نتایج جستجو برای: inverse polynomial

تعداد نتایج: 185783  

2000
Bo YU

This paper presents an efficient algorithm for computing the characteristic polynomial of a matrix, which utilizes Cayley-Hamilton’s theorem. The algorithm requires no condition on input matrix and can be performed only with basic matrix operations except only one computation of inverse of constant matrix. Though the algorithm can be applied to a constant matrix, it is the most effective when a...

Journal: :Journal of Approximation Theory 2023

We estimate the Lebesgue constants for Lagrange interpolation processes on one or several intervals by rational functions with fixed poles. admit that poles have finitely many accumulation points intervals. To prove it we use an analog of inverse polynomial image method

2014
Mikael Fridenfalk

Inverse solutions to interpolation techniques in computer graphics may increase the accuracy of the rendered frames. An example is the use of an arbitrary time stamp in time interpolation to evaluate the t-parameter, which in turn can be used for time-variant spatial interpolation. In this paper, an analytic inverse is presented for a shape-preserving piecewise cubic Hermite interpolant, used i...

2015
Aykut Bulut Ted K. Ralphs

Inverse optimization is the problem of determining the values of missing input parameters that are closest to given estimates and that will make a given target solution optimal. This study is concerned with inverse mixed integer linear optimization problems (MILPs) in which the missing parameters are objective function coefficients. This class generalizes the class studied by Ahuja and Orlin [2...

Journal: :Adv. Comput. Math. 2000
Michael S. Floater Tom Lyche

It is well known that the degree-raised Bernstein-Bézier coefficients of degree n of a polynomial g converge to g at the rate 1/n. In this paper we consider the polynomial An(g) of degree ≤ n interpolating the coefficients. We show how An can be viewed as an inverse to the Bernstein operator and that the derivatives An(g) (r) converge uniformly to g at the rate 1/n for all r. We also give an as...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده برق و کامپیوتر 1391

امروزه با گسترش تکنولوژی بی سیم و نیاز به برقراری امنیت استفاده از رمزنگاری امری اجتناب ناپذیر می نماید. گروه های تحقیقاتی زیادی تلاش می کنند که سیستم های رمزنگاری ایمن طراحی کنند. اما یک پیاده سازی بد می تواند تمامی این تلاش ها را بیهوده سازد. به همین دلیل در کنار طراحی و تحلیل امنیت سیستم های رمزنگاری، بحث پیاده سازی آن ها در دستور کار گروه های تحقیقاتی قرار می گیرد. در پیاده سازی دو موضوع م...

2003
Gilles Villard

One may consider that the algebraic complexity of basic linear algebra over an abstract field K is well known. Indeed, if ω is the exponent of matrix multiplication over K, then for instance computing the determinant, the matrix inverse, the rank or the characteristic polynomial of an n×n matrix over K can be done in O (̃n) operations in K. Here the soft “O” notation indicates some missing logar...

2015
J. Urenda D. Finston V. Kreinovich

It is known that some polynomial mappings φ : Ck → Cn are recti able in the sense that there exists a polynomial mapping α : Cn → Cn whose inverse is also polynomial and for which α(φ(z1, . . . , zk)) = (z1, . . . , zk, 0, . . . , 0) for all z1, . . . , zk. In many cases, the existence of such a recti cation is proven indirectly, without an explicit construction of the mapping α. In this paper,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید