In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in wh...In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.展开更多
Let n be a positive integer. A permutation a of the symmetric group of permutations of is called a derangement if for each . Suppose that x and y are two arbitrary permutations of . We say that...Let n be a positive integer. A permutation a of the symmetric group of permutations of is called a derangement if for each . Suppose that x and y are two arbitrary permutations of . We say that a permutation a is a double derangement with respect to x and y if and for each . In this paper, we give an explicit formula for , the number of double derangements with respect to x and y. Let and let and be two subsets of with and . Suppose that denotes the number of derangements x such that . As the main result, we show that if and z is a permutation such that for and for , then where .展开更多
Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalize...Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained.展开更多
When solving a mathematical problem, we sometimes encounter a situation where we can not reach a correct answer in spite of acquiring knowledge and formula necessary for the solution. The reason can be attributed to t...When solving a mathematical problem, we sometimes encounter a situation where we can not reach a correct answer in spite of acquiring knowledge and formula necessary for the solution. The reason can be attributed to the lack in metacognitive abilities. Metacognitive abilities consist of comparing the difficulty of problem with own ability, proper plan of solution process, and conscious monitoring and control of solution process. The role and importance of metacognitive ability in mathematical problem solving of permutations and combinations was explored. Participants were required to solve five practical problems related to permutations and combinations. For each problem, the solution process was divided into: (1) understanding (recognition) of mathematical problem; (2) plan of solution; (3) execution of solution. Participants were also required to rate the anticipation whether they could solve it or not, and to rate the confidence of their own answer. According to the total score of five problems, the participants were categorized into the group of the high test score and the group of the low test score. As a result, at the plan and the execution processes, statistically significant differences were detected between the high and the low score groups. As for the rating on the anticipation of result and the confidence of own answer, no significant differences were found between both groups. Moreover, the relationship between the score of plan process and the score of execution process was statistically correlated. In other words, the more proper the plan process was conducted, the more proper solution the participants reached. In such a way, the importance of metacognitive ability in the solving process, especially the plan ability, was suggested.展开更多
Linked partitions were introduced by Dykema(Dykema K J. Multilinear function series and transforms in free probability theory. Adv. Math., 2005, 208(1):351–407) in the study of the unsymmetrized T-transform in free p...Linked partitions were introduced by Dykema(Dykema K J. Multilinear function series and transforms in free probability theory. Adv. Math., 2005, 208(1):351–407) in the study of the unsymmetrized T-transform in free probability theory.Permutation is one of the most classical combinatorial structures. According to the linear representation of linked partitions, Chen et al.(Chen W Y C, Wu S Y J, Yan C H. Linked partitions and linked cycles. European J. Combin., 2008, 29(6): 1408–1426) de?ned the concept of singly covered minimal elements. Let L(n, k) denote the set of linked partitions of [n] with k singly covered minimal elements and let P(n, k) denote the set of permutations of [n] with k cycles. In this paper, we mainly establish two bijections between L(n, k) and P(n, k). The two bijections from a different perspective show the one-to-one correspondence between the singly covered minimal elements in L(n, k) and the cycles in P(n, k).展开更多
In this paper, a sufficient and necessary condition of quick trickle permutations is given from the point of inverse permutations. The bridge is built between quick trickle permutations and m-value logic functions. By...In this paper, a sufficient and necessary condition of quick trickle permutations is given from the point of inverse permutations. The bridge is built between quick trickle permutations and m-value logic functions. By the methods of the Chrestenson spectrum of m-value logic functions and the auto-correlation function of m-value logic functions to investigate the Chrestenson spectral characteristics and the auto-correlation function charac- teristics of inverse permutations of quick trickle permutations, a determinant arithmetic of quick trickle permutations is given. Using the results, it becomes easy to judge that a permutation is a quick trickle permutation or not by using computer. This gives a new pathway to study constructions and enumerations of quick trickle permutations.展开更多
In this article,we shall explore some techniques of permutations(排列)and combi- nations.This is going to be a slightly long ar- ticle,but is very much educative,and I'll try to cover the entire thing from front t...In this article,we shall explore some techniques of permutations(排列)and combi- nations.This is going to be a slightly long ar- ticle,but is very much educative,and I'll try to cover the entire thing from front to back. You can skip bits if you know them,but展开更多
The traditional approaches to false discovery rate(FDR)control in multiple hypothesis testing are usually based on the null distribution of a test statistic.However,all types of null distributions,including the theore...The traditional approaches to false discovery rate(FDR)control in multiple hypothesis testing are usually based on the null distribution of a test statistic.However,all types of null distributions,including the theoretical,permutation-based and empirical ones,have some inherent drawbacks.For example,the theoretical null might fail because of improper assumptions on the sample distribution.Here,we propose a null distributionfree approach to FDR control for multiple hypothesis testing in the case-control study.This approach,named target-decoy procedure,simply builds on the ordering of tests by some statistic or score,the null distribution of which is not required to be known.Competitive decoy tests are constructed from permutations of original samples and are used to estimate the false target discoveries.We prove that this approach controls the FDR when the score function is symmetric and the scores are independent between different tests.Simulation demonstrates that it is more stable and powerful than two popular traditional approaches,even in the existence of dependency.Evaluation is also made on two real datasets,including an arabidopsis genomics dataset and a COVID-19 proteomics dataset.展开更多
In this paper,we define a new class of control functions through aggregate special functions.These class of control functions help us to stabilize and approximate a tri-additiveψ-functional inequality to get a better...In this paper,we define a new class of control functions through aggregate special functions.These class of control functions help us to stabilize and approximate a tri-additiveψ-functional inequality to get a better estimation for permuting tri-homomorphisms and permuting tri-derivations in unital C*-algebras and Banach algebras by the vector-valued alternative fixed point theorem.展开更多
The complexities of the marine environment and the unique characteristics of underwater channels pose challenges in obtaining reliable signals underwater,necessitating the filtration of underwater acoustic noise.Herei...The complexities of the marine environment and the unique characteristics of underwater channels pose challenges in obtaining reliable signals underwater,necessitating the filtration of underwater acoustic noise.Herein,an underwater acoustic signal denoising method based on ensemble empirical mode decomposition(EEMD),correlation coefficient(CC),permutation entropy(PE),and wavelet threshold denoising(WTD)is proposed.Furthermore,simulation experiments are conducted using simulated and real underwater acoustic data.The experimental results reveal that the proposed denoising method outperforms other previous methods in terms of signal-to-noise ratio,root mean square error,and CC.The proposed method eliminates noise and retains valuable information in the signal.展开更多
Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery,where weak fault characteristic signals hinder accurate fault state representation,we propose a novel feature extrac...Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery,where weak fault characteristic signals hinder accurate fault state representation,we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform(FAWT)with Nonlinear Quantum Permutation Entropy.FAWT,leveraging fractional orders and arbitrary scaling and translation factors,exhibits superior translational invariance and adjustable fundamental oscillatory characteristics.This flexibility enables FAWT to provide well-suited wavelet shapes,effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults.In our approach,gearbox vibration signals undergo FAWT to obtain sub-bands.Quantum theory is then introduced into permutation entropy to propose Nonlinear Quantum Permutation Entropy,a feature that more accurately characterizes the operational state of vibration simulation signals.The nonlinear quantum permutation entropy extracted from sub-bands is utilized to characterize the operating state of rotating machinery.A comprehensive analysis of vibration signals from rolling bearings and gearboxes validates the feasibility of the proposed method.Comparative assessments with parameters derived from traditional permutation entropy,sample entropy,wavelet transform(WT),and empirical mode decomposition(EMD)underscore the superior effectiveness of this approach in fault detection and classification for rotating machinery.展开更多
We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and o...We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and obverse W states. Along with a comparison of pairwise entanglement and monogamy properties, we explore the geometric information contained in them by constructing their canonical steering ellipsoids. We obtain the volume monogamy relations satisfied by states as a function of number of qubits and compare with the maximal monogamy property of GHZ states.展开更多
Differential spatial modulation(DSM)is a multiple-input multiple-output(MIMO)transmission scheme.It has attracted extensive research interest due to its ability to transmit additional data without increasing any radio...Differential spatial modulation(DSM)is a multiple-input multiple-output(MIMO)transmission scheme.It has attracted extensive research interest due to its ability to transmit additional data without increasing any radio frequency chain.In this paper,DSM is investigated using two mapping algorithms:Look-Up Table Order(LUTO)and Permutation Method(PM).Then,the bit error rate(BER)performance and complexity of the two mapping algorithms in various antennas and modulation methods are verified by simulation experiments.The results show that PM has a lower BER than the LUTO mapping algorithm,and the latter has lower complexity than the former.展开更多
Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of ope...Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations.展开更多
Ever since the famous Erd os-Ko-Rado theorem initiated the study of intersecting families of subsets,extremal problems regarding intersecting properties of families of various combinatorial objects have been extensive...Ever since the famous Erd os-Ko-Rado theorem initiated the study of intersecting families of subsets,extremal problems regarding intersecting properties of families of various combinatorial objects have been extensively investigated.Among them,studies about families of subsets,vector spaces and permutations are of particular concerns.Recently,we proposed a new quantitative intersection problem for families of subsets:For F([n]k),define its total intersection number as I(F)=ΣF1;F2∈F|F1∩F2|.Then,what is the structure of F when it has the maximal total intersection number among all the families in([n]k)with the same family size?In a recent paper,Kong and Ge(2020)studied this problem and characterized extremal structures of families maximizing the total intersection number of given sizes.In this paper,we consider the analogues of this problem for families of vector spaces and permutations.For certain ranges of family sizes,we provide structural characterizations for both families of subspaces and families of permutations having maximal total intersection numbers.To some extent,these results determine the unique structure of the optimal family for some certain values of jFj and characterize the relationship between having the maximal total intersection number and being intersecting.Besides,we also show several upper bounds on the total intersection numbers for both families of subspaces and families of permutations of given sizes.展开更多
We present several new constructions of differentially 4-uniform permutations over F22 mby modifying the values of the inverse function on some subsets of F22 m. The resulted differentially 4-uniform permutations have...We present several new constructions of differentially 4-uniform permutations over F22 mby modifying the values of the inverse function on some subsets of F22 m. The resulted differentially 4-uniform permutations have high nonlinearities and algebraic degrees, which provide more choices for the design of crytographic substitution boxes.展开更多
We study the differential uniformity of a class of permutations over F2 n with n even. These permutations are different from the inverse function as the values x^(-1) are modified to be(γx)^(-1) on some cosets of a f...We study the differential uniformity of a class of permutations over F2 n with n even. These permutations are different from the inverse function as the values x^(-1) are modified to be(γx)^(-1) on some cosets of a fixed subgroup γ of F_(2n)~*. We obtain some sufficient conditions for this kind of permutations to be differentially 4-uniform, which enable us to construct a new family of differentially 4-uniform permutations that contains many new Carlet-Charpin-Zinoviev equivalent(CCZ-equivalent) classes as checked by Magma for small numbers n. Moreover, all of the newly constructed functions are proved to possess optimal algebraic degree and relatively high nonlinearity.展开更多
In this paper, a family of non-monomial permutations over the finite field F2n with differential uniformity at most 6 is proposed, where n is a positive integer. The algebraic degree of these functions is also determi...In this paper, a family of non-monomial permutations over the finite field F2n with differential uniformity at most 6 is proposed, where n is a positive integer. The algebraic degree of these functions is also determined.展开更多
文摘In this work we propose efficient codec algorithms for watermarking images that are intended for uploading on the web under intellectual property protection. Headed to this direction, we recently suggested a way in which an integer number w which being transformed into a self-inverting permutation, can be represented in a two dimensional (2D) object and thus, since images are 2D structures, we have proposed a watermarking algorithm that embeds marks on them using the 2D representation of w in the spatial domain. Based on the idea behind this technique, we now expand the usage of this concept by marking the image in the frequency domain. In particular, we propose a watermarking technique that also uses the 2D representation of self-inverting permutations and utilizes marking at specific areas thanks to partial modifications of the image’s Discrete Fourier Transform (DFT). Those modifications are made on the magnitude of specific frequency bands and they are the least possible additive information ensuring robustness and imperceptiveness. We have experimentally evaluated our algorithms using various images of different characteristics under JPEG compression. The experimental results show an improvement in comparison to the previously obtained results and they also depict the validity of our proposed codec algorithms.
文摘Let n be a positive integer. A permutation a of the symmetric group of permutations of is called a derangement if for each . Suppose that x and y are two arbitrary permutations of . We say that a permutation a is a double derangement with respect to x and y if and for each . In this paper, we give an explicit formula for , the number of double derangements with respect to x and y. Let and let and be two subsets of with and . Suppose that denotes the number of derangements x such that . As the main result, we show that if and z is a permutation such that for and for , then where .
基金Supported by State Key Laboratory of InformationSecurity Opening Foundation(01-02) .
文摘Orthomorphic permutations have good characteristics in cryptosystems. In this paper, by using of knowledge about relation between orthomorphic permutations and multi-output functions, and conceptions of the generalized Walsh spectrum of multi-output functions and the auto-correlation function of multi-output functions to investigate the Walsh spectral characteristics and the auto-correlation function characteristics of orthormophic permutations, several results are obtained.
文摘When solving a mathematical problem, we sometimes encounter a situation where we can not reach a correct answer in spite of acquiring knowledge and formula necessary for the solution. The reason can be attributed to the lack in metacognitive abilities. Metacognitive abilities consist of comparing the difficulty of problem with own ability, proper plan of solution process, and conscious monitoring and control of solution process. The role and importance of metacognitive ability in mathematical problem solving of permutations and combinations was explored. Participants were required to solve five practical problems related to permutations and combinations. For each problem, the solution process was divided into: (1) understanding (recognition) of mathematical problem; (2) plan of solution; (3) execution of solution. Participants were also required to rate the anticipation whether they could solve it or not, and to rate the confidence of their own answer. According to the total score of five problems, the participants were categorized into the group of the high test score and the group of the low test score. As a result, at the plan and the execution processes, statistically significant differences were detected between the high and the low score groups. As for the rating on the anticipation of result and the confidence of own answer, no significant differences were found between both groups. Moreover, the relationship between the score of plan process and the score of execution process was statistically correlated. In other words, the more proper the plan process was conducted, the more proper solution the participants reached. In such a way, the importance of metacognitive ability in the solving process, especially the plan ability, was suggested.
基金The NSF(11601020,11501014) of China2017 Commercial Specialty Project(19005757053) of BTBU2018 Postgraduate Research Capacity Improvement Project(19008001491) of BTBU
文摘Linked partitions were introduced by Dykema(Dykema K J. Multilinear function series and transforms in free probability theory. Adv. Math., 2005, 208(1):351–407) in the study of the unsymmetrized T-transform in free probability theory.Permutation is one of the most classical combinatorial structures. According to the linear representation of linked partitions, Chen et al.(Chen W Y C, Wu S Y J, Yan C H. Linked partitions and linked cycles. European J. Combin., 2008, 29(6): 1408–1426) de?ned the concept of singly covered minimal elements. Let L(n, k) denote the set of linked partitions of [n] with k singly covered minimal elements and let P(n, k) denote the set of permutations of [n] with k cycles. In this paper, we mainly establish two bijections between L(n, k) and P(n, k). The two bijections from a different perspective show the one-to-one correspondence between the singly covered minimal elements in L(n, k) and the cycles in P(n, k).
基金the Opening Foundation of State Key Labo-ratory of Information Security (20050102)
文摘In this paper, a sufficient and necessary condition of quick trickle permutations is given from the point of inverse permutations. The bridge is built between quick trickle permutations and m-value logic functions. By the methods of the Chrestenson spectrum of m-value logic functions and the auto-correlation function of m-value logic functions to investigate the Chrestenson spectral characteristics and the auto-correlation function charac- teristics of inverse permutations of quick trickle permutations, a determinant arithmetic of quick trickle permutations is given. Using the results, it becomes easy to judge that a permutation is a quick trickle permutation or not by using computer. This gives a new pathway to study constructions and enumerations of quick trickle permutations.
