Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Size: px
Start display at page:

Download "Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials"

Transcription

1 Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter is concerned with an extension of square root coputation over GF( ) defined by irreducible trinoials. We introduce a new type of Montgoery-like square root forulae, which is ore efficient copared with classic square root operation. By choosing proper Montgoery factor regarding to different types of trinoials, the space and tie coplexities of our proposal outperfor or atch the best results. Furtherore, a practical application of the Montgoery-like square root in exponentiation coputation is also presented. Keywords: Finite field, Square root, Exponentiation, Cryptography 1. Introduction Arithetic in finite field GF( ) has any iportant practical applications such as public key cryptography and coding theory [1, ]. These applications usually require high efficient ipleentations of such arithetic operations, e.g., field addition, ultiplication, inversion and squaring. Particularly, square root operation has attracted any attentions during recent years as it has becoe an iportant building block in the design of soe elliptic curve priitives [4, 5]. In addition, since the square root is soewhat analogous to squaring, it has been applied in soe parallel ultiplicative inversion or exponentiation algoriths [6, 8], where both squaring and square root are utilizing as ain building blocks. Generally speaking, the efficiency of hardware ipleentation of field arithetic is evaluated by space and tie coplexity. The forer is expressed as the nuber of logic gates (XOR and AND) and the latter is expressed as the total gates delay of the circuit, denoted by T A and T X, respectively. Consider an irreducible polynoial f (x) over F. Then, a binary extension field can be defined as GF( ) F [x]/( f (x)). Let A be an arbitrary eleent in the field GF( ). The field square root coputation This work is supported by the Natural Science Foundation of China (No , ). Corresponding author Eail addresses: yunfeiyangli@gail.co (Yin Li), willow13@16.co (Yu Zhang ) of A, denoted as A or A 1/, is to find D GF( ) such that D = A. Note that square root operation is siply a circular operation under noral base (NB) representation. Hence, ost works for efficient square root coputation are based on polynoial representation (PB). Obviously, a straightforward approach for square root coputation is based on Ferat s Little Theore [3], which requires 1 squarings in all. Fong [7] proposed ore efficient algoriths by utilizing the pre-coputation value x 1/. However, this algorith requires one / bits field ultiplication by a precoputed constant x 1/, which is still an expensive operation. In [8], Rodríguez-Henríquez et al. proposed an alternative ethod using the inversion of the ultiplicative atrix, which is constructed for squaring operation. Their approach theoretically can be applied to any type of generating polynoials. When the generating polynoial f (x) is a trinoial, they derived the explicit forulae for square root coputation. It is shown that such square root operations can be ipleented with no ore logic gates than those associated with squaring of the sae field. Based upon this assertion, the authors [8] also proposed a parallel exponentiation that perfors squaring based and square root based exponentiation algoriths, siultaneously. Therefore, such an algorith could achieve twice ipleentation efficiency copared with classic squaring based exponentiation. Rodríguez-Henríquez et al. approach is efficient. N- evertheless, for certain type of irreducible trinoials, Preprint subitted to Elsevier August 10, 017

