1,538 results
Search Results
2. New Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes From Their Zeros.
- Author
-
Qiu, Jing, Zheng, Dabin, and Fu, Fang-Wei
- Subjects
CYCLIC codes ,REED-Solomon codes ,PAPER arts ,GENERALIZATION - Abstract
An $(r, \delta)$ -locally repairable code ($(r, \delta)$ -LRC for short) was introduced by Prakash et al. for tolerating multiple failed nodes in distributed storage systems, which was a generalization of the concept of $r$ -LRCs produced by Gopalan et al.. An $(r, \delta)$ -LRC is said to be optimal if it achieves the Singleton-like bound. Recently, Chen et al. generalized the construction of cyclic $r$ -LRCs proposed by Tamo et al. , and constructed several classes of optimal $(r, \delta)$ -LRCs of length $n$ for $n\, |\, (q-1)$ or $n\,|\, (q+1)$ , respectively in terms of a union of the set of zeros controlling the minimum distance and the set of zeros ensuring the locality. Following the work of , , this paper first characterizes $(r, \delta)$ -locality of a cyclic code via its zeros. Then we construct several classes of optimal cyclic $(r, \delta)$ -LRCs of length $n$ for $n\, |\, (q-1)$ or $n\,|\, (q+1)$ , respectively from the product of two sets of zeros. Our constructions include all optimal cyclic $(r,\delta)$ -LRCs proposed in , , and our method seems more convenient to obtain optimal cyclic $(r, \delta)$ -LRCs with flexible parameters. Moreover, many optimal cyclic $(r,\delta)$ -LRCs of length $n$ for $n\, |\, (q-1)$ or $n\,|\, (q+1)$ , respectively with $(r+\delta -1)\nmid n$ can be obtained from our method. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. How to Revise and Resubmit a Journal Paper.
- Author
-
Wunsch, Donald
- Abstract
So, you've submitted your paper to your ideal target journal, waited the requisite period, and one day, your inbox contains an e-mail from the publication's editor-in-chief. It's not the hoped for acceptance, but a "Revise and Resubmit." (One of my favorite journals has switched to the more-discouraging, "Reject and Resubmit," but this is actually the same thing.) [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
4. Computation Alignment: Capacity Approximation Without Noise Accumulation.
- Author
-
Niesen, Urs, Nazer, Bobak, and Whiting, Phil
- Subjects
- *
WIRELESS communications , *PAPER arts , *MATHEMATICS , *STATISTICS , *NOISE - Abstract
Consider several source nodes communicating across a wireless network to a destination node with the help of several layers of relay nodes. Recent work by Avestimehr has approximated the capacity of this network up to an additive gap. The communication scheme achieving this capacity approximation is based on compress-and-forward, resulting in noise accumulation as the messages traverse the network. As a consequence, the approximation gap increases linearly with the network depth. This paper develops a computation alignment strategy that can approach the capacity of a class of layered, time-varying wireless relay networks up to an approximation gap that is independent of the network depth. This strategy is based on the compute-and-forward framework, which enables relays to decode deterministic functions of the transmitted messages. Alone, compute-and-forward is insufficient to approach the capacity as it incurs a penalty for approximating the wireless channel with complex-valued coefficients by a channel with integer coefficients. Here, this penalty is circumvented by carefully matching channel realizations across time slots to create integer-valued effective channels that are well suited to compute-and-forward. Unlike prior constant gap results, the approximation gap obtained in this paper also depends closely on the fading statistics, which are assumed to be i.i.d. Rayleigh. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
5. On the Multiple-Access Channel With Common Rate-Limited Feedback.
- Author
-
Shaviv, Dor and Steinberg, Yossef
- Subjects
- *
ENCODING , *PAPER arts , *MATHEMATICS , *MARKOV processes , *GAUSSIAN channels - Abstract
This paper studies the multiple-access channel (MAC) with rate-limited feedback. The channel output is encoded into one stream of bits, which is provided causally to the two users at the channel input. An achievable rate region for this setup is derived, based on superposition of information, block Markov coding, and coding with various degrees of side information for the feedback link. The suggested region coincides with the Cover–Leung inner bound for large feedback rates. The result is then extended for cases where there is only a feedback link to one of the transmitters, and for a more general case where there are two separate feedback links to both transmitters. We compute achievable regions for the Gaussian MAC and for the binary erasure MAC. The Gaussian region is computed for the case of common rate-limited feedback, whereas the region for the binary erasure MAC is computed for one-sided feedback. It is known that for the latter, the Cover–Leung region is tight, and we obtain results that coincide with the feedback capacity region for high feedback rates. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
6. On the Combinatorics of Locally Repairable Codes via Matroid Theory.
- Author
-
Westerback, Thomas, Freij-Hollanti, Ragnar, Ernvall, Toni, and Hollanti, Camilla
- Subjects
COMBINATORICS ,COMBINATORIAL probabilities ,COMBINATORIAL group theory ,MATROIDS ,LINEAR dependence (Mathematics) - Abstract
This paper provides a link between matroid theory and locally repairable codes (LRCs) that are either linear or more generally almost affine. Using this link, new results on both LRCs and matroid theory are derived. The parameters $(n,k,d,r,\delta )$ of LRCs are generalized to matroids, and the matroid analog of the generalized singleton bound by Gopalan et al. for linear LRCs is given for matroids. It is shown that the given bound is not tight for certain classes of parameters, implying a nonexistence result for the corresponding locally repairable almost affine codes that are coined perfect in this paper. Constructions of classes of matroids with a large span of the parameters $(n,k,d,r,\delta )$ and the corresponding local repair sets are given. Using these matroid constructions, new LRCs are constructed with prescribed parameters. The existence results on linear LRCs and the nonexistence results on almost affine LRCs given in this paper strengthen the nonexistence and existence results on perfect linear LRCs given by Song et al. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
7. Sugeno Integrals, Hα, and Hβ Indices: How to Compare Scientists From Different Academic Areas.
- Author
-
Jin, LeSheng, Mesiar, Radko, and Stupnanova, Andrea
- Subjects
SCIENTISTS ,INTEGRALS ,SCHOLARS ,DATABASES ,BIBLIOMETRICS - Abstract
The usage of the standard h-index to compare scientists from different research fields is often misleading. To avoid this possible failure, based on the Sugeno integrals, three new modified indices H
α , Hβ , and Hα β are proposed, thus, allowing to compensate the lower number of citations or of papers characteristic for a considered field. Our approach has a transparent geometric interpretation, and thus, it offers good candidates to replace the standard h-index H in considered databases, such as Web of Science (WOS), Scopus, or Google Scholar. [ABSTRACT FROM AUTHOR]- Published
- 2020
- Full Text
- View/download PDF
8. Infection-Probability-Dependent Interlayer Interaction Propagation Processes in Multiplex Networks.
- Author
-
Liu, Juan, Wu, Xiaoqun, Lu, Jinhu, and Wei, Xiang
- Subjects
MULTIPLEXING ,SOCIAL networks - Abstract
Different spreading processes in multiplex networks may interact with each other and display intertwined effects. In this paper, we propose a theoretical framework called infection-probability-dependent interlayer interaction propagation processes in multiplex networks with an arbitrary number of layers, to more precisely depict the intertwined effects which bring challenges to the existing state-dependent interlayer interaction models. Specifically, the spreading rate of each node is regulated by the proposed spreading rate function (SRF) which depends on both the intrinsic dynamics in its layer and the infection probabilities of its counterparts. We propose an algorithm to obtain the spreading threshold of each layer of the proposed theoretical framework. We analyze the three-layer tuberculosis-awareness-flu model with the SRF of each node being the expectation of infection-probability-dependent spreading rate. This paper gives a thorough and detailed numerical investigation of the impact and interaction of system settings and the spreading threshold of each layer. We find that for tuberculosis spreading which is in competing relation with awareness and cooperation relation with flu, the epidemic threshold is a constant when other layers’ intrinsic spreading rates are small. The cooperation layer has dramatic influence on the constant while the competing layer has no effect on it. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. A Factor-Graph Approach to Algebraic Topology, With Applications to Kramers–Wannier Duality.