文摘In this article,we shall explore some techniques of permutations(排列)and combi- nations.This is going to be a slightly long ar- ticle,but is very much educative,and I'll try to cover the entire thing from front to back. You can skip bits if you know them,but
基金supported by the National Key R&D Program of China(No.2018YFB0704304)the National Natural Science Foundation of China(Nos.32070668,62002231,61832003,61433014)the K.C.Wong Education Foundation。
文摘The traditional approaches to false discovery rate(FDR)control in multiple hypothesis testing are usually based on the null distribution of a test statistic.However,all types of null distributions,including the theoretical,permutation-based and empirical ones,have some inherent drawbacks.For example,the theoretical null might fail because of improper assumptions on the sample distribution.Here,we propose a null distributionfree approach to FDR control for multiple hypothesis testing in the case-control study.This approach,named target-decoy procedure,simply builds on the ordering of tests by some statistic or score,the null distribution of which is not required to be known.Competitive decoy tests are constructed from permutations of original samples and are used to estimate the false target discoveries.We prove that this approach controls the FDR when the score function is symmetric and the scores are independent between different tests.Simulation demonstrates that it is more stable and powerful than two popular traditional approaches,even in the existence of dependency.Evaluation is also made on two real datasets,including an arabidopsis genomics dataset and a COVID-19 proteomics dataset.
基金partially supported by the Natural Sciences and Engineering Research Council of Canada(2019-03907)。
文摘In this paper,we define a new class of control functions through aggregate special functions.These class of control functions help us to stabilize and approximate a tri-additiveψ-functional inequality to get a better estimation for permuting tri-homomorphisms and permuting tri-derivations in unital C*-algebras and Banach algebras by the vector-valued alternative fixed point theorem.
基金Supported by the National Natural Science Foundation of China(No.62033011)Science and Technology Project of Hebei Province(No.216Z1704G,No.20310401D)。
文摘The complexities of the marine environment and the unique characteristics of underwater channels pose challenges in obtaining reliable signals underwater,necessitating the filtration of underwater acoustic noise.Herein,an underwater acoustic signal denoising method based on ensemble empirical mode decomposition(EEMD),correlation coefficient(CC),permutation entropy(PE),and wavelet threshold denoising(WTD)is proposed.Furthermore,simulation experiments are conducted using simulated and real underwater acoustic data.The experimental results reveal that the proposed denoising method outperforms other previous methods in terms of signal-to-noise ratio,root mean square error,and CC.The proposed method eliminates noise and retains valuable information in the signal.
基金supported financially by FundamentalResearch Program of Shanxi Province(No.202103021223056).
文摘Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery,where weak fault characteristic signals hinder accurate fault state representation,we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform(FAWT)with Nonlinear Quantum Permutation Entropy.FAWT,leveraging fractional orders and arbitrary scaling and translation factors,exhibits superior translational invariance and adjustable fundamental oscillatory characteristics.This flexibility enables FAWT to provide well-suited wavelet shapes,effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults.In our approach,gearbox vibration signals undergo FAWT to obtain sub-bands.Quantum theory is then introduced into permutation entropy to propose Nonlinear Quantum Permutation Entropy,a feature that more accurately characterizes the operational state of vibration simulation signals.The nonlinear quantum permutation entropy extracted from sub-bands is utilized to characterize the operating state of rotating machinery.A comprehensive analysis of vibration signals from rolling bearings and gearboxes validates the feasibility of the proposed method.Comparative assessments with parameters derived from traditional permutation entropy,sample entropy,wavelet transform(WT),and empirical mode decomposition(EMD)underscore the superior effectiveness of this approach in fault detection and classification for rotating machinery.
文摘We explore the entanglement features of pure symmetric N-qubit states characterized by N-distinct spinors with a particular focus on the Greenberger-Horne-Zeilinger (GHZ) states and , an equal superposition of W and obverse W states. Along with a comparison of pairwise entanglement and monogamy properties, we explore the geometric information contained in them by constructing their canonical steering ellipsoids. We obtain the volume monogamy relations satisfied by states as a function of number of qubits and compare with the maximal monogamy property of GHZ states.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant No.62061024the Project of Gansu Province Science and Technology Department under Grant No.22ZD6GA055.
