The purpose of this paper is to construct near-vector spaces using a result by Van der Walt, with Z<sub>p</sub> for p a prime, as the underlying near-field. There are two notions of near-vector spaces, we ...The purpose of this paper is to construct near-vector spaces using a result by Van der Walt, with Z<sub>p</sub> for p a prime, as the underlying near-field. There are two notions of near-vector spaces, we focus on those studied by André [1]. These near-vector spaces have recently proven to be very useful in finite linear games. We will discuss the construction and properties, give examples of these near-vector spaces and give its application in finite linear games.展开更多
In this paper, our focus is to investigate the notion of irresolute topological vector spaces. Irresolute topological vector spaces are defined by using semi open sets and irresolute mappings. The notion of irresolute...In this paper, our focus is to investigate the notion of irresolute topological vector spaces. Irresolute topological vector spaces are defined by using semi open sets and irresolute mappings. The notion of irresolute topological vector spaces is analog to the notion of topological vector spaces, but mathematically it behaves differently. An example is given to show that an irresolute topological vector space is not a topological vector space. It is proved that: 1) Irresolute topological vector spaces possess open hereditary property;2) A homomorphism of irresolute topological vector spaces is irresolute if and only if it is irresolute at identity element;3) In irresolute topological vector spaces, the scalar multiple of semi compact set is semi compact;4) In irresolute topological vector spaces, every semi open set is translationally invariant.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Let F be any commutative field. Let v be an integer≥1 and be a fixed 2v × 2v nonsingular alternate matrix over F. Define Sp(F)={T: 2v×2v matrix over F|TKT~T=K}. It is well-known that Sp(F) is a group with r...Let F be any commutative field. Let v be an integer≥1 and be a fixed 2v × 2v nonsingular alternate matrix over F. Define Sp(F)={T: 2v×2v matrix over F|TKT~T=K}. It is well-known that Sp(F) is a group with respect to the matrix multiplication and is called the symplectic group of degree 2v over F展开更多
New objects characterizing the structure of complex linear transformations areintroduced. These new objects yield a new result for the decomposition of complexvector spaces relative to complex lrnear transformations a...New objects characterizing the structure of complex linear transformations areintroduced. These new objects yield a new result for the decomposition of complexvector spaces relative to complex lrnear transformations and provide all Jordan basesby which the Jordan canonical form is constructed. Accordingly, they can result in thecelebrated Jordan theorem and the third decomposition theorem of space directly. and,moreover, they can give a new deep insight into the exquisite and subtle structure ofthe Jordan form. The latter indicates that the Jordan canonical form of a complexlinear transformation is an invariant structure associated with double arbitrary. choices.展开更多
Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be...Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be dealt with machine learning algorithms. Standard system call datasets were employed to train these algorithms. However, advancements in operating systems made these datasets outdated and un-relevant. Australian Defence Force Academy Linux Dataset (ADFA-LD) and Australian Defence Force Academy Windows Dataset (ADFA-WD) are new generation system calls datasets that contain labelled system call traces for modern exploits and attacks on various applications. In this paper, we evaluate performance of Modified Vector Space Representation technique on ADFA-LD and ADFA-WD datasets using various classification algorithms. Our experimental results show that our method performs well and it helps accurately distinguishing process behaviour through system calls.展开更多
The Householder transformation-norm structure function in L2 vector space of linear algebra is introduced, and the edge enhancement for remote sensing images is realized. The experiment result is compared with traditi...The Householder transformation-norm structure function in L2 vector space of linear algebra is introduced, and the edge enhancement for remote sensing images is realized. The experiment result is compared with traditional Laplacian and Sobel edge enhancements and it shows that the effect of the new method is better than that of the traditional algorithms.展开更多
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat...Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.展开更多
This paper presents a new system identification approach using vector space base functions, and proposes two network structures based on Gamma sequence and Laguerre sequence. After analyzing and comparing these struct...This paper presents a new system identification approach using vector space base functions, and proposes two network structures based on Gamma sequence and Laguerre sequence. After analyzing and comparing these structures in detail, some simulation results to demonstrate the conclusions are given.展开更多
