Complete weight enumerators of two classes of linear codes

Size: px
Start display at page:

Download "Complete weight enumerators of two classes of linear codes"

Transcription

1 Comlete weght enumerators of two classes of lnear codes Quyan Wang, Fe L, Kelan Dng and Dongda Ln 1 Abstract arxv: v1 [cs.it] 23 Dec 215 Recently, lnear codes wth few weghts have been constructed and extensvely studed. In ths aer, for an odd rme, we determned the comlete weght enumerator of two classes of -ary lnear codes constructed from defnng set. Results show that the codes are at almost seven-weght lnear codes and they may have alcatons n secret sharng schemes. Index Terms Lnear code, comlete weght enumerator, Gauss sum. I. INTRODUCTION Throughout ths aer, let ba an odd rme and let q = e for some ostve nteger e. Let F denote the fnte feld wth elements. An [n,k,d] lnear code C s over F s a k-dmensonal subsace of F n wth mnmum dstance d [19]. Let A be the number of codewords of weght n C of length n. The (Hammng weght enumerator of C s defned by [19] 1+A 1 x+a 2 x 2 + +A n x n. For n, the lst A s called the weght dstrbuton or weght sectrum of C. A code C s sad to be a t-weght code f the number of nonzero A wth 1 n s equal to t. Clearly, the mnmum dstance of C can be derved from the weght dstrbuton of the code C. By error detecton and error correcton algorthms [21], the weght dstrbuton of a code can be aled to comute the error robablty of error detecton and correcton. Thus, weght dstrbuton s a sgnfcant research toc n codng theory and was studed n [2], [4], [7], [8], [9], [1], [14], [3], [31]. Let F =,1,..., 1}. For a codeword c = (c,c 1,...,c n 1 C, the comlete weght enumerator of c s the monomal w(c = w t w t 1 1 w t 1 1 n the varables w, w 1,..., w 1. Here t ( 1 s the number of comonents of c whch equal to. Then the comlete weght enumerator of the lnear code C s the homogeneous olynomal CWE(C = c C w(c of degree n (see [27], [28]. The authors are suorted by by a Natonal Key Basc Research Project of Chna (211CB324, Natonal Natural Scence Foundaton of Chna ( , the Strategc Prorty Research Program of the Chnese Academy of Scences, Grant No. XDA6171 and Foundaton of NSSFC(No.13CTJ6. Q. Wang s wth the State Key Laboratory of Informaton Securty, the Insttute of Informaton Engneerng, The Chnese Academy of Scences, Bejng, Chna. Emal: wangquyan@e.ac.cn F. L s the corresondng author and wth School of Statstcs and Aled Mathematcs, Anhu Unversty of Fnance and Economcs, Bengbu Cty, Anhu Provnce, Chna. Emal: cczxlf@163.com K. Dng s wth the State Key Laboratory of Informaton Securty, the Insttute of Informaton Engneerng, The Chnese Academy of Scences, Bejng, Chna. Emal: dngkelan@e.ac.cn D. Ln s wth the State Key Laboratory of Informaton Securty, the Insttute of Informaton Engneerng, The Chnese Academy of Scences, Bejng, Chna. Emal: ddln@e.ac.cn

2 2 From defnton, the comlete weght enumerators of bnary lnear codes are just the weght enumerators. For nonbnary lnear codes, the (Hammng weght enumerators, whch have been extensvely nvestgated [15], [16], [34], [15], [35], can be obtaned from the comlete weght enumerators. Further more, the comlete weght enumerators are closely related to the deceton of some authentcaton codes constructed from lnear codes [11], and used to comute the Walsh transform of monomal functons over fnte felds [18]. Thus, a great deal of research s devoted to the comutaton of the comlete weght dstrbuton of secfc codes [1], [3], [2], [22], [23], [25]. Let F q be the fnte feld wth q elements and D = d 1,d 2,...,d n } be a nonemty subset of F q. A generc constructon of a lnear code of length n s gven by C D = c x = (Tr(xd 1,Tr(xd 2,...,Tr(xd n : x F q }, (1.1 where Tr denote the trace functon from F q onto F [26]. The set D s called the defnng set of C D. Ths constructon technque s emloyed n lots of researches to get lnear codes wth few weghts. The readers are referred to [17], [29], [35], [12], [24], [29] for more detals. Naturally, a generalzaton of the code C D of (1.1 s defned by [32] C D = (Tr(xd 1 +u,tr(xd 2 +u,...,tr(xd n +u : u F, x F q }. (1.2 The objectve of ths aer s to resent lnear codes over F wth at most seven weghts usng the above two constructon methods. Further more, the comlete weght enumerators of the two roosed lnear codes are also calculated. The codes n ths aer may have alcatons n authentcaton codes [13], secret sharng schemes [33] and consumer electroncs. II. THE MAIN RESULTS In ths secton, we only resent the -ary lnear codes and ntroduce ther arameters. The roofs of ther arameters wll be gven later. For a F, the defnng set s gven by D a = x F q : Tr(x α +1 = a}, (2.1 where α s any natural number. It should be remarked that, for = 2, the weght enumerator of C D of (1.1 have been determned n [17]. In ths aer, for a F the comlete weght enumerators of C Da of (1.1 and C Da of (1.2 have been exlctly resented by usng exonental sums. Lemma 1 ( [5],Lemma 2.6: Let d = gcd(α,e and be odd. Then 2, f e/d s odd, gcd( d +1, e 1 = d +1, f e/d s even. Note that gcd( α +1, e 1 = 2 leads to whch means that x α +1 : x F q } = x2 : x F q } D = x F q : Tr(xα +1 = } = x F q : Tr(x2 = }. By Lemma 1, f e/d s odd, the code C D of (1.1 and the code C D n [16] are the same. Hence, we wll assume e/d s even and e = 2m for a ostve nteger m. The man results of ths aer are gven below.

3 3 TABLE I: The weght dstrbuton of the codes of Theorem 2 Weght w Multlcty A 1 ( 1 e 2 e 1 ( 1 m 1 1 ( 1( e 2 m 1 ( 1( e 1 + m 1 Theorem 2: Let m 2. If m/d 1 mod 2, then the code C D of (1.1 s a [ e 1 ( 1 m 1 1,e] lnear code wth weght dstrbuton n Table I and ts comlete weght enumerator s 1 w e 1 ( 1 m 1 1 +( e 1 ( 1 m 1 1w e 2 ( 1 m 1 1 +( 1( e 1 + m 1 w e =1 w e 2 m 1. =1 w e 2 TABLE II: The weght dstrbuton of the codes of Corollary 3 Weght b Multlcty A 1 ( 1 e 2 e 1 ( 1 m 1 1 ( 1( e 2 m 1 ( 1( e 1 + m 1 e 1 ( 1 m ( 1( e 2 m 1 1 ( 1( e 1 ( 1 m 1 1 ( 1 e 2 ( 2 m 1 1 ( 1 2 ( e 1 + m 1 Corollary 3: Let the symbols and condtons be the same as Theorem 2. The code C D of (1.2 s a [ e 1 ( 1 m 1 1,e+1] lnear code wth weght dstrbuton n Table II and ts comlete weght enumerator s 1 = w e 1 ( 1 m ( e 1 ( 1 m ( 1( e 1 + m 1 = = w e 2 1 w e 2 ( 1 m 1 1 j w e 2 m 1 j. j w e 2 j TABLE III: The weght dstrbuton of the codes of Theorem 4. Weght b Multlcty A 1 ( 1 e 2 +2 m ( 1(e 1 + m 1 ( 1 e 2 e 1 2 ( 1(e 1 + m 1 1 Theorem 4: Let g be a generator of F and a F. If m/d 1 mod 2, then the code C D a (1.1 s a [ e 1 + m 1,e] lnear code wth weght dstrbuton n table Table III and ts comlete weght enumerator

