International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:

Size: px
Start display at page:

Download "International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:"

Transcription

1 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS A. ChadraSekhar*,1, B.Ravi Kumar 2, Ch.Pragathi 3 ad Ashok Kumar 1 Professor, 2 Assistat Professor, 3 Associate Professor, Research Scholar, Egieerig Mathematics, GITAM Uiversity, Visakhapatam, Idia 1 acs@gitam.edu, 2 ravikumarbrk6@gmail.com, 3 ch.prgathi1@gmail.com, saiashok.8@gmail.com ABSTRACT The multiple ecryptios of symmetric cryptosystems provide additioal security rather tha ormal ecryptio. Desigiig of idepedet ciphers usig mathematical models is vital i this process. I this paper we proposed two idepedet ciphers Keywords Fiboacci marix, Affie, Vigere trasformatios. I. INTRODUCTION If the th is expressed i terms of its precedig umbers (ot ecessarily all) is the recurrece relatio. Geeratig matrices out of these recurrece relatios refers to the recurrece relatio. Further such matrices order ca be exteded cosequetly. A. FIBONACCI MATRIX The Fiboacci Qmatrix [7] [8][] is the 2 1 matrix defied by Q Where Q F F 1 F F 1 1 F F 1 1 F is a Fiboacci umber. The F F 1 Iverse of 2 2, Fiboacci matrix is N Q Q B. EXTENSION OF FIBONACCI MATRIX The Q1 matrix is so formed such that its determiat is ivariat without loss of geerality to the Cassii formula which is oe of the most importat theorems of the Fiboacci umbers theory[7]. 2 Q F 1 F 1 F ( 1). Also similarly it ca be exteded to a matrix matrix ad ay order square matrix. The extesio of 3 3 Fiboacci matrix is as follows Q Q a. Affie Cipher A affie ecipherig trasformatiois C ap b mod N where the pair (a, b) is the ecryptig key ad gcd(a,n)1. If y E(x) (axb)mod26,[1]the we ca solve for x i terms of y ad so E 1 ( y) that is, if y ax b mod26 the y b axmod26 ax y b or equivaletly mod26. b. Vigere ciphere The Vigeere cipher was geerated by Giova Batista Belaso i 13[1]. This cipher uses a secret keyword to ecrypt the plaitext. First, each letter i the plaitext is coverted ito a umber.the this umerical value for each letter of the plaitext is added to theumerical value of each letter of a secret keyword to get the ciphertext.the Vigeereciphers are more powerful tha substitutio ciphers. C. PROPOSED WORK A Algorithm for multi ecryptio usig Fiboacci matrix as the first layer of ecryptio A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/82

2 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 ad the affie trasformatio for super ecryptio [1][8][1] II. MULTIPLE ENCRYPTION A. ENCRYPTION ALGORITHM: Step1: Alice creates plaitexts P p 1 p 2, p 3 p m Step2: Alice computes C 1 P Q ad get 1 sr ciphertext Step3:Alice computes C 2 C 1 F i for i1,2,3, m where C 2 is the compute first cipher text. Step: Alice perform super ecryptio with the Affie trasformatio E(x) (axb) mod 26, Gcd(a,N)1 ad take a ad b are secrete, from the first level ecryptio message. Step: Alice seds super ecrypted message to Bob. B. DECRYPTION ALGORITHM: Step1: Bob receives the super ecrypted message. Step2: Bob decrypts the super ecrypted 1 E y a 1 y b mod26 message by usig (P 1 ) Step3: Bob computes PP 1 1 origial plaitext message. Q to get the III. SUPER ENCYPTION OF VIGENERE CIPHER A. ENCRYPTION ALGORITHM: Step1: Alice creates plaitexts P p 1 p 2, p 3 p m Step2: Alice computes C 1 P Q ad get 1 sr ciphertext ad get 1 sr ciphertext Step3:Alice computes C 2 C 1 F i for i1,2,3, m where C 2 is the compute first cipher text. Step: Alice apply super ecryptio of vigeere trasformatio use off set rule with to the umerical value of each letter of a secret keyword to first level ecryptio message. Step: Alice seds super ecryptio message to Bob. B. DECRYPTION ALGORITHM: Step1: Bob receives the super ecryptio message. Step2: Bob decrypts with the iverse vigeere trasformatio to super ecrypted message. It is the first decryptio message P 1 Step3: Bob computes PP 1 1 origial plaitext message. Q to get the A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Fiboacci 3 3 matix Case1: For 1 F2 F1 1 we get Q F1 F Ecryptio algorithm: P R O 1 1 Step1: Let the Plai text be P S O R 1 Step2: Alice computes C 1 P Q 1 A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/83

3 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: Step3: applyig affie trasformatio E(x)(axb) mod 26 for a & b X 1 1 x (x) mod Secod Ecrypted message is Y V J L K D J V Y Step: Ecrypted message C 2 is YVJLKDJVY Decryptio algorithm: Step1: First Decrypted Message is YVJLKDJVY Step2: Compute Iverse of Affie trasformatio P 1 1 E y a 1 y b mod26 Message Y V J L K D J V Y Y y (y) (y)mod First Decrypted text R G O E J S O G R R G O 6 1 First decrypted text P 1 E J S O G R 1 6 Step3: Compute PP 1 (Q 1 ) 1 to get origial message Mod Secod Decrypted message is P R O S O R Case2: For 2 F3 F we get Q F2 F Ecryptio algorithm: P R O 1 1 Step1: Let the Plai text be P S O R 1 A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/8

