Cuntz algebras, generalized Walsh bases and applications

Size: px
Start display at page:

Download "Cuntz algebras, generalized Walsh bases and applications"

Transcription

1 Cuntz algebras, generalized Walsh bases and applications Gabriel Picioroaga November 9, 2013 INFAS 1 / 91

2 Basics H, separable Hilbert space, (e n ) n N ONB in H: e n, e m = δ n,m span{e n } = H v = k=1 v, e k e k lim n v n k=1 v, e k e k = 0 2 / 91

3 Basics H, separable Hilbert space, (e n ) n N ONB in H: e n, e m = δ n,m span{e n } = H v = k=1 v, e k e k lim n v n k=1 v, e k e k = 0 In applications: H = L 2 space and v encodes a signal, state, image, measurable function. Good Approximation: least mean square deviation 3 / 91

4 Example Fourier: ( 1 2π e inx ) n Z ONB on L 2 [ π, π] Wavelet : {2 n/2 ψ(2 n t k) n, k Z} ONB in L 2 (R) Walsh: discrete sine-cosine versions, ±1 on dyadic intervals (exp(λ 2πx) λ Λ exponential bases on some L 2 (fractals) 4 / 91

5 Main ideas and layout of the talk: Cuntz relations generate a diversity of bases: Examples, Old and New (generalized Walsh) Zoom in on the new Walsh, study structure properties (How different from the old one is it?) Possible applications of the generalized Walsh. 5 / 91

6 Set Up R- d d expansive. B R d, N = B. IFS: τ b (x) = R 1 (x + b) (x R d, b B) Hutchinson:! attractor (X B, µ B ) invariant for the IFS. µ B is invariant for r : X B X B r(x) = τ 1 b (x), if x τ b(x B ) 6 / 91

7 Set Up R- d d expansive. B R d, N = B. IFS: τ b (x) = R 1 (x + b) (x R d, b B) Hutchinson:! attractor (X B, µ B ) invariant for the IFS. µ B is invariant for r : X B X B Example IFS : τ j (x) = x+j N, j = 0, 1,..., N 1 r(x) = τ 1 b (x), if x τ b(x B ) Attractor: X = [0, 1], with λ the Lebesgue measure r(x) = Nx mod 1 IFS : τ j (x) = x+j N, j = 0, 1,..., N 1 7 / 91

8 Cuntz Relations Definition O N : S i S j = δ i,j I, N 1 i=0 S i S i = I 8 / 91

9 QMFs QMF basis = multiresolution for the wavelet representation associated to a filter m 0. Definition A QMF basis is a set of N QMF s 1 N r(w)=z m 0, m 1,..., m N 1 such that m i (w)m j (w) = δ ij, (i, j {0,..., N 1}, z X ) 9 / 91

10 QMF bases and Cuntz algebra representations Proposition Let (m i ) N 1 i=0 be a QMF basis. The operators on L2 (X, µ) S i (f ) = m i f r, i = 0,..., N 1 are isometries and form a representation of the Cuntz algebra O N. 10 / 91

11 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 11 / 91

12 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 12 / 91

13 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 3 on the range of f the Cuntz isometries are like multiplication-dilation operators 4 c 0 X such that f (c 0 ) spane. 13 / 91

14 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 3 on the range of f the Cuntz isometries are like multiplication-dilation operators 4 c 0 X such that f (c 0 ) spane. 5 If the Ruelle (transfer) operator admits as fixed point a function h constant on f 1 (spane) then h is constant. 14 / 91

15 Main Result Theorem H Hilbert space, (S i ) N 1 i=0 Cuntz representation of O N. E orthonormal, X top.space, f : X H norm continuous function and: 1 E = N 1 i=0 S ie. 2 span{f (t) : t X } = H and f (t) = 1, for all t X. 3 on the range of f the Cuntz isometries are like multiplication-dilation operators 4 c 0 X such that f (c 0 ) spane. 5 If the Ruelle (transfer) operator admits as fixed point a function h constant on f 1 (spane) then h is constant. Then E is an orthonormal basis for H. 15 / 91

16 In applications: f (t) = exp t on L 2 (X B, µ B ) S l (g) = e l g r, (B, L) Hadamard pair S i (g) = m i g r, m i = N N 1 j=0 a ij χ [j/n,(j+1)/n] E = {S l1 S l2 S ln (exp c )}, c extreme cycle point. E = {S i1 S i2 S in (1)} 16 / 91

17 Consequences 1-dimensional: 0 B R, R > 1, 1 R B admits a set L as spectrum. C1. E = {S w (exp c ) : c extreme cycle point} is ONB in L 2 (µ B ) made of piecewise exponential functions. S l1...s ln e c (x) = e l1 (x)e l2 (rx)...e ln (r n 1 x)e c (r n x) C2. When B Z, L Z, and R Z then Λ such that {e λ : λ Λ} is ONB for L 2 (µ B ). 17 / 91

18 Consequences 1-dimensional: 0 B R, R > 1, 1 R B admits a set L as spectrum. C1. E = {S w (exp c ) : c extreme cycle point} is ONB in L 2 (µ B ) made of piecewise exponential functions. S l1...s ln e c (x) = e l1 (x)e l2 (rx)...e ln (r n 1 x)e c (r n x) C2. When B Z, L Z, and R Z then Λ such that {e λ : λ Λ} is ONB for L 2 (µ B ). Example Cantor s (X 1/4, µ 1/4 ) admits exp ONB: R = 4, B = {0, 2}, spectrum L = {0, 1} Example R = 3, B = {0, 2}, L = {0, 3 4 } spectrum of 1 3B: Middle third Cantor set which is known not to admit exponential bases. 18 / 91

