In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. S...In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. So every filter of lattice implication algebra satisfies the Syllogis m and substitution Theorem of propositional logic.展开更多
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua...The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.展开更多
In this paper, we mainly concerned about the nilpotence of Lie triple algebras.We give the definition of nilpotence of the Lie triple algebra and obtained that if Lie triplealgebra is nilpotent, then its standard enve...In this paper, we mainly concerned about the nilpotence of Lie triple algebras.We give the definition of nilpotence of the Lie triple algebra and obtained that if Lie triplealgebra is nilpotent, then its standard enveloping Lie algebra is nilpotent.展开更多
Communication network has communication capacity and connection reliability of the links. They canbe independently defined and can be used separately, and when the reliability of a communication network isanalyzed fro...Communication network has communication capacity and connection reliability of the links. They canbe independently defined and can be used separately, and when the reliability of a communication network isanalyzed from a macroscopical angle of view, it is more objective to express the performance index of a commu-nication network as a whole. The reliability index weighted capacity is just obtained by integrating these two pa-rameters. It is necessary to further study the algorithm to calculate the reliability index of the communicationnetwork with a complicated topologic structure and a whole algebraic algorithm is therefore proposed for calcula-tion of the reliability index weighted capacity of a communication network with a topologic structure. The wholecomputational procedure of the algorithm is illustrated with a typical example.展开更多
With the increasingly widespread application of linear algebra theory, and in its opposite direction is not enough emphasis, linear algebra, several important points: matrix, determinant, linear equations, linear tra...With the increasingly widespread application of linear algebra theory, and in its opposite direction is not enough emphasis, linear algebra, several important points: matrix, determinant, linear equations, linear transformations, matrix keratosis and other anti-deepening understanding of the basics and improve the comprehensive ability to solve problems.展开更多
This paper mainly proposes a new C-XSC (C- for eXtended Scientific Computing) software for the symmetric single step method and relaxation method for computing an enclosure for the solution set and compares the meth...This paper mainly proposes a new C-XSC (C- for eXtended Scientific Computing) software for the symmetric single step method and relaxation method for computing an enclosure for the solution set and compares the methods with others' and then makes some modifications and finally, examples illustrating the applicability of the proposed methods are given.展开更多
The XYZ antiferromagnetic model in linear spin-wave frame is shown explicitly to have an su(1,2) algebraic structure: the Hamiltonian can be written as a linear function of the su(1,2) algebra generators. Based o...The XYZ antiferromagnetic model in linear spin-wave frame is shown explicitly to have an su(1,2) algebraic structure: the Hamiltonian can be written as a linear function of the su(1,2) algebra generators. Based on it, the energy eigenvalues are obta/ned by making use of the similar transformations, and the algebraic diagonalization method is investigated. Some numerical solutions are given, and the results indicate that only one group solution could be accepted in physics.展开更多
We obtain. the exact analytical results of all the eigenvalues and eigenstates for three kinds of models describing N-mode multiphoton process without using the assumption of the Bethe ansatz. The exact analytical res...We obtain. the exact analytical results of all the eigenvalues and eigenstates for three kinds of models describing N-mode multiphoton process without using the assumption of the Bethe ansatz. The exact analytical results of all the eigenstates and eigenvalues are in terms of a parameter lambda for three kinds of models describing N-mode multiphoton process. The parameter is shown to be determined by the roots of a polynomial and is solvable analytically or numerically. Moreover, these three kinds of models can be processed with the same procedure.展开更多
One of the key features of Laplace's Equation is the property that allows the equation governing the flow field to be converted from a 3D problem throughout the field to a 2D problem for finding the potential on the ...One of the key features of Laplace's Equation is the property that allows the equation governing the flow field to be converted from a 3D problem throughout the field to a 2D problem for finding the potential on the surface. The solution is then found using this property by distributing "singularities" of unknown strength over discretized portions of the surface: panels. Hence the flow field solution is found by representing the surface by a number of panels, and solving a linear set of algebraic equations to determine the unknown strengths of the singularities. In this paper a Hess-Smith Panel Method is then used to examine the aerodynamics of NACA 4412 and NACA 23015 wind turbine airfoils. The lift coefficient and the pressure distribution are predicted and compared with experimental result for low Reynolds number. Results show a good agreement with experimental data.展开更多
The authors extend Hua’s fundamental theorem of the geometry of Hermitian matri- ces to the in?nite-dimensional case. An application to characterizing the corresponding Jordan ring automorphism is also presented.