4 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 Step2: Alice computes C 1 P Q Step3: applyig affie trasformatio E(x)(axb) mod 26 for a & b 16 X x (x16) mod Secod Ecrypted message is U B I J D C U M X Step: Ecrypted message C 2 is UBIJDCUMX Decryptio algorithm: Step1: First Decrypted Message is UBIJDCUMX Step2: Compute Iverse of Affie trasformatio P 1 1 E y a 1 y b mod26 Message Y y16 21(y16) 21(y16) mod26 First Decrypted text U B I J D C U M X G W O J N S G U R G W O First decrypted text P 1 J N S 13 G U R 6 2 Step3: Compute PP 1 (Q 2 ) 1 to get origial message Mod Secod Decrypted message is P R O S O R IV. A. FIBONACCI 3 3 MATIX Case1: For 1 F2 F1 1 1 we get Q F1 F VIGENERE CIPHER B. ENCRYPTION ALGORITHM: A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/8

5 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 P R O 1 1 Step1: Let the Plai text be P S O R 1 Step2: Alice computes C 1 P Q Usig vigeere ciphers take key F A L S E Step3: Offset rule with the first decrypted message 1 1 Offset rule with key Mod Secod Ecryptio message is W H Z W N X O R J Step: Ecrypted message C 2 is WHZWNXORJ C. DECRYPTION ALGORITHM: Step1: First Decrypted Message is WHZWNXORJ Step2: Decrypts with the iverse of vigeere trasformatio is P Offset rule with key Mod First Decrypted text R G O E J S O G R R G O 6 1 First decrypted text P 1 E J S O V Z Step3: Compute PP 1 (Q 1 ) 1 to get origial message Mod Secod Decrypted message is P R O S O R A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/86

6 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: 236 Case2: For 2 F3 F2 1 we get Q F2 F D. ENCRYPTION ALGORITHM: P R O 1 1 Step1: Let the Plai text be P S O R 1 Step2: Compute C 1 P Q Usig vigeere ciphers take key Step3: Offset rule with the first decrypted message Offset rule with key Step: Ecrypted message C 2 is LXZBRXGFJ F A L S E E. DECRYPTION ALGORITHM: Step1: First Decrypted Message is LXZBRXGFJ Step2: Decrypts with the iverse of vigeere trasformatio is P Reverse offset rule with key Mod First Decrypted text G X O J N S G U R G X O First decrypted text P 1 J N S 13 G U R 6 2 Step3: Compute P 1 (Q 2 ) 1 to get origial message P Mod Secod Ecryptio message is L X Z B R X G F J A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/87

7 Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February eissn: Mod Secod Decrypted message is P R O S O R V. RESULT ANALYSIS S.No First ecryptio Time for first ecryptio Super ecryptio Time for super ecryptio 1 Fiboacci matrix MILLI SEC Affie or vigeere 12 MILLI SEC VI. CONCLUSIONS The Fiboacci matrixes stads more secure, i terms of the time ad difficulty i ecodig ad decodig the message compared to the usual umber systems such as Fiboacci Lucas ad PellLucas. All the Fiboacci, Lucas ad Pell umber systems are desiged with characters i the order of additios. Whereas the Fiboacci matrix is developed with 3 multiplicatios ad additios by the order of. I view of all these reasos, this particular system is applied i this paper. REFERENCES [8] Fiboacci ad lucas umbers with applicatios thomas Khoshy ISBN: [] K.R.Sudha, A. Chadra Sekhar, P.V.G.D, Prasad Reddy, "Cryptographic Protectio Of Digital Sigal Usig some Recurrece Relatios" IJCNS, May 27, PP27. [1] Liear idepedet spaig sets ad liear trasformatios for multilevel ecryptio, A.ChadraSekhar, V.Ausha, B.Ravi Kumar, S.Ashok Kumar Vol36(21), No., PP;38. [1] A. ChadraSekhar, D. Chaya Kumari, S. Ashok Kumar "Symmetric Key Cryptosystem for Multiple Ecryptios",Iteratioal Joural of Mathematics Treds ad Techology (IJMTT). V2 (2):11 Jauary 216. ISSN: [1] A. Chadra Sekhar, Prasad Reddy. P.V.G.D, A.S.N.Murty, B.Krisha Gadhi "SelfEcryptig Data Streams Usig Graph Structures" IETECH Iteratioal Joural Of Advaced Computatios PP 7, 28, vol 2. [2] A.P.Stakhov The Golde matrices ad a ew kid of cryptography chaos, solutios ad Fractals (27) pp386. [3] A.P.Stakhov The Golde sectio ad moder harmoy mathematics. Applicatios of Fiboacci umbers,kluwer Academic publishers (18). pp333 [] A. Chadra Sekhar, K.R. Sudha ad Prasad Reddy. P.V.G.D "Data Ecryptio Techique Usig Radom Geerator" IEEE Iteratioal Coferece o Graular Computig GrC7, Nov 2, 27, Silico Valley, USA, PP 767. [] B.Krisha Gadhi, A. Chadra Sekhar ad Prasad Reddy P.V.G.D: Cryptographic Scheme for Digital sigals" INTECH Iteratioal Joural Of Advaced Computatios", Vol:2 No:, PP12,28. [6] E.H.Lock Wood, A siglelight o pascal's triagle, Math, Gazette 1(167), PP 2. [7] Fiboacci, Lucas ad Pell umbers adpascal's triagle, Thomas Khoshy, Applied Probability Trust, PP 121. A. ChadraSekhar, B.Ravi Kumar, Ch.Pragathi ad Ashok Kumar ijesird, Vol. II Issue VIII February 216/88

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

ORTHOGONAL MATRIX IN CRYPTOGRAPHY

ORTHOGONAL MATRIX IN CRYPTOGRAPHY Orthogoal Matrix i Cryptography ORTHOGONAL MATRIX IN CRYPTOGRAPHY Yeray Cachó Sataa Member of CriptoRed (U.P.M.) ABSTRACT I this work is proposed a method usig orthogoal matrix trasform properties to ecrypt

More information

ON THE HADAMARD PRODUCT OF BALANCING Q n B AND BALANCING Q n

ON THE HADAMARD PRODUCT OF BALANCING Q n B AND BALANCING Q n TWMS J App Eg Math V5, N, 015, pp 01-07 ON THE HADAMARD PRODUCT OF ALANCING Q AND ALANCING Q MATRIX MATRIX PRASANTA KUMAR RAY 1, SUJATA SWAIN, Abstract I this paper, the matrix Q Q which is the Hadamard

More information

Applied Mathematics Letters. On the properties of Lucas numbers with binomial coefficients

Applied Mathematics Letters. On the properties of Lucas numbers with binomial coefficients Applied Mathematics Letters 3 (1 68 7 Cotets lists available at ScieceDirect Applied Mathematics Letters joural homepage: wwwelseviercom/locate/aml O the properties of Lucas umbers with biomial coefficiets

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

COMPLEX FACTORIZATIONS OF THE GENERALIZED FIBONACCI SEQUENCES {q n } Sang Pyo Jun

COMPLEX FACTORIZATIONS OF THE GENERALIZED FIBONACCI SEQUENCES {q n } Sang Pyo Jun Korea J. Math. 23 2015) No. 3 pp. 371 377 http://dx.doi.org/10.11568/kjm.2015.23.3.371 COMPLEX FACTORIZATIONS OF THE GENERALIZED FIBONACCI SEQUENCES {q } Sag Pyo Ju Abstract. I this ote we cosider a geeralized

More information

Solution of Differential Equation from the Transform Technique

Solution of Differential Equation from the Transform Technique Iteratioal Joural of Computatioal Sciece ad Mathematics ISSN 0974-3189 Volume 3, Number 1 (2011), pp 121-125 Iteratioal Research Publicatio House http://wwwirphousecom Solutio of Differetial Equatio from

More information

On Second Order Additive Coupled Fibonacci Sequences

On Second Order Additive Coupled Fibonacci Sequences MAYFEB Joural of Mathematics O Secod Order Additive Coupled Fiboacci Sequeces Shikha Bhatagar School of Studies i Mathematics Vikram Uiversity Ujjai (M P) Idia suhai_bhatagar@rediffmailcom Omprakash Sikhwal

More information

Matrix representations of Fibonacci-like sequences

Matrix representations of Fibonacci-like sequences NTMSCI 6, No. 4, 03-0 08 03 New Treds i Mathematical Scieces http://dx.doi.org/0.085/tmsci.09.33 Matrix represetatios of Fiboacci-like sequeces Yasemi Tasyurdu Departmet of Mathematics, Faculty of Sciece

More information

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES A STUDY ON THE HYPERBOLA x 9 0 S. Vidhyalakshmi, M.A. Gopala & T. Mahalakshmi*, Professor, Departmet of Mathematics, Shrimati Idira Gadhi College, Trichy-60

More information

Fuzzy Shortest Path with α- Cuts

Fuzzy Shortest Path with α- Cuts Iteratioal Joural of Mathematics Treds ad Techology (IJMTT) Volume 58 Issue 3 Jue 2018 Fuzzy Shortest Path with α- Cuts P. Sadhya Assistat Professor, Deptt. Of Mathematics, AIMAN College of Arts ad Sciece

More information

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314

More information

Recurrence Relations

Recurrence Relations Recurrece Relatios Aalysis of recursive algorithms, such as: it factorial (it ) { if (==0) retur ; else retur ( * factorial(-)); } Let t be the umber of multiplicatios eeded to calculate factorial(). The

More information

The Binet formula, sums and representations of generalized Fibonacci p-numbers

The Binet formula, sums and representations of generalized Fibonacci p-numbers Europea Joural of Combiatorics 9 (008) 70 7 wwwelseviercom/locate/ec The Biet formula, sums ad represetatios of geeralized Fiboacci p-umbers Emrah Kilic TOBB ETU Uiversity of Ecoomics ad Techology, Mathematics

More information

A GENERALIZATION OF THE SYMMETRY BETWEEN COMPLETE AND ELEMENTARY SYMMETRIC FUNCTIONS. Mircea Merca

A GENERALIZATION OF THE SYMMETRY BETWEEN COMPLETE AND ELEMENTARY SYMMETRIC FUNCTIONS. Mircea Merca Idia J Pure Appl Math 45): 75-89 February 204 c Idia Natioal Sciece Academy A GENERALIZATION OF THE SYMMETRY BETWEEN COMPLETE AND ELEMENTARY SYMMETRIC FUNCTIONS Mircea Merca Departmet of Mathematics Uiversity

More information

The Paillier Cryptosystem

The Paillier Cryptosystem E-Votig Semiar The Paillier Cryptosystem Adreas Steffe Hochschule für Techik Rapperswil adreas.steffe@hsr.ch Adreas Steffe, 17.1.010, Paillier.pptx 1 Ageda Some mathematical properties Ecryptio ad decryptio

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III

Gentry s ideal-lattice based encryption scheme. Gentry s STOC 09 paper - Part III Getry s ideal-lattice based ecryptio scheme Getry s STOC 09 paper - Part 1 From Micciacio's paper Why ideal lattices --- as opposed to just ideals or lattices? We described a ideal-based ecryptio scheme

More information

The Phi Power Series

The Phi Power Series The Phi Power Series I did this work i about 0 years while poderig the relatioship betwee the golde mea ad the Madelbrot set. I have fially decided to make it available from my blog at http://semresearch.wordpress.com/.