19 Consequences C3. Walsh Bases: [0, 1] is the attractor of the IFS: τ 0 x = x 2, τ 1x = x+1 2. rx = 2xmod1. m 0 = 1, m 1 = χ [0,1/2) χ [1/2,1) form a QMF basis. E := {S w 1 : w {0, 1} } is an ONB for L 2 [0, 1], the Walsh basis. Description: For n = lk=0 i k2 k, the n th Walsh function : W n (x) = m i0 (x) m i1 (rx) m il (r l x) = S i0 i 1...i l 1 19 / 91

20 Walsh bases 20 / 91

21 Walsh bases 21 / 91

22 Walsh bases 22 / 91

23 Walsh bases 23 / 91

24 Walsh bases 24 / 91

25 Walsh bases 25 / 91

26 Walsh bases 26 / 91

27 Walsh bases 27 / 91

28 Walsh bases 28 / 91

29 Walsh bases 29 / 91

30 Walsh bases 30 / 91

31 Generalized Walsh bases C4. Let A = [a ij ] a N N unitary matrix, a 1j = 1 N. m i (x) := N N 1 j=0 a ij χ [j/n,(j+1)/n] (x) r(x) = Nxmod1, n = lk=0 i kn k with i k {0, 1,.., N 1}. The n th generalized Walsh function : W n,a (x) = m i0 (x) m i1 (rx) m il (r l x) The set (W n,a ) n N is ONB in L 2 [0, 1]. 31 / 91

32 Generalized Walsh bases Example We will graph a few generalized Walsh functions that correspond to 4 4 matrix A = / 91

33 Generalized Walsh bases 33 / 91

34 Generalized Walsh bases 34 / 91

35 Generalized Walsh bases 35 / 91

36 Generalized Walsh bases 36 / 91

37 Generalized Walsh bases 37 / 91

38 Generalized Walsh bases 38 / 91

39 Generalized Walsh bases 39 / 91

40 Generalized Walsh bases 40 / 91

41 Generalized Walsh bases 41 / 91

42 Generalized Walsh bases 42 / 91

43 Generalized Walsh bases 43 / 91

44 Generalized Walsh bases 44 / 91

45 Generalized Walsh bases 45 / 91

46 Generalized Walsh bases 46 / 91

47 Generalized Walsh bases 47 / 91

48 Generalized Walsh bases 48 / 91

49 Example We will graph a few generalized Walsh functions that correspond to 3 3 matrix A = / 91

50 Generalized Walsh bases 50 / 91

51 Generalized Walsh bases 51 / 91

52 Generalized Walsh bases 52 / 91

53 Generalized Walsh bases 53 / 91

54 Generalized Walsh bases 54 / 91

55 Generalized Walsh bases 55 / 91

56 Generalized Walsh bases 56 / 91

57 Generalized Walsh bases 57 / 91

58 Generalized Walsh bases 58 / 91

59 Generalized Walsh bases 59 / 91

60 Generalized Walsh bases 60 / 91

61 Some differences The classic Walsh functions form a group : W n (x) W m (x) = W n m (x) Figure: Graph of W 4 7,A (W n,a) n does not form a group 61 / 91

62 Convergence properties Theorem For f L 1 [0, 1] the sequence converges a.e. to f (x). Corollary S N q(x) = N q 1 n=0 f, W n,a W n,a (x) If f L 1 [0, 1] is continuous in a neighborhood of x = a then S N q f uniformly inside an interval centered at a. 62 / 91

63 Approximation issues Example f (x) = { 0, x [0, 1/16) [1/8, 3/16) [1/4, 1/2) 1, x [1/16, 1/8) [3/16, 1/4) [1/2, 1] With generalized Walsh ONB to the unitary matrix A = / 91

64 Figure: Graph of f and S 27 (f ) 64 / 91

65 Figure: Graph of f and S 36 (f ) 65 / 91

66 Figure: Graph of f and S 60 (f ) 66 / 91

67 Figure: Graph of f and S 81 (f ) 67 / 91

68 Figure: Graph of f and S 100 (f ) 68 / 91

69 Figure: Graph of f and S 200 (f ) 69 / 91

70 Figure: Graph of f and S 241 (f ) 70 / 91

71 Figure: Graph of f and S 300 (f ) 71 / 91

72 Symmetric encryption Corollary If f : [0, 1] C is constant on the interval I j := [j/n q, (j + 1)/N q ) for some j {0, 1,.., N q 1}, then for all x I j : f (x) = N q 1 n=0 f, W n,a W n,a (x) f (x) = v j, x I j, j = 0,..., N q 1. The sequence f, W n,a encrypts f with respect to a secret matrix A. 72 / 91

73 Example f = abcadbcad is encoded as a n = [ , , , , , , , , e 1] A = / 91

74 Example Given the previous sequence a n and slightly perturbed matrix à = 0.2 Figure: Graph of a n W n,ã 74 / 91

75 Continuity w.r.t. matrix entries For a fixed sequence (a n ) Nq 1 n=0 the map R N2 A N q 1 n=0 a n W n,a is continuous To strengthen the encryption : f f, W n,a + extra, e.g. ( 1) n M sin(1/a 2 ) 75 / 91

76 Previous example, now with entry a = Figure: Graph of a n W n, Ã 76 / 91

77 Encryption/Compression with Cuntz QMF basis m i (x) := N N 1 j=0 a ij χ [j/n,(j+1)/n] (x) S i (f ) = m i f r S i (f ) = 1 N N 1 k=0 m i( x+k N ) f ( x+k N ) signal f [S i (f )] i=0,n 1 (i.e. f encrypted). Compress [S i (f )] i=0,n / 91

78 Example Figure: Signal f, piece wise constant on tri-adic intervals 78 / 91

79 Example Figure: First frequency band, signal S 0 f 79 / 91

80 Example Figure: 2 nd frequency band, signal S 1 f 80 / 91

81 Example Figure: 3 rd frequency band, signal S 2 f 81 / 91

82 A cryptographic protocol H 1 space of messages, H 2 the space of encrypted messages Assume plenty of operators A : H 1 H 2 and B : H 1 H 2 such that B 1 A B 1 A = I H1 Ping-pong messaging (also Eve is eavesdropping): 1) Alice to Bob: w 1 = A(v) H 2 2) Bob to Alice: w 2 = B 1 A(v) H 1 3) Alice to Bob: w 3 = AB 1 A(v) H 2 4) Bob applies B 1 to w / 91

83 Bad choices A(f )(x) = f (x + a), B(f ) = f (x + b) f can be detected from its translations A(f )(x) = f (x a ), B(f )(x) = f (x b ) dilation/compression, some of f could be guessed, issues with the domain More generally f G, G Abelian group: Ax = ax, Bx = bx. Previous ping-pong: w 1 = af, w 2 = b 1 w 1 Eve can figure out b = w2 1 w 1 w 3 = a 1 w 2 = b 1 f Eve multiplies by b and reveals f 83 / 91

84 Transforms commutation A, B unitary N N matrices having constant 1/ N first row. W A : L 2 [0, 1] l 2 (N), W A (f ) = f, W n,a n 0 The inverse tranform (only needed for finite sequences ) : W 1 A ((a n) n ) = n a n W n,a Question: Given f under what conditions for A and B does the ping-pong protocol work? W 1 B W A W 1 B W A(f ) = f 84 / 91

85 Theorem If row l,b, row k,a = row l,a, row k,b for all k, l in {1, 2, 3,..., N} then f piecewise constant on consecutive N-adic intervals : W 1 B W A W 1 B W A(f ) = f 85 / 91

86 Theorem If row l,b, row k,a = row l,a, row k,b for all k, l in {1, 2, 3,..., N} then f piecewise constant on consecutive N-adic intervals : W 1 B N = 3 one equation is relevant: W A W 1 B W A(f ) = f 86 / 91

87 Protocol set up Alice has A = [a i,j ] j=1,n i=1,n Bob receives from Alice: with real number entries. N a kj x lj = j=1 N a lj x kj, 1 < l < k N masking coefficients j=1 87 / 91

88 Protocol set up Alice has A = [a i,j ] j=1,n i=1,n Bob receives from Alice: with real number entries. N a kj x lj = j=1 N a lj x kj, 1 < l < k N masking coefficients j=1 B = [x i,j ] j=1,n i=1,n must be unitary: x 1,j = 1/ N, j = 1,..., N N j=1 x i,j 2 = 1, i = 2,..., N N j=1 x i,j = 0, i = 2,..., N N k=1 x i,k x j,k = 0, 1 < i < j N System of N 2 N quadratics with N 2 N unknowns. 88 / 91

89 Question Are there infinitely many A for which the previous system has infinitely many solutions? Study their Grobner bases. 89 / 91

90 Question Are there infinitely many A for which the previous system has infinitely many solutions? Study their Grobner bases. Example There are infintely many B transform commuting with A = / 91

91 Thank you! Bibliography: 1) D.Dutkay, G.Picioroaga, M.S. Song Orthonormal bases generated by Cuntz algebras to appear in JMAA 2) D.Dutkay, G.Picioroaga Generalized Walsh bases and applications, to appear in ACAP 3) S.Harding, G.Picioroaga Continuity properties of a generalized Walsh system and applications to cryptography -undergraduate research project 91 / 91

Fourier Bases on the Skewed Sierpinski Gasket

Fourier Bases on the Skewed Sierpinski Gasket Fourier Bases on the Skewed Sierpinski Gasket Calvin Hotchkiss University Nebraska-Iowa Functional Analysis Seminar November 5, 2016 Part 1: A Fast Fourier Transform for Fractal Approximations The Fractal

More information

arxiv:math/ v1 [math.ca] 19 May 2004

arxiv:math/ v1 [math.ca] 19 May 2004 Fractal Components of Wavelet Measures arxiv:math/040537v [math.ca] 9 May 004 Abstract Palle E.T. Jorgensen Department of Mathematics, The University of Iowa, 4 MacLean Hall, Iowa City, IA, 54-49, U.S.A.

More information

Analysis of Fractals, Image Compression and Entropy Encoding

Analysis of Fractals, Image Compression and Entropy Encoding Analysis of Fractals, Image Compression and Entropy Encoding Myung-Sin Song Southern Illinois University Edwardsville Jul 10, 2009 Joint work with Palle Jorgensen. Outline 1. Signal and Image processing,

More information

Mathematical Methods for Computer Science

Mathematical Methods for Computer Science Mathematical Methods for Computer Science Computer Laboratory Computer Science Tripos, Part IB Michaelmas Term 2016/17 Professor J. Daugman Exercise problems Fourier and related methods 15 JJ Thomson Avenue

More information

Fourier bases on the skewed Sierpinski gasket

Fourier bases on the skewed Sierpinski gasket Graduate Theses and Dissertations Iowa State University Capstones, Theses and Dissertations 2017 Fourier bases on the skewed Sierpinski gasket Calvin Francis Hotchkiss Iowa State University Follow this

