In this paper, the nonnull moments and the distributions of the likelihood ratio criterion for testing the equality of diagonal blocks with blockwise independence under certain alternatives have derived.
Non-executive directors are now very well established in Chinese business. The uniform and final criterion of weighting the independence of non-executive directors is not available. It will be valuable to draw an anal...Non-executive directors are now very well established in Chinese business. The uniform and final criterion of weighting the independence of non-executive directors is not available. It will be valuable to draw an analogy with the criterion of weighting the independence of non-executive directors in the UK, where over a dozen different criterions are applied.展开更多
Independent component analysis( ICA) has been widely applied to the monitoring of non-Gaussian processes. Despite lots of applications,there is no universally accepted criterion to select the dominant independent comp...Independent component analysis( ICA) has been widely applied to the monitoring of non-Gaussian processes. Despite lots of applications,there is no universally accepted criterion to select the dominant independent components( ICs). Moreover, how to determine the number of dominant ICs is still an open question. To further address this issue,a novel process monitoring based on IC contribution( ICC) is proposed from the perspective of information storage. Based on the ICC with each variable,the dominant ICs can be obtained and the number of dominant ICs is determined objectively. To further preserve the process information, the remaining ICs are not useless. As a result,all the ICs are regarded to be divided into dominant and residual subspaces. The monitoring models are established respectively in each subspace, and then Bayesian inference is applied to integrating monitoring results of the two subspaces. Finally, the feasibility and effectiveness of the proposed method are illustrated through a numerical example and the Tennessee Eastman process.展开更多
In this note we prove a criterion of algebraic independence of certain complex or p-adic numbers, which implies the criteria of [1—4] in the case of. complex numbers, and the criterion of Bundschuh and Wallisser in t...In this note we prove a criterion of algebraic independence of certain complex or p-adic numbers, which implies the criteria of [1—4] in the case of. complex numbers, and the criterion of Bundschuh and Wallisser in the case of p-adic number, respectively.展开更多
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas...A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications .展开更多
文摘In this paper, the nonnull moments and the distributions of the likelihood ratio criterion for testing the equality of diagonal blocks with blockwise independence under certain alternatives have derived.
文摘Non-executive directors are now very well established in Chinese business. The uniform and final criterion of weighting the independence of non-executive directors is not available. It will be valuable to draw an analogy with the criterion of weighting the independence of non-executive directors in the UK, where over a dozen different criterions are applied.
基金National Natural Science Foundations of China(Nos.61374140,61403072,61673173)Fundamental Research Funds for the Central Universities,China(Nos.222201717006,222201714031)
文摘Independent component analysis( ICA) has been widely applied to the monitoring of non-Gaussian processes. Despite lots of applications,there is no universally accepted criterion to select the dominant independent components( ICs). Moreover, how to determine the number of dominant ICs is still an open question. To further address this issue,a novel process monitoring based on IC contribution( ICC) is proposed from the perspective of information storage. Based on the ICC with each variable,the dominant ICs can be obtained and the number of dominant ICs is determined objectively. To further preserve the process information, the remaining ICs are not useless. As a result,all the ICs are regarded to be divided into dominant and residual subspaces. The monitoring models are established respectively in each subspace, and then Bayesian inference is applied to integrating monitoring results of the two subspaces. Finally, the feasibility and effectiveness of the proposed method are illustrated through a numerical example and the Tennessee Eastman process.
基金This work was supported by an Alexander Von Humboldt Fellowship and completed in Max-Planck-Institut für Mathematik, Bonn, West Germany.
文摘In this note we prove a criterion of algebraic independence of certain complex or p-adic numbers, which implies the criteria of [1—4] in the case of. complex numbers, and the criterion of Bundschuh and Wallisser in the case of p-adic number, respectively.
基金Supported by the National Science Foundation of China (61072140)the Doctoral Program Foundation of Institutions of Higher Education of China (20100203110003)+1 种基金the 111 Project (B08038)the Fundamental Research Funds for the Central Universities ( JY10000901034)
文摘A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to measure the strength of an S-box against attacks that keep some of its input bits constant. Test results over the S-boxes of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are given and some possible applications of the HOBIC test are analyzed. Meanwhile, the source code for a basic version of the HOBIC test is also provided, the implement process of which shows that it is very fast and efficient for practical applications .