A novel method based on ant colony optimization (ACO), algorithm for solving the ill-conditioned linear systems of equations is proposed. ACO is a parallelized bionic optimization algorithm which is inspired from th...A novel method based on ant colony optimization (ACO), algorithm for solving the ill-conditioned linear systems of equations is proposed. ACO is a parallelized bionic optimization algorithm which is inspired from the behavior of real ants. ACO algorithm is first introduced, a kind of positive feedback mechanism is adopted in ACO. Then, the solu- tion problem of linear systems of equations was reformulated as an unconstrained optimization problem for solution by an ACID algorithm. Finally, the ACID with other traditional methods is applied to solve a kind of multi-dimensional Hilbert ill-conditioned linear equations. The numerical results demonstrate that ACO is effective, robust and recommendable in solving ill-conditioned linear systems of equations.展开更多
We propose a continuous analogy of Newton’s method with inner iteration for solving a system of linear algebraic equations. Implementation of inner iterations is carried out in two ways. The former is to fix the numb...We propose a continuous analogy of Newton’s method with inner iteration for solving a system of linear algebraic equations. Implementation of inner iterations is carried out in two ways. The former is to fix the number of inner iterations in advance. The latter is to use the inexact Newton method for solution of the linear system of equations that arises at each stage of outer iterations. We give some new choices of iteration parameter and of forcing term, that ensure the convergence of iterations. The performance and efficiency of the proposed iteration is illustrated by numerical examples that represent a wide range of typical systems.展开更多
Based on the dynamic equation, the performance functional and the system constraint equation of time-invariant discrete LQ control problem, the generalized Riccati equations of linear equality constraint system are ob...Based on the dynamic equation, the performance functional and the system constraint equation of time-invariant discrete LQ control problem, the generalized Riccati equations of linear equality constraint system are obtained according to the minimum principle, then a deep discussion about the above equations is given, and finally numerical example is shown in this paper.展开更多
In this article, we will explore the applications of linear ordinary differential equations (linear ODEs) in Physics and other branches of mathematics, and dig into the matrix method for solving linear ODEs. Although ...In this article, we will explore the applications of linear ordinary differential equations (linear ODEs) in Physics and other branches of mathematics, and dig into the matrix method for solving linear ODEs. Although linear ODEs have a comparatively easy form, they are effective in solving certain physical and geometrical problems. We will begin by introducing fundamental knowledge in Linear Algebra and proving the existence and uniqueness of solution for ODEs. Then, we will concentrate on finding the solutions for ODEs and introducing the matrix method for solving linear ODEs. Eventually, we will apply the conclusions we’ve gathered from the previous parts into solving problems concerning Physics and differential curves. The matrix method is of great importance in doing higher dimensional computations, as it allows multiple variables to be calculated at the same time, thus reducing the complexity.展开更多
In this paper, estimations of the lower solution bounds for the discrete algebraic Lyapunov Equation (the DALE) are addressed. By utilizing linear algebraic techniques, several new lower solution bounds of the DALE ar...In this paper, estimations of the lower solution bounds for the discrete algebraic Lyapunov Equation (the DALE) are addressed. By utilizing linear algebraic techniques, several new lower solution bounds of the DALE are presented. We also propose numerical algorithms to develop sharper solution bounds. The obtained bounds can give a supplement to those appeared in the literature. 展开更多
Continuously differentiable radial basis functions (C<sup>∞</sup>-RBFs), while being theoretically exponentially convergent are considered impractical computationally because the coefficient matrices are ...Continuously differentiable radial basis functions (C<sup>∞</sup>-RBFs), while being theoretically exponentially convergent are considered impractical computationally because the coefficient matrices are full and can become very ill- conditioned. Similarly, the Hilbert and Vandermonde have full matrices and become ill-conditioned. The difference between a coefficient matrix generated by C<sup>∞</sup>-RBFs for partial differential or integral equations and Hilbert and Vandermonde systems is that C<sup>∞</sup>-RBFs are very sensitive to small changes in the adjustable parameters. These parameters affect the condition number and solution accuracy. The error terrain has many local and global maxima and minima. To find stable and accurate numerical solutions for full linear equation systems, this study proposes a hybrid combination of block Gaussian elimination (BGE) combined with arbitrary precision arithmetic (APA) to minimize the accumulation of rounding errors. In the future, this algorithm can execute faster using preconditioners and implemented on massively parallel computers.展开更多