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr...A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.展开更多
Let be a n-dimensional row vector space over a finite field For , let be a d-?dimensional subspace of . denotes the set of all the spaces which are the subspaces of and not the subspaces of except . We define the part...Let be a n-dimensional row vector space over a finite field For , let be a d-?dimensional subspace of . denotes the set of all the spaces which are the subspaces of and not the subspaces of except . We define the partial order on by ordinary inclusion (resp. reverse inclusion), and then is a poset, denoted by (resp. ). In this paper we show that both and are finite atomic lattices. Further, we discuss the geometricity of and , and obtain their characteristic polynomials.展开更多
In this paper we investigate generalized bi quasi variational inequalities in locally convex topological vector spaces. Motivated and inspired by the recent research work in this field,we establish several existence t...In this paper we investigate generalized bi quasi variational inequalities in locally convex topological vector spaces. Motivated and inspired by the recent research work in this field,we establish several existence theorems of solutions for generalized bi quasi variational inequalities,which are the extension and improvements of the earlier and recent results obtained previously by many authors including Sun and Ding [18],Chang and Zhang [23] and Zhang [24].展开更多
Monotonic vector space (MVS), as a novel model in which there exist some monotonic mappings, is proposed. MVS model is an abstract of many practical problems (such as image processing, system capability engineering, e...Monotonic vector space (MVS), as a novel model in which there exist some monotonic mappings, is proposed. MVS model is an abstract of many practical problems (such as image processing, system capability engineering, etc.) and includes many useful important operations. This paper, as the first one of series papers, discusses the MVS framework, relative important concepts and important operations including partition, synthesis, screening, sampling, etc. And algorithms for these operations are the focus of this paper. The application of these operations in system capability engineering will be dealt with in the second part of this series of papers.展开更多
In this paper we’ll prove a fundameutal property of the vector space by means of the ex-tension field,i.e.the numbers of the elements of a basis of the vector space V over the field Fequal to the d imensions(V:F).
The application of some MVS operations (each dimension of which corresponds to a capability indicator) in system capability analysis and design, including capability indicator requirement analysis, effectiveness analy...The application of some MVS operations (each dimension of which corresponds to a capability indicator) in system capability analysis and design, including capability indicator requirement analysis, effectiveness analysis, sensibility analysis, fuzzy analysis, stability analysis, capability optimization design, etc., is discussed in the second paper of this series of papers. And some MVS-based models and algorithms for capability analysis and design are put forward. Finally, an example of capability analysis and optimization design is given for explaining the usages of related models and algorithms.展开更多
The cross-dimensional dynamical systems have received increasing research attention in recent years.This paper characterizes the structure features of the cross-dimensional vector space.Specifically,it is proved that ...The cross-dimensional dynamical systems have received increasing research attention in recent years.This paper characterizes the structure features of the cross-dimensional vector space.Specifically,it is proved that the completion of cross-dimensional vector space is an infinite-dimensional separable Hilbert space.Hence,it means that one can isometrically and linearly embed the crossdimensional vector space into theℓ^(2),which is known as the space of square summable sequences.This result will be helpful in the modeling and analyzing the dynamics of cross-dimensional dynamical systems.展开更多
Wiener amalgam spaces are a class of function spaces where the function’s local and global behavior can be easily distinguished. These spaces are ex-tensively used in Harmonic analysis that originated in the work of ...Wiener amalgam spaces are a class of function spaces where the function’s local and global behavior can be easily distinguished. These spaces are ex-tensively used in Harmonic analysis that originated in the work of Wiener. In this paper: we first introduce a two-variable exponent amalgam space (L<sup>q</sup><sup>()</sup>,l<sup>p</sup><sup>()</sup>)(Ω). Secondly, we investigate some basic properties of these spaces, and finally, we study their dual.展开更多
Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.T...Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation(SVPWM)inverters.The framework under consideration is developed in four stages.To begin,MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamicmodel.The research presents a modified SVPWM inverter control scheme.By tuning the proportional-integral(PI)controller with a transfer function,optimized values for the PI controller are derived.All the subsystems mentioned above are integrated to create a robust simulation of the LIM’s precise speed and thrust force control scheme.The reference speed values were chosen to evaluate the performance of the respective system,and the developed system’s response was verified using various data sets.For the low-speed range,a reference value of 10m/s is used,while a reference value of 100 m/s is used for the high-speed range.The speed output response indicates that themotor reached reference speed in amatter of seconds,as the delay time is between 8 and 10 s.The maximum amplitude of thrust achieved is less than 400N,demonstrating the controller’s capability to control a high-speed LIM with minimal thrust ripple.Due to the controlled speed range,the developed system is highly recommended for low-speed and high-speed and heavy-duty traction applications.展开更多
文摘The purpose of this paper is to construct near-vector spaces using a result by Van der Walt, with Z<sub>p</sub> for p a prime, as the underlying near-field. There are two notions of near-vector spaces, we focus on those studied by André [1]. These near-vector spaces have recently proven to be very useful in finite linear games. We will discuss the construction and properties, give examples of these near-vector spaces and give its application in finite linear games.
文摘In this paper, our focus is to investigate the notion of irresolute topological vector spaces. Irresolute topological vector spaces are defined by using semi open sets and irresolute mappings. The notion of irresolute topological vector spaces is analog to the notion of topological vector spaces, but mathematically it behaves differently. An example is given to show that an irresolute topological vector space is not a topological vector space. It is proved that: 1) Irresolute topological vector spaces possess open hereditary property;2) A homomorphism of irresolute topological vector spaces is irresolute if and only if it is irresolute at identity element;3) In irresolute topological vector spaces, the scalar multiple of semi compact set is semi compact;4) In irresolute topological vector spaces, every semi open set is translationally invariant.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
文摘Let F be any commutative field. Let v be an integer≥1 and be a fixed 2v × 2v nonsingular alternate matrix over F. Define Sp(F)={T: 2v×2v matrix over F|TKT~T=K}. It is well-known that Sp(F) is a group with respect to the matrix multiplication and is called the symplectic group of degree 2v over F
文摘New objects characterizing the structure of complex linear transformations areintroduced. These new objects yield a new result for the decomposition of complexvector spaces relative to complex lrnear transformations and provide all Jordan basesby which the Jordan canonical form is constructed. Accordingly, they can result in thecelebrated Jordan theorem and the third decomposition theorem of space directly. and,moreover, they can give a new deep insight into the exquisite and subtle structure ofthe Jordan form. The latter indicates that the Jordan canonical form of a complexlinear transformation is an invariant structure associated with double arbitrary. choices.
文摘Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be dealt with machine learning algorithms. Standard system call datasets were employed to train these algorithms. However, advancements in operating systems made these datasets outdated and un-relevant. Australian Defence Force Academy Linux Dataset (ADFA-LD) and Australian Defence Force Academy Windows Dataset (ADFA-WD) are new generation system calls datasets that contain labelled system call traces for modern exploits and attacks on various applications. In this paper, we evaluate performance of Modified Vector Space Representation technique on ADFA-LD and ADFA-WD datasets using various classification algorithms. Our experimental results show that our method performs well and it helps accurately distinguishing process behaviour through system calls.
基金Funded by the National Natural Science Foundation of China(No.40571100).
文摘The Householder transformation-norm structure function in L2 vector space of linear algebra is introduced, and the edge enhancement for remote sensing images is realized. The experiment result is compared with traditional Laplacian and Sobel edge enhancements and it shows that the effect of the new method is better than that of the traditional algorithms.
文摘Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
基金National Natural Science FundsNatural Science Funds of Jiangsu Province
文摘This paper presents a new system identification approach using vector space base functions, and proposes two network structures based on Gamma sequence and Laguerre sequence. After analyzing and comparing these structures in detail, some simulation results to demonstrate the conclusions are given.
文摘A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
文摘Let be a n-dimensional row vector space over a finite field For , let be a d-?dimensional subspace of . denotes the set of all the spaces which are the subspaces of and not the subspaces of except . We define the partial order on by ordinary inclusion (resp. reverse inclusion), and then is a poset, denoted by (resp. ). In this paper we show that both and are finite atomic lattices. Further, we discuss the geometricity of and , and obtain their characteristic polynomials.
文摘In this paper we investigate generalized bi quasi variational inequalities in locally convex topological vector spaces. Motivated and inspired by the recent research work in this field,we establish several existence theorems of solutions for generalized bi quasi variational inequalities,which are the extension and improvements of the earlier and recent results obtained previously by many authors including Sun and Ding [18],Chang and Zhang [23] and Zhang [24].
文摘Monotonic vector space (MVS), as a novel model in which there exist some monotonic mappings, is proposed. MVS model is an abstract of many practical problems (such as image processing, system capability engineering, etc.) and includes many useful important operations. This paper, as the first one of series papers, discusses the MVS framework, relative important concepts and important operations including partition, synthesis, screening, sampling, etc. And algorithms for these operations are the focus of this paper. The application of these operations in system capability engineering will be dealt with in the second part of this series of papers.
文摘In this paper we’ll prove a fundameutal property of the vector space by means of the ex-tension field,i.e.the numbers of the elements of a basis of the vector space V over the field Fequal to the d imensions(V:F).
文摘The application of some MVS operations (each dimension of which corresponds to a capability indicator) in system capability analysis and design, including capability indicator requirement analysis, effectiveness analysis, sensibility analysis, fuzzy analysis, stability analysis, capability optimization design, etc., is discussed in the second paper of this series of papers. And some MVS-based models and algorithms for capability analysis and design are put forward. Finally, an example of capability analysis and optimization design is given for explaining the usages of related models and algorithms.
基金supported by the National Natural Science Foundation of China under Grant No.61673129the Key Programs in Shaanxi Province of China under Grant No.2021JZ-12Science and the Technology Bureau Project of Yulin under Grant Nos.2019-89-2 and 2019-89-4。
文摘The cross-dimensional dynamical systems have received increasing research attention in recent years.This paper characterizes the structure features of the cross-dimensional vector space.Specifically,it is proved that the completion of cross-dimensional vector space is an infinite-dimensional separable Hilbert space.Hence,it means that one can isometrically and linearly embed the crossdimensional vector space into theℓ^(2),which is known as the space of square summable sequences.This result will be helpful in the modeling and analyzing the dynamics of cross-dimensional dynamical systems.
文摘Wiener amalgam spaces are a class of function spaces where the function’s local and global behavior can be easily distinguished. These spaces are ex-tensively used in Harmonic analysis that originated in the work of Wiener. In this paper: we first introduce a two-variable exponent amalgam space (L<sup>q</sup><sup>()</sup>,l<sup>p</sup><sup>()</sup>)(Ω). Secondly, we investigate some basic properties of these spaces, and finally, we study their dual.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number(RGP.2/111/43).
文摘Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation(SVPWM)inverters.The framework under consideration is developed in four stages.To begin,MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamicmodel.The research presents a modified SVPWM inverter control scheme.By tuning the proportional-integral(PI)controller with a transfer function,optimized values for the PI controller are derived.All the subsystems mentioned above are integrated to create a robust simulation of the LIM’s precise speed and thrust force control scheme.The reference speed values were chosen to evaluate the performance of the respective system,and the developed system’s response was verified using various data sets.For the low-speed range,a reference value of 10m/s is used,while a reference value of 100 m/s is used for the high-speed range.The speed output response indicates that themotor reached reference speed in amatter of seconds,as the delay time is between 8 and 10 s.The maximum amplitude of thrust achieved is less than 400N,demonstrating the controller’s capability to control a high-speed LIM with minimal thrust ripple.Due to the controlled speed range,the developed system is highly recommended for low-speed and high-speed and heavy-duty traction applications.