-
Root finding techniques that work
Abstract: In most introductory numerical analysis textbooks, the treatment of a single nonlinear equation often consists of a collection of all-purpose methods that frequently do not work or are inefficient. These textbooks neglect to teach the importance of adapting a method to the given problem, and consequently also neglect to provide the tools to accomplish this. Several general techniques are describ… ▽ More
Submitted 5 April, 2022; originally announced April 2022.
Comments: 15 pages, 5 figures
MSC Class: 65H05
-
On performance of PBFT for IoT-applications with constrained devices
Abstract: Cyber-physical systems and the Internet of things (IoT) is becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an important aspect of the functioning of IoT devices. Malicious activities lead to confidential data leakages and incorrect performance of devices are becoming critical. Therefore, development of… ▽ More
Submitted 20 April, 2021; v1 submitted 11 April, 2021; originally announced April 2021.
Comments: 12 pages, 5 figures
-
An octagon containing the numerical range of a bounded linear operator
Abstract: A polygon is derived that contains the numerical range of a bounded linear operator on a complex Hilbert space, using only norms. In its most general form, the polygon is an octagon, symmetric with respect to the origin, and tangent to the closure of the numerical range in at least four points when the spectral norm is used.
Submitted 8 February, 2021; originally announced February 2021.
Comments: 8 pages, 3 figures
MSC Class: 47A12; 47L30; 15A60; 65H17
-
An adaptive algorithm for embedding information into compressed JPEG images using the QIM method
Abstract: The widespread use of JPEG images makes them good covers for secret messages storing and transmitting. This paper proposes a new algorithm for embedding information in JPEG images based on the steganographic QIM method. The main problem of such embedding is the vulnerability to statistical steganalysis. To solve this problem, it is proposed to use a variable quantization step, which is adaptively… ▽ More
Submitted 15 December, 2020; originally announced December 2020.
Comments: 4 pages, 4 figures
-
An authorship protection technology for electronic documents based on image watermarking
Abstract: In the field of information technology, information security technologies hold a special place. They ensure the security of the use of information technology. One of the urgent tasks is the protection of electronic documents during their transfer in information systems. This paper proposes a technology for protecting electronic documents containing digital images. The main idea is that the electro… ▽ More
Submitted 1 October, 2020; originally announced October 2020.
Comments: 21 pages, 7 figures
-
arXiv:1711.09517 [pdf, ps, other]
A unifying framework for generalizations of the Enestrom-Kakeya theorem
Abstract: The classical Enestrom-Kakeya theorem establishes upper and lower bounds on the zeros of a polynomial with positive coefficients that are explicit functions of those coefficients. We establish a unifying framework that incorporates this theorem and several similar ones as special cases, while generating new theorems of a similar type. These establish zero inclusion and exclusion regions consisting… ▽ More
Submitted 3 February, 2018; v1 submitted 26 November, 2017; originally announced November 2017.
MSC Class: 30C15; 65H05
-
arXiv:1709.03040 [pdf, ps, other]
Improved Cauchy radius for scalar and matrix polynomials
Abstract: We improve the Cauchy radius of both scalar and matrix polynomials, which is an upper bound on the moduli of the zeros and eigenvalues, respectively, by using appropriate polynomial multipliers.
Submitted 29 August, 2017; originally announced September 2017.
Comments: 12 pages
MSC Class: 30C15; 47A56; 65F15
-
arXiv:1701.03994 [pdf, ps, other]
Polynomial eigenvalue bounds from companion forms
Abstract: We show how $\ell$-ifications, which are companion forms of matrix polynomials, namely, lower order matrix polynomials with the same eigenvalues as a given complex square matrix polynomial, can be used in combination with other recent results to produce eigenvalue bounds.
Submitted 21 February, 2017; v1 submitted 15 January, 2017; originally announced January 2017.
Comments: 15 pages
MSC Class: 15A18; 47A46; 65F15
-
arXiv:1602.08673 [pdf, ps, other]
Eigenvalue bounds for matrix polynomials in generalized bases
Abstract: We derive inclusion regions for the eigenvalues of matrix polynomials expressed in a general polynomial basis, which can lead to significantly better results than traditional bounds. We present several applications to engineering problems.
Submitted 28 May, 2016; v1 submitted 28 February, 2016; originally announced February 2016.
Comments: 14 pages, 9 figures
MSC Class: 12D10; 15A18; 30C15
-
arXiv:1506.06320 [pdf, ps, other]
Cauchy-like and Pellet-like results for polynomials
Abstract: We obtain several Cauchy-like and Pellet-like results for the zeros of a general complex polynomial by considering similarity transformations of the squared companion matrix and the reformulation of the zeros of a scalar polynomial as the eigenvalues of a polynomial eigenvalue problem.
Submitted 1 January, 2016; v1 submitted 21 June, 2015; originally announced June 2015.
Comments: 20 pages, 5 figures
MSC Class: 12D10; 15A18; 30C15
-
arXiv:1306.4075 [pdf, ps, other]
Geometric aspects of Pellet's and related theorems
Abstract: Pellet's theorem determines when the zeros of a polynomial can be separated into two regions, according to their moduli. We refine one of those regions and replace it with the closed interior of a lemniscate that provides more precise information on the location of the zeros. Moreover, Pellet's theorem is considered the generalization of a zero inclusion region due to Cauchy. Using linear algebra… ▽ More
Submitted 18 June, 2013; originally announced June 2013.
Comments: 16 pages, 5 figures
MSC Class: 12D10; 15A18; 30C15
-
arXiv:1210.2148 [pdf, ps, other]
Implementation of Pellet's theorem
Abstract: Pellet's theorem determines when the zeros of a polynomial can be separated into two regions, based on the presence or absence of positive roots of an auxiliary polynomial, but does not provide a method to verify its conditions or to compute the roots of the auxiliary polynomial when they exist. We derive an explicit condition for these roots to exist and, when they do, propose efficient ways to c… ▽ More
Submitted 8 October, 2012; originally announced October 2012.
Comments: 11 pages
MSC Class: 12D10; 30C15
-
arXiv:1210.0172 [pdf, ps, other]
Generalization and variations of Pellet's theorem for matrix polynomials
Abstract: We derive a generalized matrix version of Pellet's theorem, itself based on a generalized Rouché theorem for matrix-valued functions, to generate upper, lower, and internal bounds on the eigenvalues of matrix polynomials. Variations of the theorem are suggested to try and overcome situations where Pellet's theorem cannot be applied.
Submitted 14 February, 2013; v1 submitted 30 September, 2012; originally announced October 2012.
Comments: 20 pages
MSC Class: 12D10; 15A18; 30C15