More information

Functional Analysis Exercise Class

Functional Analysis Exercise Class Functional Analysis Exercise Class Week: December 4 8 Deadline to hand in the homework: your exercise class on week January 5. Exercises with solutions ) Let H, K be Hilbert spaces, and A : H K be a linear

More information

Solutions: Problem Set 4 Math 201B, Winter 2007

Solutions: Problem Set 4 Math 201B, Winter 2007 Solutions: Problem Set 4 Math 2B, Winter 27 Problem. (a Define f : by { x /2 if < x

More information

More on Fourier Series

More on Fourier Series More on Fourier Series R. C. Trinity University Partial Differential Equations Lecture 6.1 New Fourier series from old Recall: Given a function f (x, we can dilate/translate its graph via multiplication/addition,

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

CHEBYSHEV INEQUALITIES AND SELF-DUAL CONES

CHEBYSHEV INEQUALITIES AND SELF-DUAL CONES CHEBYSHEV INEQUALITIES AND SELF-DUAL CONES ZDZISŁAW OTACHEL Dept. of Applied Mathematics and Computer Science University of Life Sciences in Lublin Akademicka 13, 20-950 Lublin, Poland EMail: zdzislaw.otachel@up.lublin.pl

More information

Fourier Bases on Fractals

Fourier Bases on Fractals Fourier Bases on Fractals Keri Kornelson University of Oklahoma - Norman February Fourier Talks February 21, 2013 K. Kornelson (U. Oklahoma) Fractal Fourier Bases FFT 02/21/2013 1 / 21 Coauthors This is

More information

Self-Referentiality, Fractels, and Applications

Self-Referentiality, Fractels, and Applications Self-Referentiality, Fractels, and Applications Peter Massopust Center of Mathematics Research Unit M15 Technical University of Munich Germany 2nd IM-Workshop on Applied Approximation, Signals, and Images,

More information

OPERATOR THEORY ON HILBERT SPACE. Class notes. John Petrovic

OPERATOR THEORY ON HILBERT SPACE. Class notes. John Petrovic OPERATOR THEORY ON HILBERT SPACE Class notes John Petrovic Contents Chapter 1. Hilbert space 1 1.1. Definition and Properties 1 1.2. Orthogonality 3 1.3. Subspaces 7 1.4. Weak topology 9 Chapter 2. Operators

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

Affine and Quasi-Affine Frames on Positive Half Line

Affine and Quasi-Affine Frames on Positive Half Line Journal of Mathematical Extension Vol. 10, No. 3, (2016), 47-61 ISSN: 1735-8299 URL: http://www.ijmex.com Affine and Quasi-Affine Frames on Positive Half Line Abdullah Zakir Husain Delhi College-Delhi

More information

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2. APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product

More information

Kaczmarz algorithm in Hilbert space

Kaczmarz algorithm in Hilbert space STUDIA MATHEMATICA 169 (2) (2005) Kaczmarz algorithm in Hilbert space by Rainis Haller (Tartu) and Ryszard Szwarc (Wrocław) Abstract The aim of the Kaczmarz algorithm is to reconstruct an element in a

More information

A class of non-convex polytopes that admit no orthonormal basis of exponentials

A class of non-convex polytopes that admit no orthonormal basis of exponentials A class of non-convex polytopes that admit no orthonormal basis of exponentials Mihail N. Kolountzakis and Michael Papadimitrakis 1 Abstract A conjecture of Fuglede states that a bounded measurable set

More information

Contents. Acknowledgments

Contents. Acknowledgments Table of Preface Acknowledgments Notation page xii xx xxi 1 Signals and systems 1 1.1 Continuous and discrete signals 1 1.2 Unit step and nascent delta functions 4 1.3 Relationship between complex exponentials

More information

Linear Algebra (Review) Volker Tresp 2018

Linear Algebra (Review) Volker Tresp 2018 Linear Algebra (Review) Volker Tresp 2018 1 Vectors k, M, N are scalars A one-dimensional array c is a column vector. Thus in two dimensions, ( ) c1 c = c 2 c i is the i-th component of c c T = (c 1, c

More information

Topics in Harmonic Analysis Lecture 1: The Fourier transform

Topics in Harmonic Analysis Lecture 1: The Fourier transform Topics in Harmonic Analysis Lecture 1: The Fourier transform Po-Lam Yung The Chinese University of Hong Kong Outline Fourier series on T: L 2 theory Convolutions The Dirichlet and Fejer kernels Pointwise

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography AIMS-VOLKSWAGEN STIFTUNG WORKSHOP ON INTRODUCTION TO COMPUTER ALGEBRA AND APPLICATIONS Douala, Cameroon, October 12, 2017 Elliptic Curve Cryptography presented by : BANSIMBA Gilda Rech BANSIMBA Gilda Rech

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

MATH642. COMPLEMENTS TO INTRODUCTION TO DYNAMICAL SYSTEMS BY M. BRIN AND G. STUCK

MATH642. COMPLEMENTS TO INTRODUCTION TO DYNAMICAL SYSTEMS BY M. BRIN AND G. STUCK MATH642 COMPLEMENTS TO INTRODUCTION TO DYNAMICAL SYSTEMS BY M BRIN AND G STUCK DMITRY DOLGOPYAT 13 Expanding Endomorphisms of the circle Let E 10 : S 1 S 1 be given by E 10 (x) = 10x mod 1 Exercise 1 Show