4 4 s w e 1 + m 1 + ( e 1 ( 1 m w e 2 + m 1 +( e 1 + m 1 +( e 1 + m β=1 2 1 β=1 w e 2 ( 1 m 1 w e 2 2g β w e 2 2g β +( w e m 1 =1 =1 w e 2 w,±2g β ( e 2 ( w e 2 2 4g 2β+1 m 1, 2 4g 2β m 1 where ( denotes the Legendre symbol. TABLE IV: The weght dstrbuton of the codes of Corollary 5 Weght b Multlcty A 1 ( 1 e 2 +2 m ( 1( 2(e 1 + m 1 ( 1 e 2 e ( 1( 2(e 1 + m 1 1 e 1 + m 1 1 ( 1 e 2 + m 1 ( 1(2 e 1 ( 2 m 1 1 Corollary 5: Let the symbols and condtons be the same as Theorem 4. The code C Da of (1.2 s a [ e 1 + m 1,e+1] lnear code wth weght dstrbuton n Table IV and ts comlete weght enumerator s 1 = w e 1 + m 1 +( e 1 + m 1 +( e 1 + m 1 + ( e 1 ( 1 m ( w e β=1 = 1 β=1 = m ( w e 2 1 m 1 = w e 2 +2g β w e 2 2g β j w e 2 + m 1 j wj j,±2g β w e 2 j ( e 2 ( w e 2 j 2 4g 2β+1 m 1 j. j 2 4g 2β m 1 Examle 1: Let (,m,α = (3,3,1. If a =, then the code C D has arameters [224,6,144] wth comlete weght enumerator 2 2 w w 62 w w 8 w 72, and the C D has arameters [224,7,143] wth comlete weght enumerator w w 62 wj w 8 wj 72. F 3 F 3 j F 3 j If a = 1, then the code C D1 has arameters [252,6,162] wth comlete weght enumerator 2 w w 9 w w 72 w9 1 w9 2, =1 =1 1

5 5 and the code C D1 has arameters [252,7,162] wth comlete weght enumerator w w 9 wj w 72 wj 9. F 3 F 3 j F 3 j TABLE V: The weght dstrbuton of the codes of Theorem 6. Weght b Multlcty A 1 ( 1 e 2 ( 1 2 m+d 2 e e 2d ( 1 e 2 e 2d 1 ( 1 m d 1 1 ( 1 e 2 ( 1 m+d 1 ( 1( e 2d 1 + m d 1 Theorem 6: Let m > d+1. If m/d mod 2, then the code C D of (1.1 s a [ e 1 ( 1 m+d 1 1, e] lnear code wth weght dstrbuton n Table V and ts comlete weght enumerator s 1 w e 1 ( 1 m+d 1 1 +( 1( e 2d 1 + m d 1 w e 2 1 +( e e 2d w e 2 ( 1 m+d =1 w e 2 ( 1 m+d 2 + ( e 2d 1 ( 1 m d 1 1 w e 2 ( 1 m+d =1 =1 w e 2 m+d 1 w e 2. TABLE VI: The weght dstrbuton of the codes of Corollary 7. Weght b Multlcty A 1 ( 1 e 2 ( 1 2 m+d 2 e e 2d ( 1 e 2 e 2d 1 ( 1 m d 1 1 ( 1 e 2 ( 1 m+d 1 ( 1( e 2d 1 + m d 1 e 1 ( 1 m+d ( 1 e 2 ( 2 m+d 1 1 ( 1 2 ( e 2d 1 + m d 1 ( 1( e 2 ( 1 m+d 2 1 ( 1( e e 2d ( 1( e 2 m+d 1 1 ( 1( e 2d 1 ( 1 m d 1 1 Corollary 7: Let the symbols and condtons be the same as Theorem 6. The code C D of (1.2 s a [ e 1 ( 1 m+d 1 1,e+1] lnear code wth weght dstrbuton n Table VI and ts comlete weght enumerator s 1 = w e 1 ( 1 m+d ( 1( e 2d 1 + m d 1 1 +( e e 2d = = w e 2 1 w e 2 ( 1 m+d ( e 2d 1 ( 1 m d = j j w e 2 m+d 1 j w e 2 ( 1 m+d 2 j w e 2 ( 1 m+d 1 1 j w e 2 j.

6 6 TABLE VII: The weght dstrbuton of the codes of Theorem 8 Weght b Multlcty A 1 ( 1( e 2 + m+d 2 e e 2d ( 1 e (+1e 2d ( 1m d 1 1 ( 1 e 2 +2 m+d ( 1(e 2d 1 + m d 1 Theorem 8: Let a F. If m/d mod 2, then the code C Da of (1.1 s a [ e 1 + m+d 1,e] lnear code wth weght dstrbuton n Table VII and ts comlete weght enumerator s 1 +( e e 2d w e 1 + m+d 1 = w e 2 + m+d 2 + ( e 2d 1 ( 1 m d 1 1 w e 2 + m+d 1 +( e 2d 1 + m d 1 +( e 2d 1 + m d β=1 2 1 β=1 where ( denote the Legendre symbol. 1 =1 w e 2 w e 2 ( 1 m+d 1 w e 2 2g β w e 2 2g β +( w e m+d 1 =1 w,±2g β ( e 2 ( w e 2 2 4g 2β+1 m+d 1, TABLE VIII: The weght dstrbuton of the codes of Corollary 9. Weght b Multlcty A 1 ( 1( e 2 + m+d 2 ( e e 2d ( 1 e (2 +2( e 2d 1 + m d 1 m d 1 ( 1 e 2 +2 m+d ( 1( 2(e 2d 1 + m d 1 e 1 + m+d 1 1 ( 1 e 2 + m+d 1 ( 1(2 e 2d 1 ( 2 m d g 2β m+d 1 Corollary 9: Let the symbols and condtons be the same as Theorem 8. The code C Da of (1.2 s a [ e 1 + m+d 1,e+1] lnear code wth weght dstrbuton n Table VIII and ts comlete weght enumerator s 1 w e 1 + m+d 1 = 1 +( e e 2d = + ( e 2d 1 ( 1 m d ( e 2d 1 + m d 1 +( e 2d 1 + m d 1 1 = 1 2 ( w e 2 1 β=1 = w e 2 + m+d 2 w e 2 + m+d 1 m+d ( w e 2 1 m+d 1 1 β=1 = j w e 2 j w e 2 +2g β w e 2 2g β j wj j,±2g β ( e 2 ( w e 2 j 2 4g 2β+1 m+d 1 j. j 2 4g 2β m+d 1

7 7 Examle 2: Let (,m,α = (3,4,1. If a =, then the corresondng code C D has arameters [224, 8, 1296] wth comlete weght enumerator w w =1 w w =1 w w =1 w 729, and the code C D has arameters [224,9,1295] wth comlete weght enumerator w w 728 wj w 674 wj w 566 F 3 F 3 j F 3 j F 3 j w 729 j. If a = 1, then the code C D1 has arameters [2268,8,1458] wth comlete weght enumerator 2 2 w w w 81 w w 648 w1 81 w2 81, = and the code C D1 has arameters [2268,9,1458] wth comlete weght enumerator w w w 81 wj w 648 wj 81. F 3 F 3 F 3 j F 3 j =1 III. THE PROOFS OF THE MAIN RESULTS Our task n ths secton s to rove results n Secton 2. Frstly, we revew some basc notatons and results of grou characters and resent some lemma whch are needed for the roofs of the man results. A. Prelmnares We start wth the addtve character. A grou homomorhsm χ from F q nto the comlex numbers s called an addtve character of F q. Let b F q, the mang χ b (c = ζ Tr(bc for all c F q, defnes an addtve character of F q, where ζ = e 2π 1. The addtve character χ s called trval and the other characters χ b wth b F q are called nontrval. The character χ 1 s called the canoncal addtve character of F q. And χ b (x = χ 1 (bx for all x F q. By the orthogonal roerty of addtve characters, we have ([26], Theorem 5.4, q, f χ s trval, χ(x =, f χ s nontrval. The multlcatve characters of F q are Characters over F q, whch are gven by ψ j (g k = ζ 2π 1jk/(q 1 for k =,1,...,q 2, j q 2. Here g s a generator of F q ([26]. The multlcatve character ψ (q 1/2 s called the quadratc character of F q, whch s denoted by η. And we assume that η( = n ths aer. We defne the quadratc Gauss sum G = G(η,χ 1 over F q by G(η,χ 1 = x F q and the quadratc Gauss sum G = G(η,χ 1 over F by G(η,χ 1 = x F η(xχ 1 (x, η(xχ 1 (x,

8 8 where η and χ 1 denote the quadratc and canoncal character of F. The exlct values of quadratc Gauss sums are gven as follows. Lemma 1 ([26], Theorem 5.15: Let the symbols be the same as before. Then G(η,χ 1 = ( 1 (m 1 1 ( 1 2 m 4 q, G(η,χ1 = 1 ( Lemma 11 ([16], Lemma7: Let the symbols be the same as before. Then 1 f m 2 s even, then η(y = 1 for each y F ; 2 f m s odd, then η(y = η(y for each y F. Lemma 12 ([26], Theorem 5.33: Let χ be a nontrval addtve character of F q, and let f(x = a 2 x 2 + a 1 x+a F q [x] wth a 2. Then χ(f(x = χ ( a a 2 1 (4a 2 1 η(a 2 G(η,χ. and For a F, b F q, defne For a, c F and b F q, defne B(a,c = y F A(a = y F ζ ytr(x α +1 (3.1 S(a,b = χ ( ax α +1 +bx. (3.2 z F cz Lemma 13 ([5], Theorem 2: Let e/d be even wth e = 2m. Then m, f a q 1 d +1 1, S(a, = m+d, f a q 1 d +1 = 1, m, m+d, χ 1 (yx α+1 +bzx. (3.3 f a q 1 d +1 1, f a q 1 d +1 = 1, Lemma 14 ([6], Theorem 1: Let q be odd and suose f(x = a α X 2α + ax s a ermutaton olynomal over F q. Let x be the unque soluton of the equaton f(x = b α (b. The evaluaton of S(a, b arttons nto the followng two cases: 1 If e/d s odd, then ( 1 e 1 qη( aχ S(a,b = 1 (ax α +1 2 If e/d s even, then e = 2m, a q 1 d +1 ( 1 m d and, f 1 mod 4, ( 1 e 1 3e qη( aχ 1 (ax α +1, f 3 mod 4. S(a,b = ( 1 m d m χ 1 (ax α +1. Lemma 15 ([6], Theorem 2: Let q be odd and suose f(x = a α X 2α +ax s not a ermutaton olynomal over F q. Then for b we have S(a,b = unless the equaton f(x = b α s solvable. If the equaton s solvable, wth some soluton x say, then S(a,b = ( 1 m d m+d χ 1 (ax α +1. Lemma 16: Let the symbols be the same as before. ( 1 1 If a =, then A( = m+d, f m/d mod 2, ( 1 m, f m/d 1 mod 2.

9 9 2 If a, then A(a = Proof: Notce that ζ ytr(xα +1 m+d, f m/d mod 2, m, f m/d 1 mod 2. = S(y,. For y F, we know y q 1 d +1 = 1. Then the results can be obtaned drectly from Lemma 13. Lemma 17: Let the symbols be the same as before. If m/d 1 mod 2, then X 2α +X = b α has a soluton γ n F q and 1 2 for c, we have 3 for a, we have B(a, = B(, = B(,c = m ( 1 2, f Tr(γ α +1 =, m ( 1, f Tr(γ α +1 ; ( 1 m, f Tr(γ α +1 =, m, f Tr(γ α +1 ; ( 1 m, f Tr(γ α +1 =, m+1 η( atr(γ α +1 m, f Tr(γ α +1 ; 4 for ac, we have m, f Tr(γ α +1 =, B(a,c = m, f Tr(γ α +1 = c 2 /(4a, m+1 η(c 2 4aTr(γ α +1 m, otherwse. Proof: If m/d 1 mod 2, by Theorem 4.1 n [7], we get the equaton X 2α +X = has no soluton nf q. ThenX 2α +X s a ermutaton olynomal overf q andx 2α +X = b α has a unque soluton γ n F q. Thus y 1 ( zγ s the unque soluton n F q of y α X 2α + yx = (bz α. By Lemma 14, S(y,bz = m χ 1 y(y 1 zγ α +1. Therefore, B(a,c = ( m cz χ 1 y(y 1 zγ α +1 y F = m y F z F z F cz 2 Tr(γ α +1 ζ z y. If Tr(γ α +1 =, the corresondng results follow from the orthogonal roerty of addtve characters easly. If Tr(γ α +1, we have B(, = m z F 2 Tr(γ α +1 ζ z y = m z F ζ y = ( 1m. B(,c = m z F y F y F 2 Tr(γ α +1 ζ cz ζ z y y F = m z F ζ cz ζ y = m. y F

10 1 By Lemma 12, we get Also by Lemma 12, we have B(a, = m y F = m y F = m y F = m y F B(a,c = m y F z F ζ ay χ 1 (η 2 Tr(γ α +1 ζ z y = m η(atr(γ α +1 G y F ( +1 χ 1 Tr(γα z 2 y z F ( +1 χ 1 Tr(γα z 2 y z F ( +1 Tr(γα y = m η(atr(γ α +1 G 2 m = m+1 η( atr(γ α +1 m. = m y F = m y F cz z F 2 Tr(γ α +1 ζ z y ( +1 χ 1 Tr(γα y z F ( yc 2 χ 1 η 4Tr(γ α +1 = m η ( Tr(γ α +1 G y F + m y F G m ζ ay η( ay m z 2 cz + m y F ( +1 Tr(γα y c 2 4aTr(γ α +1 y G m 4Tr(γ ζ α +1 η(y m. (3.4 If Tr(γ α +1 = c 2 /(4a, by (3.4, we have B(a,c = m. Otherwse, we obtan B(a,c = m η ( 4aTr(γ α +1 c 2 G y F = m η ( ( c 2 4aTr(γ α +1 G 2 m = m+1 η ( c 2 4aTr(γ α +1 m. ζ c 2 4aTr(γ α +1 4Tr(γ α +1 y ( c 2 4aTr(γ α +1 η y m 4Tr(γ α +1 The roof of ths lemma s comleted. Lemma 18: Let the symbols be the same as Lemma 17. Let m/d mod 2. If X 2α + X = b α has no soluton n F q, then B(a,c =. Suose X 2α +X = b α has a soluton γ n F q, we have 1 B(, = m+d ( 1 2, f Tr(γ α +1 =, m+d ( 1, f Tr(γ α +1.