- Author
-
Al-Bashabsheh, Ali and Vontobel, Pascal O.
- Subjects
TOPOLOGY ,MATHEMATICS ,MATHEMATICAL analysis ,GRAPH theory ,COMPUTER science ,COMPUTER engineering - Abstract
Algebraic topology studies topological spaces with the help of tools from abstract algebra. The main focus of this paper is to show that many concepts from algebraic topology can be conveniently expressed in terms of (normal) factor graphs. As an application, we give an alternative proof of a classical duality result of Kramers and Wannier, which expresses the partition function of the 2-D Ising model at a low temperature in terms of the partition function of the 2-D Ising model at a high temperature. Moreover, we discuss analogous results for the 3-D Ising model and the Potts model. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
10. Capacity Characterization for State-Dependent Gaussian Channel With a Helper.
- Author
-
Sun, Yunhao, Duan, Ruchen, Liang, Yingbin, Khisti, Ashish, and Shamai Shitz, Shlomo
- Subjects
GAUSSIAN channels ,TRANSMITTERS (Communication) ,ARBITRARY constants ,MATHEMATICAL constants ,MATHEMATICS - Abstract
The state-dependent point-to-point Gaussian channel with a helper is first studied, in which a transmitter communicates with a receiver via a state-corrupted channel. The state is not known to the transmitter nor to the receiver, but known to a helper noncausally, which then wishes to assist the receiver to cancel the state. Differently from the previous work that characterized the capacity only in the infinite state power regime, this paper explores the general case with arbitrary state power. A lower bound on the capacity is derived based on an achievable scheme that integrates direct state subtraction and single-bin dirty paper coding. By analyzing this lower bound and further comparing it with the existing upper bounds, the capacity of the channel is characterized for a wide range of channel parameters. Such an idea of characterizing the capacity is further extended to study the two-user state-dependent multiple access channel with a helper. By comparing the derived inner and outer bounds, the channel parameters are partitioned into appropriate cases, and for each case, either segments on the capacity region boundary or the full capacity region are characterized. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
11. H-Index and Other Sugeno Integrals: Some Defects and Their Compensation.
- Author
-
Mesiar, Radko and Gagolewski, Marek
- Subjects
H-index (Citation analysis) ,INTEGRALS ,FUZZY systems - Abstract
The famous Hirsch index has been introduced just ca. ten years ago. Despite that, it is already widely used in many decision-making tasks, like in evaluation of individual scientists, research grant allocation, or even production planning. It is known that the $h$-index is related to the discrete Sugeno integral and the Ky Fan metric introduced in the 1940s. The aim of this paper is to propose a few modifications of this index as well as other fuzzy integrals—also on bounded chains—that lead to better discrimination of some types of data that are to be aggregated. All of the suggested compensation methods try to retain the simplicity of the original measure. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
12. Gradient Scan Gibbs Sampler: An Efficient Algorithm for High-Dimensional Gaussian Distributions.
- Author
-
Feron, Olivier, Orieux, Franois, and Giovannelli, Jean-Francois
- Abstract
This paper deals with Gibbs samplers that include high dimensional conditional Gaussian distributions. It proposes an efficient algorithm that avoids the high dimensional Gaussian sampling and relies on a random excursion along a small set of directions. The algorithm is proved to converge, i.e., the drawn samples are asymptotically distributed according to the target distribution. Our main motivation is in inverse problems related to general linear observation models and their solution in a hierarchical Bayesian framework implemented through sampling algorithms. It finds direct applications in semi-blind/unsupervised methods as well as in some non-Gaussian methods. The paper provides an illustration focused on the unsupervised estimation for super-resolution methods. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
13. Column Distances of Convolutional Codes Over ${\mathbb Z}_{p^r}$.
- Author
-
Napp, Diego, Pinto, Raquel, and Toste, Marisa
- Subjects
ERROR-correcting codes ,COLUMN foundations ,GEOMETRIC vertices ,SINGLETON bounds ,CYCLIC codes - Abstract
Maximum distance profile codes over finite non-binary fields have been introduced and thoroughly studied in the last decade. These codes have the property that their column distances are maximal among all codes of the same rate and degree. In this paper, we aim at studying this fundamental concept in the context of convolutional codes over a finite ring. We extensively use the concept of $p$ -encoder to establish the theoretical framework and derive several bounds on the column distances. In particular, a method for constructing (not necessarily free) maximum distance profile convolutional codes over ${\mathbb Z}_{p^{r}}$ is presented. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. Binary LCD Codes and Self-Orthogonal Codes From a Generic Construction.
- Author
-
Zhou, Zhengchun, Li, Xia, Tang, Chunming, and Ding, Cunsheng
- Subjects
LINEAR codes ,INJECTIONS ,POLYNOMIALS ,BINARY codes ,GENERIC drugs - Abstract
Linear codes with certain special properties have received renewed attention in recent years due to their practical applications. Among them, binary linear complementary dual (LCD) codes play an important role in implementations against side-channel attacks and fault injection attacks. Self-orthogonal codes can be used to construct quantum codes. In this paper, four classes of binary linear codes are constructed via a generic construction which has been intensively investigated in the past decade. Simple characterizations of these linear codes to be LCD or self-orthogonal are presented. Resultantly, infinite families of binary LCD codes and self-orthogonal codes are obtained. Infinite families of binary LCD codes from the duals of these four classes of linear codes are produced. Many LCD codes and self-orthogonal codes obtained in this paper are optimal or almost optimal in the sense that they meet certain bounds on general linear codes. In addition, the weight distributions of two sub-families of the proposed linear codes are established in terms of Krawtchouk polynomials. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
15. Infinite Families of Linear Codes Supporting More t -Designs.
- Author
-
Yan, Qianqian and Zhou, Junling
- Subjects
AUTOMORPHISM groups ,CYBERNETICS ,AUTOMORPHISMS ,LINEAR codes - Abstract
Tang and Ding [IEEE IT 67 (2021) 244-254] studied the class of BCH codes $\mathcal {C}_{(q,q+1,4,1)}$ and their dual codes with $q=2^{m}$ and established that the codewords of the minimum (or the second minimum) weight in these codes support 4-designs or 3-designs. Motivated by this, we further investigate the codewords of the next adjacent weight in such codes and discover more infinite classes of $t$ -designs with $t=3,4$. In particular, we prove that codewords of weight 7 in $\mathcal {C}_{(q,q+1,4,1)}$ support 4-designs for odd $m \geqslant 5$ and they support 3-designs for even $m \geqslant 4$ , which provide infinite classes of simple $t$ -designs with new parameters. Another significant class of $t$ -designs we produce in this paper has complementary designs with parameters 4- $(2^{2s+1}+ 1,5,5)$ ; these designs have the smallest index among all the known simple 4- $(q+1,5,\lambda)$ designs derived from codes for prime powers $q$ ; and they are further proved to be isomorphic to the 4-designs admitting the projective general linear group PGL $(2,2^{2s+1})$ as the automorphism group constructed by Alltop in 1969. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. An Ergodic Theory of Binary Operations—Part I: Key Properties.