An exact solution of a linear difference equation in a finite number of steps has been obtained. This refutes the conventional wisdom that a simple iterative method for solving a system of linear algebraic equations i...An exact solution of a linear difference equation in a finite number of steps has been obtained. This refutes the conventional wisdom that a simple iterative method for solving a system of linear algebraic equations is approximate. The nilpotency of the iteration matrix is the necessary and sufficient condition for getting an exact solution. The examples of iterative equations providing an exact solution to the simplest algebraic system are presented.展开更多
In this paper, the matrix algebraic equations involved in the optimal control problem of time-invariant linear Ito stochastic systems, named Riccati- Ito equations in the paper, are investigated. The necessary and suf...In this paper, the matrix algebraic equations involved in the optimal control problem of time-invariant linear Ito stochastic systems, named Riccati- Ito equations in the paper, are investigated. The necessary and sufficient condition for the existence of positive definite solutions of the Riccati- Ito equations is obtained and an iterative solution to the Riccati- Ito equations is also given in the paper thus a complete solution to the basic problem of optimal control of time-invariant linear Ito stochastic systems is then obtained. An example is given at the end of the paper to illustrate the application of the result of the paper.展开更多
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic an...This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations.展开更多
A primordial field Self-interaction Principle, analyzed in Hestenes’ Geometric Calculus, leads to Heaviside’s equations of the gravitomagnetic field. When derived from Einstein’s nonlinear field equations Heaviside...A primordial field Self-interaction Principle, analyzed in Hestenes’ Geometric Calculus, leads to Heaviside’s equations of the gravitomagnetic field. When derived from Einstein’s nonlinear field equations Heaviside’s “linearized” equations are known as the “weak field approximation”. When derived from the primordial field equation, there is no mention of field strength;the assumption that the primordial field was predominant at the big bang rather suggests that ultra-strong fields are governed by the equations. This aspect has physical significance, so we explore the assumption by formulating the gauge field version of Heaviside’s theory. We compare with recent linearized gravity formulations and discuss the significance of differences.展开更多
With the increasingly widespread application of linear algebra theory, and in its opposite direction is not enough emphasis, linear algebra, several important points: matrix, determinant, linear equations, linear tra...With the increasingly widespread application of linear algebra theory, and in its opposite direction is not enough emphasis, linear algebra, several important points: matrix, determinant, linear equations, linear transformations, matrix keratosis and other anti-deepening understanding of the basics and improve the comprehensive ability to solve problems.展开更多
This paper studies the robust stochastic stabilization and robust H∞ control for linear time-delay systems with both Markovian jump parameters and unknown norm-bounded parameter uncertainties. This problem can be sol...This paper studies the robust stochastic stabilization and robust H∞ control for linear time-delay systems with both Markovian jump parameters and unknown norm-bounded parameter uncertainties. This problem can be solved on the basis of stochastic Lyapunov approach and linear matrix inequality (LMI) technique. Sufficient conditions for the existence of stochastic stabilization and robust H∞ state feedback controller are presented in terms of a set of solutions of coupled LMIs. Finally, a numerical example is included to demonstrate the practicability of the proposed methods.展开更多
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work.展开更多
This research paper evaluated and investigated the effectiveness of the comprehensible technique (CT) introduced by the researcher as an alternative solution to Algebra’s linear equations in solving consecutive numbe...This research paper evaluated and investigated the effectiveness of the comprehensible technique (CT) introduced by the researcher as an alternative solution to Algebra’s linear equations in solving consecutive number problems. The CT is a proposed easy and efficient way of solving number problems which aimed to help the learners reduce their difficulties in using variables since the technique only uses basic arithmetic and mental Mathematics. Evaluation research was utilized in this study where 20 people, from various ages and professions, were chosen purposively as respondents of the study. The study found out that CT was very effective for the respondents especially in unlocking difficulties in solving consecutive number problems. Moreover, according to them, the CT is easy to use, it is engaging and enjoyable, direct and simple and can be utilized as shortcut way of solving consecutive number problems when competing in Math quiz bees or taking board examinations where time is of the essence.展开更多