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

SPECTRAL THEOREM FOR COMPACT SELF-ADJOINT OPERATORS

SPECTRAL THEOREM FOR COMPACT SELF-ADJOINT OPERATORS SPECTRAL THEOREM FOR COMPACT SELF-ADJOINT OPERATORS G. RAMESH Contents Introduction 1 1. Bounded Operators 1 1.3. Examples 3 2. Compact Operators 5 2.1. Properties 6 3. The Spectral Theorem 9 3.3. Self-adjoint

More information

CALCULUS JIA-MING (FRANK) LIOU

CALCULUS JIA-MING (FRANK) LIOU CALCULUS JIA-MING (FRANK) LIOU Abstract. Contents. Power Series.. Polynomials and Formal Power Series.2. Radius of Convergence 2.3. Derivative and Antiderivative of Power Series 4.4. Power Series Expansion

More information

Spectral Properties of an Operator-Fractal

Spectral Properties of an Operator-Fractal Spectral Properties of an Operator-Fractal Keri Kornelson University of Oklahoma - Norman NSA Texas A&M University July 18, 2012 K. Kornelson (U. Oklahoma) Operator-Fractal TAMU 07/18/2012 1 / 25 Acknowledgements

More information

Hadamard matrices and Compact Quantum Groups

Hadamard matrices and Compact Quantum Groups Hadamard matrices and Compact Quantum Groups Uwe Franz 18 février 2014 3ème journée FEMTO-LMB based in part on joint work with: Teodor Banica, Franz Lehner, Adam Skalski Uwe Franz (LMB) Hadamard & CQG

More information

Sparse linear models

Sparse linear models Sparse linear models Optimization-Based Data Analysis http://www.cims.nyu.edu/~cfgranda/pages/obda_spring16 Carlos Fernandez-Granda 2/22/2016 Introduction Linear transforms Frequency representation Short-time

More information

Advanced Cryptography Quantum Algorithms Christophe Petit

Advanced Cryptography Quantum Algorithms Christophe Petit The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat

More information

Strengthened Sobolev inequalities for a random subspace of functions

Strengthened Sobolev inequalities for a random subspace of functions Strengthened Sobolev inequalities for a random subspace of functions Rachel Ward University of Texas at Austin April 2013 2 Discrete Sobolev inequalities Proposition (Sobolev inequality for discrete images)

More information

Fractal wavelets of Dutkay-Jorgensen type for the Sierpinski gasket space

Fractal wavelets of Dutkay-Jorgensen type for the Sierpinski gasket space Fractal wavelets of Dutkay-Jorgensen type for the Sierpinski gasket space Jonas D Andrea, Kathy D. Merrill, and Judith Packer Abstract. Several years ago, D. Dutkay and P. Jorgensen developed the concept

More information

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice

More information

b = 10 a, is the logarithm of b to the base 10. Changing the base to e we obtain natural logarithms, so a = ln b means that b = e a.

b = 10 a, is the logarithm of b to the base 10. Changing the base to e we obtain natural logarithms, so a = ln b means that b = e a. INTRODUCTION TO CRYPTOGRAPHY 5. Discrete Logarithms Recall the classical logarithm for real numbers: If we write b = 10 a, then a = log 10 b is the logarithm of b to the base 10. Changing the base to e

More information

A remarkable representation of the Clifford group

A remarkable representation of the Clifford group A remarkable representation of the Clifford group Steve Brierley University of Bristol March 2012 Work with Marcus Appleby, Ingemar Bengtsson, Markus Grassl, David Gross and Jan-Ake Larsson Outline Useful

More information

1 Math 241A-B Homework Problem List for F2015 and W2016

1 Math 241A-B Homework Problem List for F2015 and W2016 1 Math 241A-B Homework Problem List for F2015 W2016 1.1 Homework 1. Due Wednesday, October 7, 2015 Notation 1.1 Let U be any set, g be a positive function on U, Y be a normed space. For any f : U Y let

More information

Moreover this binary operation satisfies the following properties

Moreover this binary operation satisfies the following properties Contents 1 Algebraic structures 1 1.1 Group........................................... 1 1.1.1 Definitions and examples............................. 1 1.1.2 Subgroup.....................................

More information

Lecture 3 Linear Algebra Background

Lecture 3 Linear Algebra Background Lecture 3 Linear Algebra Background Dan Sheldon September 17, 2012 Motivation Preview of next class: y (1) w 0 + w 1 x (1) 1 + w 2 x (1) 2 +... + w d x (1) d y (2) w 0 + w 1 x (2) 1 + w 2 x (2) 2 +...

More information

Examples of the Fourier Theorem (Sect. 10.3). The Fourier Theorem: Continuous case.

Examples of the Fourier Theorem (Sect. 10.3). The Fourier Theorem: Continuous case. s of the Fourier Theorem (Sect. 1.3. The Fourier Theorem: Continuous case. : Using the Fourier Theorem. The Fourier Theorem: Piecewise continuous case. : Using the Fourier Theorem. The Fourier Theorem:

More information

Part IA Numbers and Sets

Part IA Numbers and Sets Part IA Numbers and Sets Theorems Based on lectures by A. G. Thomason Notes taken by Dexter Chua Michaelmas 2014 These notes are not endorsed by the lecturers, and I have modified them (often significantly)

More information

FRAMES, BASES AND GROUP REPRESENTATIONS

FRAMES, BASES AND GROUP REPRESENTATIONS FRAMES, BASES AND GROUP REPRESENTATIONS Deguang Han Department of Mathematics Texas A&M University College Station, Texas 77843 dhan@math.tamu.edu and David R. Larson Department of Mathematics Texas A&M