- Author
-
Nasser, Rajai
- Subjects
ERGODIC theory ,BINARY operations ,MATHEMATICS ,CONTINUOUS groups ,INVARIANT measures - Abstract
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (first) part of this paper introduces the mathematical framework that we will use in the second part to characterize the polarizing operations. We define uniformity preserving, irreducible, ergodic, and strongly ergodic operations, and we study their properties. The concepts of a stable partition and the residue of a stable partition are introduced. We show that an ergodic operation is strongly ergodic if and only if all its stable partitions are their own residues. We also study the products of binary operations and the structure of their stable partitions. We show that the product of a sequence of binary operations is strongly ergodic if and only if all the operations in the sequence are strongly ergodic. In the second part of this paper, we provide a foundation of polarization theory based on the ergodic theory of binary operations that we develop in this part. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
17. Comments on Cut-Set Bounds on Network Function Computation.
- Author
-
Huang, Cupjin, Tan, Zihan, Yang, Shenghao, and Guang, Xuan
- Subjects
LINEAR network coding ,COMPUTER systems ,INFORMATION theory ,TOPOLOGY ,MATHEMATICS - Abstract
A function computation problem over a directed acyclic network has been considered in the literature, where a sink node is required to compute a target function correctly with the inputs arbitrarily generated at multiple source nodes. The network links are error free but capacity limited, and the intermediate nodes perform network coding. The computing rate of a network code is the average number of times that the target function is computed for one use of the network, i.e., each link in the network is used at most once. In the existing papers, two cut-set bounds were proposed on the computing rate. However, we in this paper show that these bounds are not valid for general network function computation problems. We analyze the reason of the invalidity and propose a general cut-set bound by using a new equivalence relation associated with the inputs of the target function. Moreover, some results in the existing papers were proved by applying the invalid upper bound. We also justify the validity of these results. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
18. Shortened Linear Codes From APN and PN Functions.
- Author
-
Xiang, Can, Tang, Chunming, and Ding, Cunsheng
- Subjects
LINEAR codes ,BINARY codes ,CODING theory ,REED-Muller codes ,GENERATING functions ,NONLINEAR functions - Abstract
Linear codes generated by component functions of perfect nonlinear (PN for short) and almost perfect nonlinear (APN for short) functions and the first-order Reed-Muller codes have been an object of intensive study in coding theory. The objective of this paper is to investigate some binary shortened codes of two families of linear codes from APN functions and some $p$ -ary shortened codes associated with PN functions. The weight distributions of these shortened codes and the parameters of their duals are determined. The parameters of these binary codes and $p$ -ary codes are flexible. Many of the codes presented in this paper are optimal or almost optimal. The results of this paper show that the shortening technique is very promising for constructing good codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Stochastic Texture Analysis for Measuring Sheet Formation Variability in the Industry.
- Author
-
Scharcanski, Jacob
- Subjects
MANUFACTURING processes ,QUALITY control ,IMAGE processing ,STOCHASTIC analysis ,VISUAL perception ,WAVELETS (Mathematics) ,MATHEMATICS - Abstract
Several continuous manufacturing processes use stochastic texture images for quality control and monitoring. Large amounts of pictorial data are acquired, providing important information about both the materials produced and the manufacturing processes involved. However, it is often difficult to measure objectively the similarity among such industrial stochastic images or to discriminate between the texture images of stochastic materials with distinct properties. Nowadays, the degree of discrimination required by industrial processes often goes beyond the limits of human visual perception. This paper proposes a new approach for multiresolution stochastic texture discrimination in the industry (e.g., nonwoven textiles and paper), which is focused on sheet formation properties. The wavelet transform is used to represent stochastic texture images in multiple resolutions and to describe them using local density variability as features. At each resolution, the wavelet subbands approximate image gradients. The image gradients are modeled as Gaussian colored noise, and the gradient magnitudes, as Rayleigh probability density functions. Based on this representation, a multiresolution distance measure for stochastic textures is proposed. Some experimental results are reported, and ideas for future work are presented with the conclusions. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
20. The q -Ary Antiprimitive BCH Codes.
- Author
-
Zhu, Hongwei, Shi, Minjia, Wang, Xiaoqiang, and Helleseth, Tor
- Subjects
CYCLIC codes ,LINEAR codes ,DECODING algorithms ,LIQUID crystal displays - Abstract
It is well-known that cyclic codes have efficient encoding and decoding algorithms. In recent years, antiprimitive BCH codes have attracted a lot of attention. The objective of this paper is to study BCH codes of this type over finite fields and analyse their parameters. Some lower bounds on the minimum distance of antiprimitive BCH codes are given. The BCH codes presented in this paper have good parameters in general, containing many optimal linear codes. In particular, two open problems about the minimum distance of BCH codes of this type are partially solved in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
21. Comments on "A Noncoherent Tracking Loop With Diversity and Multipath Interference Cancellation for Direct-Sequence Spread-Spectrum Systems".
- Author
-
Jia-Chin Lin
- Subjects
RADIO transmitter fading ,MATHEMATICS ,SCIENCE ,MATHEMATICAL programming ,TELECOMMUNICATION ,TELECOMMUNICATION systems - Abstract
This article comments on a research paper "A Noncoherent Tracking Loop With Diversity and Multipath Interference Cancellationfor Direct-Sequence Spread-Spectrum Systems." Researchers presented a noncoherent tracking loop with diversity and multipath interference cancellation to improve the loop performance on frequency-selective fading channels. Actually, such effects can change the error characteristic, at least in the mean sense, and thus make the analyses of jitter performance improper. The mathematical derivation of the research has been provided in the article.
- Published
- 2004
- Full Text
- View/download PDF
22. Narrow-Sense BCH Codes Over \mathrm GF(q) With Length n=\frac q^m-1q-1.
- Author
-
Li, Shuxing, Ding, Cunsheng, Xiong, Maosheng, and Ge, Gennian
- Subjects
CYCLIC codes ,QUADRATIC forms ,BCH codes ,DECODING algorithms ,TELECOMMUNICATION systems - Abstract
Cyclic codes are widely employed in communication systems, storage devices, and consumer electronics, as they have efficient encoding and decoding algorithms. BCH codes, as a special subclass of cyclic codes, are in most cases among the best cyclic codes. A subclass of good BCH codes are the narrow-sense BCH codes over \mathrm GF(q) with length n=(q^m-1)/(q-1) . Little is known about this class of BCH codes when $q>2$ . The objective of this paper is to study some of the codes within this class. In particular, the dimension, the minimum distance, and the weight distribution of some ternary BCH codes with length n=(3^{m}-1)/2 are determined in this paper. A class of ternary BCH codes meeting the Griesmer bound is identified. An application of some of the BCH codes in secret sharing is also investigated. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
23. Open-Loop Coherent Distributed Arrays.
- Author
-
Nanzer, Jeffrey A., Schmid, Robert L., Comberiate, Thomas M., and Hodkin, Jason E.