In this paper, we consider the perturbation analysis of linear time-invariant systems, which arise from the linear optimal control in continuous-time. We provide a method to compute condition numbers of continuous-tim...In this paper, we consider the perturbation analysis of linear time-invariant systems, which arise from the linear optimal control in continuous-time. We provide a method to compute condition numbers of continuous-time linear time-invariant systems. It solves the perturbed linear time-invariant systems via Riccati differential equations and continuous-time algebraic Riccati equations in finite and infinite time horizons. We derive the explicit expressions of measuring the perturbation bounds of condition numbers with respect to the solution of the linear time-invariant systems. Furthermore, condition numbers and their upper bounds of Riccati differential equations and continuous-time algebraic Riccati equations are also discussed. Numerical simulations show the sharpness of the perturbation bounds computed via the proposed methods.展开更多
由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解...由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解线性代数方程组(information-theoretically secure outsourcing of linear algebraic equations,ITS-OutsLAE)方法 .与之前的研究相比,在保持计算和通信复杂度与现有最优方案保持一致的同时,首次将方程组唯一解的安全性提升至信息论安全(完美保密).给出了形式化的安全性证明,并通过理论分析和实验证明了所提方法的实用性.展开更多
文摘A novel method based on ant colony optimization (ACO), algorithm for solving the ill-conditioned linear systems of equations is proposed. ACO is a parallelized bionic optimization algorithm which is inspired from the behavior of real ants. ACO algorithm is first introduced, a kind of positive feedback mechanism is adopted in ACO. Then, the solu- tion problem of linear systems of equations was reformulated as an unconstrained optimization problem for solution by an ACID algorithm. Finally, the ACID with other traditional methods is applied to solve a kind of multi-dimensional Hilbert ill-conditioned linear equations. The numerical results demonstrate that ACO is effective, robust and recommendable in solving ill-conditioned linear systems of equations.
文摘We propose a continuous analogy of Newton’s method with inner iteration for solving a system of linear algebraic equations. Implementation of inner iterations is carried out in two ways. The former is to fix the number of inner iterations in advance. The latter is to use the inexact Newton method for solution of the linear system of equations that arises at each stage of outer iterations. We give some new choices of iteration parameter and of forcing term, that ensure the convergence of iterations. The performance and efficiency of the proposed iteration is illustrated by numerical examples that represent a wide range of typical systems.
文摘Based on the dynamic equation, the performance functional and the system constraint equation of time-invariant discrete LQ control problem, the generalized Riccati equations of linear equality constraint system are obtained according to the minimum principle, then a deep discussion about the above equations is given, and finally numerical example is shown in this paper.
文摘In this article, we will explore the applications of linear ordinary differential equations (linear ODEs) in Physics and other branches of mathematics, and dig into the matrix method for solving linear ODEs. Although linear ODEs have a comparatively easy form, they are effective in solving certain physical and geometrical problems. We will begin by introducing fundamental knowledge in Linear Algebra and proving the existence and uniqueness of solution for ODEs. Then, we will concentrate on finding the solutions for ODEs and introducing the matrix method for solving linear ODEs. Eventually, we will apply the conclusions we’ve gathered from the previous parts into solving problems concerning Physics and differential curves. The matrix method is of great importance in doing higher dimensional computations, as it allows multiple variables to be calculated at the same time, thus reducing the complexity.
文摘In this paper, estimations of the lower solution bounds for the discrete algebraic Lyapunov Equation (the DALE) are addressed. By utilizing linear algebraic techniques, several new lower solution bounds of the DALE are presented. We also propose numerical algorithms to develop sharper solution bounds. The obtained bounds can give a supplement to those appeared in the literature.
文摘Continuously differentiable radial basis functions (C<sup>∞</sup>-RBFs), while being theoretically exponentially convergent are considered impractical computationally because the coefficient matrices are full and can become very ill- conditioned. Similarly, the Hilbert and Vandermonde have full matrices and become ill-conditioned. The difference between a coefficient matrix generated by C<sup>∞</sup>-RBFs for partial differential or integral equations and Hilbert and Vandermonde systems is that C<sup>∞</sup>-RBFs are very sensitive to small changes in the adjustable parameters. These parameters affect the condition number and solution accuracy. The error terrain has many local and global maxima and minima. To find stable and accurate numerical solutions for full linear equation systems, this study proposes a hybrid combination of block Gaussian elimination (BGE) combined with arbitrary precision arithmetic (APA) to minimize the accumulation of rounding errors. In the future, this algorithm can execute faster using preconditioners and implemented on massively parallel computers.
