scholarly journals Matriks atas Aljabar Max-Plus Interval

2012 ◽  
Vol 13 (2) ◽  
pp. 94
Author(s):  
Marcellinus Andy Rudhito ◽  
Sri Wahyuni ◽  
Ari Suparwanto ◽  
Frans Susilo

This paper aims to discuss the matrix algebra over interval max-plus algebra (interval matrix) and a method tosimplify the computation of the operation of them. This matrix algebra is an extension of matrix algebra over max-plus algebra and can be used to discuss the matrix algebra over fuzzy number max-plus algebra via its alpha-cut.The finding shows that the set of all interval matrices together with the max-plus scalar multiplication operationand max-plus addition is a semimodule. The set of all square matrices over max-plus algebra together with aninterval of max-plus addition operation and max-plus multiplication operation is a semiring idempotent. As reasoningfor the interval matrix operations can be performed through the corresponding matrix interval, because thatsemimodule set of all interval matrices is isomorphic with semimodule the set of corresponding interval matrix,and the semiring set of all square interval matrices is isomorphic with semiring the set of the correspondingsquare interval matrix.

Biomolecules ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 1797
Author(s):  
Shaoxia Xu ◽  
Yuan Liu ◽  
Shihua Zhou ◽  
Qiang Zhang ◽  
Nikola K. Kasabov

Numerical computation is a focus of DNA computing, and matrix operations are among the most basic and frequently used operations in numerical computation. As an important computing tool, matrix operations are often used to deal with intensive computing tasks. During calculation, the speed and accuracy of matrix operations directly affect the performance of the entire computing system. Therefore, it is important to find a way to perform matrix calculations that can ensure the speed of calculations and improve the accuracy. This paper proposes a DNA matrix operation method based on the mechanism of the DNAzyme binding to auxiliary strands to cleave the substrate. In this mechanism, the DNAzyme binding substrate requires the connection of two auxiliary strands. Without any of the two auxiliary strands, the DNAzyme does not cleave the substrate. Based on this mechanism, the multiplication operation of two matrices is realized; the two types of auxiliary strands are used as elements of the two matrices, to participate in the operation, and then are combined with the DNAzyme to cut the substrate and output the result of the matrix operation. This research provides a new method of matrix operations and provides ideas for more complex computing systems.


2019 ◽  
Vol 7 (1) ◽  
pp. 218-225
Author(s):  
Milica Anđelić ◽  
Tamara Koledin ◽  
Zoran Stanić

Abstract We consider a particular class of signed threshold graphs and their eigenvalues. If Ġ is such a threshold graph and Q(Ġ ) is a quotient matrix that arises from the equitable partition of Ġ , then we use a sequence of elementary matrix operations to prove that the matrix Q(Ġ ) – xI (x ∈ ℝ) is row equivalent to a tridiagonal matrix whose determinant is, under certain conditions, of the constant sign. In this way we determine certain intervals in which Ġ has no eigenvalues.


2014 ◽  
Vol 1008-1009 ◽  
pp. 1176-1179
Author(s):  
Hai Dong ◽  
Heng Bao Xin

In this paper, an approach of fuzzy Petri nets (FPN) is proposed to simulate the fault spreading and diagnosis of hydraulic pump. First, the fuzzy production rules and the definition of FPN were briefly introduced. Then, its knowledge reasoning process and the matrix operations based on an algorithm were conducted, which makes full use of its parallel reasoning ability and makes it simpler and easier to implement. Finally, a case of hydraulic pump fault diagnosis with FPN was presented in detail, for illustrating the interest of the proposed modeling and analysis algorithm.


Author(s):  
Götz Alefeld ◽  
Jürgen Herzberger

2021 ◽  
Vol 65 (7) ◽  
pp. 1-7
Author(s):  
Aymen Ammar ◽  
Aref Jeribi ◽  
Kamel Mahfoudhi

Author(s):  
A. Sahami ◽  
E. Ghaderi ◽  
S. M. Kazemi Torbaghan ◽  
B. Olfatian Gillan

In this paper, we study Johnson pseudo-contractibility of second dual of some Banach algebras. We show that the semigroup algebra [Formula: see text] is Johnson pseudo-contractible if and only if [Formula: see text] is a finite amenable group, where [Formula: see text] is an archimedean semigroup. We also show that the matrix algebra [Formula: see text] is Johnson pseudo-contractible if and only if [Formula: see text] is finite. We study Johnson pseudo-contractibility of certain projective tensor product second duals Banach algebras.


2018 ◽  
Vol 14 (6) ◽  
pp. 1 ◽  
Author(s):  
Riki Mukhaiyar

Cancellable fingerprint uses transformed or intentionally distorted biometric data instead of the original biometric data for identifying person. When a set of biometric data is found to be compromised, they can be discarded, and a new set of biometric data can be regenerated. This initial principal is identical with a non-invertible concept in matrices operations. In matrix domain, a matrix cannot be transformed into its original form if it meets several requirements such as non-square form matrix, consist of one zero row/column, and no row as multiple of another row. These conditions can be acquired by implementing three matrix operations using Kronecker Product (KP) operation, Elementary Row Operation (ERO), and Inverse Matrix (INV) operation. KP is useful to produce a non-square form matrix, to enlarge the size of matrix, to distinguish and disguise the element of matrix by multiplying each of elements of the matrix with a particular matrix. ERO can be defined as multiplication and addition force to matrix rows. INV is utilized to transform one matrix to another one with a different element or form as a reciprocal matrix of the original. These three matrix operations should be implemented together in generating the cancellable feature to robust image. So, if once three conditions are met by imposter, it is impossible to find the original image of the fingerprint. The initial aim of these operations is to camouflage the original look of the fingerprint feature into an abstract-look to deceive an un-authorized personal using the fingerprint irresponsibly. In this research, several fingerprint processing steps such as fingerprint pre-processing, core-point identification, region of interest, minutiae extration, etc; are determined to improve the quality of the cancellable feature. Three different databases i.e. FVC2002, FVC2004, and BRC are utilized in this work.


Sign in / Sign up

Export Citation Format

Share Document