共查询到19条相似文献,搜索用时 375 毫秒
1.
逐位模2加运算与模2n加运算的相容程度分析 总被引:2,自引:1,他引:1
深入分析了逐位模2加运算和模2^n加运算的相客程度问题,给出了它们的相客概率的计算公式;同时给出了它们的一些性质.井对用这两种群运算的组合作为编码环节的特性做了一定的分析。 相似文献
2.
3.
4.
2017年版普通高中数学课程标准对复数版块做了局部调整,增加了复数三角表示.2021年全国新高考统一考试适应性训练和2020届高考数学全国卷(Ⅱ)(理科)对复数深度考查了与“模”有关的运算,本案例举几例复数求模问题,感受“模”在复数运算中的重要地位. 相似文献
5.
给出了Klimov-Shamir型1-Lipschitz函数的模2~2-微分指标的一个直接计算,修正了Anashin关于模2~2-微分指标的一个结论.进一步地,利用Anashin的模2~2-微分指标定理构造了一大类形如f(x)=u(x)+u~2(x)∨5的单圈1-Lipschitz函数. 相似文献
6.
《中国科学:数学》2017,(11)
模2~n加法是一个非常重要的密码运算部件,它已经被广泛用于各种对称密码算法的设计,如MD5、SNOW 3G、SPECK和ZUC等.差分故障攻击是针对密码算法实现的一种通用的安全性分析方法,该攻击假设攻击者能在算法运行过程中动态注入故障.在对采用模加运算的密码算法进行差分故障分析时,攻击者往往会导出一个模加差分方程系统,该方程系统中,方程的个数恰好等于法注入故障的次数,其与方程系统的解个数密切相关.由于注入故障次数和方程系统解个数是评估故障攻击复杂度的两个关键参数,因此,研究它们之间的关系非常有意义.本文讨论了上述模加差分方程系统中一类特殊方程系统(即模加差分相互独立且服从均匀分布)的解个数的统计特性.作为结果,本文给出了它们的期望和方差.本文的结果表明,对一般的模加差分方程系统,平均意义下,需要注入大约log_2(n)+5个故障可以确定方程系统的候选解. 相似文献
7.
本文对sl(2)的q-变形的不可分解的Harish-Chandra模进行了分类. 相似文献
8.
9.
10.
将sl2(R)上不可约Harish-Chandra模及sl2(R)上不可分解的Harish-Chandra模进行了完全分类,得到了与sl2(C)上模分类的不同形式.作为应用,又构造了实Virasoro代数的一类新的不可约表示. 相似文献
11.
Brink van Der Merwe 《代数通讯》2013,41(9):4103-4115
LetV be a module over a ring R. We define V to be a unique addition module (UAM) if it is not possible to change the addition of V without changing the action of R on V. If R is a domain such that 1 is not the only unit in R and V is a torsion-free i2-module, then we show that V is a UAM if and only if V has rank 1 (or if V={0}). We also classify finitely generated unique addition modules over commutative Artinian rings. 相似文献
12.
A set S of vertices in a graph G is a total dominating set if every vertex of G is adjacent to some vertex in S. The minimum cardinality of a total dominating set of G is the total domination number of G. A graph is total domination edge addition stable if the addition of an arbitrary edge has no effect on the total domination number. In this paper, we characterize total domination edge addition stable graphs. We determine a sharp upper bound on the total domination number of total domination edge addition stable graphs, and we determine which combinations of order and total domination number are attainable. We finish this work with an investigation of claw-free total domination edge addition stable graphs. 相似文献
13.
第二作者等用一个哲学公式及0.9规格化了收敛过程,从而形象化地解释了概率论与随机计算中的若干定理,使模拟的数值规律化.基于数学软件MATLB进行了大数定律的随机模拟,直观形象地展示了1/n∑_(i=1)~nX_i到数学期望μ的收敛过程,与第二作者等的哲学公式相吻合,从而有助于学生理解和掌握大数定律. 相似文献
14.
15.
16.
S.E. Rodabaugh 《Fuzzy Sets and Systems》1982,8(1):39-52
Under the hypothesis L is a chain, we construct a binary operation ⊕ on the L-fuzzy real line (L) which reduces to the usual addition on if ⊕ is restricted to the embedded image of in (L), which yields a partially ordered, abelian cancellation semigroup with identity, and which is jointly fuzzy continuous on (L). We show ⊕ is unique, i.e. it is the only extension of addition to (L) which is consistent. We study the relationship between ⊕ and other fuzzy continuous extensions of the usual addition. We also show that fuzzy translation is a weak fuzzy homeomorphism and, under certain conditions, a fuzzy homeomorphism. 相似文献
17.
The problem of designing high speed networks using different modules of link capacities, in the same model, in order to meet uncertain demands obtained from different probability distribution functions (PDF) is a very hard and challenging real network design problem. The novelty of the new model, compared to previous ones, is to allow installing more than one module per link having equal or different capacities. Moreover, the scenarios of traffic can be generated, according to practical observations, from the main classes of uncertain demands (multi-service) simulated from different PDFs, including heavy tailed ones. These classes of traffic are considered simultaneously for the scenario generation, different from related works in the literature that use only one probability distribution function to simulate the scenarios of traffic. In this work we present the problem formulation and report computational results using branch-and-bound and L-shaped decomposition solution approaches. We consider in the same model up to three different types of modular capacities (multi-facility), since it seems that using more than this can lead to an intractable model. The objective is to minimize penalty (in case of unmet demands) and investment costs. We obtain confidence intervals (with 95% of covering rate) on the expected optimal solution value for the resulting two-stage stochastic integer-modular problem and discuss when they are meaningful. Numerical experiments show that our model can handle up to medium real size instances. 相似文献
18.
Xiaodi Li 《Nonlinear Analysis: Real World Applications》2010,11(5):4194-4201
This paper studies the global exponential stabilization of impulsive functional differential equations with infinite delays or finite delays by using Lyapunov functions and improved Razumikhin technique. The results obtained in this paper improve and complement ones from some recent works. Moreover, the Razumikhin condition obtained is very simple and effective to implement in real problems and it is helpful for investigating the stability of control systems and synchronization control of chaotic systems. Finally, two examples and their simulations are given to show the effectiveness and advantages of our results. 相似文献
19.
A complete set of addition laws for incomplete Edwards curves 总被引:1,自引:0,他引:1
Edwards curves were the first curves shown to have a complete addition law. However, the completeness of the addition law depends on the curve parameters and even a complete Edwards curve becomes incomplete over a quadratic field extension. This paper covers arbitrary Edwards curves and gives a set of two addition laws that for any pair of input points P1, P2 produce the sum P1+P2. 相似文献