Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Physical Sciences and Mathematics

Back Circulant Latin Squares And The Influence Of A Set, L. F. Fitina, Jennifer Seberry, G. R. Chaudhry Oct 1999

Back Circulant Latin Squares And The Influence Of A Set, L. F. Fitina, Jennifer Seberry, G. R. Chaudhry

Faculty of Informatics - Papers (Archive)

We define the notions of nest and influence of a subset of a critical set of a back circulant latin square, and study their properties. We also show that a secret sharing scheme based on a critical set of a latin square is both compartmentalised, and hierachical.


When The Necessary Conditions Are Not Sufficient: Sequences With Zero Autocorrelation Function, J. Horton, Jennifer Seberry Sep 1999

When The Necessary Conditions Are Not Sufficient: Sequences With Zero Autocorrelation Function, J. Horton, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Recently K. T. Arasu (personal communication) and Yoseph Strassler, in his PhD thesis, The Classification of Circulant Weighing Matrices of Weight 9, Bar-Ilan University, Ramat-Gan, 1997, have intensively studied circulant weighing matrices, or single sequences, with weight 9. They show many cases are non-existent. Here we give details of a search for two sequences with zero periodic autocorrelation and types (1,9), (1,16) and (4,9). We find some new cases but also many cases where the known necessary conditions are not sufficient. We instance a number of occasions when the known necessary conditions are not sufficient for the existence of weighing …


Soliton Evolution And Radiation Loss For The Sine-Gordon Equation , N. F. Smyth, Annette L. Worthy Aug 1999

Soliton Evolution And Radiation Loss For The Sine-Gordon Equation , N. F. Smyth, Annette L. Worthy

Faculty of Informatics - Papers (Archive)

An approximate method for describing the evolution of solitonlike initial conditions to solitons for the sine-Gordon equation is developed. This method is based on using a solitonlike pulse with variable parameters in an averaged Lagrangian for the sine-Gordon equation. This averaged Lagrangian is then used to determine ordinary differential equations governing the evolution of the pulse parameters. The pulse evolves to a steady soliton by shedding dispersive radiation. The effect of this radiation is determined by examining the linearized sine-Gordon equation and loss terms are added to the variational equations derived from the averaged Lagrangian by using the momentum and …


The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael Jul 1999

The Genre Of The Apocalypse: What Are They Saying Now?, M. G. Michael

Faculty of Informatics - Papers (Archive)

No abstract provided.


Observations On 666 In The Old Testament, M. G. Michael Jun 1999

Observations On 666 In The Old Testament, M. G. Michael

Faculty of Informatics - Papers (Archive)

No abstract provided.


On F-Squares And Their Critical Sets, L. F. Fitina, Jennifer Seberry, D. Sarvate May 1999

On F-Squares And Their Critical Sets, L. F. Fitina, Jennifer Seberry, D. Sarvate

Faculty of Informatics - Papers (Archive)

We define the notion of critical set of an F-square, following the definition of critical set in latin squares, and then give critical sets for certain classes of F-squares. We also generalise certain results obtained for critical sets of latin squares, and look at minimal such sets. We show that critical sets of F-squares need to be studied as well as critical sets for latin squares as the techniques used differ considerably. We obtain theorems for the sizes of critical sets of types F(n; 1,n — 1), F(n;1, 1, n — 2), and F(n; 2, 2, ... , 2).


Asymptotic Solitons Of The Extended Korteweg–De Vries Equation, Timothy R. Marchant Mar 1999

Asymptotic Solitons Of The Extended Korteweg–De Vries Equation, Timothy R. Marchant

Faculty of Informatics - Papers (Archive)

The interaction of two higher-order solitary waves, governed by the extended Korteweg–de Vries (KdV) equation, is examined. A nonlocal transformation is used on the extended KdV equation to asymptotically transform it to the KdV equation. The transformation is used to derive the higher-order two-soliton collision and it is found that the interaction is asymptotically elastic. Moreover, the higher-order corrections to the phase shifts suffered by the solitary waves during the collision are found. Comparison is made with a previous result, which indicated that, except for a special case, the interaction of higher-order KdV solitary waves is inelastic, with a coupling, …


New Weighing Matrices And Orthogonal Designs Constructed Using Two Sequences With Zero Autocorrelation Function - A Review, C. Koukouvinos, Jennifer Seberry Jan 1999

New Weighing Matrices And Orthogonal Designs Constructed Using Two Sequences With Zero Autocorrelation Function - A Review, C. Koukouvinos, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

The book, Orthogonal Designs: Quadratic Forms and Hadamard Matrices, Marcel Dekker, New York-Basel, 1979, by A. V. Geramita and Jennifer Seberry, has now been out of print for almost two decades. Many of the results on weighing matrices presented therein have been greatly improved. Here we review the theory, restate some results which are no longer available and expand on the existence of many new weighing matrices and orthogonal designs of order 2n where n is odd. We give a number of new constructions for orthogonal designs. Then using number theory, linear algebra and computer searches we find new weighing …


Crypto Topics And Applications Ii, Jennifer Seberry, C. Charnes, J. Pieprzyk, R. Safavi-Naini Jan 1999

Crypto Topics And Applications Ii, Jennifer Seberry, C. Charnes, J. Pieprzyk, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

In this chapter we continue our exposition of the crypto topics which was begun in the previous chapter. This chapter covers: Secret Sharing, Threshold Cryptography, Signature Schemes, and finally Quantum Key Distribution and Quantum Cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have included in the bibliography sufficient items which can be consulted for further details.


Crypto Topics And Applications I, Jennifer Seberry, C. Charnes, J. Pieprzyk, R. Safavi-Naini Jan 1999

Crypto Topics And Applications I, Jennifer Seberry, C. Charnes, J. Pieprzyk, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

In this chapter we discuss four related areas of cryptology, namely: Authentication, Hashing, Message Authentication Codes (MACs), and Digital Signatures. These topics represent currently active and growing research topics in cryptology. Due to space limitations, we concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have included sufficiently many items to provide the interested reader with an overall view of the current state of knowledge in the above areas.


Exact Neumann Boundary Controllability For Problems Of Transmission Of The Wave Equation, W. Liu, G. H. Williams Jan 1999

Exact Neumann Boundary Controllability For Problems Of Transmission Of The Wave Equation, W. Liu, G. H. Williams

Faculty of Informatics - Papers (Archive)

Using the Hilbert Uniqueness Method, we study the problem of exact controllability in Neumann boundary conditions for problems of transmission of the wave equation. We prove that this system is exactly controllable for all initial states in L2(Omega) x (H1(Omaga))'.