11 11 2 f c, then 3 f a, then B(a, = B(,c = ( 1 m+d, f Tr(γ α +1 =, m+d, f Tr(γ α +1. ( 1 m+d, f Tr(γ α +1 =, m+d+1 η ( atr(γ α +1 m+d, f Tr(γ α +1, 4 f ac, then m+d, f Tr(γ α +1 =, B(a,c = m+d, f Tr(γ α +1 = c 2 /(4a, m+d+1 η ( c 2 4aTr(γ α +1 m+d, otherwse. Proof: If m/d mod 2, by Theorem 4.1 n [7], we know that X 2α + X s not a ermutaton olynomal. Then usng Lemma 15, the roof s smlar to that of Lemma 17. We omt the detals. Lemma 19: Set f(x = X 2α +X and S = b F q : f(x = b α s solvable n F q }. If m/d s even, then S = e 2d. Proof: Note that both e/d and m/d are even. By Theorem 4.1 n [7], t s easy to see that f(x = has 2d solutons n F q. So does the equaton f(x = b α wth b S. For b 1,b 2 F q and b 1 b 2, t s not hard to know that the two equatons f(x = b α 1 and f(x = b α 2 have no common solutons. Furthermore, for each a F q, there must exst b F q such that f(a = b α, snce X α s a ermutaton olynomal over F q. So the desred result can be concluded wth the above dscussons. B. Proofs of theorems n Secton A Let For a F, recall that we set D a = x F q : Tr(xα +1 = a}. n a = Da }, f a =, D a, f a. From the defnton of n a, we know n a = 1 ytr(xα +1 ay y Fζ Therefore, where A(a s defned by (3.1. For a, c F and b F q, defne = e y F ζ ytr(x α +1. n a = e A(a, (3.5 N b (a,c = x F q : Tr(x α +1 = a and Tr(bx = c}. Let wt(c b denote the Hammng weght of the codeword c b (b F q of the code C D a. It s not dffcult to see that wt(c b = n a N b (a,c. (3.6

12 12. From defnton, for b F q, and a, c F we have N b (a,c = 2 ytr(xα +1 ay y Fζ = 2 1+ y F = e y F + 2 y F z F ζ ytr(xα +1 ay z Fζ ztr(bx cz ζ ytr(x α +1 ay 1+ z F + 2 z F ζ Tr(yx α +1 +bzx ay cz ζ ztr(bx cz ζ ztr(bx cz = e A(a+ 2 B(a,c (3.7 where A(a and B(a, c are defned by (3.1 and (3.3, resectvely. Our task n the sequel s to calculate n a, N b (a,c and gve the roofs of the man results. 1 The frst case: a = and m/d 1 mod 2. Let γ be the unque soluton of equaton X 2α +X = b α. By (3.7, Lemmas 16 and 17, we have the followng two lemmas. Lemma 2: Let b F q, then N b (, = e 2 ( 1 m 1, f Tr(γ α +1 =, e 2, f Tr(γ α +1. Lemma 21: For b F q and c F, we have N b (,c = e 2, f Tr(γ α +1 =, e 2 m 1, f Tr(γ α +1. Now t comes to rove Theorem 2. Proof: By (3.6 and Lemma 16, we get n = e 1 ( 1 m 1. Usng Lemma 2, we have wt(c b ( 1 e 2,( 1 e 2 ( 1 m 1 }. Because wt(c b for each b F q, the dmenson of C D s e. Suose b 1 = ( 1 e 2, b 2 = ( 1 e 2 ( 1 m 1. Also by Lemma 2 and the value of n, we know that A b1 = e 1 ( 1 m 1 1, A b2 = ( 1( e 1 m 1. Hence, we get the Table 1. By the above two lemma, t s easy to get the comlete weght enumerator of C D. And we comlete the roof of Theorem 2.

13 13 2 The second case: a, m/d 1 mod 2. By (3.5, (3.7 and Lemmas 16 and 17, t s easy to get the values of n a, N b (a, and N b (a,c. Lemma 22: For a F, f m/d 1 mod 2, then n a = e 1 + m 1. Lemma 23: For b F q and a F, f m/d 1 mod 2, then N b (a, = e 2 + m 1, f Tr(γ α +1 =, e 2 m 1 η( atr(γ α +1, f Tr(γ α +1. Lemma 24: For b F q, a and c F, f m/d 1 mod 2, then e 2, f Tr(γ α +1 =, N b (a,c = e 2, f Tr(γ α +1 = c 2 /(4a, e 2 m 1 η ( c 2 4aTr(γ α +1, otherwse. Now we begn to rove Theorem 4. Proof: In ths case, usng the above three lemma, as the roof of Theorem 2 one can rove Theorem 4 smlarly. The detals are omtted. 3 The thrd case: a = and m/d mod 2. By (3.5, (3.7and Lemmas 16 and 18, we get the followng two lemmas. Lemma 25: Let b F q and m/d mod 2. If X2α +X = b α has no soluton n F q, then N b (, = e 2 ( 1 m+d 2. If X 2α +X = b α has a soluton γ n F q, then N b (, = e 2 ( 1 m+d 1, f Tr(γ α +1 =, e 2, f Tr(γ α +1. Lemma 26: Let b F q, c F and m/d mod 2. If X2α +X = b α has no soluton n F q, then N b (,c = e 2 ( 1 m+d 2. If X 2α +X = b α has a soluton γ n F q, then N b (,c = e 2, f Tr(γ α +1 =, e 2 m+d 1, f Tr(γ α +1. Now we gve the roof of Theorem 6. Proof: By (3.5 and Lemma 16, we get n = e 1 ( 1 m+d 1. Together wth Lemma 25, we have that wt(c b has three nonzero values. Suose b 1 = ( 1 e 2 ( 1 2 m+d 2, b 2 = ( 1 e 2, b 3 = ( 1 e 2 ( 1 m+d 1. By Lemma 19, A b1 = e e 2d. By the frst two Pless Power Moments([19],. 26 the frequency A b of w satsfes the followng equatons: Ab1 +A b2 +A b3 = m 1, b 1 A b1 +b 2 A b2 +b 3 A b3 = e 1 (3.8 ( 1n, where n = e 1 ( 1 m+d 1 1. Solvng the equatons gves the weght dstrbuton of Table 5. By Lemma 26, together the defnton of comlete weght enumerator of codes, we can obtan the comlete weght enumerator f C D. The roof s comleted.

14 14 4 The fourth case: a and m/d mod 2. By (3.5, (3.7, Lemmas 16 and 18, we have the followng three lemmas. Lemma 27: Let a F and m/d mod 2. Then n a = e 1 + m+d 1. Lemma 28: Let b F q, a F and m/d mod 2. If X 2α + X = b α has no soluton n F q, then N b (a, = e 2 + m+d 2. If X 2α +X = b α has a soluton γ n F q, then N b (a, = e 2 + m+d 1, f Tr(γ α +1 =, e 2 m+d 1 η ( atr(γ α +1, f Tr(γ α +1. Lemma 29: Let a, c F and b F q. Let m/d mod 2. If X2α +X = b α has no soluton n F q, then N b (a,c = e 2 + m+d 2. If X 2α +X = b α has a soluton γ n F q, then e 2, f Tr(γ α +1 =, N b (a,c = e 2, f Tr(γ α +1 = c 2 /(4a, e 2 m+d 1 η ( c 2 4aTr(γ α +1, otherwse. Now we begn to rove Theorem 8. Proof: In ths case, by the three lemmas above, we can get the results n Theorem 6. And we omt the detals. By the defnton of C Da, Corollares 3, 5, 7 and 9 follow drectly from Theorems 2, 4, 6 and 8, resectvely. We omt the roofs. IV. CONCLUDING REMARKS In ths aer, the comlete weght enumerators of two famles of lnear code wth few weghts are determned. Let w mn and w max denote the mnmum and maxmum nonzero weght of a lnear code, resectvely. As ntroduced n [33], any lnear code over F can be emloyed to construct secret sharng schemes wth nterestng access structures f w mn w max > 1. It can be verfed that the lnear code n Theorem 2, Corollary 3 and Theorem 4 have the roerty w mn w max > 1 f m 3. REFERENCES [1] S. Bae, C. L, Q. Yue, On the comlete weght enumerator of some reducble cyclc codes. Dscret. Math. 338 ( [2] L. D. Baumert, R. J. McElece, Weghts of rreducble cyclc codes. Inf. Control 2(2 ( [3] I. F. Blake, K. Kth, On the comlete weght enumerator of Reed-Solomon codes. SIAM J. Dscret. Math. 4(2 ( [4] S. -T. Cho, J. -Y. Km, J. -S. No, and H. Chung, Weght dstrbuton of some cyclc codes, n Proc. Int. Sym. Inf. Theory ( [5] R. S. Coulter, Exlct evaluaton of some Wel sums, Acta Arth, 83 ( [6] R. S. Coulter, Further evaluaton of Wel sums, Acta Arth, 3 ( [7] B. Courteau, J. Wolfmann, On trle sum sets and two or three weghts codes, Dscrete Mathematcs 5 ( [8] W. Chu, C. J. Colbourn, P. Dukes, On constant comoston codes. Dscret. Al. Math. 154 ( [9] C. Dng, A class of three-weght and four-weght codes, n: C. Xng, et al. (Eds., Proc. of the Second Internatonal Worksho on Codng Theory and Crytograhy, n: Lecture Notes n Comuter Scence, 5557, Srnger Verlag, 34 42, 29. [1] C. Dng, Lnear codes from some 2-desgns, IEEE Trans. Inf. Theory 61(6 ( [11] C. Dng, T. Helleseth, T. Kløve, X. Wang, A general constructon of authentcaton codes. IEEE Trans. Inf. Theory 53(6, (27. [12] C. Dng, J. Luo, H. Nederreter, Two-weght codes unctured from rreducble cyclc codes, n: Y. L, et al. (Eds., Proceedngs of the Frst Worsho on Codng and Crytograhy, World Scentfc, Sngaore, , 28. [13] C. Dng and X. Wang, A codng theory constructon of new systematc authentcaton codes, Theoretcal Comut. Sc.,33(1 ( [14] C. Dng, J. Yang, Hammng weghts n rreducble cyclc codes, Dscrete Math. 313(4 (

15 [15] C. Dng, Y. Gao, Z. Zhou, Fve Famles of Three-Weght Ternary Cyclc Codes and Ther Duals, IEEE Trans. Inf. Theory 59( [16] K. Dng, C. Dng, A class of two-weght and three-weght codes and ther alcatons n secret sharng, arxv:153,6512v1. [17] K. Dng, C. Dng, Banry lnear codes wth three weghts, IEEE Communcaton Letters, 18(11 ( [18] T. Helleseth, A. Kholosha, Monomal and quadratc bent functons over the fnte felds of odd characterstc. IEEE Trans. Inf. Theory 52(5 ( [19] W. C. Huffman and V. Pless, Fundamentals of error-correctng codes, Cambrdge: Cambrdge Unversty Press, 23. [2] K. Kth, Comlete weght enumeraton ofreed-solomon codes. Masters Thess,Deartment of Electrcal and Comutng Engneerng, Unversty of Waterloo, Waterloo, Ontaro, Canada (1989. [21] T. Kløve, Codes for Error Detecton, World Scentfc, 27. [22] A. S. Kuzmn, A. A. Nechaev, Comlete weght enumerators of generalzed Kerdock code and lnear recursve codes overgalos rngs. In: Proceedngs of the WCC99 Worksho on Codng and Crytograhy, , Pars, France, January (1999 [23] A. S. Kuzmn, A. A. Nechaev, Comlete weght enumerators of generalzed Kerdock code and related lnear codes over Galos rngs. Dscret. Al. Math. 111 ( [24] C. L, Q. Yue, and F. L, Hammng weghts of the duals of cyclc codes wth two zeros, IEEE Trans. Inf. Theory 6(7 ( [25] C. L, Q. Yue, and F. Fu, Comlete weght enumerators of some cyclc codes, Des. Codes Crytogr., DOI 1.17/s , 215. [26] R. Ldl, H. Nederreter, Fnte felds. Cambrdge Unversty Press, New York, [27] F. J. MacWllams, N. J. A. Sloane, The Theory of Error-Correctng Codes. North-Holland, Amsterdam (1977. [28] F. J. MacWllams, C. L. Mallows, N. J. A. Sloane, Generalzatons of Gleasons theorem on weght enumerators of self-dual codes, IEEE Trans. Inform. Theory 18(6 ( [29] Q. Wang, K. Dng, R. Xue, Bnary lnear codes wth two weghts, IEEE Communcaton Letters 19(7 ( [3] A. Sharma, Baksh G.K.: The weght dstrbuton of some rreducble cyclc codes. Fnte Felds and Ther Alcatons 18(1 ( [31] G. Vega, The weght dstrbuton of an extended class of reducble cyclc codes. IEEE Transactons on Informaton Theory 58(7 ( [32] S. Yang, Z. -A. Yao, Comlete weght enumerators of some lnear codes, arxv: v1 [33] J. Yuan and C. Dng, Secret sharng schemes from three classes of lnear codes, IEEE Trans. Inf. Theory 52(1 ( [34] Z. Zhou, C. Dng, A class of three weght cyclc codes, Fnte Felds and Ther Alcatons 25 ( [35] Z. Zhou, N. L, C. Fan, T. Helleseth, Lnear codes wth two or three weghts from quadratc bent functons, arxv:

SMARANDACHE-GALOIS FIELDS

SMARANDACHE-GALOIS FIELDS SMARANDACHE-GALOIS FIELDS W. B. Vasantha Kandasamy Deartment of Mathematcs Indan Insttute of Technology, Madras Chenna - 600 036, Inda. E-mal: vasantak@md3.vsnl.net.n Abstract: In ths aer we study the

More information

An application of generalized Tsalli s-havrda-charvat entropy in coding theory through a generalization of Kraft inequality

