4,649 research outputs found
Efficient computer algebra algorithms for polynomial matrices in control design
The theory of polynomial matrices plays a key role in the design and analysis of multi-input multi-output control and communications systems using frequency domain methods. Examples include coprime factorizations of transfer functions, cannonical realizations from matrix fraction descriptions, and the transfer function design of feedback compensators. Typically, such problems abstract in a natural way to the need to solve systems of Diophantine equations or systems of linear equations over polynomials. These and other problems involving polynomial matrices can in turn be reduced to polynomial matrix triangularization procedures, a result which is not surprising given the importance of matrix triangularization techniques in numerical linear algebra. Matrices with entries from a field and Gaussian elimination play a fundamental role in understanding the triangularization process. In the case of polynomial matrices, matrices with entries from a ring for which Gaussian elimination is not defined and triangularization is accomplished by what is quite properly called Euclidean elimination. Unfortunately, the numerical stability and sensitivity issues which accompany floating point approaches to Euclidean elimination are not very well understood. New algorithms are presented which circumvent entirely such numerical issues through the use of exact, symbolic methods in computer algebra. The use of such error-free algorithms guarantees that the results are accurate to within the precision of the model data--the best that can be hoped for. Care must be taken in the design of such algorithms due to the phenomenon of intermediate expressions swell
Formalized linear algebra over Elementary Divisor Rings in Coq
This paper presents a Coq formalization of linear algebra over elementary
divisor rings, that is, rings where every matrix is equivalent to a matrix in
Smith normal form. The main results are the formalization that these rings
support essential operations of linear algebra, the classification theorem of
finitely presented modules over such rings and the uniqueness of the Smith
normal form up to multiplication by units. We present formally verified
algorithms computing this normal form on a variety of coefficient structures
including Euclidean domains and constructive principal ideal domains. We also
study different ways to extend B\'ezout domains in order to be able to compute
the Smith normal form of matrices. The extensions we consider are: adequacy
(i.e. the existence of a gdco operation), Krull dimension and
well-founded strict divisibility
Algebraic Approach to Physical-Layer Network Coding
The problem of designing physical-layer network coding (PNC) schemes via
nested lattices is considered. Building on the compute-and-forward (C&F)
relaying strategy of Nazer and Gastpar, who demonstrated its asymptotic gain
using information-theoretic tools, an algebraic approach is taken to show its
potential in practical, non-asymptotic, settings. A general framework is
developed for studying nested-lattice-based PNC schemes---called lattice
network coding (LNC) schemes for short---by making a direct connection between
C&F and module theory. In particular, a generic LNC scheme is presented that
makes no assumptions on the underlying nested lattice code. C&F is
re-interpreted in this framework, and several generalized constructions of LNC
schemes are given. The generic LNC scheme naturally leads to a linear network
coding channel over modules, based on which non-coherent network coding can be
achieved. Next, performance/complexity tradeoffs of LNC schemes are studied,
with a particular focus on hypercube-shaped LNC schemes. The error probability
of this class of LNC schemes is largely determined by the minimum inter-coset
distances of the underlying nested lattice code. Several illustrative
hypercube-shaped LNC schemes are designed based on Construction A and D,
showing that nominal coding gains of 3 to 7.5 dB can be obtained with
reasonable decoding complexity. Finally, the possibility of decoding multiple
linear combinations is considered and related to the shortest independent
vectors problem. A notion of dominant solutions is developed together with a
suitable lattice-reduction-based algorithm.Comment: Submitted to IEEE Transactions on Information Theory, July 21, 2011.
Revised version submitted Sept. 17, 2012. Final version submitted July 3,
201
Algebraic statistical models
Many statistical models are algebraic in that they are defined in terms of
polynomial constraints, or in terms of polynomial or rational parametrizations.
The parameter spaces of such models are typically semi-algebraic subsets of the
parameter space of a reference model with nice properties, such as for example
a regular exponential family. This observation leads to the definition of an
`algebraic exponential family'. This new definition provides a unified
framework for the study of statistical models with algebraic structure. In this
paper we review the ingredients to this definition and illustrate in examples
how computational algebraic geometry can be used to solve problems arising in
statistical inference in algebraic models
A Non-commutative Cryptosystem Based on Quaternion Algebras
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion
algebras. This cryptosystem uses bivariate polynomials as the underling ring.
The multiplication operation in our cryptosystem can be performed with high
speed using quaternions algebras over finite rings. As a consequence, the key
generation and encryption process of our cryptosystem is faster than NTRU in
comparable parameters. Typically using Strassen's method, the key generation
and encryption process is approximately times faster than NTRU for an
equivalent parameter set. Moreover, the BQTRU lattice has a hybrid structure
that makes inefficient standard lattice attacks on the private key. This
entails a higher computational complexity for attackers providing the
opportunity of having smaller key sizes. Consequently, in this sense, BQTRU is
more resistant than NTRU against known attacks at an equivalent parameter set.
Moreover, message protection is feasible through larger polynomials and this
allows us to obtain the same security level as other NTRU-like cryptosystems
but using lower dimensions.Comment: Submitted for possible publicatio
Computational linear algebra over finite fields
We present here algorithms for efficient computation of linear algebra
problems over finite fields
- …