2 the circuit delay of the square root and squaring is d- ifferent. For exaple, if f (x) = x + x k + 1 with odd and even k, the squaring costs T X delay while square root costs 3T X. In this case, if these two operations are applied to perfor parallel exponentiation (inversion), the slower one will influence the perforance of the whole algorith. In this contribution, we consider a new type of square root operator by adding a specific Montgoery-like factor. Explicit forulae of such operations are presented when GF( ) is generated with an irreducible trinoial. As a result, it is shown that these forulae are quite siple and have saller space and tie coplexities in parallel ipleentation. Coincidentally, this type of Montgoery-like square root operator has the sae circuit delay copared with Montgoery squaring [9] that defined in the sae finite field. Therefore, we then describe an iproved parallel exponentiation algorith that using Montgoery squaring and Montgoery-like square root operation. The rest of this paper is organized as follows: in Section, we introduce the definition of the Montgoerylike square root and soe other notations. Then, explicit forulae for this type of square root operation are given in section. In addition, the space and tie coplexities are also evaluated. Section 3 describes a parallel exponentiation algorith based on Montgoery squaring and Montgoery-like square root operators. Finally, soe conclusions are drawn in Section 4.. Montgoery-like Square Root Let A = a ix i be an arbitrary eleent of GF( ) using PB representation. To copute the square root of A, we first partition A into two parts according to the degree parity of its interediate, i.e., where A = A even + xa odd, A even = ()/ a i x i, A odd = ( 3)/ a i+1 x i, ( is odd), A even = / 1 a i x i, A odd = / 1 a i+1 x i, ( is even). Therefore, the square root of A is given by A 1 = Aeven + x 1 Aodd. (1) It is obvious that the coputation of x 1/ is crucial to the square root coputation. Actually, the eleent x 1/ is a constant that can be pre-coputed. Thus, the square root operation can be ipleented as perforing a field ultiplication between A odd and x 1/ and then adding with A even [7]. However, this ethod requires a constant ultiplication, which is still an expensive operation. Inspired by Montgoery squaring operation, we ultiply the square root by a proper factor and introduce a Montgoery-like square root operation. Such a factor can help us siplify the calculation of x 1/ and avoid previous coplex operation, which can accelerate the ipleentation of the Montgoery-like square root operation. We first give the definition of this new type of square root operation. Definition 1. Let A be an arbitrary eleent and ω be a fixed eleent of GF( ), respectively. Then the Montgoery-like square root of A is defined as A 1/ ω, while ω is naed as the Montgoery-like factor. Let D be the result of A 1/ ω. When GF( ) is defined by an irreducible trinoial f (x) = x + x k + 1, we investigate the choice of ω and the explicit forulae with respect to D. Note that here x = x + x k and x 1 = x + x k. It follows that the optial ω relies on the coputation of x 1/, which varies according to the parities of and k. Thus, four cases are considered: Case 1: even, k odd. In this case, we know that, but k. Let n = /, then we have x 1 = x n x 1 + x k+1 x k+1 = (1 + x n ) x 1, x 1 = (1 + x n ) x k 1 Plug the above expression to (1), one can check that A 1 = Aeven + x 1 Aodd = A even + (A odd + A odd x n ) x k 1. Note that A odd consists of n ters, thus, there is no overlap between A odd and A odd x n. Let ω be x (k 1)/, the Montgoery-like square root of this case is A 1 ω = A 1 x k 1 = A even x k 1 + (A odd + A odd x n ). Since the degree of A even and A odd are n 1, deg(a even x (k 1)/ ) = n 1 + (k 1)/ n + ( 1)/ = and deg(a odd + A odd x n ) = n+n 1 =. Therefore, no further reduction is needed in above expression. At this tie, D = d ix i = A 1/ x (k 1)/. Then, a i+1, 0 i k 3, k 1 a i k+1 + a i+1, i n 1, a i k+1 + a i+1, n i n 1 + k 1, () a i+1, n + k 1 i 1,.

