Novel Encryption Schemes Based on Catalan Numbers
|
|
- Gabriel Warren
- 6 years ago
- Views:
Transcription
1 D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: Novel Ecryptio Schemes Based o atala Numbers 1 D. Sravaa Kumar H. Sueetha 3 A. hadrasekhar 1 Reader i Physics, SVLNS Govermet ollege, Bheemuipatam, Visakhapatam Dt., Idia Assistat Professor i Egieerig Mathematics, GITAM Uiversity, Visakhapatam, Idia, 3 Professor i Egieerig Mathematics, GITAM Uiversity, Visakhapatam, Idia Abstract:- Applied Number theory has so may applicatios i cryptography. Particularly iteger sequeces play very importat i cryptography. Earlier cryptographic algorithms were desiged usig the iteger sequeces of Fiboacci umbers ad Lucas umbers. I the preset paper ovel cryptographic algorithms were proposed basig o iteger sequeces of atala umbers. Key Words:- atala umber, ecryptio, decryptio Itroductio:- Biomial oefficiets:- Biomials which are sums of two terms always occur i mathematics. There is symmetric way of expadig the positive itegral powers of biomials. Let ad r be oegative itegers. The biomial coefficiet is defied as r! where 0 r, if r the r r!( r)! r is defied as zero. Iteger Sequece: - A iteger sequece is a sequece of itegers which may be specified explicitly by givig a formula for its th term, or implicitly by givig a relatioship betwee its terms. For example, the sequece 0, 1, 1,, 3, 5, 8, 13, (the Fiboacci sequece) is formed startig with 0 ad 1 ad the addig ay two cosecutive terms to obtai the ext oe: a implicit descriptio. The sequece 0, 3, 8, 15, is formed accordig to the formula 1 for the th term: a explicit defiitio. Defiitio:- atala umbers [1] were discovered by Belgia mathematicia Eugee. atala i atala umbers are sequece of atural umbers. The atala umber is defied as! 1, 0 ( 1)!! 1 Every atala umber is a iteger. The various atala umbers are 1,1,,5,14,4,13,49,1430,486,.. Defiitio: - The secod way of defiig the atala umber is!! 1 (!) ( 1)!( 1)!!!( 1)! This defiitio cofirms that every atala umber is a iteger. Seger s Recursive Formula:- I 1761, Seger usig the additio ad multiplicatio priciples, published a secod order recurrece formula T, where if greater tha or equal to 3. The Seger s recurrece formula ca be developed usig a -go with vertices A 1,A.A. The Seger s recurrece formula T is 1 T T T T T T T... T T, 3 k k k Defiitio:- From Euler s triagulatio problem the atala umber ca also be defied [3] recursively as = 1, 1 = 1, = 1, 0.(1) I 1941 H. Urba coectured the recurrece relatio. He first computed 3, 4, 5 ad the he made the followig observatios P a g e
2 D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: With this clear patter Urba iferred that = 1, 1...(1) Explicit formula of :- From the recursive formula the explicit formula of atala umber ca be derived as (4)(46) ( 1) (4 )(4 6)(4 10) ( 1) ( 1) A approximate value of atala umber ca be foud usig Stirlig s approximatio for factorials as ( 1) Ubiquitous Nature of atala Numbers :- Like Fiboacci umbers ad Lucas umbers, atala umbers are also ubiquitous [7]. atala sequece is the most frequetly ecoutered sequece presets everywhere i combiatorics. There are may coutig problems i combiatorics whose solutio is give by atala umbers. Some examples are 1.Fidig the umber of lattice paths of moutai rages with steps (1,1) ad (1,-1) that ever fall below the x-axis which are called Dyck paths.. Successive applicatios of biary operatios ca be represeted i terms of full biary tree. There the atala umber is the umber of full biary trees with +1 leaves. 3. I parethesizatio problem usig postfix expressios ad cyclic shifts of such exprssessios. 4. I the theory of partitioig i ombiatoraics. 5. I Abstract algebra ad sports 6. I Pascal s triagles ad iomputer Sciece. Properties of atala umbers:- Parity of atala umbers:-odd ad Eve atala umbers [6] Theorem:- For > 0, is odd if ad oly if is a Merseer umber. Proof:- It follows from the Seger s recurrece relatio that ( , if is eve 1 ( , otherwise osequetly for > 0, is odd if ad oly if both ad 1 1 umber is odd if ad oly if ad 3 are both odd or Primality of atala umbers:- Theorem:- The oly prime atala umbers[] are ad 3. (+) =(4+) 4 are odd. From this it implies that the atala 1 is zero. Proof :- From the formula (1) 1. Let be prime for some. It follows that if 16 P a g e