More information

A Remark on Relationship between Pell Triangle and Zeckendorf Triangle

A Remark on Relationship between Pell Triangle and Zeckendorf Triangle Iteratioal Joural of Pure a Applie Mathematics Volume 9 No. 5 8 3357-3364 ISSN: 34-3395 (o-lie versio) url: http://www.acapubl.eu/hub/ http://www.acapubl.eu/hub/ A Remark o Relatioship betwee Pell Triagle

More information

ON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS

ON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS Joural of Algebra, Number Theory: Advaces ad Applicatios Volume, Number, 00, Pages 7-89 ON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS OLCAY KARAATLI ad REFİK KESKİN Departmet

More information

On the Jacobsthal-Lucas Numbers by Matrix Method 1

On the Jacobsthal-Lucas Numbers by Matrix Method 1 It J Cotemp Math Scieces, Vol 3, 2008, o 33, 1629-1633 O the Jacobsthal-Lucas Numbers by Matrix Method 1 Fikri Köke ad Durmuş Bozkurt Selçuk Uiversity, Faculty of Art ad Sciece Departmet of Mathematics,

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

On the Number of 1-factors of Bipartite Graphs

On the Number of 1-factors of Bipartite Graphs Math Sci Lett 2 No 3 181-187 (2013) 181 Mathematical Scieces Letters A Iteratioal Joural http://dxdoiorg/1012785/msl/020306 O the Number of 1-factors of Bipartite Graphs Mehmet Akbulak 1 ad Ahmet Öteleş

More information

Solutions to Math 347 Practice Problems for the final

Solutions to Math 347 Practice Problems for the final Solutios to Math 347 Practice Problems for the fial 1) True or False: a) There exist itegers x,y such that 50x + 76y = 6. True: the gcd of 50 ad 76 is, ad 6 is a multiple of. b) The ifiimum of a set is

More information

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two

More information

On the Linear Complexity of Feedback Registers

On the Linear Complexity of Feedback Registers O the Liear Complexity of Feedback Registers A. H. Cha M. Goresky A. Klapper Northeaster Uiversity Abstract I this paper, we study sequeces geerated by arbitrary feedback registers (ot ecessarily feedback

More information

Factoring Algorithms and Other Attacks on the RSA 1/12

Factoring Algorithms and Other Attacks on the RSA 1/12 Factorig Algorithms ad Other Attacks o the RSA T-79550 Cryptology Lecture 8 April 8, 008 Kaisa Nyberg Factorig Algorithms ad Other Attacks o the RSA / The Pollard p Algorithm Let B be a positive iteger

More information

Two-step Extrapolated Newton s Method with High Efficiency Index

Two-step Extrapolated Newton s Method with High Efficiency Index Jour of Adv Research i Damical & Cotrol Systems Vol. 9 No. 017 Two-step Etrapolated Newto s Method with High Efficiecy Ide V.B. Kumar Vatti Dept. of Egieerig Mathematics Adhra Uiversity Visakhapatam Idia.

More information

GAMALIEL CERDA-MORALES 1. Blanco Viel 596, Valparaíso, Chile. s: /

GAMALIEL CERDA-MORALES 1. Blanco Viel 596, Valparaíso, Chile.  s: / THE GELIN-CESÀRO IDENTITY IN SOME THIRD-ORDER JACOBSTHAL SEQUENCES arxiv:1810.08863v1 [math.co] 20 Oct 2018 GAMALIEL CERDA-MORALES 1 1 Istituto de Matemáticas Potificia Uiversidad Católica de Valparaíso

More information

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh

More information

ANOTHER GENERALIZED FIBONACCI SEQUENCE 1. INTRODUCTION

ANOTHER GENERALIZED FIBONACCI SEQUENCE 1. INTRODUCTION ANOTHER GENERALIZED FIBONACCI SEQUENCE MARCELLUS E. WADDILL A N D LOUIS SACKS Wake Forest College, Wisto Salem, N. C., ad Uiversity of ittsburgh, ittsburgh, a. 1. INTRODUCTION Recet issues of umerous periodicals

More information

Modified Logistic Maps for Cryptographic Application

Modified Logistic Maps for Cryptographic Application Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi

More information

Pellian sequence relationships among π, e, 2

Pellian sequence relationships among π, e, 2 otes o umber Theory ad Discrete Mathematics Vol. 8, 0, o., 58 6 Pellia sequece relatioships amog π, e, J. V. Leyedekkers ad A. G. Shao Faculty of Sciece, The Uiversity of Sydey Sydey, SW 006, Australia

More information

You may work in pairs or purely individually for this assignment.