文摘An exact solution of a linear difference equation in a finite number of steps has been obtained. This refutes the conventional wisdom that a simple iterative method for solving a system of linear algebraic equations is approximate. The nilpotency of the iteration matrix is the necessary and sufficient condition for getting an exact solution. The examples of iterative equations providing an exact solution to the simplest algebraic system are presented.
文摘In this paper, the matrix algebraic equations involved in the optimal control problem of time-invariant linear Ito stochastic systems, named Riccati- Ito equations in the paper, are investigated. The necessary and sufficient condition for the existence of positive definite solutions of the Riccati- Ito equations is obtained and an iterative solution to the Riccati- Ito equations is also given in the paper thus a complete solution to the basic problem of optimal control of time-invariant linear Ito stochastic systems is then obtained. An example is given at the end of the paper to illustrate the application of the result of the paper.
文摘This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations.
文摘A primordial field Self-interaction Principle, analyzed in Hestenes’ Geometric Calculus, leads to Heaviside’s equations of the gravitomagnetic field. When derived from Einstein’s nonlinear field equations Heaviside’s “linearized” equations are known as the “weak field approximation”. When derived from the primordial field equation, there is no mention of field strength;the assumption that the primordial field was predominant at the big bang rather suggests that ultra-strong fields are governed by the equations. This aspect has physical significance, so we explore the assumption by formulating the gauge field version of Heaviside’s theory. We compare with recent linearized gravity formulations and discuss the significance of differences.
文摘With the increasingly widespread application of linear algebra theory, and in its opposite direction is not enough emphasis, linear algebra, several important points: matrix, determinant, linear equations, linear transformations, matrix keratosis and other anti-deepening understanding of the basics and improve the comprehensive ability to solve problems.
文摘This paper studies the robust stochastic stabilization and robust H∞ control for linear time-delay systems with both Markovian jump parameters and unknown norm-bounded parameter uncertainties. This problem can be solved on the basis of stochastic Lyapunov approach and linear matrix inequality (LMI) technique. Sufficient conditions for the existence of stochastic stabilization and robust H∞ state feedback controller are presented in terms of a set of solutions of coupled LMIs. Finally, a numerical example is included to demonstrate the practicability of the proposed methods.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386)the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004)+2 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)Major State Basic Research Development Program of China(973 Program)(No.2014CB340600)the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
文摘Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work.
文摘This research paper evaluated and investigated the effectiveness of the comprehensible technique (CT) introduced by the researcher as an alternative solution to Algebra’s linear equations in solving consecutive number problems. The CT is a proposed easy and efficient way of solving number problems which aimed to help the learners reduce their difficulties in using variables since the technique only uses basic arithmetic and mental Mathematics. Evaluation research was utilized in this study where 20 people, from various ages and professions, were chosen purposively as respondents of the study. The study found out that CT was very effective for the respondents especially in unlocking difficulties in solving consecutive number problems. Moreover, according to them, the CT is easy to use, it is engaging and enjoyable, direct and simple and can be utilized as shortcut way of solving consecutive number problems when competing in Math quiz bees or taking board examinations where time is of the essence.
文摘In this paper, we consider the perturbation analysis of linear time-invariant systems, which arise from the linear optimal control in continuous-time. We provide a method to compute condition numbers of continuous-time linear time-invariant systems. It solves the perturbed linear time-invariant systems via Riccati differential equations and continuous-time algebraic Riccati equations in finite and infinite time horizons. We derive the explicit expressions of measuring the perturbation bounds of condition numbers with respect to the solution of the linear time-invariant systems. Furthermore, condition numbers and their upper bounds of Riccati differential equations and continuous-time algebraic Riccati equations are also discussed. Numerical simulations show the sharpness of the perturbation bounds computed via the proposed methods.
文摘由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解线性代数方程组(information-theoretically secure outsourcing of linear algebraic equations,ITS-OutsLAE)方法 .与之前的研究相比,在保持计算和通信复杂度与现有最优方案保持一致的同时,首次将方程组唯一解的安全性提升至信息论安全(完美保密).给出了形式化的安全性证明,并通过理论分析和实验证明了所提方法的实用性.