期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
构造数表导出1~3+2~3+…+n^3公式
1
作者 范丽观 《中学生数学(高中版)》 2003年第04S期11-11,共1页
关键词 构造数表 1^3+2^3+…+n^3公式 代数 数学 高中 教学
原文传递
A Family of Asymmetrical Orthogonal Arrays with Run Sizes 4p^2 被引量:1
2
作者 廖靖宇 张建军 张应山 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2007年第3期426-435,共10页
Nowadays orthogonal arrays play important roles in statistics, computer science, coding theory and cryptography. The usual difference matrices are essential for the construction of many mixed orthogonal arrays. But th... Nowadays orthogonal arrays play important roles in statistics, computer science, coding theory and cryptography. The usual difference matrices are essential for the construction of many mixed orthogonal arrays. But there are also many orthogonal arrays, especially mixed-level or asymmetrical which can not be obtained by the usual difference matrices. In order to construct these asymmetrical orthogonal arrays, a class of special matrices, so-called generalized difference matrices, were discovered by Zhang(1989, 1990, 1993) by the orthogonal decompositions of projective matrices. In this article, an interesting equivalent relationship between the orthogonal arrays and the generalized difference matrices is presented. As an application, a family of orthogonal arrays of run sizes 4p2, such as L36(6^13^42^10), are constructed. 展开更多
关键词 mixed-level orthogonal arrays generalized difference matrices projective matrices permutable matrices
下载PDF
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
3
作者 Zhao Wentao Fu Shaojing +1 位作者 Li Chao Qu Longjiang 《China Communications》 SCIE CSCD 2012年第10期33-39,共7页
To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation o... To protect against algebraic attacks, a high algebraic immunity is now an important criterion for Boolean functions used in stream ciphers. In this paper, a new method based on a univariate polynomial representation of Boolean functions is proposed. The proposed method is used to constmct Boolean functions with an odd number of variables and with maximum algebraic immunity. We also discuss the nonlinearity of the constructed functions. Moreover, a lower bound is deter- mined for the number of Boolean functions with rmximum algebraic immunity. 展开更多
关键词 CRYPTOGRAPHY boolean function alge- braic attack algebraic immunity
下载PDF
Information schema constructs for instantiation and composition of system manifestation features
4
作者 Shahab POURTALEBI Imre HORVATH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1396-1415,共20页
Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management ... Complementing our previous publications, this paper presents the information schema constructs (ISCs) that underpin the programming of specific system manifestation feature (SMF) orientated information management and composing system models. First, we briefly present (1) the general process of pre-embodiment design with SMFs, (2) the procedures of creating genotypes and phenotypes of SMFs, (3) the specific procedure of instantiation of phenotypes of SMFs, and (4) the procedure of system model management and processing. Then, the chunks of information needed for instantiation of phenotypes of SMFs are discussed, and the ISCs designed for instantiation presented. Afterwards, the information management aspects of system modeling are addressed. Methodologically, system modeling involves (1) placement of phenotypes of SMF in the modeling space, (2) combining them towards the desired architecture and operation, (3) assigning values to the parameters and checking the satisfac- tion of constraints, and (4) storing the system model in the SMFs-based warehouse database. The final objective of the reported research is to develop an SMFs-based toolbox to support modeling of cyber-physical systems (CPSs). 展开更多
关键词 System manifestation features (SMFs) Information schema constructs Database schemata SMF genotypes SMFphenotypes SMF instances Soft'ware tool box System-level design Cyber-physieal systems
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部