An application of generalized Tsalli s-havrda-charvat entropy in coding theory through a generalization of Kraft inequality Internatonal Journal of Statstcs and Aled Mathematcs 206; (4): 0-05 ISS: 2456-452 Maths 206; (4): 0-05 206 Stats & Maths wwwmathsjournalcom Receved: 0-09-206 Acceted: 02-0-206 Maharsh Markendeshwar Unversty,

More information

Algorithms for factoring

Algorithms for factoring CSA E0 235: Crytograhy Arl 9,2015 Instructor: Arta Patra Algorthms for factorng Submtted by: Jay Oza, Nranjan Sngh Introducton Factorsaton of large ntegers has been a wdely studed toc manly because of

More information

February 14, TiCC TR Generalized Residue Codes and their Idempotent Generators. Bulgarian Academy of Sciences, Bulgaria and

February 14, TiCC TR Generalized Residue Codes and their Idempotent Generators. Bulgarian Academy of Sciences, Bulgaria and Tlurg centre for Creatve Comutng P.O. Bo 90153 Tlurg Unversty 5000 LE Tlurg, The Netherlands htt://www.uvt.nl/tcc Emal: tcc@uvt.nl Coyrght S.M. Dodunekov, A. Bolov and A.J. van Zanten 2011. Feruary 14,

More information

On the Connectedness of the Solution Set for the Weak Vector Variational Inequality 1

On the Connectedness of the Solution Set for the Weak Vector Variational Inequality 1 Journal of Mathematcal Analyss and Alcatons 260, 15 2001 do:10.1006jmaa.2000.7389, avalable onlne at htt:.dealbrary.com on On the Connectedness of the Soluton Set for the Weak Vector Varatonal Inequalty

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

Smarandache-Zero Divisors in Group Rings

Smarandache-Zero Divisors in Group Rings Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the

More information

A NOTE ON THE DISCRETE FOURIER RESTRICTION PROBLEM

A NOTE ON THE DISCRETE FOURIER RESTRICTION PROBLEM A NOTE ON THE DISCRETE FOURIER RESTRICTION PROBLEM XUDONG LAI AND YONG DING arxv:171001481v1 [mathap] 4 Oct 017 Abstract In ths aer we establsh a general dscrete Fourer restrcton theorem As an alcaton

More information

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period -Adc Comlexty of a Seuence Obtaned from a Perodc Bnary Seuence by Ether Insertng or Deletng Symbols wthn One Perod ZHAO Lu, WEN Qao-yan (State Key Laboratory of Networng and Swtchng echnology, Bejng Unversty

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Some congruences related to harmonic numbers and the terms of the second order sequences

Some congruences related to harmonic numbers and the terms of the second order sequences Mathematca Moravca Vol. 0: 06, 3 37 Some congruences related to harmonc numbers the terms of the second order sequences Neşe Ömür Sbel Koaral Abstract. In ths aer, wth hels of some combnatoral denttes,

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

Lecture 13 APPROXIMATION OF SECOMD ORDER DERIVATIVES

Lecture 13 APPROXIMATION OF SECOMD ORDER DERIVATIVES COMPUTATIONAL FLUID DYNAMICS: FDM: Appromaton of Second Order Dervatves Lecture APPROXIMATION OF SECOMD ORDER DERIVATIVES. APPROXIMATION OF SECOND ORDER DERIVATIVES Second order dervatves appear n dffusve

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map

Cocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map Contemporary Mathematcs Cocyclc Butson Hadamard matrces and Codes over Z n va the Trace Map N. Pnnawala and A. Rao Abstract. Over the past couple of years trace maps over Galos felds and Galos rngs have

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Malaya J. Mat. 2(1)(2014) 49 60

Malaya J. Mat. 2(1)(2014) 49 60 Malaya J. Mat. 2(1)(2014) 49 60 Functonal equaton orgnatng from sum of hgher owers of arthmetc rogresson usng dfference oerator s stable n Banach sace: drect and fxed ont methods M. Arunumar a, and G.

More information

Valuated Binary Tree: A New Approach in Study of Integers

Valuated Binary Tree: A New Approach in Study of Integers Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach

More information

Deriving the X-Z Identity from Auxiliary Space Method

Deriving the X-Z Identity from Auxiliary Space Method Dervng the X-Z Identty from Auxlary Space Method Long Chen Department of Mathematcs, Unversty of Calforna at Irvne, Irvne, CA 92697 chenlong@math.uc.edu 1 Iteratve Methods In ths paper we dscuss teratve

More information

Taylor series coefficients of the HP-polynomial as an invariant for links in the solid torus

Taylor series coefficients of the HP-polynomial as an invariant for links in the solid torus Al. Math. Inf. c. 7, No. 1, 23-28 (213) 23 Aled Mathematcs & Informaton cences An Internatonal Journal c 213 NP Natural cences Publshng Cor. aylor seres coeffcents of the HP-olynomal as an nvarant for

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Journal of Pure and Applied Algebra

Journal of Pure and Applied Algebra Journal of Pure and Aled Algebra 23 (2009) 20 207 Contents lsts avalable at ScenceDrect Journal of Pure and Aled Algebra journal homeage: wwwelsevercom/locate/jaa K 2 of fnte abelan grou algebras Yubn

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

On Graphs with Same Distance Distribution

On Graphs with Same Distance Distribution Appled Mathematcs, 07, 8, 799-807 http://wwwscrporg/journal/am ISSN Onlne: 5-7393 ISSN Prnt: 5-7385 On Graphs wth Same Dstance Dstrbuton Xulang Qu, Xaofeng Guo,3 Chengy Unversty College, Jme Unversty,

More information

Binomial transforms of the modified k-fibonacci-like sequence

Binomial transforms of the modified k-fibonacci-like sequence Internatonal Journal of Mathematcs and Computer Scence, 14(2019, no. 1, 47 59 M CS Bnomal transforms of the modfed k-fbonacc-lke sequence Youngwoo Kwon Department of mathematcs Korea Unversty Seoul, Republc

More information

Supplementary Material for Spectral Clustering based on the graph p-laplacian

Supplementary Material for Spectral Clustering based on the graph p-laplacian Sulementary Materal for Sectral Clusterng based on the grah -Lalacan Thomas Bühler and Matthas Hen Saarland Unversty, Saarbrücken, Germany {tb,hen}@csun-sbde May 009 Corrected verson, June 00 Abstract

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Exerments-I MODULE III LECTURE - 2 EXPERIMENTAL DESIGN MODELS Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 2 We consder the models

More information

Fuzzy approach to solve multi-objective capacitated transportation problem

Fuzzy approach to solve multi-objective capacitated transportation problem Internatonal Journal of Bonformatcs Research, ISSN: 0975 087, Volume, Issue, 00, -0-4 Fuzzy aroach to solve mult-objectve caactated transortaton roblem Lohgaonkar M. H. and Bajaj V. H.* * Deartment of

More information

SOME NOISELESS CODING THEOREM CONNECTED WITH HAVRDA AND CHARVAT AND TSALLIS S ENTROPY. 1. Introduction

SOME NOISELESS CODING THEOREM CONNECTED WITH HAVRDA AND CHARVAT AND TSALLIS S ENTROPY. 1. Introduction Kragujevac Journal of Mathematcs Volume 35 Number (20, Pages 7 SOME NOISELESS COING THEOREM CONNECTE WITH HAVRA AN CHARVAT AN TSALLIS S ENTROPY SATISH KUMAR AN RAJESH KUMAR 2 Abstract A new measure L,