- Subjects
QUANTITATIVE research ,REMOTE sensing ,RANGE of measurement ,DETECTORS ,MATHEMATICS - Abstract
The ability to cohere the wireless operations between separate, moving microwave systems enables significant increases in capability for remote sensing, radar, communications, and other microwave wireless applications. Open-loop coherent distributed arrays, which are distributed systems of nodes that coherently coordinate without external signal inputs from the destination, are introduced in this paper. A model of the signal received from a coherent distributed array is derived, and a statistical analysis of the variation in signal power in the presence of coordination errors is presented. Requirements on the tolerable errors for internode range measurement, beamsteering angle measurement, and internode clock phase synchronization are given as a function of the probability of achieving a given signal power. Approaches for achieving the necessary internode range and angle measurements are presented, and the experimental results of a novel one-way clock transfer approach to phase synchronization are shown. These examples demonstrate the feasibility of implementing coherent distributed arrays on moving platforms operating at frequencies extending into the microwave region. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
24. Reduced Electromagnetic Edge Scattering Using Inhomogeneous Anisotropic Impedance Surfaces.
- Author
-
Hou, Haijian, Long, Jiang, Wang, Junhong, and Sievenpiper, Daniel F.
- Subjects
CRITICAL angle (Optics) ,MATHEMATICS ,ELECTROMAGNETIC wave scattering ,REFRACTIVE index ,ELECTRO-optical effects - Abstract
Electromagnetic scattering characteristics highly depend on the geometry and material property of the scatterers. In particular, electromagnetic wave scattering occurs at the discontinuity of the propagation path, such as the edge of a scatterer. In this paper, the edge scattering from a triangular object is largely reduced by patterning the triangular surface with inhomogeneous and anisotropic impedance surface. Because surface waves propagate toward the direction with the lower surface refractive index on an anisotropic surface, the direction of the wave propagation can be controlled by designing the distribution of the refractive index. Consequently, the proposed anisotropic impedance surfaces can make the current flows toward or away from the edge so that the edge scattering can be reduced or redirected to a different angle. For demonstration, anisotropic unit cells are analyzed and designed. Also, the anisotropic impedance surfaces are simulated, fabricated, and measured. Here we propose two types of impedance profiles, which are capable of changing the surface current direction either toward or away from the scattering edge. The experimental measurement demonstrates a 7–10 dB edge scattering reduction. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
25. An Inductive Content-Augmented Network Embedding Model for Edge Artificial Intelligence.
- Author
-
Yuan, Bo, Panneerselvam, John, Liu, Lu, Antonopoulos, Nick, and Lu, Yao
- Abstract
Real-time data processing applications demand dynamic resource provisioning and efficient service discovery, which is particularly challenging in resource-constraint edge computing environments. Network embedding techniques can potentially aid effective resource discovery services in edge environments, by achieving a proximity-preserving representation of the network resources. Most of the existing techniques of network embedding fail to capture accurate proximity information among the network nodes and further lack exploiting information beyond the second-order neighbourhood. This paper leverages artificial intelligence for network representation and proposes a deep learning model, named inductive content augmented network embedding (ICANE), which integrates the network structure and resource content attributes into a feature vector. Secondly, a hierarchical aggregation approach is introduced to explicitly learn the network representation through sampling the nodes and aggregating features from the higher-order neighbourhood. A semantic proximity search model is then designed to generate the top-k ranking of relevant nodes using the learned network representation. Experiments conducted on real-world datasets demonstrate the superiority of the proposed model over the existing popular methods in terms of resource discovery and the query resolving performance. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
26. Topological Structure, Reachability, and Stabilization of Constrained Boolean Control Networks via Event-Triggered Control.
- Author
-
Lin, Lin, Cao, Jinde, Abdel-Aty, Mahmoud, and Al-Juboori, Udai Ali
- Subjects
ESCHERICHIA coli ,SWARM intelligence ,STATE feedback (Feedback control systems) ,ALGORITHMS - Abstract
This paper is concerned with the topological structure, reachability, and stabilization for Boolean control networks (BCNs) with state constraints via event-triggered control (ETC) scheme. In the first part, the topological structure of BCNs with state constraints is studied. Under the framework of state constrain, the definitions of fixed point and cycle are first defined. A novel phenomenon is that there may exist two kinds constrained fixed points, which are, respectively, named as the livelock and deadlock ones. It is different with the traditional fixed point. Accordingly, a formula is presented to calculate the number of constrained fixed points and constrained cycles. In the second part, the constrained reachability and stabilization problem of the event-triggered controlled BCNs are investigated. Two necessary and sufficient criteria are, respectively, obtained. Furthermore, an algorithm is developed to design all feasible controllers. Finally, a reduced model of the lac operon in the Escherichia coli is shown to illustrate the efficiency of the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. Geometric Approach to b-Symbol Hamming Weights of Cyclic Codes.
- Author
-
Shi, Minjia, Ozbudak, Ferruh, and Sole, Patrick
- Subjects
CYCLIC codes ,HAMMING weight ,GEOMETRIC approach ,FINITE fields ,BINARY codes ,DECODING algorithms ,HAMMING distance ,ALGEBRAIC curves - Abstract
Symbol-pair codes were introduced by Cassuto and Blaum in 2010 to protect pair errors in symbol-pair read channels. Recently Yaakobi, Bruck and Siegel (2016) generalized this notion to b-symbol codes in order to consider consecutive b errors for a prescribed integer b ≥ 2, and they gave constructions and decoding algorithms. Cyclic codes were considered by various authors as candidates for symbol-pair codes and they established minimum distance bounds on (certain) cyclic codes. In this paper we use algebraic curves over finite fields in order to obtain tight lower and upper bounds on b-symbol Hamming weights of arbitrary cyclic codes over F
q . Here b ≥ 2 is an arbitrary prescribed positive integer and Fq is an arbitrary finite field. We also present a stability theorem for an arbitrary cyclic code C of dimension k and length n: the b-symbol Hamming weight enumerator of C is the same as the k-symbol Hamming weight enumerator of C if k ≤ b ≤ n−1. Moreover, we give improved tight lower and upper bounds on b-symbol Hamming weights of some cyclic codes related to irreducible cyclic codes. Throughout the paper the length n is coprime to q. [ABSTRACT FROM AUTHOR]- Published
- 2021
- Full Text
- View/download PDF
28. Emergency Remote Teaching in Higher Education Institutes: A Taxonomy of Challenges Faced by First-Year Mathematics Students in the Pacific Region
- Author
-
Sione Paea, Bibhya Sharma, Gabiriele Bulivou, and Christos Katsanos
- Subjects
Best merge method (BMM) ,card sorting ,category validity technique (CVT) ,COVID-19 pandemic ,emergency remote teaching (ERT) ,mathematics ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Emergency Remote Teaching (ERT) can be defined as a shift of instructional delivery to a substitute delivery approach during a crisis. Such a shift poses several challenges for students at Higher Education Institutes. This paper presents a taxonomy of such challenges faced by first-year mathematics students in the Pacific region during the ERT dictated by the COVID-19 pandemic. First, a list of 44 challenges was assembled based on a university’s in-house monitoring report, literature review and the authors’ experiences of challenges faced by students. Next, the open card sorting technique involving 32 participants was used to classify these challenges. Open card sorting is a well-established method for discovering how people understand and categorize information. This paper employed a recently proposed algorithm to quantitatively analyze open card sorting data using the Best Merge Method, Category Validity Technique and Multidimensional Scaling. Analysis of the collected card sort data produced the initial taxonomy of challenges. Finally, the participants were asked to answer a questionnaire so that we could validate and further refine the taxonomy. The proposed taxonomy includes seven challenges: i) lack of online learning support; ii) problem with online course delivery; iii) time and workload management; iv) learning management system issues; v) lack of face-to-face interaction; vi) financial hardship; vii) internet challenge. Such a taxonomy might be particularly useful in designing and evaluating an ERT approach.
