• Title/Summary/Keyword: Residue theorem

Search Result 15, Processing Time 0.015 seconds

A Study on the Extension of Base Using CRT in RNS (CRT를 사용한 잉여수계 기수확장에 관한 연구)

  • Kim Yong-Sung
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.145-154
    • /
    • 2002
  • The Extension of Base is a fundamental Method to expend the moduli in RNS(Residue Number System). RNS has the benefit of parallelism and no carry propagation at each moduli, but division , extension of base and etc. is the problem of RNS in case of the operation speed.Generally this method is applied to system using Mixed Radix Conversion. it appears to decrease the size of Arithmetic Unit, but increasing the time of operation. So in this paper, the Improved Extension of Base is proposed using Chinese Remainder Theorem. it has the comparative small size and Improved speed.

  • PDF

EVALUATION OF CERTAIN ALTERNATING SERIES

  • Choi, Junesang
    • Honam Mathematical Journal
    • /
    • v.36 no.2
    • /
    • pp.263-273
    • /
    • 2014
  • Ever since Euler solved the so-called Basler problem of ${\zeta}(2)=\sum_{n=1}^{\infty}1/n^2$, numerous evaluations of ${\zeta}(2n)$ ($n{\in}\mathbb{N}$) as well as ${\zeta}(2)$ have been presented. Very recently, Ritelli [61] used a double integral to evaluate ${\zeta}(2)$. Modifying mainly Ritelli's double integral, here, we aim at evaluating certain interesting alternating series.

효율적 비화 DBMS를 위한 크립토그래픽 모델

  • Nam Gil-Hyeon
    • Journal of the military operations research society of Korea
    • /
    • v.12 no.1
    • /
    • pp.38-49
    • /
    • 1986
  • Cryptography attempts to protect information by altering its form to make it unreadable to all but the authorized readers. DBMS is a most important computer application area requiring data security, but only a few cryptosystems are suggested for the database encryption. This research develops a new Residue-Coded Cryptosystem based on the Chinese Remainder Theorem, which is considered to be more efficient than the database encryption scheme introduced by Davida, Wells and Kam in 1981.

  • PDF

EFFICINET GENERATION OF MAXIMAL IDEALS IN POLYNOMIAL RINGS

  • Kim, Sunah
    • Bulletin of the Korean Mathematical Society
    • /
    • v.29 no.1
    • /
    • pp.137-143
    • /
    • 1992
  • The purpose of this paper is to provide the affirmative solution of the following conjecture due to Davis and Geramita. Conjecture; Let A=R[T] be a polynomial ring in one variable, where R is a regular local ring of dimension d. Then maximal ideals in A are complete intersection. Geramita has proved that the conjecture is true when R is a regular local ring of dimension 2. Whatwadekar has rpoved that conjecture is true when R is a formal power series ring over a field and also when R is a localization of an affine algebra over an infinite perfect field. Nashier also proved that conjecture is true when R is a local ring of D[ $X_{1}$,.., $X_{d-1}$] at the maximal ideal (.pi., $X_{1}$,.., $X_{d-1}$) where (D,(.pi.)) is a discrete valuation ring with infinite residue field. The methods to establish our results are following from Nashier's method. We divide this paper into three sections. In section 1 we state Theorems without proofs which are used in section 2 and 3. In section 2 we prove some lemmas and propositions which are used in proving our results. In section 3 we prove our main theorem.eorem.rem.

  • PDF

ON THE FIRST GENERALIZED HILBERT COEFFICIENT AND DEPTH OF ASSOCIATED GRADED RINGS

  • Mafi, Amir;Naderi, Dler
    • Bulletin of the Korean Mathematical Society
    • /
    • v.57 no.2
    • /
    • pp.407-417
    • /
    • 2020
  • Let (R, m) be a d-dimensional Cohen-Macaulay local ring with infinite residue field. Let I be an ideal of R that has analytic spread ℓ(I) = d, satisfies the Gd condition, the weak Artin-Nagata property AN-d-2 and m is not an associated prime of R/I. In this paper, we show that if j1(I) = λ(I/J) + λ[R/(Jd-1 :RI+(Jd-2 :RI+I):R m)] + 1, then I has almost minimal j-multiplicity, G(I) is Cohen-Macaulay and rJ(I) is at most 2, where J = (x1, , xd) is a general minimal reduction of I and Ji = (x1, , xi). In addition, the last theorem is in the spirit of a result of Sally who has studied the depth of associated graded rings and minimal reductions for m-primary ideals.