More information

Math 4377/6308 Advanced Linear Algebra

Math 4377/6308 Advanced Linear Algebra 2.3 Composition Math 4377/6308 Advanced Linear Algebra 2.3 Composition of Linear Transformations Jiwen He Department of Mathematics, University of Houston jiwenhe@math.uh.edu math.uh.edu/ jiwenhe/math4377

More information

Recovering overcomplete sparse representations from structured sensing

Recovering overcomplete sparse representations from structured sensing Recovering overcomplete sparse representations from structured sensing Deanna Needell Claremont McKenna College Feb. 2015 Support: Alfred P. Sloan Foundation and NSF CAREER #1348721. Joint work with Felix

More information

Chapter 8 Integral Operators

Chapter 8 Integral Operators Chapter 8 Integral Operators In our development of metrics, norms, inner products, and operator theory in Chapters 1 7 we only tangentially considered topics that involved the use of Lebesgue measure,

More information

Transformation of functions

Transformation of functions Transformation of functions Translations Dilations (from the x axis) Dilations (from the y axis) Reflections (in the x axis) Reflections (in the y axis) Summary Applying transformations Finding equations

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Elliptic Curves An elliptic curve is a cubic equation of the form: y + axy + by = x 3 + cx + dx + e where a, b, c, d and e are real numbers. A special addition operation is

More information

MATH 167: APPLIED LINEAR ALGEBRA Chapter 3

MATH 167: APPLIED LINEAR ALGEBRA Chapter 3 MATH 167: APPLIED LINEAR ALGEBRA Chapter 3 Jesús De Loera, UC Davis February 18, 2012 Orthogonal Vectors and Subspaces (3.1). In real life vector spaces come with additional METRIC properties!! We have

More information

Spectral Hutchinson-3 Measures and Their Associated Operator Fractals

Spectral Hutchinson-3 Measures and Their Associated Operator Fractals University of Colorado, Boulder CU Scholar Mathematics Graduate Theses & Dissertations Mathematics Spring 1-1-2017 Spectral Hutchinson- Measures and Their Associated Operator Fractals Ian Long University

More information

ELEMENTARY LINEAR ALGEBRA

ELEMENTARY LINEAR ALGEBRA ELEMENTARY LINEAR ALGEBRA K R MATTHEWS DEPARTMENT OF MATHEMATICS UNIVERSITY OF QUEENSLAND First Printing, 99 Chapter LINEAR EQUATIONS Introduction to linear equations A linear equation in n unknowns x,

More information

Week 15-16: Combinatorial Design

Week 15-16: Combinatorial Design Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial

More information

Lattice Cryptography

Lattice Cryptography CSE 06A: Lattice Algorithms and Applications Winter 01 Instructor: Daniele Micciancio Lattice Cryptography UCSD CSE Many problems on point lattices are computationally hard. One of the most important hard

More information

Joseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia

Joseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia ELLIPTIC CURVE CRYPTOGRAPHY USING MAPLE Joseph Fadyn Kennesaw State University 1100 South Marietta Parkway Marietta, Georgia 30060 jfadyn@spsu.edu An elliptic curve is one of the form: y 2 = x 3 + ax +

More information

Matrices: 2.1 Operations with Matrices

Matrices: 2.1 Operations with Matrices Goals In this chapter and section we study matrix operations: Define matrix addition Define multiplication of matrix by a scalar, to be called scalar multiplication. Define multiplication of two matrices,

More information

Review of linear algebra

Review of linear algebra Review of linear algebra 1 Vectors and matrices We will just touch very briefly on certain aspects of linear algebra, most of which should be familiar. Recall that we deal with vectors, i.e. elements of

More information

Errata Applied Analysis

Errata Applied Analysis Errata Applied Analysis p. 9: line 2 from the bottom: 2 instead of 2. p. 10: Last sentence should read: The lim sup of a sequence whose terms are bounded from above is finite or, and the lim inf of a sequence

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

Carmen s Core Concepts (Math 135)

Carmen s Core Concepts (Math 135) Carmen s Core Concepts (Math 135) Carmen Bruni University of Waterloo Week 8 1 The following are equivalent (TFAE) 2 Inverses 3 More on Multiplicative Inverses 4 Linear Congruence Theorem 2 [LCT2] 5 Fermat

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Introduction Public Key Cryptography Unlike symmetric key, there is no need for Alice and Bob to share a common secret Alice can convey her public key to Bob in a public communication:

More information

Chap. 3. Controlled Systems, Controllability

Chap. 3. Controlled Systems, Controllability Chap. 3. Controlled Systems, Controllability 1. Controllability of Linear Systems 1.1. Kalman s Criterion Consider the linear system ẋ = Ax + Bu where x R n : state vector and u R m : input vector. A :

More information

Lecture 3. Random Fourier measurements

Lecture 3. Random Fourier measurements Lecture 3. Random Fourier measurements 1 Sampling from Fourier matrices 2 Law of Large Numbers and its operator-valued versions 3 Frames. Rudelson s Selection Theorem Sampling from Fourier matrices Our

More information

THREE LECTURES ON QUASIDETERMINANTS

THREE LECTURES ON QUASIDETERMINANTS THREE LECTURES ON QUASIDETERMINANTS Robert Lee Wilson Department of Mathematics Rutgers University The determinant of a matrix with entries in a commutative ring is a main organizing tool in commutative

More information

Real Variables # 10 : Hilbert Spaces II

Real Variables # 10 : Hilbert Spaces II randon ehring Real Variables # 0 : Hilbert Spaces II Exercise 20 For any sequence {f n } in H with f n = for all n, there exists f H and a subsequence {f nk } such that for all g H, one has lim (f n k,

More information

Math 115 ( ) Yum-Tong Siu 1. Derivation of the Poisson Kernel by Fourier Series and Convolution

Math 115 ( ) Yum-Tong Siu 1. Derivation of the Poisson Kernel by Fourier Series and Convolution Math 5 (006-007 Yum-Tong Siu. Derivation of the Poisson Kernel by Fourier Series and Convolution We are going to give a second derivation of the Poisson kernel by using Fourier series and convolution.

