• 제목/요약/키워드: function algebra

검색결과 148건 처리시간 0.029초

RELATIONSHIP BETWEEN THE WIENER INTEGRAL AND THE ANALYTIC FEYNMAN INTEGRAL OF CYLINDER FUNCTION

  • Kim, Byoung Soo
    • 충청수학회지
    • /
    • 제27권2호
    • /
    • pp.249-260
    • /
    • 2014
  • Cameron and Storvick discovered a change of scale formula for Wiener integral of functionals in a Banach algebra $\mathcal{S}$ on classical Wiener space. We express the analytic Feynman integral of cylinder function as a limit of Wiener integrals. Moreover we obtain the same change of scale formula as Cameron and Storvick's result for Wiener integral of cylinder function. Our result cover a restricted version of the change of scale formula by Kim.

ASYMPTOTIC BEHAVIOR OF A-HARMONIC FUNCTIONS AND p-EXTREMAL LENGTH

  • Kim, Seok-Woo;Lee, Sang-Moon;Lee, Yong-Hah
    • 대한수학회보
    • /
    • 제47권2호
    • /
    • pp.423-432
    • /
    • 2010
  • We describe the asymptotic behavior of functions of the Royden p-algebra in terms of p-extremal length. We also prove that each bounded $\cal{A}$-harmonic function with finite energy on a complete Riemannian manifold is uniquely determined by the behavior of the function along p-almost every curve.

이산 카오스 함수와 Permutation Algorithm을 결합한 고신뢰도 광영상 암호시스템 (A high reliable optical image encryption system which combined discrete chaos function with permutation algorithm)

  • 박종호
    • 정보보호학회논문지
    • /
    • 제9권4호
    • /
    • pp.37-48
    • /
    • 1999
  • 현대암호방식은 종래의 선형 대수와 수리이론을 적용한 암호통신을 벗어난 유사 잡음성을 띠는 카오스 신호를 이용한 암호통신을 적용해 오고 있다,[1-2] 본 논문은 1차 permutation 알고 리즘을 이용 하여 변환된 정보를 2차 이산 카오스 변환 함수를 이용해 암호화하는 광영상 암호시스템을 제안하여UT 다. 제안된 시스템은 키수열 발생기의 출력을 통해 영상정보를 permutation 하는 알고리즘 을 설계하였고 이에 대한 검정을 수행하였다. 또한 본 논문에서는 permutation 알고리즘을 통해 제한적인 카오스 함수 의 적용시 발생하는 문제점을 해결하고 비도를 증가시킴으로써 광영상 암호시스템에 적용 시 그 타당성 을 검정하였다. Current encryption methods have been applied to secure communication using discrete chaotic system whose output is a noise-like signal which differs from the conventional encryption methods that employ algebra and number theory[1-2] We propose an optical encryption method that transforms the primary pattern into the image pattern of discrete chaotic function first a primary pattern is encoded using permutation algorithm, In the proposed system we suggest the permutation algorithm using the output of key steam generator and its security level is analyzed. In this paper we worked out problem of the application about few discrete chaos function through a permutation algorithm and enhanced the security level. Experimental results with image signal demonstrate the proper of the implemented optical encryption system.

On the Computerization of Minimizing the Switching Function by the MASK Method

  • Cho, Dong-Sub;Hwang, Hee-Yeung
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1979년도 하계 전자.전기연합학술발표회논문집
    • /
    • pp.69-72
    • /
    • 1979
  • This paper deals with the computer method of finding the minimal sum of products for a switching function by using the MASK method derived from the characteristics of the Boolean algebra. The experiments with the program which is dissimilar to the previous computer programs show that the algorithm presented will be more efficient.

  • PDF

CONSTRUCTION OF MANY d-ALGEBRAS

  • Allen, Paul J.
    • 대한수학회논문집
    • /
    • 제24권3호
    • /
    • pp.361-366
    • /
    • 2009
  • In this paper we consider constructive function triples on the real numbers $\mathbb{R}$ and on (not necessarily commutative) integral domains D which permit the construction of a multitude of d-algebras via these constructive function triples. At the same time these constructions permit one to consider various conditions on these d-algebras for subsets of solutions of various equations, thereby producing geometric problems and interesting visualizations of some of these subsets of solutions. In particular, one may consider what notions such as "locally BCK" ought to mean, certainly in the setting provided below.