Results 11 to 20 of about 5,939 (303)
Application of Extended Euclid Algorithm on Hill Cipher Cryptography Modulo 95
Hill Cipher Cryptography is the art of hiding a message using an invertible matrix as the key. Let A be a 2 2 invertible matrix of the real number. Encryption performed by converting each character on the original message into an ASCII code.
Annisa +3 more
doaj +1 more source
A unified approach for covariance matrix estimation under Stein loss
In this paper, we address the problem of estimating a covariance matrix of a multivariate Gaussian distribution, from a decision theoretic point of view, relative to a Stein type loss function.
Haddouche, Anis M., Lu, Wei
doaj +1 more source
Diagonal dominance and invertibility of matrices
A weakly diagonally dominant matrix may or may not be invertible. We characterize, in terms of combinatorial structure and sign pattern when such a matrix is invertible, which is the common case. Examples are given.
Johnson Charles Royal +2 more
doaj +1 more source
Algorithms for simultaneous block triangularization and block diagonalization of sets of matrices
In a recent paper, a new method was proposed to find the common invariant subspaces of a set of matrices. This paper investigates the more general problem of putting a set of matrices into block triangular or block-diagonal form simultaneously.
Ahmad Y. Al-Dweik +3 more
doaj +1 more source
Direct Iterative Photonic Integrated Matrix Inverter
We demonstrate the first chip-based real-valued direct photonic matrix inverter using coherent sources. At a rate of 2×10 5 inversions/s, a 16×16 diagonal matrix and a 2×2 arbitrary matrix are inverted with 99.2% and 93.7% accuracy.
Chen, Minjia +6 more
openaire +1 more source
Degree-inverting involutions on matrix algebras [PDF]
Let $F$ be an algebraically closed field of characteristic zero, and $G$ be a finite abelian group. If $A=\oplus_{g\in G} A_g$ is a $G$-graded algebra, we study degree-inverting involutions on $A$, i.e., involutions $*$ on $A$ satisfying $(A_g)^*\subseteq A_{g^{-1}}$, for all $g\in G$.
Fonseca, Lu��s Felipe Gon��alves +1 more
openaire +4 more sources
A New Algorithm for Privacy-Preserving Horizontally Partitioned Linear Programs
In a linear programming for horizontally partitioned data, the equality constraint matrix is divided into groups of rows. Each group of the matrix rows and the corresponding right-hand side vector are owned by different entities, and these entities are ...
Chengxue Zhang +3 more
doaj +1 more source
Gait Analysis for a Tiltrotor: The Dynamic Invertible Gait
A conventional feedback-linearization-based controller, when applied to a tiltrotor (eight inputs), results in extensive changes in tilting angles, which are not expected in practice. To solve this problem, we introduce the novel concept of “UAV gait” to
Zhe Shen, Takeshi Tsuchiya
doaj +1 more source
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers
The bit-based division property (BDP) is the most effective technique for finding integral characteristics of symmetric ciphers. Recently, automatic search tools have become one of the most popular approaches to evaluating the security of designs against
Kai Hu, Qingju Wang, Meiqin Wang
doaj +1 more source
An analogue of Serre’s conjecture for a ring of distributions
The set 𝒜 := δ0+ 𝒟+′, obtained by attaching the identity δ0 to the set 𝒟+′ of all distributions on with support contained in (0, ∞), forms an algebra with the operations of addition, convolution, multiplication by complex scalars.
Sasane Amol
doaj +1 more source