3 where 0 < k 1. In addition, if k = 1, () can be siplified further: { ai+1, 0 i n 1, (3) a i + a i+1, n i 1 Case : even, k = / odd. This case is actually a special case of Case 1. It is easy to check that x 1/ = (1 + x k ) x (k 1)/. Also notice that = k and x = x k +1. Hence, the preceding expression can be rewritten as x 1/ = x k (k 1)/. So, A 1 k+1 = k+ Aeven + A odd x. Notice that there are at ost (k+1)/ ters of which degrees are out of the range [0, 1] and the reduction is relatively siple. Thus, let ω = 1 and D = d ix i = A 1/, we have a i + a i+k, 0 i k 1, k+1 a i, i k 1 a (i+k) od, k i 1. (4) This forula siply coincides with the result presented in [8]. Case 3: both and k are odd. Let n = +1, then x 1 = x n + x k+1. One can check that the above forula is very easy and the corresponding square root coputation needs no ω to siplify its coputation. Analogous with Case, let ω = 1 and D = d ix i = A 1, then a i, 0 i k 1, k+1 a i + a i k, i, a i k, k i 1. Case 4: odd, k even. Let n =, then x 1 = x n+1 + x k x 1 x n+1 = (1 + x k ) x 1, x 1 = (1 + x k ) x (n+1), x 1 = (1 + x k ) x n. Plug the above expression to (1), then A 1 = A even + x 1 A odd = A even + (A odd + A odd x k ) x n Let ω be x n, then the Montgoery-like square root is A 1 ω = A 1 x n = A even x n + A odd + A odd x k. (5) 3 Please note that A odd consists of n ters and A even consists of n + 1 ters. Thus, A even x n and A odd are nonoverlapping with each other. Also notice that deg A odd = n 1, deg A even = n and k <, so deg A odd x k = n 1 + k/ n + ()/ = 1, deg A even x n = n = 1. Therefore, no further reduction is required by A 1/ x n. Let D = d ix i = A 1 x n, then a i+1, 0 i k 1, k a i+1 + a i+1 k, i n 1, a i+1 k + a i +1, n i n + k 1, (6) a i +1, n + k i 1. where 0 < k < 1. If k = 1, then a i+1, 0 i n 1, a i +1 + a i +, n i, a i +1, i = 1. According to expression () to (7), we suarize the space and tie coplexities of the Montgoery-like square root in Table 1. As a coparison, the space and tie coplexities of ordinary square root operation [8] are also given. Specially, we also give the coplexities for Montgoery squaring A x k od x + x k + 1 for 1 k /, which had been investigated in [9]. It is clear that, by choosing proper factor ω, the Montgoery-like square root costs at ost / (or ( 1)/) XOR gates with only 1 T X gate delay, which outperfors or atches the best square root coputation algoriths [8]. Moreover, the proposed new type of square root coincidentally has the identical circuit delay copared with Montgoery squaring, while their space coplexities are alost the sae. Exaple: Consider a finite field GF( 9 ) defined by x 9 + x According to previous description, x 9 + x satisfies case 4, we have ω = x (9 1)/ = x 4. Given an arbitrary eleent A = 8 a ix i, the Montgoery-like square root of A is A 1/ x 4 = 8 d ix i, where d 0 = a 1, d 3 = a 7 + a 3, d 6 = a 4, d 1 = a 3, d 4 = a 0 + a 5, d 7 = a 6, d = a 5 + a 1, d 5 = a + a 7, d 8 = a 8. (7) The coputation of above coefficients d i requires 4 X- OR gates and T X in parallel. 3. Exponentiation based on Montgoery squaring and square root In [8], the authors proposed a parallel exponentiation algorith over GF( ). Their algorith coprises two sub-exponentiations that based on squaring and square

4 Table 1: Space and tie coplexities for different square root operations and squaring operations Montgoery square root Ordinary[8] Montgoery squaring [9] Squaring [8] Cases ω #XOR Delay #XOR Delay #XOR Delay #XOR Delay 1. even, k odd x k 1 T X T X T X T X. even, k = odd T X 4 T X T X 4 T X 3., k odd 1 T X T X T X T X 4. odd, k even x T X 3T X T X T X root operation, respectively. For square root based exponentiation, it ainly utilized the equation A i = A i, i = 1,,, 1, where A GF( ) is an arbitrary nonzero eleent. The above equation can be easily proved using Ferat Little Theore [3]. Let e = (e,, e 1, e 0 ) be a -bit nonzero integer. By substituting half the squaring operations with square root operations, the exponentiation A e can be written as A e = e i = Ai i=n = e i i=n n 1 e i A ( i). Ai Ai e i n 1 Ai e i where 0 < n <. In [8], the paraeter n is chosen as. One can check that the two sub-exponentiations p- resented in above expression can be perfored siultaneously, thus, the whole algorith achieved better perforance copared with the classic one. As shown in Table 1, we note that the Montgoery-like square root operator and Montgoery squaring are usually faster than ordinary square root and squaring operations. Algorith 1 describes an iproved exponentiation algorith for A e, which utilized Montgoery squaring and square root operator. Algorith 1 Exponentiation based on Montgoery squaring and Montgoery-like Square root Input: A GF( ), f (x), e = (e, e,, e 1, e 0 ) Output: B = A e od f (x) 1: B = C = 1; : e = 0; 3: n = ; 4: for i = n 1 down to 0 do for j = n to do 5: B = B x k ; C = C 1 ω; 6: if e i == 1 then if e j == 1 then 7: B = B A od f (x); C = C A od f (x); 8: end if end if 9: end for end for 10: B = B C; 11: B = B ω ; 1: return B; 4 Description: The two procedures presented in steps 4-9 are running in parallel. Also notice that the choice of n in step 3 is slightly different fro [8], as we found that this selection can ake the nuber of squaring and square root alost equal, which can save the whole algorith delay. Since we utilize the Montgoery squaring and Montgoery-like square root operator instead of the original ones, ω in step 11 is a copensatory paraeter that used to correct the final exponentiation. The for of ω is given in following proposition. Proposition 1. The copensatory paraeter ω in Algorith 1 can be obtained as ω = ω n (x k ) n 1. (8) Proof. According to steps 4-7 of Algorith 1, it totally perfor n + 1 Montgoery-like square root operations and n Montgoery squarings. Each tie we execute the body in the loops, there are one x k (for squaring) and one ω (for square root) ultiplying the results. In the end, it follows that the extra paraeter is ω ω 1 ω 1 4 ω 1 n x k (x k ) (x k ) n 1 = ω ( n) (x k ) n 1 = (ω) n (x k ) 1 n = ω n (x k ) 1 n (9) Since ω is the copensatory paraeter that used to correct the final result, then we know that (9) is equal to the inversion of ω. Then, the result is direct. According to proposition, the explicit forula of ω depends on the for of ω. For exaple, when, k satisfy the condition of case 1, we have ω = x (k 1)/ and n = /. Plug these forulae into expression (8), we have ω = x (k 1)(n 1 1)+k( n 1). The explicit forulae for ω of other cases are suarized in Table. Furtherore, the constant ultiplication B ω can be perfored using Mastrovito approach. Since ω is constant, the corresponding product atrix is fixed, no AND gate is needed. Only certain XOR gates are required by corresponding atrix-vector ultiplication,