In this paper,a generalized Toeplitz operator is defined and some of results about the classical Toeplitz operator are generalized.In particular,we obtain the necessary and sufficient condition for the product of two ...In this paper,a generalized Toeplitz operator is defined and some of results about the classical Toeplitz operator are generalized.In particular,we obtain the necessary and sufficient condition for the product of two such Toeplitz operators to still be Toeplitz operator and the necessary and sufficient condition for such Toeplitz operator to be normal operator.Finally,a necessary condition for two such Toeplitz operators to be commutative is established.展开更多
We continue our investigations on pointwise multipliers for Besov spaces of dominating mixed smoothness. This time we study the algebra property of the classes S_(p,q)~rB(R^d) with respect to pointwise multiplication....We continue our investigations on pointwise multipliers for Besov spaces of dominating mixed smoothness. This time we study the algebra property of the classes S_(p,q)~rB(R^d) with respect to pointwise multiplication. In addition, if p≤q, we are able to describe the space of all pointwise multipliers for S_(p,q)~rB(R^d).展开更多
Jimbo-Miwa(JM) equation is one of the famous(3+1)-dimensional conditionally integrable nonlinear dynamical systems. It is pointed out that JM equation and its generalized form possess some types of interesting nonline...Jimbo-Miwa(JM) equation is one of the famous(3+1)-dimensional conditionally integrable nonlinear dynamical systems. It is pointed out that JM equation and its generalized form possess some types of interesting nonlinear excitations such as the algebraic lump-type line solitons, the lumpoff-type half line solitons, and segment solitons.展开更多
This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, nonlinearity and algebraic im...This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, nonlinearity and algebraic immunity are also considered. A sufficient condition of the modified func- tions with optimal algebraic degree in terms of the Siegenthaler bound is proposed. The authors obtain a lower bound on the nonlinearity of the Tang-Carlet-Tang functions, which is slightly better than the known result. If the authors do not break the "continuity" of the support and zero sets, the functions constructed in this paper have suboptimal algebraic immunity. Finally, four specific classes of 1-resilient Boolean functions constructed from this construction and with the mentioned good cryptographic properties are proposed. Experimental results show that there are many 1-resilient Boolean functions have higher nonlinearities than known l-resilient functions modified by Tu-Deng and Tang- Carlet-Tang functions.展开更多
Quantum algorithms have been developed for efficiently solving linear algebra tasks.However,they generally require deep circuits and hence universal fault-tolerant quantum computers.In this work,we propose variational...Quantum algorithms have been developed for efficiently solving linear algebra tasks.However,they generally require deep circuits and hence universal fault-tolerant quantum computers.In this work,we propose variational algorithms for linear algebra tasks that are compatible with noisy intermediate-scale quantum devices.We show that the solutions of linear systems of equations and matrix–vector multiplications can be translated as the ground states of the constructed Hamiltonians.Based on the variational quantum algorithms,we introduce Hamiltonian morphing together with an adaptive ans?tz for efficiently finding the ground state,and show the solution verification.Our algorithms are especially suitable for linear algebra problems with sparse matrices,and have wide applications in machine learning and optimisation problems.The algorithm for matrix multiplications can be also used for Hamiltonian simulation and open system simulation.We evaluate the cost and effectiveness of our algorithm through numerical simulations for solving linear systems of equations.We implement the algorithm on the IBM quantum cloud device with a high solution fidelity of 99.95%.展开更多
For a quantized enveloping algebra of finite type, one can associate a natural monomial to a dominant weight. We show that these monomials for types A5 and D4 are semitight(i.e., a Z-linear combination of elements in ...For a quantized enveloping algebra of finite type, one can associate a natural monomial to a dominant weight. We show that these monomials for types A5 and D4 are semitight(i.e., a Z-linear combination of elements in the canonical basis) by a direct calculation.展开更多
The left-inverse system with minimal order and its algorithms of discrete-time nonlinear systems are studied in a linear algebraic framework. The general structure of left-inverse system is described and computed in s...The left-inverse system with minimal order and its algorithms of discrete-time nonlinear systems are studied in a linear algebraic framework. The general structure of left-inverse system is described and computed in symbolic algorithm. Two algorithms are given for constructing left-inverse systems with minimal order.展开更多
This paper investigates the controllability problem of time-variant linear stochastic controlsystems.A sufficient and necessary condition is established for stochastic exact controllability,whichprovides a useful alge...This paper investigates the controllability problem of time-variant linear stochastic controlsystems.A sufficient and necessary condition is established for stochastic exact controllability,whichprovides a useful algebraic criterion for stochastic control systems.Furthermore,when the stochasticsystems degenerate to deterministic systems,the algebraic criterion becomes the counterpart for thecomplete controllability of deterministic control systems.展开更多
文摘In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. So every filter of lattice implication algebra satisfies the Syllogis m and substitution Theorem of propositional logic.
