26 resultados para System of Diophantine Equations

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Solving indeterminate algebraic equations in integers is a classic topic in the mathematics curricula across grades. At the undergraduate level, the study of solutions of non-linear equations of this kind can be motivated by the use of technology. This article shows how the unity of geometric contextualization and spreadsheet-based amplification of this topic can provide a discovery experience for prospective secondary teachers and information technology students. Such experience can be extended to include a transition from a computationally driven conjecturing to a formal proof based on a number of simple yet useful techniques.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Several recently proposed ciphers, for example Rijndael and Serpent, are built with layers of small S-boxes interconnected by linear key-dependent layers. Their security relies on the fact, that the classical methods of cryptanalysis (e.g. linear or differential attacks) are based on probabilistic characteristics, which makes their security grow exponentially with the number of rounds N r r. In this paper we study the security of such ciphers under an additional hypothesis: the S-box can be described by an overdefined system of algebraic equations (true with probability 1). We show that this is true for both Serpent (due to a small size of S-boxes) and Rijndael (due to unexpected algebraic properties). We study general methods known for solving overdefined systems of equations, such as XL from Eurocrypt’00, and show their inefficiency. Then we introduce a new method called XSL that uses the sparsity of the equations and their specific structure. The XSL attack uses only relations true with probability 1, and thus the security does not have to grow exponentially in the number of rounds. XSL has a parameter P, and from our estimations is seems that P should be a constant or grow very slowly with the number of rounds. The XSL attack would then be polynomial (or subexponential) in N r> , with a huge constant that is double-exponential in the size of the S-box. The exact complexity of such attacks is not known due to the redundant equations. Though the presented version of the XSL attack always gives always more than the exhaustive search for Rijndael, it seems to (marginally) break 256-bit Serpent. We suggest a new criterion for design of S-boxes in block ciphers: they should not be describable by a system of polynomial equations that is too small or too overdefined.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The solution of linear ordinary differential equations (ODEs) is commonly taught in first year undergraduate mathematics classrooms, but the understanding of the concept of a solution is not always grasped by students until much later. Recognising what it is to be a solution of a linear ODE and how to postulate such solutions, without resorting to tables of solutions, is an important skill for students to carry with them to advanced studies in mathematics. In this study we describe a teaching and learning strategy that replaces the traditional algorithmic, transmission presentation style for solving ODEs with a constructive, discovery based approach where students employ their existing skills as a framework for constructing the solutions of first and second order linear ODEs. We elaborate on how the strategy was implemented and discuss the resulting impact on a first year undergraduate class. Finally we propose further improvements to the strategy as well as suggesting other topics which could be taught in a similar manner.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The stimulus for this project rose from the need to find an alternative solution to aging superstructures of road-bridge in low volume roads (LVR). The solution investigated, designed and consequently plans to construct, involved replacing an aging super-structure of a 10m span bridge with Flat-Bed Rail Wagon (FBRW). The main focus of this paper is to present alternate structural system for the design of the FBRW as road bridge deck conforming to AS5100. The structural adequacy of the primary members of the FBRW was first validated using full scale experimental investigation to AS5100 serviceability and ultimate limit state loading. The bare FBRW was further developed to include a running surface. Two options were evaluated during the design phase, namely timber and reinforced concrete. First option, which is presented here, involved strengthening of the FBRW using numerous steel sections and overlaying the bridge deck with timber planks. The idea of this approach was to use all the primary and secondary members of the FBRW in load sharing and to provide additional members where weaknesses in the original members arose. The second option, which was the preferred option for construction, involved use of primary members only with an overlaying reinforced concrete slab deck. This option minimised the risk associated with any uncertainty of secondary members to its structural adequacy. The paper will report selected results of the experiment as well as the design phases of option one with conclusions highlighting the viability of option 1 and its limitations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is defined. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, but is unlikely to occur either randomly or in applications. However, by deleting certain vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn the system of polynomial equations would be separated into smaller systems of near-equal sizes. In graph theory terms, this process is equivalent to finding balanced vertex partitions with minimum-weight vertex separators. The techniques of finding these vertex partitions are discussed, and experiments are performed to evaluate its practicality for general graphs and systems of polynomial equations. Applications of this approach in algebraic cryptanalysis on symmetric ciphers are presented: For the QUAD family of stream ciphers, we show how a malicious party can manufacture conforming systems that can be easily broken. For the stream ciphers Bivium and Trivium, we nachieve significant speedups in algebraic attacks against them, mainly in a partial key guess scenario. In each of these cases, the systems of polynomial equations involved are well-suited to our graph partitioning method. These results may open a new avenue for evaluating the security of symmetric ciphers against algebraic attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The numerical modelling of electromagnetic waves has been the focus of many research areas in the past. Some specific applications of electromagnetic wave scattering are in the fields of Microwave Heating and Radar Communication Systems. The equations that govern the fundamental behaviour of electromagnetic wave propagation