You may work in pairs or purely individually for this assignment. CS 04 Problem Solvig i Computer Sciece OOC Assigmet 6: Recurreces You may work i pairs or purely idividually for this assigmet. Prepare your aswers to the followig questios i a plai ASCII text file or

More information

On Infinite Series Involving Fibonacci Numbers

On Infinite Series Involving Fibonacci Numbers Iteratioal Joural of Cotemporary Mathematical Scieces Vol. 10, 015, o. 8, 363-379 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijcms.015.594 O Ifiite Series Ivolvig Fiboacci Numbers Robert Frotczak

More information

End-of-Year Contest. ERHS Math Club. May 5, 2009

End-of-Year Contest. ERHS Math Club. May 5, 2009 Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,

More information

Pell and Lucas primes

Pell and Lucas primes Notes o Number Theory ad Discrete Mathematics ISSN 30 532 Vol. 2, 205, No. 3, 64 69 Pell ad Lucas primes J. V. Leyedekkers ad A. G. Shao 2 Faculty of Sciece, The Uiversity of Sydey NSW 2006, Australia

More information

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series

More information

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0

More information

Review Article Incomplete Bivariate Fibonacci and Lucas p-polynomials

Review Article Incomplete Bivariate Fibonacci and Lucas p-polynomials Discrete Dyamics i Nature ad Society Volume 2012, Article ID 840345, 11 pages doi:10.1155/2012/840345 Review Article Icomplete Bivariate Fiboacci ad Lucas p-polyomials Dursu Tasci, 1 Mirac Ceti Firegiz,

More information

Warped, Chirp Z-Transform: Radar Signal Processing

Warped, Chirp Z-Transform: Radar Signal Processing arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z

More information

Merkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum

Merkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum Merkle-Hellma Kapsack Cryptosystem i Udergraduate Computer Sciece Curriculum Y. Kortsarts, Y. Kemper 2 Computer Sciece Departmet, Wideer Uiversity, Chester, PA, USA 2 Computer Sciece Departmet, Holo Istitute

More information

Accepted in Fibonacci Quarterly (2007) Archived in SEQUENCE BALANCING AND COBALANCING NUMBERS

Accepted in Fibonacci Quarterly (2007) Archived in  SEQUENCE BALANCING AND COBALANCING NUMBERS Accepted i Fiboacci Quarterly (007) Archived i http://dspace.itrl.ac.i/dspace SEQUENCE BALANCING AND COBALANCING NUMBERS G. K. Pada Departmet of Mathematics Natioal Istitute of Techology Rourela 769 008

More information

1/(1 -x n ) = \YJ k=0

1/(1 -x n ) = \YJ k=0 ADVANCED PROBLEMS AND SOLUTIONS Edited by RAYMOND E.WHITNEY Lock Have State College, Lock Have, Pesylvaia Sed all commuicatios cocerig Advaced Problems ad Solutios to Eaymod E. Whitey, Mathematics Departmet,

More information

Some Trigonometric Identities Involving Fibonacci and Lucas Numbers

Some Trigonometric Identities Involving Fibonacci and Lucas Numbers 1 2 3 47 6 23 11 Joural of Iteger Sequeces, Vol. 12 (2009), Article 09.8.4 Some Trigoometric Idetities Ivolvig Fiboacci ad Lucas Numbers Kh. Bibak ad M. H. Shirdareh Haghighi Departmet of Mathematics Shiraz

More information

Number of Spanning Trees of Circulant Graphs C 6n and their Applications

Number of Spanning Trees of Circulant Graphs C 6n and their Applications Joural of Mathematics ad Statistics 8 (): 4-3, 0 ISSN 549-3644 0 Sciece Publicatios Number of Spaig Trees of Circulat Graphs C ad their Applicatios Daoud, S.N. Departmet of Mathematics, Faculty of Sciece,

More information

Exact Solutions for a Class of Nonlinear Singular Two-Point Boundary Value Problems: The Decomposition Method

Exact Solutions for a Class of Nonlinear Singular Two-Point Boundary Value Problems: The Decomposition Method Exact Solutios for a Class of Noliear Sigular Two-Poit Boudary Value Problems: The Decompositio Method Abd Elhalim Ebaid Departmet of Mathematics, Faculty of Sciece, Tabuk Uiversity, P O Box 741, Tabuki

More information

CSE 1400 Applied Discrete Mathematics Number Theory and Proofs

CSE 1400 Applied Discrete Mathematics Number Theory and Proofs CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of

More information

, then cv V. Differential Equations Elements of Lineaer Algebra Name: Consider the differential equation. and y2 cos( kx)

, then cv V. Differential Equations Elements of Lineaer Algebra Name: Consider the differential equation. and y2 cos( kx) Cosider the differetial equatio y '' k y 0 has particular solutios y1 si( kx) ad y cos( kx) I geeral, ay liear combiatio of y1 ad y, cy 1 1 cy where c1, c is also a solutio to the equatio above The reaso

More information

On the Determinants and Inverses of Skew Circulant and Skew Left Circulant Matrices with Fibonacci and Lucas Numbers

On the Determinants and Inverses of Skew Circulant and Skew Left Circulant Matrices with Fibonacci and Lucas Numbers WSEAS TRANSACTIONS o MATHEMATICS Yu Gao Zhaoli Jiag Yapeg Gog O the Determiats ad Iverses of Skew Circulat ad Skew Left Circulat Matrices with Fiboacci ad Lucas Numbers YUN GAO Liyi Uiversity Departmet

More information

The log-concavity and log-convexity properties associated to hyperpell and hyperpell-lucas sequences

The log-concavity and log-convexity properties associated to hyperpell and hyperpell-lucas sequences Aales Mathematicae et Iformaticae 43 2014 pp. 3 12 http://ami.etf.hu The log-cocavity ad log-covexity properties associated to hyperpell ad hyperpell-lucas sequeces Moussa Ahmia ab, Hacèe Belbachir b,