基金the National Natural Science Foundation of China,the State Key Program of National Natural Science of China,the Major Research Plan of the National Natural Science Foundation of China,Major State Basic Research Development Program of China (973 Program),the Hubei Natural Science Foundation of China
文摘The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.
基金Supported by NKBRPC(2004CB31800)Supported by NNSFC(10375087)
文摘In this paper, we mainly concerned about the nilpotence of Lie triple algebras.We give the definition of nilpotence of the Lie triple algebra and obtained that if Lie triplealgebra is nilpotent, then its standard enveloping Lie algebra is nilpotent.
基金Sponsored by the Natural Science Foundation of Harbin Institute of Technology (Weihai) (Grant No. HIT(WH). 2002. 7)
文摘Communication network has communication capacity and connection reliability of the links. They canbe independently defined and can be used separately, and when the reliability of a communication network isanalyzed from a macroscopical angle of view, it is more objective to express the performance index of a commu-nication network as a whole. The reliability index weighted capacity is just obtained by integrating these two pa-rameters. It is necessary to further study the algorithm to calculate the reliability index of the communicationnetwork with a complicated topologic structure and a whole algebraic algorithm is therefore proposed for calcula-tion of the reliability index weighted capacity of a communication network with a topologic structure. The wholecomputational procedure of the algorithm is illustrated with a typical example.
文摘With the increasingly widespread application of linear algebra theory, and in its opposite direction is not enough emphasis, linear algebra, several important points: matrix, determinant, linear equations, linear transformations, matrix keratosis and other anti-deepening understanding of the basics and improve the comprehensive ability to solve problems.
文摘This paper mainly proposes a new C-XSC (C- for eXtended Scientific Computing) software for the symmetric single step method and relaxation method for computing an enclosure for the solution set and compares the methods with others' and then makes some modifications and finally, examples illustrating the applicability of the proposed methods are given.
基金The project supported by National Natural Science Foundation of China under Grant Nos.10447103 and 90305026the Natural Science Foundation of Beijing under Grant No.1072010the Foundation of Education Department of Beijing under Grant No.KM200610772007
文摘The XYZ antiferromagnetic model in linear spin-wave frame is shown explicitly to have an su(1,2) algebraic structure: the Hamiltonian can be written as a linear function of the su(1,2) algebra generators. Based on it, the energy eigenvalues are obta/ned by making use of the similar transformations, and the algebraic diagonalization method is investigated. Some numerical solutions are given, and the results indicate that only one group solution could be accepted in physics.
文摘We obtain. the exact analytical results of all the eigenvalues and eigenstates for three kinds of models describing N-mode multiphoton process without using the assumption of the Bethe ansatz. The exact analytical results of all the eigenstates and eigenvalues are in terms of a parameter lambda for three kinds of models describing N-mode multiphoton process. The parameter is shown to be determined by the roots of a polynomial and is solvable analytically or numerically. Moreover, these three kinds of models can be processed with the same procedure.
文摘One of the key features of Laplace's Equation is the property that allows the equation governing the flow field to be converted from a 3D problem throughout the field to a 2D problem for finding the potential on the surface. The solution is then found using this property by distributing "singularities" of unknown strength over discretized portions of the surface: panels. Hence the flow field solution is found by representing the surface by a number of panels, and solving a linear set of algebraic equations to determine the unknown strengths of the singularities. In this paper a Hess-Smith Panel Method is then used to examine the aerodynamics of NACA 4412 and NACA 23015 wind turbine airfoils. The lift coefficient and the pressure distribution are predicted and compared with experimental result for low Reynolds number. Results show a good agreement with experimental data.
基金Project supported by the National Natural Science Foundation of China (No.10471082) and the ShanxiProvincial Natural Science Foundation of China.
文摘The authors extend Hua’s fundamental theorem of the geometry of Hermitian matri- ces to the in?nite-dimensional case. An application to characterizing the corresponding Jordan ring automorphism is also presented.
