Shannon Entropy Loss in Mixed-Radix Conversions
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Generalizing Zeckendorf's Theorem to F-Decompositions
GENERALIZING ZECKENDORF’S THEOREM TO f-DECOMPOSITIONS PHILIPPE DEMONTIGNY, THAO DO, ARCHIT KULKARNI, STEVEN J. MILLER, DAVID MOON, AND UMANG VARMA ABSTRACT. A beautiful theorem of Zeckendorf states that every positive integer can be uniquely decomposed as a sum of non-consecutive Fibonacci numbers fFng, where F1 = 1, F2 = 2 and Fn+1 = Fn + Fn−1. For general recurrences fGng with non-negative coefficients, there is a notion of a legal decomposition which again leads to a unique representation, and the number of sum- mands in the representations of uniformly randomly chosen m 2 [Gn;Gn+1) converges to a normal distribution as n ! 1. We consider the converse question: given a notion of legal decomposition, is it possible to con- struct a sequence fang such that every positive integer can be decomposed as a sum of terms from the sequence? We encode a notion of legal decomposition as a function f : N0 ! N0 and say that if an is in an “f-decomposition”, then the decomposition cannot contain the f(n) terms immediately before an in the sequence; special choices of f yield many well known decompositions (including base-b, Zeckendorf and factorial). We prove that for any f : N0 ! N0, there exists a sequence 1 fangn=0 such that every positive integer has a unique f-decomposition using fang. Further, if f is periodic, then the unique increasing sequence fang that corresponds to f satisfies a linear recurrence relation. Previous research only handled recurrence relations with no negative coefficients. We find a function f that yields a sequence that cannot be described by such a recurrence relation. -
Dynamical Directions in Numeration Tome 56, No 7 (2006), P
R AN IE N R A U L E O S F D T E U L T I ’ I T N S ANNALES DE L’INSTITUT FOURIER Guy BARAT, Valérie BERTHÉ, Pierre LIARDET & Jörg THUSWALDNER Dynamical directions in numeration Tome 56, no 7 (2006), p. 1987-2092. <http://aif.cedram.org/item?id=AIF_2006__56_7_1987_0> © Association des Annales de l’institut Fourier, 2006, tous droits réservés. L’accès aux articles de la revue « Annales de l’institut Fourier » (http://aif.cedram.org/), implique l’accord avec les conditions générales d’utilisation (http://aif.cedram.org/legal/). Toute re- production en tout ou partie cet article sous quelque forme que ce soit pour tout usage autre que l’utilisation à fin strictement per- sonnelle du copiste est constitutive d’une infraction pénale. Toute copie ou impression de ce fichier doit contenir la présente mention de copyright. cedram Article mis en ligne dans le cadre du Centre de diffusion des revues académiques de mathématiques http://www.cedram.org/ Ann. Inst. Fourier, Grenoble 56, 7 (2006) 1987-2092 DYNAMICAL DIRECTIONS IN NUMERATION by Guy BARAT, Valérie BERTHÉ, Pierre LIARDET & Jörg THUSWALDNER (*) Abstract. — This survey aims at giving a consistent presentation of numer- ation from a dynamical viewpoint: we focus on numeration systems, their asso- ciated compactification, and dynamical systems that can be naturally defined on them. The exposition is unified by the fibred numeration system concept. Many examples are discussed. Various numerations on rational integers, real or complex numbers are presented with special attention paid to β-numeration and its gener- alisations, abstract numeration systems and shift radix systems, as well as G-scales and odometers. -
A Robust Software Watermarking for Copyright Protection
computers & security 28 (2009) 395–409 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose A robust software watermarking for copyright protection Ibrahim Kamela,*, Qutaiba Albluwib aDepartment of Computer Engineering Sharjah University, P.O. Box 27272, United Arab Emirates bSchool of Computing, Queens University, Canada article info abstract Article history: This paper advocates protecting software copyright through hiding watermarks in various Received 18 August 2008 data structures used by the code, e.g., Bþ-trees, R-trees, linked lists, etc. Prior proposals Received in revised form hide the watermarks in dummy data structures, e.g., linked lists and graphs that are 13 January 2009 created, solely for this reason, during the execution of the hosting software. This makes Accepted 30 January 2009 them vulnerable to subtractive attacks, because the attacker can remove the dummy data structures without altering the functionality or the semantic of the software program. We Keywords: argue that hiding watermarks in one or more data structures that are used by the program Information security would make the watermark more robust because disturbing the watermark would affect R-trees the semantic and the functionality of the underlying software. The challenge is that the Watermarking insertion of the watermark should have a minimal effect on the operations and perfor- Multimedia indexes mance of the data structure. Spatial data structures This paper proposes a novel method for watermarking R-tree data structure and its variants. Copyright protection The proposed watermarking technique does not change the values of the stored data objects. It takes advantage of the redundancy in the order of entries inside the R-tree nodes. -
THÈSE DOCTEUR DE L'université DU LUXEMBOURG EN INFORMATIQUE ET DOCTEUR DE L'université LILLE1 EN INFORMATIQUE Malika Mehd
PhD-FSTC-2011-17 Faculté des Sciences, de la Technologie et de Faculté des Sciences et Technologies de Lille la Communication THÈSE Soutenue le 20/10/2011 à Luxembourg En vue de l’obtention du grade académique de DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE ET DOCTEUR DE L’UNIVERSITÉ LILLE1 EN INFORMATIQUE par Malika Mehdi née le 10 septembre 1981 à Bejaia PARALLEL HYBRID OPTIMIZATION METHODS FOR PERMUTATION BASED PROBLEMS Jury de thèse Prof. Dr. Pascal Bouvry, directeur de thèse Professeur, Université du Luxembourg Prof. Dr. El-Ghazali Talbi, directeur de thèse Professeur, Université Lille1 Prof. Dr. Nouredine Melab, co-directeur de thèse Professeur, Université Lille1 Prof. Dr. Raymond Bisdorff, président Professeur, Université du Luxembourg Prof. Dr. Enrique Alba, membre Professeur, Université de Malaga Dr. Didier El-Baz, membre HDR, LAAS-CNRS, Toulouse Abstract Solving efficiently large benchmarks of NP-hard permutation-based problems re- quires the development of hybrid methods combining different classes of optimiza- tion methods. Indeed, it is now acknowledged that such methods perform better than traditional optimization methods when used separately. The key challenge is how to find connections between the divergent search strategies used in each class of methods in order to build efficient hybridization strategies. Genetic algorithms (GAs) are very popular population-based metaheuristics based on stochastic evo- lutionary operators. The hybridization of GAs with tree-based exact methods such as Branch-and-Bound is a promising research trend. B&B algorithms are based on an implicit enumeration of the solution space represented as a tree. Our hybridization approach consists in providing a common solution and search space coding and associated search operators enabling an efficient cooperation between the two methods. -
Basic Computer Arithmetic
BASIC COMPUTER ARITHMETIC TSOGTGEREL GANTUMUR Abstract. First, we consider how integers and fractional numbers are represented and manipulated internally on a computer. The focus is on the principles behind the algorithms, rather than on implementation details. Then we develop a basic theoretical framework for analyzing algorithms involving inexact arithmetic. Contents 1. Introduction 1 2. Integers 2 3. Simple division algorithms 6 4. Long division 11 5. The SRT division algorithm 16 6. Floating point numbers 18 7. Floating point arithmetic 21 8. Propagation of error 24 9. Summation and product 29 1. Introduction There is no way to encode all real numbers by using finite length words, even if we use an alphabet with countably many characters, because the set of finite sequences of integers is countable. Fortunately, the real numbers support many countable dense subsets, and hence the encoding problem of real numbers may be replaced by the question of choosing a suitable countable dense subset. Let us look at some practical examples of real number encodings. ● Decimal notation. Examples: 36000, 2:35(75), −0:000072. ● Scientific notation. Examples: 3:6⋅104, −72⋅10−6. The general form is m⋅10e. In order to have a unique (or near unique) representation of each number, one can impose a normalization, such as requiring 1 ≤ ∣m∣ < 10. 2 −1 ● System with base/radix β. Example: m2m1m0:m−1 = m2β +m1β +m0 +m−1β . The dot separating the integer and fractional parts is called the radix point. ● Binary (β = 2), octal (β = 8), and hexadecimal (β = 16) numbers. ● Babylonian hexagesimal (β = 60) numbers. -
Version 13.0 Release Notes
Release Notes The tool of thought for expert programming Version 13.0 Dyalog is a trademark of Dyalog Limited Copyright 1982-2011 by Dyalog Limited. All rights reserved. Version 13.0 First Edition April 2011 No part of this publication may be reproduced in any form by any means without the prior written permission of Dyalog Limited. Dyalog Limited makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Dyalog Limited reserves the right to revise this publication without notification. TRADEMARKS: SQAPL is copyright of Insight Systems ApS. UNIX is a registered trademark of The Open Group. Windows, Windows Vista, Visual Basic and Excel are trademarks of Microsoft Corporation. All other trademarks and copyrights are acknowledged. iii Contents C H A P T E R 1 Introduction .................................................................................... 1 Summary........................................................................................................................... 1 System Requirements ....................................................................................................... 2 Microsoft Windows .................................................................................................... 2 Microsoft .Net Interface .............................................................................................. 2 Unix and Linux .......................................................................................................... -