in waveguides and cavities are the Maxwell's equations. In the literature, a number of methods have been employed to solve these equations. Of these methods, the classical Finite-Difference Time-Domain scheme, which uses a staggered time and space discretisation, is the most well known and widely used. However, it is complicated to implement this method on an irregular computational domain using an unstructured mesh. In this work, a coupled method is introduced for the solution of Maxwell's equations. It is proposed that the free-space component of the solution is computed in the time domain, whilst the load is resolved using the frequency dependent electric field Helmholtz equation. This methodology results in a timefrequency domain hybrid scheme. For the Helmholtz equation, boundary conditions are generated from the time dependent free-space solutions. The boundary information is mapped into the frequency domain using the Discrete Fourier Transform. The solution for the electric field components is obtained by solving a sparse-complex system of linear equations. The hybrid method has been tested for both waveguide and cavity configurations. Numerical tests performed on waveguides and cavities for inhomogeneous lossy materials highlight the accuracy and computational efficiency of the newly proposed hybrid computational electromagnetic strategy.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Entertainment Industries is the first book to map entertainment as a cultural system. Including work from world-renowned analysts such as Henry Jenkins and Jonathan Gray, this innovative collection explains what entertainment is and how it works. Entertainment is audience-centred culture. The Entertainment Industries are a uniquely interdisciplinary collection of evolving businesses that openly monitor evolving cultural trends and work within them. The producers of entertainment – central to that practice– are the new artists. They understand audiences and combine creative, business and legal skills in order to produce cultural products that cater to them. Entertainment Industries describes the characteristics of entertainment, the systems that produce it, and the role of producers and audiences in its development, as well as explaining the importance of this area of study, and how it might be better integrated into Universities.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this Issues Paper, I raise some key points relevant for any government which is considering its child protection and family welfare policy. In particular, I will raise questions about whether a form of legislative reporting duty is required, and if so, what consequences this has for child protection. The context of child maltreatment - and each form of maltreatment: physical abuse, sexual abuse, psychological or emotional abuse, and neglect - is extremely complex, and the overarching question of how to deal with these phenomena involve challenging normative, economic and practical questions. There are no easy or perfect solutions. Nor, often, is there the amount and quality of evidence available on which public policy approaches should be devised. However, from the best evidence about the history of this context, from research conducted in this field, and from the best evidence available about the nature, incidence and effects of different subtypes of maltreatment, some observations can be made which may help to inform deliberations. I outline 10 key issues related to mandatory reporting legislation while being mindful of the New Zealand context. My view, based on both research evidence and a concern to protect and promote children’s interests, and society’s interests, is that reporting laws in some form are necessary and can contribute substantially to child protection and enhancing family and community health and wellbeing. However, they are only one necessary part of a sound child protection system, being a method of tertiary and secondary prevention, and primary prevention efforts must also be prioritised. Moreover, it is essential that if a legislative reporting duty is enacted, it must be designed carefully and implemented soundly, and it must be integrated within a properly resourced child protection and family welfare system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mixtures of single odours were used to explore the receptor response profile across individual antennae of Helicoverpa armigera (Hübner) (Lepidoptera: Noctuidae). Seven odours were tested including floral and green-leaf volatiles: phenyl acetaldehyde, benzaldehyde, β-caryophyllene, limonene, α-pinene, 1-hexanol, 3Z-hexenyl acetate. Electroantennograms of responses to paired mixtures of odours showed that there was considerable variation in receptor tuning across the receptor field between individuals. Data from some moth antennae showed no additivity, which indicated a restricted receptor profile. Results from other moth antennae to the same odour mixtures showed a range of partial additivity. This indicated that a wider array of receptor types was present in these moths, with a greater percentage of the receptors tuned exclusively to each odour. Peripheral receptor fields show variation in the spectrum of response within a population (of moths) when exposed to high doses of plant volatiles. This may be related to recorded variation in host choice within moth populations as reported by other authors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Irradiance profile around the receiver tube (RT) of a parabolic trough collector (PTC) is a key effect of optical performance that affects the overall energy performance of the collector. Thermal performance evaluation of the RT relies on the appropriate determination of the irradiance profile. This article explains a technique in which empirical equations were developed to calculate the local irradiance as a function of angular location of the RT of a standard PTC using a vigorously verified Monte Carlo ray tracing model. A large range of test conditions including daily normal insolation, spectral selective coatings and glass envelop conditions were selected from the published data by Dudley et al. [1] for the job. The R2 values of the equations are excellent that vary in between 0.9857 and 0.9999. Therefore, these equations can be used confidently to produce realistic non-uniform boundary heat flux profile around the RT at normal incidence for conjugate heat transfer analyses of the collector. Required values in the equations are daily normal insolation, and the spectral selective properties of the collector components. Since the equations are polynomial functions, data processing software can be employed to calculate the flux profile very easily and quickly. The ultimate goal of this research is to make the concentrating solar power technology cost competitive with conventional energy technology facilitating its ongoing research.