More information

A generalization of Fibonacci and Lucas matrices

A generalization of Fibonacci and Lucas matrices Discrete Applied Mathematics 56 28) 266 269 wwwelseviercom/locate/dam A geeralizatio of Fioacci ad Lucas matrices Predrag Staimirović, Jovaa Nikolov, Iva Staimirović Uiversity of Niš, Departmet of Mathematics,

More information

TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction

TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction Math Appl 6 2017, 143 150 DOI: 1013164/ma201709 TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES PANKAJ KUMAR DAS ad LALIT K VASHISHT Abstract We preset some iequality/equality for traces of Hadamard

More information

BHW #13 1/ Cooper. ENGR 323 Probabilistic Analysis Beautiful Homework # 13

BHW #13 1/ Cooper. ENGR 323 Probabilistic Analysis Beautiful Homework # 13 BHW # /5 ENGR Probabilistic Aalysis Beautiful Homework # Three differet roads feed ito a particular freeway etrace. Suppose that durig a fixed time period, the umber of cars comig from each road oto the

More information

ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM

ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM Iteratioal ook Series "Iformatio Sciece ad Computig" 7 ASYETIC CIPHE POTOCO USING DECOPOSITION POE Adrius aulyaitis, Saulius Japertas Abstract: The asymmetric cipher protocol based o decompositio problem

More information

Chapter 2 The Monte Carlo Method

Chapter 2 The Monte Carlo Method Chapter 2 The Mote Carlo Method The Mote Carlo Method stads for a broad class of computatioal algorithms that rely o radom sampligs. It is ofte used i physical ad mathematical problems ad is most useful

More information

SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS. Levent Kargin and Veli Kurt

SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS. Levent Kargin and Veli Kurt Mathematical ad Computatioal Applicatios, Vol. 18, No. 3, pp. 33-39, 013 SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS Levet Kargi ad Veli Kurt Departmet of Mathematics, Faculty Sciece, Uiversity of Adeiz

More information

Applications of Two Dimensional Fractional Mellin Transform

Applications of Two Dimensional Fractional Mellin Transform Iteratioal Joural of Scietific ad Iovative Mathematical Research (IJSIMR) Volume 2 Issue 9 September 2014 PP 794-799 ISSN 2347-307X (Prit) & ISSN 2347-3142 (Olie) www.arcjourals.org Applicatios of Two

More information

DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS. Park Road, Islamabad, Pakistan

DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS. Park Road, Islamabad, Pakistan Mathematical ad Computatioal Applicatios, Vol. 9, No. 3, pp. 30-40, 04 DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS Muhammad Aslam Noor, Khalida Iayat Noor ad Asif Waheed

More information

Chimica Inorganica 3

Chimica Inorganica 3 himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule

More information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m. Final Exam Math 10: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 0 April 2002 :0 11:00 a.m. Instructions: Please be as neat as possible (use a pencil), and show

More information

THE TRANSFORMATION MATRIX OF CHEBYSHEV IV BERNSTEIN POLYNOMIAL BASES

THE TRANSFORMATION MATRIX OF CHEBYSHEV IV BERNSTEIN POLYNOMIAL BASES Joural of Mathematical Aalysis ISSN: 17-341, URL: http://iliriascom/ma Volume 7 Issue 4(16, Pages 13-19 THE TRANSFORMATION MATRIX OF CHEBYSHEV IV BERNSTEIN POLYNOMIAL BASES ABEDALLAH RABABAH, AYMAN AL

More information

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding

Some Explicit Formulae of NAF and its Left-to-Right. Analogue Based on Booth Encoding Vol.7, No.6 (01, pp.69-74 http://dx.doi.org/10.1457/ijsia.01.7.6.7 Some Explicit Formulae of NAF ad its Left-to-Right Aalogue Based o Booth Ecodig Dog-Guk Ha, Okyeo Yi, ad Tsuyoshi Takagi Kookmi Uiversity,

More information

The Pascal Fibonacci numbers

The Pascal Fibonacci numbers Notes o Number Theory ad Discrete Mathematics Vol. 19, 013, No. 3, 5 11 The Pascal Fiboacci umbers J. V. Leyedekkers 1 ad A. G. Shao 1 Faculty of Sciece, The Uiversity of Sydey NSW 00, Australia Faculty

More information

Roger Apéry's proof that zeta(3) is irrational

Roger Apéry's proof that zeta(3) is irrational Cliff Bott cliffbott@hotmail.com 11 October 2011 Roger Apéry's proof that zeta(3) is irratioal Roger Apéry developed a method for searchig for cotiued fractio represetatios of umbers that have a form such

More information

Generating Functions for Laguerre Type Polynomials. Group Theoretic method

Generating Functions for Laguerre Type Polynomials. Group Theoretic method It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet

More information

PAijpam.eu ON DERIVATION OF RATIONAL SOLUTIONS OF BABBAGE S FUNCTIONAL EQUATION

PAijpam.eu ON DERIVATION OF RATIONAL SOLUTIONS OF BABBAGE S FUNCTIONAL EQUATION Iteratioal Joural of Pure ad Applied Mathematics Volume 94 No. 204, 9-20 ISSN: 3-8080 (prited versio); ISSN: 34-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/0.2732/ijpam.v94i.2 PAijpam.eu