3 D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: > 3, < 1. So,. osequetly, so 1 k for some positive iteger k. The 1 (4+)=k(+) where 1 k 3 ad thus 4. Therefore, it follows that ad 3 are the oly atala umbers that are prime. L.W. Shapiro of Howard Uiversity itroduced triagular array of umbers B(,r) alled atala triagle. 1, if r = 1 = B(, r) B(-1,r-1) +B(-1,r)+B(-1,r+1), if 1 r 0, otherwise Geeralizatio of atala umbers:- atala umbers are special class of umbers 1 (k+1) (,k) defied by (,k) = where k 0 k+1 learly (,1) =. Some atala Numbers for =1 to 0are give below i the table for ready referece. As the value icreases the umber of digits i icrease rapidly. For example umber of decimal digits i 100 = Applicatio of Number Theory i ryptography:- Applied Number theory has so may applicatios i cryptography [8,9]. ryptographic algorithms were desiged usig Fiboacci umbers ad Lucas umbers. The geeral idea of the Fiboacci cryptography is similar to the Fiboacci codig ad based o the applicatio of the geeralized Fiboacci matrices. Lucas sequeces ca also be used for public key cryptosystems ad sigature systems similar to RSA, but usig Lucas sequeces modulo a composite umber istead of expoetiatio. Proposed Method 1:- Both the commuicatig parties before commuicatig the messages agree upo to use a large radom umber. The they write the correspodig atala umber which is a very large atural umber. Step 1. The seder divides the text message ito data blocks of m characters each, where m is a atural umber equal to the umber of decimal digits i the atala umber. The size of message always may ot be of m characters or multiples of m characters. If the message cotais less tha m characters the the seder adds three hash (###) characters at the ed of the message represetig that the message space is over ad the remaiig characters may be filled at radom. Step :- osider the first data block. All the m characters of the first data block are coded to equivalet biary umbers usig ASII code table. Let the ASII biary code of the th character M be b 7 b 6 b 5 b 4 b 3 b b 1 b P a g e
4 D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: Step 3:- Let the th digit of the key i.e., the atala umber be K. The compute K K 4(mod8). Logical NOT Operatios are applied o b l ad b ll ll k k Example: Let the M has the biary code ad let K be 9 the compute l ll K K (mod8) l bits of the umber. K K (mod8) 9(mod8) 1ad K K 4(mod8) 13(mod8) 5. The the logical NOT operatio is applied o b 1 ad b 5. The the umber M is ecrypted as This ecrypted umber is coded back to text characters usig ASII code table. Step 4:- The procedure explaied i steps ad 3 is applied to all the 8 bit biary codes of the characters i the th data block. This procedure is applied to all data blocks. Step 5 :- The this cipher text is commuicated to the receiver i public chael. Decryptio:- The receiver after receivig the cipher text decrypts the cipher text as follows: Step 1:- The receiver divides the cipher text ito data blocks of m characters each. Step :- He decrypts the message by ecryptig the cipher text as explaied i the ecryptio algorithm. If the receiver fids three cosecutive hash (###) characters i the cipher text the he recogizes that the message is over ad the discards the remaiig cipher characters. ad Example:- Ecryptio:-Suppose that the commuicatig parties agree upo to use the radom atural umber =7 i the process of commuicatio. The correspodig atala umber 7 = 49. The message is divided ito blocks of 3 characters each. Let the message be rrr. This message costitutes oly oe text block i.e. rrr, as m=3 i the selected example. K 4(mod8) 4, K 4 4(mod8) = K (mod8), K 4(mod8) = 6 K 9(mod8) 1, K 9 4(mod8) = The biary equivalet of r from the ASII code table is The first character r is coded as which correspods to the character c i the ASII code table. The secod character r is coded to which correspods to the character 6 i the ASII code table. The third character r is coded to which correspods to P i the ASII code table. So, the same character r i the message is coded to differet characters i this proposed method. rrr is ecrypted as c6p. Here a simple case of a small radom atural umber = 7 is cosidered as the example. But, i practice very large radom atural umber should