud speed gradiet Alex Zioviev ad Adria D. Joes Maritime
More information1 Covariance Estimation
Eco 75 Lecture 5 Covariace Estimatio ad Optimal Weightig Matrices I this lecture, we cosider estimatio of the asymptotic covariace matrix B B of the extremum estimator b : Covariace Estimatio Lemma 4.
More informationAN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC MAPS
http://www.paper.edu.c Iteratioal Joural of Bifurcatio ad Chaos, Vol. 1, No. 5 () 119 15 c World Scietific Publishig Compay AN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC
More information1. Introduction. 2. Numerical Methods
America Joural o Computatioal ad Applied Matematics, (5: 9- DOI:.59/j.ajcam.5. A Stud o Numerical Solutios o Secod Order Iitial Value Problems (IVP or Ordiar Dieretial Equatios wit Fourt Order ad Butcer
More informationALG 2.2 Search Algorithms
Algorithms Professor Joh Reif ALG 2.2 Search Algorithms (a Biary Search: average case (b Biary Search with Errors (homework (c Iterpolatio Search (d Ubouded Search Biary Search Trees (i sorted Table of
More information