More information

Average Number of Real Zeros of Random Fractional Polynomial-II

Average Number of Real Zeros of Random Fractional Polynomial-II Average Number of Real Zeros of Radom Fractioal Polyomial-II K Kadambavaam, PG ad Research Departmet of Mathematics, Sri Vasavi College, Erode, Tamiladu, Idia M Sudharai, Departmet of Mathematics, Velalar

More information

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i

More information

Thomas J. Osler Mathematics Department Rowan University Glassboro, NJ Introduction

Thomas J. Osler Mathematics Department Rowan University Glassboro, NJ Introduction Ja 4, 007 USING THEON S LADDER TO FIND ROOTS OF QUADRATIC EQUATIONS Thomas J. Osler Mathematics Departmet Rowa Uiversit Glassboro, NJ 0808 Osler@rowa.edu. Itroductio Theo of Smra (circa 40 A. D.) described

More information

Reciprocal Series of K Fibonacci Numbers with Subscripts in Linear Form

Reciprocal Series of K Fibonacci Numbers with Subscripts in Linear Form IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578 p-issn: 39-765X Volume Issue 6 Ver IV (Nov - Dec06) PP 39-43 wwwiosrjouralsorg Reciprocal Series of K iboacci Numbers with Subscripts i iear orm Sergio

More information

Solving a Nonlinear Equation Using a New Two-Step Derivative Free Iterative Methods

Solving a Nonlinear Equation Using a New Two-Step Derivative Free Iterative Methods Applied ad Computatioal Mathematics 07; 6(6): 38-4 http://www.sciecepublishiggroup.com/j/acm doi: 0.648/j.acm.070606. ISSN: 38-5605 (Prit); ISSN: 38-563 (Olie) Solvig a Noliear Equatio Usig a New Two-Step

More information

POWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS

POWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS Joural of Applied Mathematics ad Computatioal Mechaics 4 3(3) 3-8 POWER SERIES SOLUION OF FIRS ORDER MARIX DIFFERENIAL EQUAIONS Staisław Kukla Izabela Zamorska Istitute of Mathematics Czestochowa Uiversity

More information

SOME NON-EXTENDABLE DIOPHANTINE TRIPLES IN SPECIAL NUMBER PATTERNS

SOME NON-EXTENDABLE DIOPHANTINE TRIPLES IN SPECIAL NUMBER PATTERNS Iteratioal Joural of Iovative Research ad Review ISSN: 347 444 (Olie A Olie Iteratioal Joural Available at http://www.cibtech.org/jirr.htm 014 Vol. (3 July-September, pp.1-7/gopala et al. SOME NON-ETENDABLE

More information

Algebraic Solutions to Overdefined Systems with Applications to Cryptanalysis

Algebraic Solutions to Overdefined Systems with Applications to Cryptanalysis Rose-Hulma Istitute of Techology Rose-Hulma Scholar Mathematical Scieces Techical Reports (MSTR) Mathematics -0 Algebraic Solutios to Overdefied Systems with Applicatios to Cryptaalysis Eric Crockett Rose-Hulma

More information

Formulas for the Number of Spanning Trees in a Maximal Planar Map

Formulas for the Number of Spanning Trees in a Maximal Planar Map Applied Mathematical Scieces Vol. 5 011 o. 64 3147-3159 Formulas for the Number of Spaig Trees i a Maximal Plaar Map A. Modabish D. Lotfi ad M. El Marraki Departmet of Computer Scieces Faculty of Scieces

More information

Discrete Orthogonal Moment Features Using Chebyshev Polynomials

Discrete Orthogonal Moment Features Using Chebyshev Polynomials Discrete Orthogoal Momet Features Usig Chebyshev Polyomials R. Mukuda, 1 S.H.Og ad P.A. Lee 3 1 Faculty of Iformatio Sciece ad Techology, Multimedia Uiversity 75450 Malacca, Malaysia. Istitute of Mathematical

More information

On Matrices Over Semirings

On Matrices Over Semirings Aals of Pure ad Applied Mathematics Vol. 6, No. 1, 14, 1-1 ISSN: 79-87X (P, 79-888(olie Pulished o 16 April 14 www.researchmathsci.org Aals of O Matrices Over Semirigs K. R.Chowdhury 1, Aeda Sultaa, N.K.Mitra

More information

Sequences of Definite Integrals, Factorials and Double Factorials

Sequences of Definite Integrals, Factorials and Double Factorials 47 6 Joural of Iteger Sequeces, Vol. 8 (5), Article 5.4.6 Sequeces of Defiite Itegrals, Factorials ad Double Factorials Thierry Daa-Picard Departmet of Applied Mathematics Jerusalem College of Techology

More information

Sequences, Sums, and Products

Sequences, Sums, and Products CSCE 222 Discrete Structures for Computig Sequeces, Sums, ad Products Dr. Philip C. Ritchey Sequeces A sequece is a fuctio from a subset of the itegers to a set S. A discrete structure used to represet

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

An Iterative Method for Solving Unsymmetric System of Fuzzy Linear Equations

An Iterative Method for Solving Unsymmetric System of Fuzzy Linear Equations The SIJ Trasactios o Computer Sciece Egieerig & its Applicatios (CSEA) Vol. No. 5 November-December 03 A Iterative Method for Solvig Usymmetric System of Fuzzy Liear Equatios Majid Hasazadeh* & Hossei

More information

Four-dimensional Vector Matrix Determinant and Inverse

Four-dimensional Vector Matrix Determinant and Inverse I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat

More information

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.