be selected so that cotais large umber of decimal digits. Such selectio esures m is large. For example if = 100, m =57 Decryptio:- The receiver receives the cipher text c6p. He computes 7 ad calculates K 4(mod8) 4, K 4 4(mod8) = K (mod8), K 4(mod8) = 6 K 9(mod8) 1, K 9 4(mod8) = 5 He writes the correspodig biary code for c6p. The 3 1 correspodig biary code of the character c is To decrypt this biary umber he ecrypts it usig the ecryptio algorithm. This results i decrypted code correspodig to the message character r. Similarly the other characters i cipher 6 ad P are decrypted to r ad r. So, the receiver recovers the origial message rrr. Proposed Method II: - Both the commuicatig parties before commuicatig the messages agree upo to use a large radom umber. The they write the correspodig atala umber which is a very large atural umber. Step 1. The seder divides the text message ito data blocks of m characters each, where m is a atural umber equal to the umber of decimal digits i the atala umber. The size of message space may ot be of m characters or multiples of m characters. If the message cotais less tha m characters the the seder adds three hash (###) characters at the ed of the message represetig that the message space is over ad the remaiig characters may be filled at radom. Step :- osider the first data block. All the m characters of the first data block are coded to equivalet biary umbers usig ASII code table. Let the ASII biary code of the th character M be 164 P a g e
5 D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: b 7 b 6 b 5 b 4 b 3 b b 1 b 0 Step 3:- Let the th digit of the key i.e., the atala umber be K. The K which is a decimal digit is coverted to 4bit biary umber. The the th digit M which is i the 8 bits biary format is XORed with 841 code of K K. For example, let the biary code of 4th digit of the message be ad the 4 th digit of the key be 5. The is XORed bit wise with the 841 code of 55. ( ) XOR ( ) = Step 4:- The procedure explaied i steps ad 3 is applied to all the characters of each data block which are i biary format. Step 5:- The this cipher text is commuicated to the receiver i public chael. Decryptio: - The receiver after receivig the cipher text decrypts the cipher text as follows: Step 1:- The receiver divides the cipher text ito data blocks of m characters each. Step :- He decrypts the message by ecryptig the cipher text as explaied i the ecryptio algorithm. If the receiver fids three cosecutive hash (###) characters i the decrypted text the he recogizes that the message is over ad the discards the remaiig cipher characters. Example:- Ecryptio:-Suppose that the commuicatig parties agree upo to use the radom atural umber =7 i the process of commuicatio. The correspodig atala umber 7 = 49. Here K 1 =4. The correspodig 841 code is The 841 code of 44 = K =. The correspodig 841 code is The 841 code of = K 3 =9. The correspodig 841 code is The 841 code of 99 = Let the message be rrr. This message costitutes oly oe text block i.e. rrr, as m=3 i the selected example. The biary equivalet of r from the ASII code table is The first character r is ecrypted as XOR = This biary code correspods to the cipher character 6 i the ASII code table. The secod character r is ecrypted as XOR = This biary code correspods to the cipher character P i the ASII code table. The third character r is ecrypted as XOR = This biary code correspods to the cipher character ё i the ASII code table. So, the same character is coded to differet characters i this proposed method. rrr is ecrypted as 6P ё. Here a simple case of a small radom atural umber = 7 is cosidered as the example. But, i practice very large radom atural umber should be selected so that cotais large umber of decimal digits. Such selectio esures m is large. For example if = 94, m =54 Decryptio:- The receiver receives the cipher text 6P ё. The ASII biary codes of the characters of cipher message are , ad He computes 7 =49 ad recogizes K 1 =4,K = ad K 3 =9. The correspodig 841 codes are 0100, 0010 ad 1001 respectively. He calculates the strigs required to decrypt the first, secod ad third characters i the cipher message as , ad He decrypts the cipher as follows. 1) XOR = This biary code correspods to the cipher character r i the ASII code table. ) XOR = This biary code correspods to the cipher character r i the ASII code table. 3) XOR = This biary code correspods to the cipher character r i the ASII code table. So, the receiver retrieves the origial message rrr from the cipher text. oclusios:- I the proposed method of ecryptio usig atala umbers a large radom atural umber is agreed upo by the commuicatig parties as the secret key. The decimal digits i the atala umber correspodig to the agreed upo secret key are used to ecrypt/decrypt the message. The proposed two methods of ecryptio use logical NOT ad logical XOR operatios o the bits of the ASII biary codes of the characters i the message. The message is divided ito data blocks of size m characters each, where m is the umber of decimal digits i the atala umber. I the algorithms proposed decryptio is effected by ecryptig the cipher text, i.e. ecryptio of plai text gives cipher text ad ecryptio of cipher text gives the plai text. The ecryptio algorithms proposed usig atala umbers resistat to most of the types of kow attacks such as plai text attacks ad chose cipher text attacks [4]. The idetical characters of the plai text are coded to differet cipher characters. Hece, the brute force attack [5] ad exhaustive key search are difficult to execute. The time for ecipherig or decipherig is idepedet of characters i the data block. The time required to ecipher or decipher a data block is same for all data blocks. Eve though the origial message cotais the characters whose umber is less tha the umber of digits of the atala umber the remaiig characters are filled at radom, so that each data block 165 P a g e
6 D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: cotais exactly the same umber of characters. Therefore the cipher proposed here is less proe to timig attacks. The mai advatage of the methods proposed i this paper are higher level of security at relatively low computatioal overhead. Refereces:- [1] Alter.R, Some Remarks ad Results o atala Numbers, proceedigs of Louisiaa oferece o ombiatorics, Graph Theory ad computig (1971). [] Alter.R, ad K.K. Kubota Prime power Divisibility of atala Numbers, Joural of ombiatorial Theory, series A, 15 (1973), [3]. Brualdi, R. A. Itroductory ombiatorics, 4th ed. New York: Elsevier, 1997 [4]. aetti R. Halevi, S. ad Katz, J. hose cipher text security from idetity-based ecryptio, Advaces i ryptography-eurorypt 004, Vol. 307 of LNS, Spriger-Verlag. [5]. Eli Biham, ryptaalysis of multiples modes of operatio, Joural of ryptology, 1998, Vol.11, No.1, pgs [6] Jarvis.F. atala Numbers, Mathematical spectrum 36 (003-04), 9-1. [7] Koshy.T, The Ubiquitous atala Numbers, Mathematics Teacher 100 (October 006). [8] D.R. Stiso: ryptography. Theory ad Practice, R Press, Boca Rato, 00. [9] W. Trappe, L.. Washigto: Itroductio to ryptography with odig Theory, Pretice Hall, Upper Sadle River, P a g e
1.2 Binomial Coefficients and Subsets
1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =
More informationModule 8-7: Pascal s Triangle and the Binomial Theorem
Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationOn Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract
O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order
More informationSECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME
SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationINTERSECTION CORDIAL LABELING OF GRAPHS
INTERSECTION CORDIAL LABELING OF GRAPHS G Meea, K Nagaraja Departmet of Mathematics, PSR Egieerig College, Sivakasi- 66 4, Virudhuagar(Dist) Tamil Nadu, INDIA meeag9@yahoocoi Departmet of Mathematics,
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More information5.3 Recursive definitions and structural induction
/8/05 5.3 Recursive defiitios ad structural iductio CSE03 Discrete Computatioal Structures Lecture 6 A recursively defied picture Recursive defiitios e sequece of powers of is give by a = for =0,,, Ca
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationSuper Vertex Magic and E-Super Vertex Magic. Total Labelling
Proceedigs of the Iteratioal Coferece o Applied Mathematics ad Theoretical Computer Sciece - 03 6 Super Vertex Magic ad E-Super Vertex Magic Total Labellig C.J. Deei ad D. Atoy Xavier Abstract--- For a
More informationA Note on Chromatic Transversal Weak Domination in Graphs
Iteratioal Joural of Mathematics Treds ad Techology Volume 17 Number 2 Ja 2015 A Note o Chromatic Trasversal Weak Domiatio i Graphs S Balamuruga 1, P Selvalakshmi 2 ad A Arivalaga 1 Assistat Professor,
More informationOn Spectral Theory Of K-n- Arithmetic Mean Idempotent Matrices On Posets
Iteratioal Joural of Sciece, Egieerig ad echology Research (IJSER), Volume 5, Issue, February 016 O Spectral heory Of -- Arithmetic Mea Idempotet Matrices O Posets 1 Dr N Elumalai, ProfRMaikada, 3 Sythiya
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationOn (K t e)-saturated Graphs
Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationA Comparative Study of Positive and Negative Factorials
A Comparative Study of Positive ad Negative Factorials A. M. Ibrahim, A. E. Ezugwu, M. Isa Departmet of Mathematics, Ahmadu Bello Uiversity, Zaria Abstract. This paper preset a comparative study of the
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationCHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs
CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationUNIT 1 RECURRENCE RELATIONS
UNIT RECURRENCE RELATIONS Structure Page No.. Itroductio 7. Objectives 7. Three Recurret Problems 8.3 More Recurreces.4 Defiitios 4.5 Divide ad Coquer 7.6 Summary 9.7 Solutios/Aswers. INTRODUCTION I the
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationFast Fourier Transform (FFT) Algorithms
Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform
More informationAn Improvement of the Basic El-Gamal Public Key Cryptosystem
Iteratioal Joural of Computer Applicatios Techology ad Research A Improvemet of the Basic El-Gamal Public Key Cryptosystem W.D.M.G.M. Dissaayake (PG/MPhil/2015/09 Departmet of Computer Egieerig Faculty
More informationA RELATIONSHIP BETWEEN BOUNDS ON THE SUM OF SQUARES OF DEGREES OF A GRAPH
J. Appl. Math. & Computig Vol. 21(2006), No. 1-2, pp. 233-238 Website: http://jamc.et A RELATIONSHIP BETWEEN BOUNDS ON THE SUM OF SQUARES OF DEGREES OF A GRAPH YEON SOO YOON AND JU KYUNG KIM Abstract.
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationA New Bit Wise Technique for 3-Partitioning Algorithm
Special Issue of Iteratioal Joural of Computer Applicatios (0975 8887) o Optimizatio ad O-chip Commuicatio, No.1. Feb.2012, ww.ijcaolie.org A New Bit Wise Techique for 3-Partitioig Algorithm Rajumar Jai
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationSolving Fuzzy Assignment Problem Using Fourier Elimination Method
Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio
More informationThe Counterchanged Crossed Cube Interconnection Network and Its Topology Properties
WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationA study on Interior Domination in Graphs
IOSR Joural of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 219-765X. Volume 12, Issue 2 Ver. VI (Mar. - Apr. 2016), PP 55-59 www.iosrjourals.org A study o Iterior Domiatio i Graphs A. Ato Kisley 1,
More informationn n B. How many subsets of C are there of cardinality n. We are selecting elements for such a
4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationLecture 2: Spectra of Graphs
Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad
More informationCIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)
CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationRecursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:
Recursio Recursio Jordi Cortadella Departmet of Computer Sciece Priciple: Reduce a complex problem ito a simpler istace of the same problem Recursio Itroductio to Programmig Dept. CS, UPC 2 Mathematical
More informationCreating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA
Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by
More informationPartitions of a Convex Polygon
HAPTER 6 Partitios of a ovex Polygo 6 INTRODUTION I our survey we have come across some results o eumeratio of ocrossig cofiguratios o the set of vertices of a covex polygo, such as triagulatios ad trees
More informationarxiv: v2 [cs.ds] 24 Mar 2018
Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves
More informationReversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits
Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig
More informationNew Results on Energy of Graphs of Small Order
Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order
More informationPrime Cordial Labeling on Graphs
World Academy of Sciece, Egieerig ad Techology Iteratioal Joural of Mathematical ad Computatioal Scieces Vol:7, No:5, 013 Prime Cordial Labelig o Graphs S. Babitha ad J. Baskar Babujee, Iteratioal Sciece
More informationAlgorithm. Counting Sort Analysis of Algorithms
Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will
More informationLU Decomposition Method
SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio
More informationTheory of Fuzzy Soft Matrix and its Multi Criteria in Decision Making Based on Three Basic t-norm Operators
Theory of Fuzzy Soft Matrix ad its Multi Criteria i Decisio Makig Based o Three Basic t-norm Operators Md. Jalilul Islam Modal 1, Dr. Tapa Kumar Roy 2 Research Scholar, Dept. of Mathematics, BESUS, Howrah-711103,
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationName of the Student: Unit I (Logic and Proofs) 1) Truth Table: Conjunction Disjunction Conditional Biconditional
SUBJECT NAME : Discrete Mathematics SUBJECT CODE : MA 2265 MATERIAL NAME : Formula Material MATERIAL CODE : JM08ADM009 (Sca the above QR code for the direct dowload of this material) Name of the Studet:
More informationSome cycle and path related strongly -graphs
Some cycle ad path related strogly -graphs I. I. Jadav, G. V. Ghodasara Research Scholar, R. K. Uiversity, Rajkot, Idia. H. & H. B. Kotak Istitute of Sciece,Rajkot, Idia. jadaviram@gmail.com gaurag ejoy@yahoo.co.i
More informationGPUMP: a Multiple-Precision Integer Library for GPUs
GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract
More informationMajor CSL Write your name and entry no on every sheet of the answer script. Time 2 Hrs Max Marks 70
NOTE:. Attempt all seve questios. Major CSL 02 2. Write your ame ad etry o o every sheet of the aswer script. Time 2 Hrs Max Marks 70 Q No Q Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Total MM 6 2 4 0 8 4 6 70 Q. Write a
More informationSome New Results on Prime Graphs
Ope Joural of Discrete Mathematics, 202, 2, 99-04 http://dxdoiorg/0426/ojdm202209 Published Olie July 202 (http://wwwscirporg/joural/ojdm) Some New Results o Prime Graphs Samir Vaidya, Udaya M Prajapati
More informationRecurrent Formulas of the Generalized Fibonacci Sequences of Third & Fourth Order
Natioal Coferece o 'Advaces i Computatioal Mathematics' 7-8 Sept.03 :- 49 Recurret Formulas of the Geeralized Fiboacci Sequeces of hird & Fourth Order A. D.Godase Departmet of Mathematics V.P.College Vaijapur
More informationMean cordiality of some snake graphs
Palestie Joural of Mathematics Vol. 4() (015), 49 445 Palestie Polytechic Uiversity-PPU 015 Mea cordiality of some sake graphs R. Poraj ad S. Sathish Narayaa Commuicated by Ayma Badawi MSC 010 Classificatios:
More informationPolynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0
Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity
More informationEE123 Digital Signal Processing
Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add
More informationCSE 417: Algorithms and Computational Complexity
Time CSE 47: Algorithms ad Computatioal Readig assigmet Read Chapter of The ALGORITHM Desig Maual Aalysis & Sortig Autum 00 Paul Beame aalysis Problem size Worst-case complexity: max # steps algorithm
More informationCounting the Number of Minimum Roman Dominating Functions of a Graph
Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph
More information3. b. Present a combinatorial argument that for all positive integers n : : 2 n
. b. Preset a combiatorial argumet that for all positive itegers : : Cosider two distict sets A ad B each of size. Sice they are distict, the cardiality of A B is. The umber of ways of choosig a pair of
More informationOctahedral Graph Scaling
Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationHash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative
More informationCh 9.3 Geometric Sequences and Series Lessons
Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric
More informationFuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations
Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu
More informationfound that now considerable work has been done in this started with some example, which motivates the later results.
