scholarly journals Multiplicative knapsack injectivity as condition of effective unauthorized access protection

2021 ◽  
Vol 2131 (2) ◽  
pp. 022084
Author(s):  
V O Osipyan ◽  
A S Zhuk ◽  
E P Lukashchik ◽  
K I Litvinov ◽  
R Kh Bagdasaryan

Abstract The mathematical modelling of data protection systems based on multiplicative knapsack is considered. In particular, development of cryptographic solution to hierarchic access control problem is represented. Previously in research the authors has formulated the requirements to knapsack in order to apply these to a hierarchic access control problem based on the requirements for similar models. Here in the article the possibility of practical implementation of the construction of such knapsacks is pointed. Based on special mathematical model for multiplicative knapsacks generalized sufficient condition of multiplicative knapsack injectivity is formulated and proved in the article. Known sufficient conditions of multiplicative knapsack injectivity are special cases of authors condition. The mathematical apparatus of additive knapsacks for building multiplicative vector is shown.

2020 ◽  
Vol 18 (1) ◽  
pp. 1540-1551
Author(s):  
Jung Wook Lim ◽  
Dong Yeol Oh

Abstract Let ({\mathrm{\Gamma}},\le ) be a strictly ordered monoid, and let {{\mathrm{\Gamma}}}^{\ast }\left={\mathrm{\Gamma}}\backslash \{0\} . Let D\subseteq E be an extension of commutative rings with identity, and let I be a nonzero proper ideal of D. Set \begin{array}{l}D+[\kern-2pt[ {E}^{{{\mathrm{\Gamma}}}^{\ast },\le }]\kern-2pt] := \left\{f\in [\kern-2pt[ {E}^{{\mathrm{\Gamma}},\le }]\kern-2pt] \hspace{0.15em}|\hspace{0.2em}f(0)\in D\right\}\hspace{.5em}\text{and}\\ \hspace{0.2em}D+[\kern-2pt[ {I}^{{\Gamma }^{\ast },\le }]\kern-2pt] := \left\{f\in [\kern-2pt[ {D}^{{\mathrm{\Gamma}},\le }]\kern-2pt] \hspace{0.15em}|\hspace{0.2em}f(\alpha )\in I,\hspace{.5em}\text{for}\hspace{.25em}\text{all}\hspace{.5em}\alpha \in {{\mathrm{\Gamma}}}^{\ast }\right\}.\end{array} In this paper, we give necessary conditions for the rings D+[\kern-2pt[ {E}^{{{\mathrm{\Gamma}}}^{\ast },\le }]\kern-2pt] to be Noetherian when ({\mathrm{\Gamma}},\le ) is positively ordered, and sufficient conditions for the rings D+[\kern-2pt[ {E}^{{{\mathrm{\Gamma}}}^{\ast },\le }]\kern-2pt] to be Noetherian when ({\mathrm{\Gamma}},\le ) is positively totally ordered. Moreover, we give a necessary and sufficient condition for the ring D+[\kern-2pt[ {I}^{{\Gamma }^{\ast },\le }]\kern-2pt] to be Noetherian when ({\mathrm{\Gamma}},\le ) is positively totally ordered. As corollaries, we give equivalent conditions for the rings D+({X}_{1},\ldots ,{X}_{n})E{[}{X}_{1},\ldots ,{X}_{n}] and D+({X}_{1},\ldots ,{X}_{n})I{[}{X}_{1},\ldots ,{X}_{n}] to be Noetherian.


Mathematics ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 1309
Author(s):  
P. R. Gordoa ◽  
A. Pickering

We consider the problem of the propagation of high-intensity acoustic waves in a bubble layer consisting of spherical bubbles of identical size with a uniform distribution. The mathematical model is a coupled system of partial differential equations for the acoustic pressure and the instantaneous radius of the bubbles consisting of the wave equation coupled with the Rayleigh–Plesset equation. We perform an analytic analysis based on the study of Lie symmetries for this system of equations, concentrating our attention on the traveling wave case. We then consider mappings of the resulting reductions onto equations defining elliptic functions, and special cases thereof, for example, solvable in terms of hyperbolic functions. In this way, we construct exact solutions of the system of partial differential equations under consideration. We believe this to be the first analytic study of this particular mathematical model.


2000 ◽  
Vol 11 (03) ◽  
pp. 515-524
Author(s):  
TAKESI OKADOME

The paper deals with learning in the limit from positive data. After an introduction and overview of earlier results, we strengthen a result of Sato and Umayahara (1991) by establishing a necessary and sufficient condition for the satisfaction of Angluin's (1980) finite tell-tale condition. Our other two results show that two notions introduced here, the finite net property and the weak finite net property, lead to sufficient conditions for learning in the limit from positive data. Examples not solvable by earlier methods are also given.


