vectorial function
Recently Published Documents


TOTAL DOCUMENTS

12
(FIVE YEARS 1)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 2 (3) ◽  
pp. 187-201
Author(s):  
Sebastiano Pennisi

In a recent article an infinite set of balance equations has been proposed to modelize polyatomic gases with rotational and vibrational modes in the non-relativistic context. To obtain particular cases, it has been truncated to obtain a model with 7 or 15 moments. Here the following objectives are pursued: 1) to obtain the relativistic counterpart of this model which, at the non-relativistic limit, gives the same balance equations as in the known classical case; 2) to obtain the previous result for the model with an arbitrary but fixed number of moments, 3) to obtain the closure of the resulting relativistic model so that all the functions appearing in the balance equations are expressed in terms of the independent variables. To achieve these goals, the following methods are used: 1) The Entropy Principle is imposed. As a result is obtained that the closure is determined up to a single 4-vectorial function usually called 4-potential. 2) To determine this last function, a more restrictive principle is imposed, namely the Maximum Entropy Principle (MEP). 3) Since all the functions involved must be expressed in the covariant form, so as not to depend on the observer, the Representation Theorems are used. Findings of this article are exactly the goals outlined earlier. They are clearly novelty because they had never been achieved before. They can be considered also improvements because, if the aforementioned arbitrary number of moments is restricted to 16, the present work coincide with that already known in literature. Doi: 10.28991/HIJ-2021-02-03-04 Full Text: PDF


Author(s):  
M. Boumezbeur ◽  
S. Mesnager ◽  
K. Guenda

In this paper, we study the relationship between vectorial (Boolean) functions and cyclic codes in the context of algebraic attacks. We first derive a direct link between the annihilators of a vectorial function (in univariate form) and certain [Formula: see text]-ary cyclic codes (which we show that they are LCD codes). We also present some properties of those cyclic codes as well as their weight enumerator. In addition, we generalize the so-called algebraic complement and study its properties.


2020 ◽  
Vol 48 (4) ◽  
pp. 1473-1492 ◽  
Author(s):  
Andrea Marco Amati ◽  
Simone Graf ◽  
Sabina Deutschmann ◽  
Nicolas Dolder ◽  
Christoph von Ballmoos

Membrane proteins (MPs) are the gatekeepers between different biological compartments separated by lipid bilayers. Being receptors, channels, transporters, or primary pumps, they fulfill a wide variety of cellular functions and their importance is reflected in the increasing number of drugs that target MPs. Functional studies of MPs within a native cellular context, however, is difficult due to the innate complexity of the densely packed membranes. Over the past decades, detergent-based extraction and purification of MPs and their reconstitution into lipid mimetic systems has been a very powerful tool to simplify the experimental system. In this review, we focus on proteoliposomes that have become an indispensable experimental system for enzymes with a vectorial function, including many of the here described energy transducing MPs. We first address long standing questions on the difficulty of successful reconstitution and controlled orientation of MPs into liposomes. A special emphasis is given on coreconstitution of several MPs into the same bilayer. Second, we discuss recent progress in the development of fluorescent dyes that offer sensitive detection with high temporal resolution. Finally, we briefly cover the use of giant unilamellar vesicles for the investigation of complex enzymatic cascades, a very promising experimental tool considering our increasing knowledge of the interplay of different cellular components.


2020 ◽  
Vol 20 (1&2) ◽  
pp. 65-84
Author(s):  
Xuexuan Hao ◽  
Fengrong Zhang ◽  
Yongzhuang Wei ◽  
Yong Zhou

Quantum period finding algorithms have been used to analyze symmetric cryptography. For instance, the 3-round Feistel construction and the Even-Mansour construction could be broken in polynomial time by using quantum period finding algorithms. In this paper, we firstly provide a new algorithm for finding the nonzero period of a vectorial function with O(n) quantum queries, which uses the Bernstein-Vazirani algorithm as one step of the subroutine. Afterwards, we compare our algorithm with Simon's algorithm. In some scenarios, such as the Even-Mansour construction and the function satisfying Simon's promise, etc, our algorithm is more efficient than Simon's algorithm with respect to the tradeoff between quantum memory and time. On the other hand, we combine our algorithm with Grover's algorithm for the key-recovery attack on the FX construction. Compared with the Grover-Meets-Simon algorithm proposed by Leander and May at Asiacrypt 2017, the new algorithm could save the quantum memory.