Unranking Combinations Lexicographically: an Efficient New Strategy Compared with Others Cyann Donnot, Antoine Genitrini, Yassine Herida
Unranking Combinations Lexicographically: an efficient new strategy compared with others Cyann Donnot, Antoine Genitrini, Yassine Herida To cite this version: Cyann Donnot, Antoine Genitrini, Yassine Herida. Unranking Combinations Lexicographically: an efficient new strategy compared with others. 2020. hal-02462764 HAL Id: hal-02462764 https://hal.sorbonne-universite.fr/hal-02462764 Preprint submitted on 31 Jan 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Unranking Combinations Lexicographically: an efficient new strategy compared with others Cyann Donnot1, Antoine Genitrini2, and Yassine Herida1 1 Full-time master student at Sorbonne University 2 Sorbonne University, LIP6. [email protected] Abstract. We propose a comparative study of four algorithms dedi- cated to the lexicographic unranking of combinations. The three first ones are algorithms from the literature. We give some key ideas how to analyze them in average and describe their strengths and weaknesses. We then introduce a new algorithm based on a new strategy inside the classical factorial numeral system (or factoradics). We conclude the pa- per with an experimental study, in particular when n = 10000; k = 5000, our algorithm is 36 (resp. 53) times as fast as our C++ implementation of Matlab’s (resp. -
Math Book from Wikipedia
Math book From Wikipedia PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 25 Jul 2011 10:39:12 UTC Contents Articles 0.999... 1 1 (number) 20 Portal:Mathematics 24 Signed zero 29 Integer 32 Real number 36 References Article Sources and Contributors 44 Image Sources, Licenses and Contributors 46 Article Licenses License 48 0.999... 1 0.999... In mathematics, the repeating decimal 0.999... (which may also be written as 0.9, , 0.(9), or as 0. followed by any number of 9s in the repeating decimal) denotes a real number that can be shown to be the number one. In other words, the symbols 0.999... and 1 represent the same number. Proofs of this equality have been formulated with varying degrees of mathematical rigour, taking into account preferred development of the real numbers, background assumptions, historical context, and target audience. That certain real numbers can be represented by more than one digit string is not limited to the decimal system. The same phenomenon occurs in all integer bases, and mathematicians have also quantified the ways of writing 1 in non-integer bases. Nor is this phenomenon unique to 1: every nonzero, terminating decimal has a twin with trailing 9s, such as 8.32 and 8.31999... The terminating decimal is simpler and is almost always the preferred representation, contributing to a misconception that it is the only representation. The non-terminating form is more convenient for understanding the decimal expansions of certain fractions and, in base three, for the structure of the ternary Cantor set, a simple fractal. -
The Mayan Long Count Calendar Thomas Chanier
The Mayan Long Count Calendar Thomas Chanier To cite this version: Thomas Chanier. The Mayan Long Count Calendar. 2015. hal-00750006v11 HAL Id: hal-00750006 https://hal.archives-ouvertes.fr/hal-00750006v11 Preprint submitted on 8 Dec 2015 (v11), last revised 16 Dec 2015 (v12) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. The Mayan Long Count Calendar Thomas Chanier∗1 1 Universit´ede Brest, 6 avenue Victor le Gorgeu, F-29285 Brest Cedex, France The Mayan Codices, bark-paper books from the Late Postclassic period (1300 to 1521 CE) contain many astronomical tables correlated to ritual cycles, evidence of the achievement of Mayan naked- eye astronomy and mathematics in connection to religion. In this study, a calendar supernumber is calculated by computing the least common multiple of 8 canonical astronomical periods. The three major calendar cycles, the Calendar Round, the Kawil and the Long Count Calendar are shown to derive from this supernumber. The 360-day Tun, the 365-day civil year Haab’ and the 3276-day Kawil-direction-color cycle are determined from the prime factorization of the 8 canonical astronomical input parameters. -
The Statistic Pinv for Number System∗