文摘Differential spatial modulation(DSM)is a multiple-input multiple-output(MIMO)transmission scheme.It has attracted extensive research interest due to its ability to transmit additional data without increasing any radio frequency chain.In this paper,DSM is investigated using two mapping algorithms:Look-Up Table Order(LUTO)and Permutation Method(PM).Then,the bit error rate(BER)performance and complexity of the two mapping algorithms in various antennas and modulation methods are verified by simulation experiments.The results show that PM has a lower BER than the LUTO mapping algorithm,and the latter has lower complexity than the former.
文摘Secure computing paradigms impose new architectural challenges for general-purpose processors. Cryptographic processing is needed for secure communications, storage, and computations. We identify two categories of operations in symmetric-key and public-key cryptographic algorithms that are not common in previous general-purpose workloads: advanced bit operations within a word and multi-word operations. We define MOMR (Multiple Operands Multiple Results) execution or datarich execution as a unified solution to both challenges. It allows arbitrary n-bit permutations to be achieved in one or two cycles, rather than O(n) cycles as in existing RISC processors. It also enables significant acceleration of multiword multiplications needed by public-key ciphers. We propose two implementations of MOMR: one employs only hardware changes while the other uses Instruction Set Architecture (ISA) support. We show that MOMR execution leverages available resources in typical multi-issue processors with minimal additional cost. Multi-issue processors enhanced with MOMR units provide additional speedup over standard multi-issue processors with the same datapath. MOMR is a general architectural solution for word-oriented processor architectures to incorporate datarich operations.
基金supported by National Natural Science Foundation of China (Grant No. 11971325)National Key Research and Development Program of China (Grant Nos. 2020YFA0712100 and 2018YFA0704703)Beijing Scholars Program
文摘Ever since the famous Erd os-Ko-Rado theorem initiated the study of intersecting families of subsets,extremal problems regarding intersecting properties of families of various combinatorial objects have been extensively investigated.Among them,studies about families of subsets,vector spaces and permutations are of particular concerns.Recently,we proposed a new quantitative intersection problem for families of subsets:For F([n]k),define its total intersection number as I(F)=ΣF1;F2∈F|F1∩F2|.Then,what is the structure of F when it has the maximal total intersection number among all the families in([n]k)with the same family size?In a recent paper,Kong and Ge(2020)studied this problem and characterized extremal structures of families maximizing the total intersection number of given sizes.In this paper,we consider the analogues of this problem for families of vector spaces and permutations.For certain ranges of family sizes,we provide structural characterizations for both families of subspaces and families of permutations having maximal total intersection numbers.To some extent,these results determine the unique structure of the optimal family for some certain values of jFj and characterize the relationship between having the maximal total intersection number and being intersecting.Besides,we also show several upper bounds on the total intersection numbers for both families of subspaces and families of permutations of given sizes.
基金supported by National Basic Research Programme of China(Grant No.2013CB834203)National Natural Science Foundation of China(Grant Nos.11201214 and 61472417)the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA06010702)
文摘We present several new constructions of differentially 4-uniform permutations over F22 mby modifying the values of the inverse function on some subsets of F22 m. The resulted differentially 4-uniform permutations have high nonlinearities and algebraic degrees, which provide more choices for the design of crytographic substitution boxes.
基金supported by National Natural Science Foundation of China(Grant Nos.61202463 and 61202471)Shanghai Key Laboratory of Intelligent Information Processing(Grant No.IIPL-2014-005)
文摘We study the differential uniformity of a class of permutations over F2 n with n even. These permutations are different from the inverse function as the values x^(-1) are modified to be(γx)^(-1) on some cosets of a fixed subgroup γ of F_(2n)~*. We obtain some sufficient conditions for this kind of permutations to be differentially 4-uniform, which enable us to construct a new family of differentially 4-uniform permutations that contains many new Carlet-Charpin-Zinoviev equivalent(CCZ-equivalent) classes as checked by Magma for small numbers n. Moreover, all of the newly constructed functions are proved to possess optimal algebraic degree and relatively high nonlinearity.
基金supported by the National Science Foundation of China under Grant Nos.11401172 and 61672212
文摘In this paper, a family of non-monomial permutations over the finite field F2n with differential uniformity at most 6 is proposed, where n is a positive integer. The algebraic degree of these functions is also determined.