2019 ◽  
Vol 16 (05) ◽  
pp. 1950067 ◽  
Author(s):  
Hoavo Hova ◽  
Huanxiong Yang ◽  
Samuel Owusu

In this work, we study the evolution of an isotropic universe in an extended theory of gravity obtained geometrically by transforming the normal-gauge Lyra displacement vector field [Formula: see text] as a complex vectorial function depending on a dynamical scalar field [Formula: see text]. By using the latest observational data, we observe that for [Formula: see text] the universe starts accelerating at the critical scale factor [Formula: see text] which corresponds to a redshift of [Formula: see text]. We also find that the dark energy fluid considered in this model is a generalized fluid with equation of state [Formula: see text].


2018 ◽  
Vol 8 (11) ◽  
pp. 2236 ◽  
Author(s):  
Laura Celentano

This paper presents new theorems, which allow to design in a unified way robust proportional-derivative (PD)-type control laws without chattering for a broad class of uncertain nonlinear multi-input multi-output (MIMO) systems, subject to bounded disturbances and noises, of great theoretical and engineering relevance. These controllers are used to track a reference signal with bounded second derivative with the tracking error norm smaller than a prescribed value. The proposed control laws are simple to design and implement, above all for robotic systems, both in the case of a trajectory assigned in the joint space and in the workspace. The obtained theoretical results can have numerous applications. In this paper four significant applications are provided. The first one concerns the solution of a nonlinear equations system or the determination of an equilibrium point of a nonlinear system. The second case study deals with the inversion of a nonlinear vectorial function or the kinematic inversion of a robot. The third application concerns: (A) the tracking control of a robot with parametric uncertainties, with and without measurement noise on velocity, both in the joint space and the workspace; (B) the impedance control of a robot interacting with a human operator. The fourth case study addresses the tracking control of an uncertain nonlinear system that does not belong to the class of mechanical systems. Finally, an appendix is included, providing six easy examples, which show how the results proposed in the paper can eliminate and/or reduce serious disadvantages existing in the robust control literature for significant classes of linear and nonlinear uncertain systems.


2017 ◽  
Vol 4 (1) ◽  
pp. 124-138
Author(s):  
Franco Rubio ◽  
Orlando Hernández

2011 ◽  
Vol 22 (06) ◽  
pp. 1259-1269 ◽  
Author(s):  
CLAUDE CARLET

The nonlinearity profile of Boolean functions is a generalization of the most important cryptographic criterion, called the (first order) nonlinearity. It is defined as the sequence of the minimum Hamming distances nlr(f) between a given Boolean function f and all Boolean functions in the same number of variables and of degrees at most r, for r ≥ 1. This parameter, which has a close relationship with the Gowers norm, quantifies the resistance to cryptanalyses by low degree approximations of stream ciphers using the Boolean function f as combiner or as filter. The nonlinearity profile can also be defined for vectorial functions: it is the sequence of the minimum Hamming distances between the component functions of the vectorial function and all Boolean functions of degrees at most r, for r ≥ 1. The nonlinearity profile of the multiplicative inverse functions has been lower bounded in a previous paper by the same author. No other example of an infinite class of functions with unbounded nonlinearity profile has been exhibited since then. In this paper, we lower bound the whole nonlinearity profile of the (simplest) Dillon bent function (x,y) ↦ xy2n/2-2, x, y ∈ 𝔽2n/2 and we exhibit another class of functions, for which bounding the whole profile of each of them comes down to bounding the first order nonlinearities of all functions.


1986 ◽  
Vol 20 (4) ◽  
pp. 280-287 ◽  
Author(s):  
Almério de Castro Gomes ◽  
Jair Lício Ferreira Santos ◽  
Eunice Aparecida Bianchi Galati

The invasive tendency of Psychodopygus intermedius in the home environment, observed initially by Forattini et al. (1976), has now been confirmed by the demonstration of its high endophilic ability and by the use of human residences for shelter. Populations such as Lutzomyia migonei and Pintomyia fischeri were also present in that environment, though their low densities registered during this investigation could be an indication of their poor ability to overcome the barriers raised by the artificial environment. An objective epidemiological analysis based on the variables here given showed that human infection takes place in the extraforest environment, and the principal vectorial function falls, without doubt, on P. intermedius.


Sign in / Sign up

Export Citation Format

Share Document