期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Normal Bases and Their Dual-Bases over Finite Fields 被引量:9
1
作者 Qun Ying LIAO Qi SUN 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2006年第3期845-848,共4页
In this paper, we prove the following results: 1) A normal basis N over a finite field is equivalent to its dual basis if and only if the multiplication table of N is symmetric; 2) The normal basis N is self-dual i... In this paper, we prove the following results: 1) A normal basis N over a finite field is equivalent to its dual basis if and only if the multiplication table of N is symmetric; 2) The normal basis N is self-dual if and only if its multiplication table is symmetric and Tr(α^2) = 1, where α generates N; 3) An optimal normal basis N is self-dual if and only if N is a type-Ⅰ optimal normal basis with q = n = 2 or N is a type-Ⅱ optimal normal basis. 展开更多
关键词 normal bases over finite fields Optimal normal bases Multiplication tables of normal bases
原文传递
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
2
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(DataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and Bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
下载PDF
关于有限域上一类特殊的对偶基 被引量:8
3
作者 廖群英 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第1期41-46,共6页
设q为素数幂,F=Fqn为有限域Fq的n次扩张,N={αqi|i=0,…,n-1}为F到Fq上的一组正规基,T=(ti,j)为其乘法表,B={βqi|i=0,…,n-1}为N的对偶基,H=(hi,j)为其乘法表,本文作者给出了: a,b∈Fq使β=a+bα的两个充分必要条件,以及在该假设之... 设q为素数幂,F=Fqn为有限域Fq的n次扩张,N={αqi|i=0,…,n-1}为F到Fq上的一组正规基,T=(ti,j)为其乘法表,B={βqi|i=0,…,n-1}为N的对偶基,H=(hi,j)为其乘法表,本文作者给出了: a,b∈Fq使β=a+bα的两个充分必要条件,以及在该假设之下乘法表T与H之间的运算关系. 展开更多
关键词 有限域上的正规基 正规基的对偶基 正规基的乘法表 等价正规基
下载PDF
On Primitive Optimal Normal Elements of Finite Fields 被引量:1
4
作者 Qun Ying LIAO 《Journal of Mathematical Research and Exposition》 CSCD 2010年第5期869-875,共7页
Let q be a prime or prime power and Fq^n the extension of q elements finite field Fq with degree n (n 〉 1). Davenport, Lenstra and School proved that there exists a primitive element α ∈ Fq^n such that α generat... Let q be a prime or prime power and Fq^n the extension of q elements finite field Fq with degree n (n 〉 1). Davenport, Lenstra and School proved that there exists a primitive element α ∈ Fq^n such that α generates a normal basis of Fq^n over Fq. Later, Mullin, Gao and Lenstra, etc., raised the definition of optimal normal bases and constructed such bases. In this paper, we determine all primitive type I optimal normal bases and all finite fields in which there exists a pair of reciprocal elements α and α^-1 such that both of them generate optimal normal bases of Fq^n over Fq. Furthermore, we obtain a sufficient condition for the existence of primitive type II optimal normal bases over finite fields and prove that all primitive optimal normal elements are conjugate to each other. 展开更多
关键词 finite fields normal bases primitive elements optimal normal bases.
下载PDF
The generalized Goertzel algorithm and its parallel hardware implementation
5
作者 CHEN Hao CHEN GongLiang LI JianHua 《Science China Mathematics》 SCIE 2008年第1期37-41,共5页
Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) error correcting codes are widely used in digital technology. An important problem in the implementation of RS and BCH decoding is the fast finding of the error p... Reed-Solomon (RS) and Bose-Chaudhuri-Hocquenghem (BCH) error correcting codes are widely used in digital technology. An important problem in the implementation of RS and BCH decoding is the fast finding of the error positions (the roots of error locator polynomials). Several fast root-finding algorithms for polynomials over finite fields have been proposed. In this paper we give a generalization of the Goertzel algorithm. Our algorithm is suitable for the parallel hardware implementation and the time of multiplications used is restricted by a constant. 展开更多
关键词 number theory of finite field RS and BCH decoding normal base the Goertzel algorithm 94B35 94-30
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部