- Published
- 2024
- Full Text
- View/download PDF
29. A Double-Blind Anonymous Evaluation-Based Trust Model in Cloud Computing Environments.
- Author
-
Zhang, Peiyun, Zhou, Mengchu, and Kong, Yang
- Subjects
CLOUD computing ,HELPING behavior ,TRUST ,COMPUTER systems ,DECEPTION ,FUZZY graphs ,FUZZY mathematics - Abstract
In the last ten years, cloud services provided many applications in various areas. Most of them are hosted in a heterogeneous distributed large-scale cloud computing environment and face inherent uncertainty, unreliability, and malicious attacks that trouble both service users and providers. To solve the problems of malicious attacks (including solo and collusion deception ones) in a public cloud computing environment, we for the first time propose a double-blind anonymous evaluation-based trust model. Based on it, cloud service providers and users are anonymously matched according to user requirements. It can be used to effectively handle some malicious attacks that intend to distort trust evaluations. Providers may secretly hide gain-sharing information into service results and send the results to users to ask for higher trust evaluations than their deserved ones. This paper proposes to adopt checking nodes to help detect such behavior. It then conducts gain–loss analysis for providers who intend to perform provider–user collusion deception. The proposed trust model can be used to effectively help one recognize collusion deception behavior and allow policy-makers to set suitable loss to punish malicious providers. Consequently, provider-initiated collusion deception behavior can be greatly discouraged in public cloud computing systems. Simulation results show that the proposed method outperform two updated methods, i.e., one based on fail-stop signature and another based on fuzzy mathematics in terms of malicious node detection ratio and speed. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
30. PAPR Problem for Walsh Systems and Related Problems.
- Author
-
Boche, Holger and Tampubolon, Ezra
- Subjects
SIGNAL processing ,WIRELESS communications ,ENERGY consumption ,POWER resources ,CODE division multiple access ,ARITHMETIC series - Abstract
High peak values of transmission signals in wireless communication systems lead to wasteful energy consumption and degradation of several transmission performances. We continue the theoretical contributions made by Boche and Farell toward the understanding of peak value reduction, using the strategy known as tone reservation for orthogonal transmission schemes. There it was shown that for orthogonal frequency-division multiplexing (OFDM) systems, the combinatorial object called arithmetic progression plays an important role in setting limitations for the applicability of the tone reservation method. In this paper, we show that the combinatorial object introduced as perfect Walsh sum (PWS) plays a similar role for code-division multiple access (CDMA) systems as arithmetic progression for OFDM systems. By specific construction, we show that for a chosen numbers $m$ and $n$ , all subsets $\mathcal {I} $ of the set $[N]$ of the first $N=2^{n}$ natural numbers, which has the density in $[N]$ larger than a given $\delta \in (0,1)$ , i.e., $\left |{ \mathcal {I} }\right |/N\geq \delta $ , and which is sufficiently large enough, in the sense that $\left |{ I }\right |\geq 2(2/\delta)^{2^{m}-1}$ , contains a PWS of size $2^{m}$. By means of this result, and motivated by the previously mentioned connection between arithmetic progression and PWS, we show results for the PWS which are analogous to the famous Szemerédi theorem on arithmetic progressions, Conlon-Gower’s theorem on probabilistic construction of “sparse” sets containing an arithmetic progression, and even a solution of an analogon to the Erdős’ conjecture on arithmetic progressions. Those results give in particular an insight into the asymptotic limitations of tone reservation method for the CDMA systems. Besides, we show that a subset $I$ of $[N]$ is a PWS if and only if the embedding inequality of the subspace of $L^{1}([{0,1}])$ , containing linear combinations of Walsh functions indexed by elements of $\mathcal {I} $ , holds with the minimum possible embedding constant $\sqrt { \left |{ \mathcal {I} }\right |}$. The corresponding approach based in particular by the fact that the PWSs are the only Walsh sums having unit $L^{1}$ -norm, proven in this paper. By means of that results, we show that the minimum possible threshold constant for which the tone reservation method is applicable yields $\sqrt { \left |{ \mathcal {I} }\right |}$ if and only if the information set $\mathcal {I} $ is a PWS. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
31. Characterization of a Class of Fuzzy Implication Functions Satisfying the Law of Importation With Respect to a Fixed Uninorm—Part II.
- Author
-
Massanet, Sebastia, Ruiz-Aguilera, Daniel, and Torrens, Joan
- Subjects
IMPLICIT functions ,FUZZY logic ,IMAGE processing - Abstract
The law of importation is an important property of fuzzy implication functions because of its interesting applications in approximate reasoning and image processing. In this paper, as a continuation of the paper [S. Massanet, D. Ruiz-Aguilera, and J. Torrens, “Characterization of a class of fuzzy implication functions satisfying the law of importation with respect to a fixed uninorm—Part I,” IEEE Trans. Fuzz Syst. , to be published.], the characterization of all fuzzy implication functions that satisfy the law of importation with respect to a given uninorm $U$ , and having an $\alpha$ -section that is a continuous fuzzy negation is given for the cases when the uninorm $U$ lies in one of the most used classes of uninorms. As the case when the uninorm $U$ is in ${\mathcal U}_{\min }$ was already solved in [S. Massanet, D. Ruiz-Aguilera, and J. Torrens, “Characterization of a class of fuzzy implication functions satisfying the law of importation with respect to a fixed uninorm—Part I,” IEEE Trans. Fuzz Syst., to be published.], this paper focuses in the cases when $U$ is an idempotent uninorm, a representable uninorm, or a uninorm continuous in the open unit square. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. Advances in the First Brazilian Project on an HTS Power Cable.
- Author
-
Neves, Marcelo A., da Silva, Edson P., Lopes, Artur J. S., Branco, Luiz M. C., Pereyra, Luiz A., de Léo, Ana C., Neto, Denis P., Berredo, Alessandro C. S., Barony, Marcio A. P., Gliender Mendonca, Nascimento, Carlos A. F., Pereira, Maureen T. R. F., Paulo Teixeira, Toshiaki Hojo, Carvalho Jr., Eden L., Alves, Wanderson M., Guimarães, Maurissone F., and Nascimento, Carlos A. M.