1973 ◽  
Vol 95 (4) ◽  
pp. 356-361 ◽  
Author(s):  
G. Leitmann ◽  
W. Schmitendorf

We consider the optimal control problem with vector-valued criterion (including cooperative games) and seek Pareto-optimal (noninferior) solutions. Scalarization results, together with modified sufficiency theorems from optimal control theory, are used to deduce sufficient conditions for Pareto-optimality. The utilization of these conditions is illustrated by various examples.


Author(s):  
Bart Jacobs ◽  
Aleks Kissinger ◽  
Fabio Zanasi

Abstract Extracting causal relationships from observed correlations is a growing area in probabilistic reasoning, originating with the seminal work of Pearl and others from the early 1990s. This paper develops a new, categorically oriented view based on a clear distinction between syntax (string diagrams) and semantics (stochastic matrices), connected via interpretations as structure-preserving functors. A key notion in the identification of causal effects is that of an intervention, whereby a variable is forcefully set to a particular value independent of any prior propensities. We represent the effect of such an intervention as an endo-functor which performs ‘string diagram surgery’ within the syntactic category of string diagrams. This diagram surgery in turn yields a new, interventional distribution via the interpretation functor. While in general there is no way to compute interventional distributions purely from observed data, we show that this is possible in certain special cases using a calculational tool called comb disintegration. We demonstrate the use of this technique on two well-known toy examples: one where we predict the causal effect of smoking on cancer in the presence of a confounding common cause and where we show that this technique provides simple sufficient conditions for computing interventions which apply to a wide variety of situations considered in the causal inference literature; the other one is an illustration of counterfactual reasoning where the same interventional techniques are used, but now in a ‘twinned’ set-up, with two version of the world – one factual and one counterfactual – joined together via exogenous variables that capture the uncertainties at hand.


2007 ◽  
Vol 7 (7) ◽  
pp. 624-638
Author(s):  
J. de Vicente

We study the separability of bipartite quantum systems in arbitrary dimensions using the Bloch representation of their density matrix. This approach enables us to find an alternative characterization of the separability problem, from which we derive a necessary condition and sufficient conditions for separability. For a certain class of states the necessary condition and a sufficient condition turn out to be equivalent, therefore yielding a necessary and sufficient condition. The proofs of the sufficient conditions are constructive, thus providing decompositions in pure product states for the states that satisfy them. We provide examples that show the ability of these conditions to detect entanglement. In particular, the necessary condition is proved to be strong enough to detect bound entangled states.


2021 ◽  
Vol 13 (1) ◽  
pp. 148-178
Author(s):  
Huiyi Guo ◽  
Nicholas C. Yannelis

This paper introduces the maxmin expected utility framework into the problem of fully implementing a social choice set as ambiguous equilibria. Our model incorporates the Bayesian framework and the Wald-type maxmin preferences as special cases and provides insights beyond the Bayesian implementation literature. We establish necessary and almost sufficient conditions for a social choice set to be fully implementable. Under the Wald-type maxmin preferences, we provide easy-to-check sufficient conditions for implementation. As applications, we implement the set of ambiguous Pareto-efficient and individually rational social choice functions, the maxmin core, the maxmin weak core, and the maxmin value. (JEL D71, D81, D82)


2004 ◽  
Vol 95 (2) ◽  
pp. 517-550 ◽  
Author(s):  
William M. Grove

This article first explains concepts in taxometrics, including the meaning of “taxon” in relation to taxometric procedures. It then mathematically develops the MAXSLOPE procedure of Grove and Meehl which relies on nonlinear regression of one taxometric indicator variable on another. Sufficient conditions for MAXSLOPE's validity are set forth. The relationship between the point of maximum regression slope (MAXSLOPE point) and the HITMAX cut, i.e., the point on a variable which, if used as a diagnostic cut-off score, yields maximum classification accuracy, is analyzed. A sufficient condition is given for the MAXSLOPE point to equal the HITMAX cut; however, most distributions have different MAXSLOPE and HITMAX points. Equations and an algorithm are spelled out for making a graphical test for the existence of a taxon, estimating taxometric parameters, and conducting consistency tests; the latter serve as stringent checks on the validity of a taxonic conjecture. The plausibility of assumptions made, in deriving MAXSLOPE equations, is discussed, and the qualitative effects of violations of these assumptions are explained.


Sign in / Sign up

Export Citation Format

Share Document