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Section 9.2: Matrices. Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns.

Section 9.2: Matrices. Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns. Section 9.2: Matrices Definition: A matrix A consists of a rectangular array of numbers, or elements, arranged in m rows and n columns. That is, a 11 a 12 a 1n a 21 a 22 a 2n A =...... a m1 a m2 a mn A

More information

Mobile Robotics 1. A Compact Course on Linear Algebra. Giorgio Grisetti

Mobile Robotics 1. A Compact Course on Linear Algebra. Giorgio Grisetti Mobile Robotics 1 A Compact Course on Linear Algebra Giorgio Grisetti SA-1 Vectors Arrays of numbers They represent a point in a n dimensional space 2 Vectors: Scalar Product Scalar-Vector Product Changes

More information

MTH5112 Linear Algebra I MTH5212 Applied Linear Algebra (2017/2018)

MTH5112 Linear Algebra I MTH5212 Applied Linear Algebra (2017/2018) MTH5112 Linear Algebra I MTH5212 Applied Linear Algebra (2017/2018) COURSEWORK 3 SOLUTIONS Exercise ( ) 1. (a) Write A = (a ij ) n n and B = (b ij ) n n. Since A and B are diagonal, we have a ij = 0 and

More information

Maths for Signals and Systems Linear Algebra in Engineering

Maths for Signals and Systems Linear Algebra in Engineering Maths for Signals and Systems Linear Algebra in Engineering Lectures 13 15, Tuesday 8 th and Friday 11 th November 016 DR TANIA STATHAKI READER (ASSOCIATE PROFFESOR) IN SIGNAL PROCESSING IMPERIAL COLLEGE

More information

Boolean Inner-Product Spaces and Boolean Matrices

Boolean Inner-Product Spaces and Boolean Matrices Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer 1 Lecture 13 October 16, 2017 (notes revised 10/23/17) 1 Derived from lecture notes by Ewa Syta. CPSC 467, Lecture 13 1/57 Elliptic Curves

More information

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 11 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,, a n, b are given real

More information

Quantum Computing Lecture 2. Review of Linear Algebra

Quantum Computing Lecture 2. Review of Linear Algebra Quantum Computing Lecture 2 Review of Linear Algebra Maris Ozols Linear algebra States of a quantum system form a vector space and their transformations are described by linear operators Vector spaces

More information

Shannon-Like Wavelet Frames on a Class of Nilpotent Lie Groups

Shannon-Like Wavelet Frames on a Class of Nilpotent Lie Groups Bridgewater State University From the SelectedWorks of Vignon Oussa Winter April 15, 2013 Shannon-Like Wavelet Frames on a Class of Nilpotent Lie Groups Vignon Oussa Available at: https://works.bepress.com/vignon_oussa/1/

More information

Isogenies in a quantum world

Isogenies in a quantum world Isogenies in a quantum world David Jao University of Waterloo September 19, 2011 Summary of main results A. Childs, D. Jao, and V. Soukharev, arxiv:1012.4019 For ordinary isogenous elliptic curves of equal

More information

Chapter 4: Interpolation and Approximation. October 28, 2005

Chapter 4: Interpolation and Approximation. October 28, 2005 Chapter 4: Interpolation and Approximation October 28, 2005 Outline 1 2.4 Linear Interpolation 2 4.1 Lagrange Interpolation 3 4.2 Newton Interpolation and Divided Differences 4 4.3 Interpolation Error

More information

Interpolation via weighted l 1 -minimization

Interpolation via weighted l 1 -minimization Interpolation via weighted l 1 -minimization Holger Rauhut RWTH Aachen University Lehrstuhl C für Mathematik (Analysis) Matheon Workshop Compressive Sensing and Its Applications TU Berlin, December 11,

More information

A SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM TO NON-ABELIAN GROUPS

A SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM TO NON-ABELIAN GROUPS Communications in Algebra, 3: 3878 3889, 2008 Copyright Taylor & Francis Group, LLC ISSN: 0092-7872 print/132-12 online DOI: 10.1080/0092787080210883 A SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM

More information

Notes on Continued Fractions for Math 4400

Notes on Continued Fractions for Math 4400 . Continued fractions. Notes on Continued Fractions for Math 4400 The continued fraction expansion converts a positive real number α into a sequence of natural numbers. Conversely, a sequence of natural

More information

Information Dimension

Information Dimension Information Dimension Mina Karzand Massachusetts Institute of Technology November 16, 2011 1 / 26 2 / 26 Let X would be a real-valued random variable. For m N, the m point uniform quantized version of

More information

DUALITY FOR FRAMES ZHITAO FAN, ANDREAS HEINECKE, AND ZUOWEI SHEN

DUALITY FOR FRAMES ZHITAO FAN, ANDREAS HEINECKE, AND ZUOWEI SHEN DUALITY FOR FRAMES ZHITAO FAN, ANDREAS HEINECKE, AND ZUOWEI SHEN Abstract. The subject of this article is the duality principle, which, well beyond its stand at the heart of Gabor analysis, is a universal