- Subjects
DIELECTRIC devices ,ELECTROMAGNETIC devices ,COMPUTER simulation ,GEOMETRY ,MATHEMATICS - Abstract
This paper presents, in development in Brazil, a research for an ac three-phase cold dielectric (CD) high-temperature superconducting (HTS) power cable. That cable was rated to operate mainly at 69 kV/300 A. The first phase of research was part of a National Strategic Project for power transfer in Brazil. The research over the last two years included an improvement in design in order to enable operation also at higher voltages. The cable design changed and now each phase is inside its own cryostat. The electric isolation also changed. It was selected a laminated dielectric material not yet used (to our knowledge) in any other HTS power cable project. The main outcomes and results presented here are i) the improved cable design, ii) the characterizations of the new isolating material, iii) the facilities for cable construction and high-current tests, iv) one demonstrative model for one phase of the cable, and v) the validation of the new cable geometry by numerical simulation of electromagnetic and thermal behaviors of one of its phases at the rated voltage and current. As a conclusion, the results allowed to improve and disseminate the feasibility of the CD HTS cable technology in Brazil. Some details are not shown because they are patent pending. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
33. Binary [ n , (n + 1)/2] Cyclic Codes With Good Minimum Distances.
- Author
-
Tang, Chunming and Ding, Cunsheng
- Subjects
CYCLIC codes ,REED-Muller codes ,BINARY codes ,LINEAR codes - Abstract
The binary quadratic-residue codes and the punctured Reed-Muller codes ${\mathcal {R}}_{2}((m-1)/2, m))$ are two families of binary cyclic codes with parameters $[n, (n+1)/2, d \geq \sqrt {n}]$. These two families of binary cyclic codes are interesting partly due to the fact that their minimum distances have a square-root bound. The objective of this paper is to construct two families of binary cyclic codes of length $2^{m}-1$ and dimension near $2^{m-1}$ with good minimum distances. When $m \geq 3$ is odd, the codes become a family of duadic codes with parameters $[2^{m}-1, 2^{m-1}, d]$ , where $d \geq 2^{(m-1)/2}+1$ if $m \equiv 3 \pmod {4}$ and $d \geq 2^{(m-1)/2}+3$ if $m \equiv 1 \pmod {4}$. The two families of binary cyclic codes contain some optimal binary cyclic codes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
34. Successive Interference Mitigation in Multiuser MIMO Channels.
- Author
-
Che, Enlong, Tuan, Hoang Duong, Minh Tam Tam, Ho Huu, and Nguyen, Ha H.
- Subjects
MIMO systems ,MATHEMATICAL optimization ,SIMULATION methods & models ,ALGORITHMS ,MATHEMATICS - Abstract
Motivated by the work of Dahrouj and Yu in applying the Han-Kobayashi transmission strategy for mitigating the intercell interference in a multi-cell multi-user multiple-input single-output interference network (MISO IN), this paper considers splitting messages into private and common parts in a multi-cell multi-user MIMO IN. Specifically, the covariances of the private messages and common messages are designed to optimize either the sum rate or the minimal rate. The common messages and private messages are decoded in sequence using successive decoding. This paper shows how these difficult optimization problems can be adequately solved by means of d.c. (
d ifference ofc oncave functions) optimization over a simple convex set. Numerical and simulation results also reveal the great advantage of our proposed solutions for various types of INs. In particular, the proposed solutions are shown to outperform the algorithm developed by Dahrouj and Yu for the simpler case of the MISO IN. [ABSTRACT FROM PUBLISHER]- Published
- 2015
- Full Text
- View/download PDF
35. Design of Resilient Reliable Dissipativity Control for Systems With Actuator Faults and Probabilistic Time-Delay Signals via Sampled-Data Approach.
- Author
-
Manivannan, R., Samidurai, R., Cao, Jinde, and Perc, Matjaz
- Subjects
SERVOMECHANISMS ,RESILIENT design ,LINEAR matrix inequalities ,ACTUATORS ,BINOMIAL distribution ,INTEGRAL inequalities - Abstract
The issue of resilient reliable dissipativity performance index for systems including actuator faults and probabilistic time-delay signals via sampled-data control approach is investigated. Specifically, random variables governed by the Bernoulli distribution are examined in detail for the random time-delay signals. By using the Lyapunov–Krasovskii functionals together with the Wirtinger double integral inequality approach and reciprocally convex combination technique, which reflects complete information on the certain random sampling; as a result, a new set of sufficient criterion is launched to ensure that the proposed closed-loop system is strictly ${(\mathbb {Q},\mathbb {S},\mathbb {R})}$ - ${\gamma }$ -dissipative. The proposed criterion for dissipativity-based resilient reliable controller is expressed in the form of linear matrix inequalities. The major contributions of this paper is ${(\mathbb {Q},\mathbb {S},\mathbb {R})}$ - ${\gamma }$ -dissipativity concept can be adopted to analyze more dynamical performances simultaneously, such as ${\mathcal {H}_\infty }$ , passivity, mixed ${\mathcal {H}_\infty }$ , and passivity performance for the proposed system model by choosing the weighting matrices ${(\mathbb {Q},\mathbb {S},\mathbb {R})}$. Finally, an interesting simulation example is demonstrated to showing the applicability and effectiveness of the theoretical results together with proposed control law by taking the experimental values of the high-incidence research model and rotary servo system. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
36. PermPair : Android Malware Detection Using Permission Pairs.
- Author
-
Arora, Anshul, Peddoju, Sateesh K., and Conti, Mauro
- Abstract
The Android smartphones are highly prone to spreading the malware due to intrinsic feebleness that permits an application to access the internal resources when the user grants the permissions knowingly or unknowingly. Hence, the researchers have focused on identifying the conspicuous permissions that lead to malware detection. Most of these permissions, common to malware and normal applications present themselves in different patterns and contribute to attacks. Therefore, it is essential to find the significant combinations of the permissions that can be dangerous. Hence, this paper aims to identify the pairs of permissions that can be dangerous. To the best of our knowledge, none of the existing works have used the permission pairs to detect malware. In this paper, we proposed an innovative detection model, named PermPair, that constructs and compares the graphs for malware and normal samples by extracting the permission pairs from the manifest file of an application. The evaluation results indicate that the proposed scheme is successful in detecting malicious samples with an accuracy of 95.44% when compared to other similar approaches and favorite mobile anti-malware apps. Further, we also proposed an efficient edge elimination algorithm that removed 7% of the unnecessary edges from the malware graph and 41% from the normal graph. This lead to minimum space utility and also 28% decrease in the detection time. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
37. K-Plex 2-Erasure Codes and Blackburn Partial Latin Squares.
- Author
-
Stones, Rebecca J.
- Subjects
MAGIC squares ,CIPHERS - Abstract
A k-plex of order n is an ${n} \times {n}$ matrix on n symbols, where every row contains k distinct symbols, every column contains k distinct symbols, and every symbol occurs exactly k times. Yi et al. (2019) introduced 3-plex codes which are 2-erasure codes (2-erasure tolerant array codes) derived from 3-plexes. In this paper, we generalize 3-plex codes to k-plex codes. We introduce the notion of a “strong” k-plex which implies the derived k-plex code is 2-erasure tolerant. Moreover, k-plex codes derived from strong $k$ -plexes have a straightforward algorithm for reconstruction. These general k-plex codes offer greater flexibility when choosing a suitable code for a storage system, enabling the operator to better optimize the unavoidable trade-offs involved. Blackburn asked for the maximum number of entries in an ${n} \times {n}$ partial Latin square on n symbols in which if distinct cells $({i},{j})$ and $({i}',{j}')$ contain the same symbol, then the cells $({i}',{j})$ and $({i},{j}')$ are empty. A “strong” k-plex satisfies the Blackburn property (along with two other properties related to erasure coding). We investigate the necessary conditions for the existence of Blackburn k-plexes (and hence necessary conditions for the existence of strong k-plexes). We show that any Blackburn k-plex has order ${n} \geq \lceil (\sqrt {2}+1){k}-2 \rceil $. We describe how to construct strong k-plexes of order n when $k \in \{2,3,4,5\}$ for all possible orders n, and we give a simple construction of strong k-plexes of order ${k}^{2}$ for $k \geq 2$. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
38. Codes, Differentially $\delta$ -Uniform Functions, and $t$ -Designs.
- Author
-
Tang, Chunming, Ding, Cunsheng, and Xiong, Maosheng
- Subjects
BINARY codes ,LINEAR codes ,CODING theory ,BOOLEAN functions ,AUTOMORPHISM groups ,STEINER systems ,LINEAR algebraic groups - Abstract
Boolean functions, coding theory and $t$ -designs have close connections and interesting interplay. A standard approach to constructing $t$ -designs is the use of linear codes with certain regularity. The Assmus-Mattson Theorem and the automorphism groups are two ways for proving that a code has sufficient regularity for supporting $t$ -designs. However, some linear codes hold $t$ -designs, although they do not satisfy the conditions in the Assmus-Mattson Theorem and do not admit a $t$ -transitive or $t$ -homogeneous group as a subgroup of their automorphisms. The major objective of this paper is to develop a theory for explaining such codes and obtaining such new codes and hence new $t$ -designs. To this end, a general theory for punctured and shortened codes of linear codes supporting $t$ -designs is established, a generalized Assmus-Mattson theorem is developed, and a link between 2-designs and differentially $\delta $ -uniform functions and 2-designs is built. With these general results, binary codes with new parameters and explicit weight distributions are obtained, new 2-designs and Steiner system $S(2, 4, 2^{n})$ are produced in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
39. Towards Practical Private Information Retrieval From MDS Array Codes.
- Author
-
Li, Jie, Karpuk, David, and Hollanti, Camilla
- Subjects
INFORMATION retrieval ,TWO-dimensional bar codes ,CIPHERS ,BANDWIDTHS - Abstract
Private information retrieval (PIR) is the problem of privately retrieving one out of $M$ original files from $N$ severs, i.e., each individual server gains no information on the identity of the file that the user is requesting. Usually, the $M$ files are replicated or encoded by a maximum distance separable (MDS) code and then stored across the $N$ servers. Compared to mere replication, MDS-coded servers can significantly reduce the storage overhead. Particularly, PIR from minimum storage regenerating (MSR) coded servers can simultaneously reduce the repair bandwidth when repairing failed servers. Existing PIR protocols from MSR-coded servers either require large sub-packetization levels or are not capacity-achieving. In this paper, a PIR protocol from MDS array codes is proposed, subsuming PIR from MSR-coded servers as a special case. Particularly, only the case of non-colluding, honest-but-curious servers is considered. The retrieval rate of the new PIR protocol achieves the capacity of PIR from MDS-/MSR-coded servers. By choosing different MDS array codes, the new PIR protocol can have varying advantages when compared with existing protocols, e.g., 1) small sub-packetization, 2) (near-)optimal repair bandwidth, 3) implementable over the binary field $\mathbf {F}_{2}$. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
40. Sampled-Data State Feedback Control for the Set Stabilization of Boolean Control Networks.
- Author
-
Zhu, Shiyong, Liu, Yang, Lou, Jungang, Lu, Jianquan, and Alsaadi, Fuad E.
- Subjects
STATE feedback (Feedback control systems) ,INVARIANT sets ,POINT set theory - Abstract
This paper studies the set stabilization of Boolean control networks (BCNs) under sampled-data state feedback control (SDSFC). The main research content is divided into two parts. First, the topological structure of BCNs under given SDSFC is investigated. The fixed point and sampled cycle are defined, respectively. It is found that sampled cycles allow elements to be repeated and not every element can be regarded as an initial state, and this is quite different from conventional cycles of BCNs. A theorem is presented to calculate the number of fixed points and an algorithm is given to find all fixed points and sampled cycles. Second, the set stabilization problem of BCNs by SDSFC is investigated based on the sampled point set and the sampled point control invariant set (SPCIS). A necessary and sufficient condition is derived for the global set stabilization of BCNs by SDSFC, and further sampled-data state feedback controllers are also designed. The interesting thing is that if a state enters the SPCIS as an unsampled point, then it may run out of the given set again, which is in sharp contrast to conventional BCNs. Finally, an example is given to illustrate the efficiency of the obtained results. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
41. Basic design for cultivating creative thinking based on mathematics.
- Author
-
Jutao Li, Juan Lan, and Yu Chen
- Abstract
The purpose of this paper is to explore the teaching methods for Basic Design, aiming at cultivating creative thinking for the design beginners. Based on the basic features of the mathematical thinking, this paper presented the new teaching methods - “abstract problem”, “accurate limitation” and “permutation and combination as well as comparison” in view of the characteristics of “selection”, “breakthrough” and “reconstruction” in the creative thinking of the modern design methodology. The paper also pointed out the relationship between logical thinking and intuitive thinking in applying the above methods and the scope that the above methods could be applied to the practice of teaching. In addition, the paper emphasized the final purpose of the above methods was to form a methodology for cultivating creative thinking instead of having a detailed method. The new teaching methods are useful for improving the quality of teaching for Basic Design, which aims at cultivating creative thinking for the design beginners, and enhance the creative thinking of the design beginners. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
42. Plausible deductive reasoning plan for business mathematics learners.
- Author
-
Shirota, Yukari and Hashimoto, Takako
- Abstract
When the student is not able to solve a given problem, a plausible deductive reasoning process should be offered to him/her. Our final goal is a development of an e-Learning system which could help students not too much and not too little so that they can acquire as much deductive experience of independent work as possible. In the paper, we illustrate a solution plan graph which is a plausible deductive reasoning material with a concrete word problem. Our guiding principle for conducting the deduction is the thinking method of “working backwards” from the unknown. The paper also illustrates the details of the working backwards method. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
43. Web publication of visual teaching materials for business mathematics.
- Author
-
Hashimoto, Takako and Shirota, Yukari
- Abstract
The paper describes our web publication of visual teaching materials for business mathematics. The objective of the web site is to familiarize students with our visual approach for business mathematics at early stage. The significant advantage of visualization is that seeing the materials leads to better understanding of the mathematical process. Even if the students cannot understand the algebraic calculation process, they can intuitively understand the essence, only seeing the visual materials. The feature of our developed teaching materials is utilization of three-dimensional graphics and its animations. Just watching the animation, students can see the points, even if they have no idea about operations on the web. In the paper, we will illustrate the typical economics problem named the Marshallian demand function. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
44. The Subfield Codes and Subfield Subcodes of a Family of MDS Codes.
- Author
-
Tang, Chunming, Wang, Qi, and Ding, Cunsheng
- Subjects
CYCLIC codes ,LIQUID crystal displays ,LINEAR codes - Abstract
Maximum distance separable (MDS) codes are very important in both theory and practice. There is a classical construction of a family of $[{2^{m}+1, 2u-1, 2^{m}-2u+3}]$ MDS codes for $1 \leq u \leq 2^{m-1}$ , which are cyclic, reversible and BCH codes over ${\mathrm {GF}}(2^{m})$. The objective of this paper is to study the quaternary subfield subcodes and quaternary subfield codes of a subfamily of the MDS codes for even $m$. A family of quaternary cyclic codes is obtained. These quaternary codes are distance-optimal in some cases and very good in general. Furthermore, two infinite families of 3-designs from these quaternary codes and their duals are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. The Differential Spectrum of the Power Mapping x p n −3.