5 Cases Table : Explicit forulae of ω ω 1. even, k odd x (k 1)(n 1 1)+k( n 1). even, k = odd xk(n 1) 3., k odd x k(n 1) 4. odd, k even x ()(n 1 1)+k( n 1) which leads to no ore than XOR gates with at ost log XOR gate delay. Then we give a coparative analysis between the o- riginal exponentiation algorith [8] and ours. On the one hand, both their algorith and ours cost W(e) ultiplications, n + 1 square root and n squaring operations (classic or Montgoery), where W( ) is the Haing weight of the binary representation of e. In addition, our algorith requires one ore extra constant ultiplication. Assue that the nuber of bit operations for a ultiplication and a constant ultiplication are 1 and 1, respectively. We copare the bit operations of the two algoriths in the following table. As shown in the table, our algorith roughly Table 3: The bit operations for different exponentiation Algoriths Bit operations [8] ( 1) W(e) + O( /) This paper ( 1) W(e) + O(3 /) costs ore bit-operations than that in [8]. In fact, we have checked the space coplexity of B ω in GF( ) defined by all the trinoials of degree [100, 103] with cryptographic interests. It is argued that B ω only costs less than / XOR gates in roughly two thirds of such finite fields. In this case, our algorith only costs about / ore bit-operations. On the other hand, according to Table 1, it is clear that the gate delays for the ordinary squaring and square root are identical only when, k satisfy case. Note that the circuit delay for parallel ipleentation of ordinary squaring and square root is in fact equal to that of the slower operation. Thus, in other cases, it requires at least T X. Conversely, our algorith can save at least one T X for each squaring (square root) coputation in the loop. Note that the constant ultiplication presented in step 11 requires at ost log extra XOR gate delays. We finally save at least ( log )T X circuit delay except case. In case, the algorith in [8] is preferred to ours, as it has saller space and tie coplexities. Notwithstanding, in other cases, our algorith takes slightly ore space but less tie. 4. Conclusion In this paper, we have proposed a new type of Montgoery-like square root operation. By choosing a proper Montgoery factor, the proposed schee has only one T X delay and its space coplexity is at least as good as the best result. As an iportant application, we show that this type of square root cobined with Montgoery squaring can speed up parallel exponentiation algorith that based on ordinary squaring and square root. References [1] R. Lidl and H. Niederreiter, Introduction to finite fields and their applications. Cabridge University Press, New York, NY, USA, [] R. Lidl and H. Niederreiter, Finite Fields, Cabridge University Press, New York, NY, USA, [3] J.V.Z. Gathen and J. Gerhard, Modern Coputer Algebra (3rd ed.). Cabridge University Press, New York, NY, USA, 013. [4] D. Hankerson, A. Menezes and S. Vanstone, Guide to Elliptic Cryptography, Springer-Verlag, 004. [5] R. Schroeppel, C. Beaver, R. Gonzales, R. Miller and T. Draelos, A Low-Power Design for an Elliptic Curve Digital Signature Chip, Proc. Fourth Int l Workshop Cryptographic Hardware and Ebedded Systes, 00, pp [6] F. Rodríguez-Henríquez, G. Morales-Luna, N. Saqib,and N. CruzCortés, Parallel Itoh-Tsujii Multiplicative Inversion Algorith for a Special Class of Trinoials, Reconfigurable Coputing: Architectures, Tools and Applications, LNCS 4419, 007, pp [7] K. Fong, D. Hankerson, J. López, and A. Menezes, Field Inversion and Point Halving Revisited, IEEE Trans. Coputers, 004, 53, (8), pp [8] F. Rodríguez-Henríquez, G. Morales-Luna and J. Lópz, Low- Coplexity Bit-Parallel Square Root Coputation over GF( ) for All Trinoials, IEEE Transactions on Coputers, 008, 57, (4), pp [9] H. Wu, Montgoery ultiplier and squarer for a class of finite fields, IEEE Transactions on Coputers, 00, 51, (5), pp [10] Recoended Elliptic Curves for Federal Governent Use, special publication, Nat l Inst. Standards and Technology, csrc.nist.gov/csrc/fedstandards.htl, July The constant ultiplication needs no AND gates for bitwise ultiplication, as the product atrix is fixed. 5

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

On Concurrent Detection of Errors in Polynomial Basis Multiplication

On Concurrent Detection of Errors in Polynomial Basis Multiplication 1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses

More information

s = (Y Q Y P)/(X Q - X P)

s = (Y Q Y P)/(X Q - X P) Elliptic Curves and their Applications in Cryptography Preeti Shara M.Tech Student Mody University of Science and Technology, Lakshangarh Abstract This paper gives an introduction to elliptic curves. The

More information

BSIDES multiplication, squaring is also an important

BSIDES multiplication, squaring is also an important 1 Bit-Parallel GF ( n ) Squarer Using Shifted Polynomial Basis Xi Xiong and Haining Fan Abstract We present explicit formulae and complexities of bit-parallel shifted polynomial basis (SPB) squarers in

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

On the Design of an On-line Complex Householder Transform

On the Design of an On-line Complex Householder Transform On the esign of an On-line Coplex Householder Transfor Robert McIlhenny Coputer Science epartent California State University, Northridge Northridge, CA 9330 rcilhen@csunedu Milo s Ercegovac Coputer Science

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

A New Algorithm for Reactive Electric Power Measurement

A New Algorithm for Reactive Electric Power Measurement A. Abiyev, GAU J. Soc. & Appl. Sci., 2(4), 7-25, 27 A ew Algorith for Reactive Electric Power Measureent Adalet Abiyev Girne Aerican University, Departernt of Electrical Electronics Engineering, Mersin,

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials

Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials 1 Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang and Chuanda Qi Abstract We present a new type of bit-parallel non-recursive Karatsuba multiplier over

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

On the Number of Trace-One Elements in Polynomial Bases for F 2

On the Number of Trace-One Elements in Polynomial Bases for F 2 On the Number of Trace-One Elements in Polynomial Bases for F 2 n Omran Ahmadi and Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada {oahmadid,ajmeneze}@uwaterloo.ca

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 1, NO. 6, JUNE 00 715 Short Papers Test Data Copression and Decopression Based on Internal Scan Chains and Golob Coding

More information

Math 262A Lecture Notes - Nechiporuk s Theorem

Math 262A Lecture Notes - Nechiporuk s Theorem Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

BINARY extension fields GF (2 m ) are heavily used

BINARY extension fields GF (2 m ) are heavily used This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content ay change prior to final publication. Citation inforation: DOI 0.09/TC.205.248408,

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns

Fast Structural Similarity Search of Noncoding RNAs Based on Matched Filtering of Stem Patterns Fast Structural Siilarity Search of Noncoding RNs Based on Matched Filtering of Ste Patterns Byung-Jun Yoon Dept. of Electrical Engineering alifornia Institute of Technology Pasadena, 91125, S Eail: bjyoon@caltech.edu

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

A Quantum Observable for the Graph Isomorphism Problem

A Quantum Observable for the Graph Isomorphism Problem A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2 m )

High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2 m ) High-speed VLSI ipleentation of igit-serial Gaussian noral basis Multiplication over GF(2 ) Bahra Rashidi, Sayed Masoud Sayedi 2, Reza Rezaeian Farashahi 3,2 ept. of Elec. & Cop. Eng., Isfahan University