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

General viscosity iterative method for a sequence of quasi-nonexpansive mappings

General viscosity iterative method for a sequence of quasi-nonexpansive mappings Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,

More information

Differential Polynomials

Differential Polynomials JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Ballot Paths Avoiding Depth Zero Patterns

Ballot Paths Avoiding Depth Zero Patterns Ballot Paths Avodng Depth Zero Patterns Henrch Nederhausen and Shaun Sullvan Florda Atlantc Unversty, Boca Raton, Florda nederha@fauedu, ssull21@fauedu 1 Introducton In a paper by Sapounaks, Tasoulas,

More information

Lecture 9: Converse of Shannon s Capacity Theorem

Lecture 9: Converse of Shannon s Capacity Theorem Error Correctng Codes: Combnatorcs, Algorthms and Alcatons (Fall 2007) Lecture 9: Converse of Shannon s Caacty Theorem Setember 17, 2007 Lecturer: Atr Rudra Scrbe: Thanh-Nhan Nguyen & Atr Rudra In the

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

Root Structure of a Special Generalized Kac- Moody Algebra

Root Structure of a Special Generalized Kac- Moody Algebra Mathematcal Computaton September 04, Volume, Issue, PP8-88 Root Structu of a Specal Generalzed Kac- Moody Algebra Xnfang Song, #, Xaox Wang Bass Department, Bejng Informaton Technology College, Bejng,

More information

Christian Aebi Collège Calvin, Geneva, Switzerland

Christian Aebi Collège Calvin, Geneva, Switzerland #A7 INTEGERS 12 (2012) A PROPERTY OF TWIN PRIMES Chrstan Aeb Collège Calvn, Geneva, Swtzerland chrstan.aeb@edu.ge.ch Grant Carns Department of Mathematcs, La Trobe Unversty, Melbourne, Australa G.Carns@latrobe.edu.au

More information

Research Article Relative Smooth Topological Spaces

Research Article Relative Smooth Topological Spaces Advances n Fuzzy Systems Volume 2009, Artcle ID 172917, 5 pages do:10.1155/2009/172917 Research Artcle Relatve Smooth Topologcal Spaces B. Ghazanfar Department of Mathematcs, Faculty of Scence, Lorestan

More information

Self-complementing permutations of k-uniform hypergraphs

Self-complementing permutations of k-uniform hypergraphs Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty

More information

P.P. PROPERTIES OF GROUP RINGS. Libo Zan and Jianlong Chen

P.P. PROPERTIES OF GROUP RINGS. Libo Zan and Jianlong Chen Internatonal Electronc Journal of Algebra Volume 3 2008 7-24 P.P. PROPERTIES OF GROUP RINGS Lbo Zan and Janlong Chen Receved: May 2007; Revsed: 24 October 2007 Communcated by John Clark Abstract. A rng

More information

(2mn, m 2 n 2, m 2 + n 2 )

(2mn, m 2 n 2, m 2 + n 2 ) MATH 16T Homewk Solutons 1. Recall that a natural number n N s a perfect square f n = m f some m N. a) Let n = p α even f = 1,,..., k. be the prme factzaton of some n. Prove that n s a perfect square f

More information

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma

More information

The binomial transforms of the generalized (s, t )-Jacobsthal matrix sequence

The binomial transforms of the generalized (s, t )-Jacobsthal matrix sequence Int. J. Adv. Appl. Math. and Mech. 6(3 (2019 14 20 (ISSN: 2347-2529 Journal homepage: www.jaamm.com IJAAMM Internatonal Journal of Advances n Appled Mathematcs and Mechancs The bnomal transforms of the

More information

Erdős-Burgess constant of the multiplicative semigroup of the quotient ring off q [x]

Erdős-Burgess constant of the multiplicative semigroup of the quotient ring off q [x] Erdős-Burgess constant of the multplcatve semgroup of the quotent rng off q [x] arxv:1805.02166v1 [math.co] 6 May 2018 Jun Hao a Haol Wang b Lzhen Zhang a a Department of Mathematcs, Tanjn Polytechnc Unversty,

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

PARTIAL QUOTIENTS AND DISTRIBUTION OF SEQUENCES. Department of Mathematics University of California Riverside, CA

PARTIAL QUOTIENTS AND DISTRIBUTION OF SEQUENCES. Department of Mathematics University of California Riverside, CA PARTIAL QUOTIETS AD DISTRIBUTIO OF SEQUECES 1 Me-Chu Chang Deartment of Mathematcs Unversty of Calforna Rversde, CA 92521 mcc@math.ucr.edu Abstract. In ths aer we establsh average bounds on the artal quotents

More information

J. Number Theory 130(2010), no. 4, SOME CURIOUS CONGRUENCES MODULO PRIMES

J. Number Theory 130(2010), no. 4, SOME CURIOUS CONGRUENCES MODULO PRIMES J. Number Theory 30(200, no. 4, 930 935. SOME CURIOUS CONGRUENCES MODULO PRIMES L-Lu Zhao and Zh-We Sun Department of Mathematcs, Nanjng Unversty Nanjng 20093, People s Republc of Chna zhaollu@gmal.com,

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Solutions for Tutorial 1

Solutions for Tutorial 1 Toc 1: Sem-drect roducts Solutons for Tutoral 1 1. Show that the tetrahedral grou s somorhc to the sem-drect roduct of the Klen four grou and a cyclc grou of order three: T = K 4 (Z/3Z). 2. Show further

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

A Note on \Modules, Comodules, and Cotensor Products over Frobenius Algebras"

A Note on \Modules, Comodules, and Cotensor Products over Frobenius Algebras Chn. Ann. Math. 27B(4), 2006, 419{424 DOI: 10.1007/s11401-005-0025-z Chnese Annals of Mathematcs, Seres B c The Edtoral Oce of CAM and Sprnger-Verlag Berln Hedelberg 2006 A Note on \Modules, Comodules,

More information

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function

A Local Variational Problem of Second Order for a Class of Optimal Control Problems with Nonsmooth Objective Function A Local Varatonal Problem of Second Order for a Class of Optmal Control Problems wth Nonsmooth Objectve Functon Alexander P. Afanasev Insttute for Informaton Transmsson Problems, Russan Academy of Scences,

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

n-strongly Ding Projective, Injective and Flat Modules

n-strongly Ding Projective, Injective and Flat Modules Internatonal Mathematcal Forum, Vol. 7, 2012, no. 42, 2093-2098 n-strongly Dng Projectve, Injectve and Flat Modules Janmn Xng College o Mathematc and Physcs Qngdao Unversty o Scence and Technology Qngdao

More information

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997

More information

Research Journal of Pure Algebra -2(12), 2012, Page: Available online through ISSN

Research Journal of Pure Algebra -2(12), 2012, Page: Available online through  ISSN Research Journal of Pure Algebra (, 0, Page: 37038 Avalable onlne through www.rja.nfo ISSN 48 9037 A NEW GENERALISATION OF SAMSOLAI S MULTIVARIATE ADDITIVE EXPONENTIAL DISTRIBUTION* Dr. G. S. Davd Sam

More information

The Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices

The Degrees of Nilpotency of Nilpotent Derivations on the Ring of Matrices Internatonal Mathematcal Forum, Vol. 6, 2011, no. 15, 713-721 The Degrees of Nlpotency of Nlpotent Dervatons on the Rng of Matrces Homera Pajoohesh Department of of Mathematcs Medgar Evers College of CUNY