- Author
-
Yan, Haode, Xia, Yongbo, Li, Chunlei, Helleseth, Tor, Xiong, Maosheng, and Luo, Jinquan
- Subjects
POWER spectra ,ELLIPTIC curves ,INTEGERS ,WIRELESS communications - Abstract
Let $n$ be a positive integer and $p$ a prime. The power mapping $x^{p^{n}-3}$ over ${\mathbb {F}}_{p^{n}}$ has desirable differential properties, and its differential spectra for $p=2,\,3$ have been determined. In this paper, for any odd prime $p$ , by investigating certain quadratic character sums and some equations over ${\mathbb {F}}_{p^{n}}$ , we determine the differential spectrum of $x^{p^{n}-3}$ with a unified approach. The obtained result shows that for any given odd prime $p$ , the differential spectrum can be expressed explicitly in terms of $n$. Compared with previous results, a special elliptic curve over ${\mathbb {F}}_{p}$ plays an important role in our computation for the general case $p \ge 5$. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Unknown Output Values of Faulty Circuits and Output Response Compaction.
- Author
-
Pomeranz, Irith
- Subjects
DATA compression ,INTEGRATED circuits ,LEAVES ,MATHEMATICAL variables ,MATHEMATICS - Abstract
When using output response compaction it is necessary to address the fact that circuits may produce unknown output values. Methods to address this issue ensure that the output response compactor would produce a unique fault-free signature that can be used for fault detection. This paper considers the unknown output values that are produced by faulty circuits. If a faulty circuit produces an unknown value when the output value of the fault-free circuit is known, the unknown faulty output value may affect the computation of a signature. The faulty signature may not be unique, and it may not always be different from a fault-free signature. The ability to verify that the fault will be detected based on its signature is thus lost. Without limiting the discussion to a particular output response compactor, the paper studies the prevalence of such faults in benchmark circuits, the prevalence of unknown faulty output values for which the corresponding fault-free values are known, and the effects of addressing this issue. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
47. A Possible Way to Perform Recursive Bayesian Estimate in the Possibility Domain.
- Author
-
Jiang, Wei, Ferrero, Alessandro, Salicone, Simona, and Zhang, Qi
- Subjects
GENERALIZATION ,BAYESIAN analysis ,RANDOM variables ,POSSIBILITY ,MATHEMATICS - Abstract
This paper defines a generalization of the recursive Bayesian estimate (RBE), within the mathematical possibility theory. This generalization is motivated by the fact that the classical RBE, by design, deals only with random variables and can only provide closed-form solution for a few cases. The possibilistic generalization is based on the random-fuzzy variables, thus allowing one to take into account, in a very natural way, both random and systematic contributions to the uncertainty and to implement the RBE for any distribution of system state variables in a simple way. This paper illustrates the advantages of the proposed generalization, by presenting both the theoretical development, and a detailed application example. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
48. \mathbb Z2\mathbb Z2[u] ?Cyclic and Constacyclic Codes.
- Author
-
Aydogdu, Ismail, Abualrub, Taher, and Siap, Irfan
- Subjects
CYCLIC codes ,LINEAR codes ,ORDERED algebraic structures ,MODULES (Algebra) ,MATHEMATICAL bounds - Abstract
Following the very recent studies on \mathbb Z2\mathbb Z4 -additive codes, \mathbb Z2\mathbb Z2[u] -linear codes have been introduced by Aydogdu et al. In this paper, we introduce and study the algebraic structure of cyclic, constacyclic codes and their duals over the R -module \mathbb {Z}_{2}^\alpha R^\beta where R=\mathbb {Z}_{2}+u\mathbb {Z}_{2}=\left \{{0,1,u,u+1}\right \} is the ring with four elements and u^2=0 . We determine the generating independent sets and the types and sizes of both such codes and their duals. Finally, we present a bound and an optimal family of codes attaining this bound and also give some illustrative examples of binary codes that have good parameters which are obtained from the cyclic codes in \mathbb Z_2^\alpha R^\beta . [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
49. On the Performance of Channel-Statistics-Based Codebook for Massive MIMO Channel Feedback.
- Author
-
Shen, Wenqian, Dai, Linglong, Zhang, Yu, Li, Jianjun, and Wang, Zhaocheng
- Subjects
MIMO systems ,STATISTICS ,ANTENNAS (Electronics) ,WIRELESS communications ,MATHEMATICS - Abstract
The channel feedback overhead for massive multiple-input multiple-output systems with a large number of base station (BS) antennas is very high since the number of feedback bits of traditional codebooks scales linearly with the number of BS antennas. To reduce the feedback overhead, an effective codebook based on channel statistics has been designed, where the required number of feedback bits only scales linearly with the rank of the channel correlation matrix. However, this attractive conclusion was only proved under a particular channel assumption in the literature. To provide a rigorous theoretical proof under a general channel assumption, in this paper, we quantitatively analyze the performance of the channel-statistics-based codebook. Specifically, we first introduce the rate gap between the ideal case of perfect channel state information at the transmitter and the practical case of limited channel feedback, where we find that the rate gap depends on the quantization error of the codebook. Then, we derive an upper bound of the quantization error, based on which we prove that the required number of feedback bits to ensure a constant rate gap only scales linearly with the rank of the channel correlation matrix. Finally, numerical results are provided to verify this conclusion. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
50. Multiport Interferometer-Enabled 2-D Angle of Arrival (AOA) Estimation System.
- Author
-
Moghaddasi, Jaber, Djerafi, Tarek, and Wu, Ke
- Subjects
INTERFEROMETERS ,PLANE wavefronts ,PERFORMANCE ,CALIBRATION ,MATHEMATICS - Abstract
A systematic scheme for finding the direction of arrival (DOA) or 2-D angle of arrival (AOA) of an electromagnetic beam is proposed and demonstrated in this paper. This system estimates the respective angle of propagation vector of an incoming plane wave in either horizontal or vertical plane. It consists of three main parts, namely, an antenna, a multiport wave interferometric receiver or phase discriminator, and a signal processor. The antenna is composed of four receiving elements located in the same plane, which is arranged in a diamond-shaped configuration. The received signals manifest relative phase differences that contain information about the beam’s DOA. With the proposed eight-port junction topology, the interferometer extracts these informative phase differences and leaves them for a simple signal processing algorithm to estimate the two angles. The theoretical analysis of the proposed scheme is presented along with system-level simulation results for the proof of concept. In addition, an appropriate calibration technique is formulated to deal with nonidealities and consecutive errors in practice. One of the main applications of such a system is related to the angular detection of an antenna-to-antenna misalignment in pencil beam millimeter-wave systems. Therefore, implementation of the presented system scheme for millimeter wave applications is briefly discussed for its prototyping over 60-GHz range (V-band). Finally, the performance of the prototype system is assessed through a set of system-level measurements. Excellent results are obtained, thus validating the outstanding functionality of the proposed system. Simplicity, low cost, compact size, and operational accuracy make this system a superior candidate for 2-D angle detection applications. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.