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

Ufuk Demirci* and Feza Kerestecioglu**

Ufuk Demirci* and Feza Kerestecioglu** 1 INDIRECT ADAPTIVE CONTROL OF MISSILES Ufuk Deirci* and Feza Kerestecioglu** *Turkish Navy Guided Missile Test Station, Beykoz, Istanbul, TURKEY **Departent of Electrical and Electronics Engineering,

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

(t, m, s)-nets and Maximized Minimum Distance, Part II

(t, m, s)-nets and Maximized Minimum Distance, Part II (t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated

More information

PARALLEL MULTIPLICATION IN F 2

PARALLEL MULTIPLICATION IN F 2 PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

Structures for Interpolation, Decimation, and Nonuniform Sampling Based on Newton s Interpolation Formula

Structures for Interpolation, Decimation, and Nonuniform Sampling Based on Newton s Interpolation Formula Structures for Interpolation, Deciation, and Nonunifor Sapling Based on Newton s Interpolation Forula Vesa Lehtinen, arkku Renfors To cite this version: Vesa Lehtinen, arkku Renfors. Structures for Interpolation,

More information

Combinatorial Primality Test

Combinatorial Primality Test Cobinatorial Priality Test Maheswara Rao Valluri School of Matheatical and Coputing Sciences Fiji National University, Derrick Capus, Suva, Fiji E-ail: aheswara.valluri@fnu.ac.fj Abstract This paper provides

More information

Time-frequency plane behavioural studies of harmonic and chirp functions with fractional Fourier transform (FRFT)

Time-frequency plane behavioural studies of harmonic and chirp functions with fractional Fourier transform (FRFT) Maejo International Journal of Science and Technology Full Paper ISSN 95-7873 Available online at www.ijst.ju.ac.th Tie-frequency plane behavioural studies of haronic and chirp functions with fractional

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

Numerical issues in the implementation of high order polynomial multidomain penalty spectral Galerkin methods for hyperbolic conservation laws

Numerical issues in the implementation of high order polynomial multidomain penalty spectral Galerkin methods for hyperbolic conservation laws Nuerical issues in the ipleentation of high order polynoial ultidoain penalty spectral Galerkin ethods for hyperbolic conservation laws Sigal Gottlieb 1 and Jae-Hun Jung 1, 1 Departent of Matheatics, University

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

Arithmetic Unit for Complex Number Processing

Arithmetic Unit for Complex Number Processing Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit

More information

Parallel stream cipher for secure high-speed communications

Parallel stream cipher for secure high-speed communications Signal Processing 82 (2002 259 265 www.elsevier.co/locate/sigpro Parallel strea cipher for secure high-speed counications Hoonjae Lee a;, Sangjae Moon b a Departent of Coputer Engineering, Kyungwoon University,

More information

A note on López-Dahab coordinates

A note on López-Dahab coordinates A note on López-Dahab coordinates Tanja Lange Faculty of Mathematics, Matematiktorvet - Building 303, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark tanja@hyperelliptic.org Abstract López-Dahab

More information

Jordan Journal of Physics

Jordan Journal of Physics Volue 5, Nuber 3, 212. pp. 113-118 ARTILE Jordan Journal of Physics Networks of Identical apacitors with a Substitutional apacitor Departent of Physics, Al-Hussein Bin Talal University, Ma an, 2, 71111,

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Defect-Aware SOC Test Scheduling

Defect-Aware SOC Test Scheduling Defect-Aware SOC Test Scheduling Erik Larsson +, Julien Pouget*, and Zebo Peng + Ebedded Systes Laboratory + LIRMM* Departent of Coputer Science Montpellier 2 University Linköpings universitet CNRS Sweden

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

The Wilson Model of Cortical Neurons Richard B. Wells

The Wilson Model of Cortical Neurons Richard B. Wells The Wilson Model of Cortical Neurons Richard B. Wells I. Refineents on the odgkin-uxley Model The years since odgkin s and uxley s pioneering work have produced a nuber of derivative odgkin-uxley-like

More information

Statistical Logic Cell Delay Analysis Using a Current-based Model

Statistical Logic Cell Delay Analysis Using a Current-based Model Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,

More information

Maximum a Posteriori Decoding of Turbo Codes

Maximum a Posteriori Decoding of Turbo Codes Maxiu a Posteriori Decoing of Turbo Coes by Bernar Slar Introuction The process of turbo-coe ecoing starts with the foration of a posteriori probabilities (APPs) for each ata bit, which is followe by choosing

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information