scholarly journals Bit-size reduction of triangular sets in two and three variables

10.29007/nz5x ◽  
2018 ◽  
Author(s):  
Tetsuro Yamashita ◽  
Xavier Dahan

At ISSAC 2004, Schost and D.introduced a transformation of triangular lexicographic Groebner basesgenerating a radical ideal of dimension zero,which reduces significantly the bit-size of coefficients.The case where the triangular lexicographic Groebner basis does not generate a radical idealis far more complicated. This work treats the case of n=2 variables, andin some extent the case of n=3 variables.It resorts to an extra operation, the squarefree factorization;nevertheless this operation has low complexity cost.But as soon as n>2 variables a lack of simple and efficient gcd-like operationover non-reduced rings prevents to undertake meaningful algorithmic considerations.An implementation in Maple for the case n=2 confirms the expectedreduction of the expected size coefficients.

Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4361 ◽  
Author(s):  
Ahmed Mostafa ◽  
Suk Jin Lee ◽  
Yesem Kurt Peker

Internet of Things (IoT) has become the driving force in modern day technology with an increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used in manufacturing, agriculture, transportation, education, healthcare and many other business environments as well as home automation. Authentication for IoT devices is essential because many of these devices establish communication with servers through public networks. A rigorous lightweight device authentication scheme is needed to secure its physical hardware from cloning or side-channel attacks and accommodate the limited storage and computational power of IoT devices in an efficient manner. In this paper, we introduce a lightweight mutual two-factor authentication mechanism where an IoT device and the server authenticate each other. The proposed mechanism exploits Physical Unclonable Functions (PUFs) and a hashing algorithm with the purpose of achieving a secure authentication and session key agreement between the IoT device and the server. We conduct a type of formal analysis to validate the protocol’s security. We also validate that the proposed authentication mechanism is secure against different types of attack scenarios and highly efficient in terms of memory storage, server capacity, and energy consumption with its low complexity cost and low communication overhead. In this sense, the proposed authentication mechanism is very appealing and suitable for resource-constrained and security-critical environments.


2005 ◽  
Vol 2 (1) ◽  
pp. 77
Author(s):  
B.R. Arafeh

 In this work, a two-step approach is adopted for scheduling tasks with synchronous inter-task communication. To that end, an efficient algorithm, called GLB-Synch, is introduced for mapping clusters and ordering tasks on processors. The algorithm used the information obtained during the clustering step for selecting a cluster to be mapped on the least loaded processor. A performance study has been conducted on the GLB-Synch algorithm by simulation. A multi-step scheduling setup has been performed based on a previously developed algorithm for clustering DAGs with synchronous communication, called NLC-SynchCom, and using synthesized DAGs. We have shown by analysis and experimentation that the GLB-Synch algorithm retains the same low complexity cost of the first step for clustering. The performance results highlight the drawback of synchronization on speedup scalability. 


2000 ◽  
Vol 6 (S2) ◽  
pp. 834-835
Author(s):  
Robert W. Bradford, Chairman ◽  
Curriculum Oversight

The typical aging processes can be characterized by a gradual alteration and essential breakdown of the functional systems of the body. Numerous factors play important roles in the alterations of these pathways from biochemical individuality and genetic predisposition to environmental insults and deficiency states.1 Clinical research, as but one example, has clearly documented the role of free radicals (ROS) or oxidative injury in disease and aging affecting the body's basic cellular structures.The objective of functional or health assessments is to be able to detect in vivo stresses and imbalances in the biological systems, while the patient is asymptomatic, so that early therapeutic intervention can resolve the problems prior to disease onset or accelerated aging. The ability to assess risk factors and treat the sub-clinical metabolic toxicities, deficiency states, hormonal imbalances, oxidative injury (ROS), immunodeficiencies, enzyme down regulations, antioxidant status, metal toxicities, cardiovascular stresses, organ reserves/stresses and detox systems in a low-complexity, cost-effective office procedure is true preventive medicine.


2018 ◽  
Vol 10 (4) ◽  
pp. 49
Author(s):  
Noura Okko

In 1872, Lazarus Fuchs used a new tool which is The Invariant Theory to construct the minimal polynomial of an algebraic solution of a differential equation of second order. He expressed the coefficient of the equation in terms of the (semi-)invariants of its differential Galois group. In this paper we will give another method to obtain Fuchs Relation: for the octahedral groupe $S_4^{SL_2}$ by using Groebner Basis; a tool which is introduced in 1965 nearly two century after Fuchs Relation.


Energies ◽  
2021 ◽  
Vol 14 (19) ◽  
pp. 6337
Author(s):  
Navid Bayati ◽  
Hamid Reza Baghaee ◽  
Mehdi Savaghebi ◽  
Amin Hajizadeh ◽  
Mohsen N. Soltani ◽  
...  

A new DC fault current limiter (FCL)-based circuit breaker (CB) for DC microgrid (MG) clusters is proposed in this paper. The analytical expressions of the DC fault current of a bidirectional interlink DC/DC converter in the interconnection line of two nearby DC MGs are analyzed in detail. Meanwhile, a DC fault clearing solution (based on using a DC FCL in series with a DC circuit breaker) is proposed. This structure offers low complexity, cost, and power losses. To assess the performance of the proposed method, time-domain simulation studies are carried out on a test DC MG cluster in a MATLAB/Simulink environment. The results of the proposed analytical expressions are compared with simulation results. The obtained results verify the analytical expression of the fault current and prove the effectiveness of the proposed DC fault current limiting and clearing strategy.


Sign in / Sign up

Export Citation Format

Share Document