polynomial representation
Recently Published Documents


TOTAL DOCUMENTS

165
(FIVE YEARS 25)

H-INDEX

15
(FIVE YEARS 2)

2021 ◽  
Vol 2090 (1) ◽  
pp. 012096
Author(s):  
Ibrahim Nonkané ◽  
Léonard Todjihounde

Abstract In this note, we study the action of the rational quantum Calogero-Moser system on polynomials rings. This a continuation of our paper [Ibrahim Nonkan 2021 J. Phys.: Conf. Ser. 1730 012129] in which we deal with the polynomial representation of the ring of invariant differential operators. Using the higher Specht polynomials we give a detailed description of the actions of the Weyl algebra associated with the ring of the symmetric polynomial C[x 1,..., xn]Sn on the polynomial ring C[x 1,..., xn ]. In fact, we show that its irreducible submodules over the ring of differential operators invariant under the symmetric group are its submodules generated by higher Specht polynomials over the ring of the symmetric polynomials. We end up studying the polynomial representation of the ring of differential operators invariant under the actions of products of symmetric groups by giving the generators of its simple components, thus we give a differential structure to the higher Specht polynomials.


2021 ◽  
Vol 2090 (1) ◽  
pp. 012097
Author(s):  
Ibrahim Nonkané ◽  
M. Latévi Lawson

Abstract In this note, we study the polynomial representation of the quantum Olshanetsky-Perelomov system for a finite reflection group W of type Bn. We endowed the polynomial ring C[x 1,..., xn ] with a structure of module over the Weyl algebra associated with the ring C[x 1,..., xn]W of invariant polynomials under a reflections group W of type Bn . Then we study the polynomials representation of the ring of invariant differential operators under the reflections group W. We make use of the theory of representation of groups namely the higher Specht polynomials associated with the reflection group W to yield a decomposition of that structure by providing explicitly the generators of its simple components.


2021 ◽  
pp. 1-19
Author(s):  
Guo Niu ◽  
Zhengming Ma ◽  
Haoqing Chen ◽  
Xue Su

Manifold learning plays an important role in nonlinear dimensionality reduction. But many manifold learning algorithms cannot offer an explicit expression for dealing with the problem of out-of-sample (or new data). In recent, many improved algorithms introduce a fixed function to the object function of manifold learning for learning this expression. In manifold learning, the relationship between the high-dimensional data and its low-dimensional representation is a local homeomorphic mapping. Therefore, these improved algorithms actually change or damage the intrinsic structure of manifold learning, as well as not manifold learning. In this paper, a novel manifold learning based on polynomial approximation (PAML) is proposed, which learns the polynomial approximation of manifold learning by using the dimensionality reduction results of manifold learning and the original high-dimensional data. In particular, we establish a polynomial representation of high-dimensional data with Kronecker product, and learns an optimal transformation matrix with this polynomial representation. This matrix gives an explicit and optimal nonlinear mapping between the high-dimensional data and its low-dimensional representation, and can be directly used for solving the problem of new data. Compare with using the fixed linear or nonlinear relationship instead of the manifold relationship, our proposed method actually learns the polynomial optimal approximation of manifold learning, without changing the object function of manifold learning (i.e., keeping the intrinsic structure of manifold learning). We implement experiments over eight data sets with the advanced algorithms published in recent years to demonstrate the benefits of our algorithm.


Author(s):  
Merrick Cai ◽  
Daniil Kalinov

In this paper, we study the irreducible quotient [Formula: see text] of the polynomial representation of the rational Cherednik algebra [Formula: see text] of type [Formula: see text] over an algebraically closed field of positive characteristic [Formula: see text] where [Formula: see text]. In the [Formula: see text] case, for all [Formula: see text] we give a complete description of the polynomials in the maximal proper graded submodule [Formula: see text], the kernel of the contravariant form [Formula: see text], and subsequently find the Hilbert series of the irreducible quotient [Formula: see text]. In the [Formula: see text] case, we give a complete description of the polynomials in [Formula: see text] when the characteristic [Formula: see text] and [Formula: see text] is transcendental over [Formula: see text], and compute the Hilbert series of the irreducible quotient [Formula: see text]. In doing so, we prove a conjecture due to Etingof and Rains completely for [Formula: see text], and also for any [Formula: see text] and [Formula: see text]. Furthermore, for [Formula: see text], we prove a simple criterion to determine whether a given polynomial [Formula: see text] lies in [Formula: see text] for all [Formula: see text] with [Formula: see text] and [Formula: see text] fixed.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ou Ruan ◽  
Hao Mao

Private set intersection (PSI) allows participants to securely compute the intersection of their inputs, which has a wide range of applications such as privacy-preserving contact tracing of COVID-19. Most existing PSI protocols were based on asymmetric/symmetric cryptosystem. Therefore, keys-related operations would burden these systems. In this paper, we transform the problem of the intersection of sets into the problem of finding roots of polynomials by using point-value polynomial representation, blind polynomials’ point-value pairs for secure transportation and computation with the pseudorandom function, and then propose an efficient PSI protocol without any cryptosystem. We optimize the protocol based on the permutation-based hash technique which divides a set into multisubsets to reduce the degree of the polynomial. The following advantages can be seen from the experimental result and theoretical analysis: (1) there is no cryptosystem for data hiding or encrypting and, thus, our design provides a lightweight system; (2) with set elements less than 212, our protocol is highly efficient compared to the related protocols; and (3) a detailed formal proof is given in the semihonest model.


Sign in / Sign up

Export Citation Format

Share Document