More information

The Adomian Polynomials and the New Modified Decomposition Method for BVPs of nonlinear ODEs

The Adomian Polynomials and the New Modified Decomposition Method for BVPs of nonlinear ODEs Mathematical Computatio March 015, Volume, Issue 1, PP.1 6 The Adomia Polyomials ad the New Modified Decompositio Method for BVPs of oliear ODEs Jusheg Dua # School of Scieces, Shaghai Istitute of Techology,

More information

Mathematics 3 Outcome 1. Vectors (9/10 pers) Lesson, Outline, Approach etc. This is page number 13. produced for TeeJay Publishers by Tom Strang

Mathematics 3 Outcome 1. Vectors (9/10 pers) Lesson, Outline, Approach etc. This is page number 13. produced for TeeJay Publishers by Tom Strang Vectors (9/0 pers) Mathematics 3 Outcome / Revise positio vector, PQ = q p, commuicative, associative, zero vector, multiplicatio by a scalar k, compoets, magitude, uit vector, (i, j, ad k) as well as

More information

Monte Carlo Integration

Monte Carlo Integration Mote Carlo Itegratio I these otes we first review basic umerical itegratio methods (usig Riema approximatio ad the trapezoidal rule) ad their limitatios for evaluatig multidimesioal itegrals. Next we itroduce

More information

Statistical Properties of the Square Map Modulo a Power of Two

Statistical Properties of the Square Map Modulo a Power of Two Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehavi, A. Mahmoodi Rishakai, M. R. Mirzee Shamsabad 3, Hamidreza Maimai, Eiollah Pasha Kharazmi Uiversity, Faculty of Mathematical

More information

CALCULATION OF FIBONACCI VECTORS

CALCULATION OF FIBONACCI VECTORS CALCULATION OF FIBONACCI VECTORS Stuart D. Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithaca.edu ad Dai Novak Departmet of Mathematics, Ithaca College

More information

Estimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable

Estimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable Iteratioal Joural of Probability ad Statistics 01, 1(4: 111-118 DOI: 10.593/j.ijps.010104.04 Estimatio of Populatio Mea Usig Co-Efficiet of Variatio ad Media of a Auxiliary Variable J. Subramai *, G. Kumarapadiya

More information

The random version of Dvoretzky s theorem in l n

The random version of Dvoretzky s theorem in l n The radom versio of Dvoretzky s theorem i l Gideo Schechtma Abstract We show that with high probability a sectio of the l ball of dimesio k cε log c > 0 a uiversal costat) is ε close to a multiple of the

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim

More information

International Journal of Multidisciplinary Research and Development. M.A. Gopalan, A. Kavitha, G. Thamaraiselvi

International Journal of Multidisciplinary Research and Development. M.A. Gopalan, A. Kavitha, G. Thamaraiselvi Volume:, Issue: 6, -7 Jue 015.allsubjectjoural.com e-issn: 49-418 p-issn: 49-5979 Impact Factor:.76 M.A. Gopala Professor, Departmet of Idira Gadhi College, Trichy-6000, Tamiladu, Idia. A. Kavitha Lecturer,

More information

REPRESENTING MARKOV CHAINS WITH TRANSITION DIAGRAMS

REPRESENTING MARKOV CHAINS WITH TRANSITION DIAGRAMS Joural o Mathematics ad Statistics, 9 (3): 49-54, 3 ISSN 549-36 3 Sciece Publicatios doi:.38/jmssp.3.49.54 Published Olie 9 (3) 3 (http://www.thescipub.com/jmss.toc) REPRESENTING MARKOV CHAINS WITH TRANSITION

More information

Numerical Solutions of Second Order Boundary Value Problems by Galerkin Residual Method on Using Legendre Polynomials

Numerical Solutions of Second Order Boundary Value Problems by Galerkin Residual Method on Using Legendre Polynomials IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-765X. Volume 11, Issue 6 Ver. IV (Nov. - Dec. 15), PP 1-11 www.iosrjourals.org Numerical Solutios of Secod Order Boudary Value Problems

More information

M 340L CS Homew ork Set 6 Solutions

M 340L CS Homew ork Set 6 Solutions 1. Suppose P is ivertible ad M 34L CS Homew ork Set 6 Solutios A PBP 1. Solve for B i terms of P ad A. Sice A PBP 1, w e have 1 1 1 B P PBP P P AP ( ).. Suppose ( B C) D, w here B ad C are m matrices ad

More information

M 340L CS Homew ork Set 6 Solutions

M 340L CS Homew ork Set 6 Solutions . Suppose P is ivertible ad M 4L CS Homew ork Set 6 Solutios A PBP. Solve for B i terms of P ad A. Sice A PBP, w e have B P PBP P P AP ( ).. Suppose ( B C) D, w here B ad C are m matrices ad D is ivertible.

More information

Estimation of Backward Perturbation Bounds For Linear Least Squares Problem

Estimation of Backward Perturbation Bounds For Linear Least Squares Problem dvaced Sciece ad Techology Letters Vol.53 (ITS 4), pp.47-476 http://dx.doi.org/.457/astl.4.53.96 Estimatio of Bacward Perturbatio Bouds For Liear Least Squares Problem Xixiu Li School of Natural Scieces,

More information

In number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play.

In number theory we will generally be working with integers, though occasionally fractions and irrationals will come into play. Number Theory Math 5840 otes. Sectio 1: Axioms. I umber theory we will geerally be workig with itegers, though occasioally fractios ad irratioals will come ito play. Notatio: Z deotes the set of all itegers

More information