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Restricted divisor sums

Restricted divisor sums ACTA ARITHMETICA 02 2002) Restrcted dvsor sums by Kevn A Broughan Hamlton) Introducton There s a body of work n the lterature on varous restrcted sums of the number of dvsors of an nteger functon ncludng

More information

On quasiperfect numbers

On quasiperfect numbers Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

Math 217 Fall 2013 Homework 2 Solutions

Math 217 Fall 2013 Homework 2 Solutions Math 17 Fall 013 Homework Solutons Due Thursday Sept. 6, 013 5pm Ths homework conssts of 6 problems of 5 ponts each. The total s 30. You need to fully justfy your answer prove that your functon ndeed has

More information

SUCCESSIVE MINIMA AND LATTICE POINTS (AFTER HENK, GILLET AND SOULÉ) M(B) := # ( B Z N)

SUCCESSIVE MINIMA AND LATTICE POINTS (AFTER HENK, GILLET AND SOULÉ) M(B) := # ( B Z N) SUCCESSIVE MINIMA AND LATTICE POINTS (AFTER HENK, GILLET AND SOULÉ) S.BOUCKSOM Abstract. The goal of ths note s to present a remarably smple proof, due to Hen, of a result prevously obtaned by Gllet-Soulé,

More information

Combined Wronskian solutions to the 2D Toda molecule equation

Combined Wronskian solutions to the 2D Toda molecule equation Combned Wronskan solutons to the 2D Toda molecule equaton Wen-Xu Ma Department of Mathematcs and Statstcs, Unversty of South Florda, Tampa, FL 33620-5700, USA Abstract By combnng two peces of b-drectonal

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

Beyond Zudilin s Conjectured q-analog of Schmidt s problem

Beyond Zudilin s Conjectured q-analog of Schmidt s problem Beyond Zudln s Conectured q-analog of Schmdt s problem Thotsaporn Ae Thanatpanonda thotsaporn@gmalcom Mathematcs Subect Classfcaton: 11B65 33B99 Abstract Usng the methodology of (rgorous expermental mathematcs

More information

An improved lower-bound on the counterfeit coins problem

An improved lower-bound on the counterfeit coins problem An mproved lower-bound on the counterfet cons problem L An-Png Bejng 100085, P.R. Chna apl0001@sna.com Hagen von Etzen hagen@von-etzen.de Abstract In ths paper, we wll gve an mprovement on the lower bound

More information

Case Study of Markov Chains Ray-Knight Compactification

Case Study of Markov Chains Ray-Knight Compactification Internatonal Journal of Contemporary Mathematcal Scences Vol. 9, 24, no. 6, 753-76 HIKAI Ltd, www.m-har.com http://dx.do.org/.2988/cms.24.46 Case Study of Marov Chans ay-knght Compactfcaton HaXa Du and

More information

The Pseudoblocks of Endomorphism Algebras

The Pseudoblocks of Endomorphism Algebras Internatonal Mathematcal Forum, 4, 009, no. 48, 363-368 The Pseudoblocks of Endomorphsm Algebras Ahmed A. Khammash Department of Mathematcal Scences, Umm Al-Qura Unversty P.O.Box 796, Makkah, Saud Araba

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

arxiv: v1 [math.co] 12 Sep 2014

arxiv: v1 [math.co] 12 Sep 2014 arxv:1409.3707v1 [math.co] 12 Sep 2014 On the bnomal sums of Horadam sequence Nazmye Ylmaz and Necat Taskara Department of Mathematcs, Scence Faculty, Selcuk Unversty, 42075, Campus, Konya, Turkey March

More information

Counting Solutions to Discrete Non-Algebraic Equations Modulo Prime Powers

Counting Solutions to Discrete Non-Algebraic Equations Modulo Prime Powers Rose-Hulman Insttute of Technology Rose-Hulman Scholar Mathematcal Scences Techncal Reorts (MSTR) Mathematcs 5-20-2016 Countng Solutons to Dscrete Non-Algebrac Equatons Modulo Prme Powers Abgal Mann Rose-Hulman

More information

Algebraic properties of polynomial iterates

Algebraic properties of polynomial iterates Algebrac propertes of polynomal terates Alna Ostafe Department of Computng Macquare Unversty 1 Motvaton 1. Better and cryptographcally stronger pseudorandom number generators (PRNG) as lnear constructons

More information

Solutions Homework 4 March 5, 2018

Solutions Homework 4 March 5, 2018 1 Solutons Homework 4 March 5, 018 Soluton to Exercse 5.1.8: Let a IR be a translaton and c > 0 be a re-scalng. ˆb1 (cx + a) cx n + a (cx 1 + a) c x n x 1 cˆb 1 (x), whch shows ˆb 1 s locaton nvarant and

More information

Uniqueness of Weak Solutions to the 3D Ginzburg- Landau Model for Superconductivity

Uniqueness of Weak Solutions to the 3D Ginzburg- Landau Model for Superconductivity Int. Journal of Math. Analyss, Vol. 6, 212, no. 22, 195-114 Unqueness of Weak Solutons to the 3D Gnzburg- Landau Model for Superconductvty Jshan Fan Department of Appled Mathematcs Nanjng Forestry Unversty

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

ALGEBRA HW 7 CLAY SHONKWILER

ALGEBRA HW 7 CLAY SHONKWILER ALGEBRA HW 7 CLAY SHONKWILER 1 Whch of the followng rngs R are dscrete valuaton rngs? For those that are, fnd the fracton feld K = frac R, the resdue feld k = R/m (where m) s the maxmal deal), and a unformzer

More information

A Capacity-Achieving T -PIR Scheme Based On MDS Array Codes

A Capacity-Achieving T -PIR Scheme Based On MDS Array Codes A Capacty-Achevng T -PIR Scheme Based On MDS Array Codes Jnge Xu, Yaqan Zhang, Zhfang Zhang KLMM, Academy of Mathematcs and Systems Scence, Chnese Academy of Scences, Bejng 100190, Chna School of Mathematcal

More information

Managing Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration

Managing Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration Managng Caacty Through eward Programs on-lne comanon age Byung-Do Km Seoul Natonal Unversty College of Busness Admnstraton Mengze Sh Unversty of Toronto otman School of Management Toronto ON M5S E6 Canada

More information

Non-Ideality Through Fugacity and Activity

Non-Ideality Through Fugacity and Activity Non-Idealty Through Fugacty and Actvty S. Patel Deartment of Chemstry and Bochemstry, Unversty of Delaware, Newark, Delaware 19716, USA Corresondng author. E-mal: saatel@udel.edu 1 I. FUGACITY In ths dscusson,

More information

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo

More information

Y. Guo. A. Liu, T. Liu, Q. Ma UDC

Y. Guo. A. Liu, T. Liu, Q. Ma UDC UDC 517. 9 OSCILLATION OF A CLASS OF NONLINEAR PARTIAL DIFFERENCE EQUATIONS WITH CONTINUOUS VARIABLES* ОСЦИЛЯЦIЯ КЛАСУ НЕЛIНIЙНИХ ЧАСТКОВО РIЗНИЦЕВИХ РIВНЯНЬ З НЕПЕРЕРВНИМИ ЗМIННИМИ Y. Guo Graduate School

More information