基金Foundation item: the Natural Science Foundation of Jiangxi Province (No. 2007GZS0371)
文摘In this paper,a generalized Toeplitz operator is defined and some of results about the classical Toeplitz operator are generalized.In particular,we obtain the necessary and sufficient condition for the product of two such Toeplitz operators to still be Toeplitz operator and the necessary and sufficient condition for such Toeplitz operator to be normal operator.Finally,a necessary condition for two such Toeplitz operators to be commutative is established.
文摘We continue our investigations on pointwise multipliers for Besov spaces of dominating mixed smoothness. This time we study the algebra property of the classes S_(p,q)~rB(R^d) with respect to pointwise multiplication. In addition, if p≤q, we are able to describe the space of all pointwise multipliers for S_(p,q)~rB(R^d).
基金Supported by National Natural Science Foundation of China under Grant No.11435005Ningbo Natural Science Foundation(No.2015A610159)+1 种基金granted by the Opening Project of Zhejiang Provincial Top Key Discipline of Physics Sciences in Ningbo University under Grant No.xkzwl1502sponsored by K.C.Wong Magna Fund in Ningbo University
文摘Jimbo-Miwa(JM) equation is one of the famous(3+1)-dimensional conditionally integrable nonlinear dynamical systems. It is pointed out that JM equation and its generalized form possess some types of interesting nonlinear excitations such as the algebraic lump-type line solitons, the lumpoff-type half line solitons, and segment solitons.
基金supported by the National Key Basic Research Program of China under Grant No.2013CB834203the National Natural Science Foundation of China under Grant Nos.61472417 and 61472120the Research Council of Norway
文摘This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, nonlinearity and algebraic immunity are also considered. A sufficient condition of the modified func- tions with optimal algebraic degree in terms of the Siegenthaler bound is proposed. The authors obtain a lower bound on the nonlinearity of the Tang-Carlet-Tang functions, which is slightly better than the known result. If the authors do not break the "continuity" of the support and zero sets, the functions constructed in this paper have suboptimal algebraic immunity. Finally, four specific classes of 1-resilient Boolean functions constructed from this construction and with the mentioned good cryptographic properties are proposed. Experimental results show that there are many 1-resilient Boolean functions have higher nonlinearities than known l-resilient functions modified by Tu-Deng and Tang- Carlet-Tang functions.
基金the Engineering and Physical Sciences Research Council National Quantum Technology Hub in Networked Quantum Information Technology(EP/M013243/1)Japan Student Services Organization(JASSO)Student Exchange Support Program(Graduate Scholarship for Degree Seeking Students)+1 种基金the National Natural Science Foundation of China(U1730449)the European Quantum Technology Flagship project AQTION。
文摘Quantum algorithms have been developed for efficiently solving linear algebra tasks.However,they generally require deep circuits and hence universal fault-tolerant quantum computers.In this work,we propose variational algorithms for linear algebra tasks that are compatible with noisy intermediate-scale quantum devices.We show that the solutions of linear systems of equations and matrix–vector multiplications can be translated as the ground states of the constructed Hamiltonians.Based on the variational quantum algorithms,we introduce Hamiltonian morphing together with an adaptive ans?tz for efficiently finding the ground state,and show the solution verification.Our algorithms are especially suitable for linear algebra problems with sparse matrices,and have wide applications in machine learning and optimisation problems.The algorithm for matrix multiplications can be also used for Hamiltonian simulation and open system simulation.We evaluate the cost and effectiveness of our algorithm through numerical simulations for solving linear systems of equations.We implement the algorithm on the IBM quantum cloud device with a high solution fidelity of 99.95%.
文摘For a quantized enveloping algebra of finite type, one can associate a natural monomial to a dominant weight. We show that these monomials for types A5 and D4 are semitight(i.e., a Z-linear combination of elements in the canonical basis) by a direct calculation.
文摘The left-inverse system with minimal order and its algorithms of discrete-time nonlinear systems are studied in a linear algebraic framework. The general structure of left-inverse system is described and computed in symbolic algorithm. Two algorithms are given for constructing left-inverse systems with minimal order.
基金supported by the National Natural Science Foundation under Grant Nos.60904029 and 60704002the State Key Laboratory under Grant No.RCS2008ZT002
文摘This paper investigates the controllability problem of time-variant linear stochastic controlsystems.A sufficient and necessary condition is established for stochastic exact controllability,whichprovides a useful algebraic criterion for stochastic control systems.Furthermore,when the stochasticsystems degenerate to deterministic systems,the algebraic criterion becomes the counterpart for thecomplete controllability of deterministic control systems.