More information

Positive entries of stable matrices

Positive entries of stable matrices Positive entries of stable matrices Shmuel Friedland Department of Mathematics, Statistics and Computer Science, University of Illinois at Chicago Chicago, Illinois 60607-7045, USA Daniel Hershkowitz,

More information

Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem

Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem 1 Fourier Analysis, a review We ll begin with a short review of simple facts about Fourier analysis, before going on to interpret

More information

arxiv: v2 [math.fa] 27 Sep 2016

arxiv: v2 [math.fa] 27 Sep 2016 Decomposition of Integral Self-Affine Multi-Tiles Xiaoye Fu and Jean-Pierre Gabardo arxiv:43.335v2 [math.fa] 27 Sep 26 Abstract. In this paper we propose a method to decompose an integral self-affine Z

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

5.6. PSEUDOINVERSES 101. A H w.

5.6. PSEUDOINVERSES 101. A H w. 5.6. PSEUDOINVERSES 0 Corollary 5.6.4. If A is a matrix such that A H A is invertible, then the least-squares solution to Av = w is v = A H A ) A H w. The matrix A H A ) A H is the left inverse of A and

More information

Chapter 2 Formulas and Definitions:

Chapter 2 Formulas and Definitions: Chapter 2 Formulas and Definitions: (from 2.1) Definition of Polynomial Function: Let n be a nonnegative integer and let a n,a n 1,...,a 2,a 1,a 0 be real numbers with a n 0. The function given by f (x)

More information

ON SPECTRAL CANTOR MEASURES. 1. Introduction

ON SPECTRAL CANTOR MEASURES. 1. Introduction ON SPECTRAL CANTOR MEASURES IZABELLA LABA AND YANG WANG Abstract. A probability measure in R d is called a spectral measure if it has an orthonormal basis consisting of exponentials. In this paper we study

More information

Wavelet Analysis. Willy Hereman. Department of Mathematical and Computer Sciences Colorado School of Mines Golden, CO Sandia Laboratories

Wavelet Analysis. Willy Hereman. Department of Mathematical and Computer Sciences Colorado School of Mines Golden, CO Sandia Laboratories Wavelet Analysis Willy Hereman Department of Mathematical and Computer Sciences Colorado School of Mines Golden, CO 8040-887 Sandia Laboratories December 0, 998 Coordinate-Coordinate Formulations CC and

More information

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS SCOTT HOTTOVY Abstract. Quantum networks are used to transmit and process information by using the phenomena of quantum mechanics.

More information

Linear Algebra: Matrix Eigenvalue Problems

Linear Algebra: Matrix Eigenvalue Problems CHAPTER8 Linear Algebra: Matrix Eigenvalue Problems Chapter 8 p1 A matrix eigenvalue problem considers the vector equation (1) Ax = λx. 8.0 Linear Algebra: Matrix Eigenvalue Problems Here A is a given

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 13 March 3, 2013 CPSC 467b, Lecture 13 1/52 Elliptic Curves Basics Elliptic Curve Cryptography CPSC

More information

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms CRYPTOGRAPHY 19 Cryptography 5 ElGamal cryptosystems and Discrete logarithms Definition Let G be a cyclic group of order n and let α be a generator of G For each A G there exists an uniue 0 a n 1 such

More information

Lecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?

Lecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why? KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of

More information

EE263 Review Session 1

EE263 Review Session 1 EE263 Review Session 1 October 5, 2018 0.1 Importing Variables from a MALAB.m file If you are importing variables given in file vars.m, use the following code at the beginning of your script. close a l

More information

Module 7:Data Representation Lecture 35: Wavelets. The Lecture Contains: Wavelets. Discrete Wavelet Transform (DWT) Haar wavelets: Example

Module 7:Data Representation Lecture 35: Wavelets. The Lecture Contains: Wavelets. Discrete Wavelet Transform (DWT) Haar wavelets: Example The Lecture Contains: Wavelets Discrete Wavelet Transform (DWT) Haar wavelets: Example Haar wavelets: Theory Matrix form Haar wavelet matrices Dimensionality reduction using Haar wavelets file:///c /Documents%20and%20Settings/iitkrana1/My%20Documents/Google%20Talk%20Received%20Files/ist_data/lecture35/35_1.htm[6/14/2012

More information

ICS 6N Computational Linear Algebra Matrix Algebra

ICS 6N Computational Linear Algebra Matrix Algebra ICS 6N Computational Linear Algebra Matrix Algebra Xiaohui Xie University of California, Irvine xhx@uci.edu February 2, 2017 Xiaohui Xie (UCI) ICS 6N February 2, 2017 1 / 24 Matrix Consider an m n matrix

More information

Lecture 2: Haar Multiresolution analysis

Lecture 2: Haar Multiresolution analysis WAVELES AND MULIRAE DIGIAL SIGNAL PROCESSING Lecture 2: Haar Multiresolution analysis Prof.V. M. Gadre, EE, II Bombay 1 Introduction HAAR was a mathematician, who has given an idea that any continuous

More information

Colored Burau Matrices, E-multiplication, and the Algebraic Eraser Key Agreement Protocol

Colored Burau Matrices, E-multiplication, and the Algebraic Eraser Key Agreement Protocol Colored Burau Matrices, E-multiplication, and the Algebraic Eraser Key Agreement Protocol SecureRF Corporation 100 Beard Sawmill Road Suite 350 Shelton, CT 06484 203-227-3151 info@securerf.com www.securerf.com

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information