8 Iteratioal Joural of Comuter Sciece & Emergig Techologies (E-ISSN: 44-64) Volume, Issue 4, December A Study o Adjacecy Matrix for Zero-Divisor Grahs over Fiite Rig of Gaussia Iteger Prajali, Amit Sharma
More informationPLEASURE TEST SERIES (XI) - 04 By O.P. Gupta (For stuffs on Math, click at theopgupta.com)
wwwtheopguptacom wwwimathematiciacom For all the Math-Gya Buy books by OP Gupta A Compilatio By : OP Gupta (WhatsApp @ +9-9650 350 0) For more stuffs o Maths, please visit : wwwtheopguptacom Time Allowed
More informationThe Adjacency Matrix and The nth Eigenvalue
Spectral Graph Theory Lecture 3 The Adjacecy Matrix ad The th Eigevalue Daiel A. Spielma September 5, 2012 3.1 About these otes These otes are ot ecessarily a accurate represetatio of what happeed i class.
More informationEVALUATION OF TRIGONOMETRIC FUNCTIONS
EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationMessage Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationVisualization of Gauss-Bonnet Theorem
Visualizatio of Gauss-Boet Theorem Yoichi Maeda maeda@keyaki.cc.u-tokai.ac.jp Departmet of Mathematics Tokai Uiversity Japa Abstract: The sum of exteral agles of a polygo is always costat, π. There are
More informationMAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS
Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete
More informationCombination Labelings Of Graphs
Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is
More informationMatrix Partitions of Split Graphs
Matrix Partitios of Split Graphs Tomás Feder, Pavol Hell, Ore Shklarsky Abstract arxiv:1306.1967v2 [cs.dm] 20 Ju 2013 Matrix partitio problems geeralize a umber of atural graph partitio problems, ad have
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationJournal of Mathematical Nanoscience. Sanskruti Index of Bridge Graph and Some Nanocones
Joural of Mathematical Naoscieese 7 2) 2017) 85 95 Joural of Mathematical Naosciece Available Olie at: http://jmathaosrttuedu Saskruti Idex of Bridge Graph ad Some Naocoes K Pattabirama * Departmet of
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationON A GENERALIZED EULERIAN DISTRIBUTION
A. Ist. Statist. Math. Vol. 43, No. 1, 197-206 (1991) ON A GENERALIZED EULERIAN DISTRIBUTION CH. A. CHARALAMBIDES Statistical Uit, Uiversity of Athes, Paepisteraiopolis, Athes 157 84, Greece (Received
More informationPrivate Key Cryptography. TELE3119: Week2
Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i
More informationOn Characteristic Polynomial of Directed Divisor Graphs
Iter. J. Fuzzy Mathematical Archive Vol. 4, No., 04, 47-5 ISSN: 30 34 (P), 30 350 (olie) Published o April 04 www.researchmathsci.org Iteratioal Joural of V. Maimozhi a ad V. Kaladevi b a Departmet of
More informationAlgorithms Chapter 3 Growth of Functions
Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity Outlie Asymptotic otatio Stadard otatios
More informationStrong Complementary Acyclic Domination of a Graph
Aals of Pure ad Applied Mathematics Vol 8, No, 04, 83-89 ISSN: 79-087X (P), 79-0888(olie) Published o 7 December 04 wwwresearchmathsciorg Aals of Strog Complemetary Acyclic Domiatio of a Graph NSaradha
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationSum-connectivity indices of trees and unicyclic graphs of fixed maximum degree
1 Sum-coectivity idices of trees ad uicyclic graphs of fixed maximum degree Zhibi Du a, Bo Zhou a *, Nead Triajstić b a Departmet of Mathematics, South Chia Normal Uiversity, uagzhou 510631, Chia email:
More informationNeuro Fuzzy Model for Human Face Expression Recognition
IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1
More informationCubic Polynomial Curves with a Shape Parameter
roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad
More informationCSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)
CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a
More informationMath 10C Long Range Plans
Math 10C Log Rage Plas Uits: Evaluatio: Homework, projects ad assigmets 10% Uit Tests. 70% Fial Examiatio.. 20% Ay Uit Test may be rewritte for a higher mark. If the retest mark is higher, that mark will
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More information