• Title/Summary/Keyword: cellular algebra

Search Result 4, Processing Time 0.017 seconds

Note on Cellular Structure of Edge Colored Partition Algebras

  • Kennedy, A. Joseph;Muniasamy, G.
    • Kyungpook Mathematical Journal
    • /
    • v.56 no.3
    • /
    • pp.669-682
    • /
    • 2016
  • In this paper, we study the cellular structure of the G-edge colored partition algebras, when G is a finite group. Further, we classified all the irreducible representations of these algebras using their cellular structure whenever G is a finite cyclic group. Also we prove that the ${\mathbb{Z}}/r{\mathbb{Z}}$-Edge colored partition algebras are quasi-hereditary over a field of characteristic zero which contains a primitive $r^{th}$ root of unity.

ON STEPANOV WEIGHTED PSEUDO ALMOST AUTOMORPHIC SOLUTIONS OF NEURAL NETWORKS

  • Lee, Hyun Mork
    • Korean Journal of Mathematics
    • /
    • v.30 no.3
    • /
    • pp.491-502
    • /
    • 2022
  • In this paper we investigate some sufficient conditions to guarantee the existence and uniqueness of Stepanov-like weighted pseudo almost periodic solutions of cellular neural networks on Clifford algebra for non-automomous cellular neural networks with multi-proportional delays. Our analysis is based on the differential inequality techniques and the Banach contraction mapping principle.

A Characteristic of Nonlinear Filter Models based on LFSMs (LFSM기한의 비선형 필터 모델의 특성)

  • Hong, Jin;Lee, Dong-Hoon;Ji, Sung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.75-83
    • /
    • 2004
  • We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a cellular automata in place of an LFSR in constructing a stream cipher did not necessarily increase its security. We also give a general method for checking whether or not a nonlinear filter generator based on an LFSM allows reduction to one that is based on an LFSR and which is vulnerable to Anderson information leakage.