Applied Mathematics E-Notes, 20(2020), 230-235 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.edu.tw/ amen/ The Statistic Pinv For Number System Fanomezantsoa Patrick Rabarisony, Hery Randriamaroz Received 19 April 2019 Abstract The number of inversions is a statistic on permutation groups measuring the degree to which the entries of a permutation are out of order. We provide a generalization of that statistic by introducing the statistic number of pseudoinversions on the colored permutation groups. The main motivation for studying that statistic is the possibility to use it to define a number system and a numeral system on the colored permutation groups. By means of the statistic number of i-pseudoinversions, we construct our number system, and a bijection between the set of positive integers and the colored permutation groups. 1 Introduction A statistic over a group is a function from that group to the set of nonnegative integers. One of the most studied statistics is the number of inversions, defined by inv := # (i, j) [n]2 i < j, (i) > (j) , 2 j on the symmetric group Sn over [n]. A well-known result is the equidistribution of inv with the statistic major index proved by Foata [3]. Besides, the Lehmer code is based on that statistic. It is a particular way to encode each permutation of n numbers, and an instance of a scheme for numbering permutations. Remark that Vajnovszki provided several permutation codes directly related to the Lehmer code [5]. In this article, we give a generalization of the statistic inv on the colored permutation group in order to create a more general code. -
Zot-Binary: a New Numbering System with an Application on Big-Integer Multiplication
Journal of Theoretical and Applied Information Technology 10th February 2013. Vol. 48 No.1 © 2005 - 2013 JATIT & LLS. All rights reserved. ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195 ZOT-BINARY: A NEW NUMBERING SYSTEM WITH AN APPLICATION ON BIG-INTEGER MULTIPLICATION 1SHAHRAM JAHANI, 2AZMAN SAMSUDIN 1,2 School of Computer Sciences, Universiti Sains Malaysia,Pulau Penang, Malaysia E-mail: [email protected], [email protected] ABSTRACT In this paper we present a new numbering system with an efficient application on Big-Integer multiplication. The paper starts with an introduction to a new redundant positional numbering system known as “Big-Digit Numbering System” (BDNS). With BDNS, a new non-redundant positional numbering system known as ZOT-Binary is proposed. ZOT-Binary has a low Hamming weight with an average of 23.8% nonzero symbols, and therefore is highly suitable for Big-Integer calculation, especially for Big- Integer multiplication. To harvest such benefit from the ZOT-Binary representation, a new Big-Integer multiplication algorithm, ZOT-CM, which is based on the Classical multiplication algorithm, is proposed. Our result shows that when compared with the Classical multiplication algorithm, ZOT-CM is about 12 times faster for multiplying 128 bits numbers and at least 16 times faster for multiplying numbers that are bigger than 32,000 bits long. Our result also shows that ZOT-CM is about 20 to 3 times faster than Karatsuba multiplication algorithm, for multiplying numbers that are ranging from 128 bits to 32,000 bits long. From the findings, it is clear that ZOT-CM is a valuable addition to Big-Integer multiplication algorithm, and it is also believed that ZOT-Binary representation can benefit many other Big-Integer calculations. -
Ed 040 737 Institution Available from Edrs Price
DOCUMENT RESUME ED 040 737 LI 002 060 TITLE Automatic Data Processing Glossary. INSTITUTION Bureau of the Budget, Washington, D.C. NOTE 65p. AVAILABLE FROM Reprinted and distributed by Datamation Magazine, 35 Mason St., Greenwich, Conn. 06830 ($1.00) EDRS PRICE EDRS Price MF-$0.50 HC-$3.35 DESCRIPTORS *Electronic Data Processing, *Glossaries, *Word Lists ABSTRACT The technology of the automatic information processing field has progressed dramatically in the past few years and has created a problem in common term usage. As a solution, "Datamation" Magazine offers this glossary which was compiled by the U.S. Bureau of the Budget as an official reference. The terms appear in a single alphabetic sequence, ignoring commas or hyphens. Definitions are given only under "key word" entries. Modifiers consisting of more than one word are listed in the normally used sequence (record, fixed length). In cases where two or more terms have the same meaning, only the preferred term is defined, all synonylious terms are given at the end of the definition.Other relationships between terms are shown by descriptive referencing expressions. Hyphens are used sparingly to avoid ambiguity. The derivation of an acronym is shown by underscoring the appropriate letters in the words from which the acronym is formed. Although this glossary is several years old, it is still considered the best one available. (NH) Ns U.S DEPARTMENT OF HEALTH, EDUCATION & WELFARE OFFICE OF EDUCATION THIS DOCUMENT HAS BEEN REPRODUCED EXACTLY AS RECEIVED FROM THE PERSON OR ORGANIZATION ORIGINATING IT POINTS OF VIEW OR OPINIONS STATED DO NOT NECES- SARILY REPRESENT OFFICIAL OFFICE OF EDU- CATION POSITION OR POLICY automatic data processing GLOSSA 1 I.R DATAMATION Magazine reprints this Glossary of Terms as a service to the data processing field.