Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
5 result(s) for "Positional notation"
Sort by:
The Code Underneath
An inverse-square probability mass function (PMF) is at the Newcomb–Benford law (NBL)’s root and ultimately at the origin of positional notation and conformality. PrZ=2Z−2, where Z∈Z+. Under its tail, we find information as harmonic likelihood Ls,t=Ht−1−Hs−1, where Hn is the nth harmonic number. The global Q-NBL is Prb,q=Lq,q+1L1,b=qHb−1−1, where b is the base and q is a quantum (1≤q
Polynomial Commitment in a Verkle Tree Based on a Non-Positional Polynomial Notation
This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions. Unlike traditional Merkle trees, the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments. Compact proofs also accelerate the verification process, reducing computational overhead, which makes Verkle trees particularly useful. The study proposes a new approach based on a non-positional polynomial notation (NPN) employing the Chinese Remainder Theorem (CRT). CRT enables efficient data representation and verification by decomposing data into smaller, independent components, simplifying computations, reducing overhead, and enhancing scalability. This technique facilitates parallel data processing, which is especially advantageous in cryptographic applications such as commitment and proof construction in Verkle trees, as well as in systems with constrained computational resources. Theoretical foundations of the approach, its advantages, and practical implementation aspects are explored, including resistance to potential attacks, application domains, and a comparative analysis with existing methods based on well-known parameters and characteristics. An analysis of potential attacks and vulnerabilities, including greatest common divisor (GCD) attacks, approximate multiple attacks (LLL lattice-based), brute-force search for irreducible polynomials, and the estimation of their total number, indicates that no vulnerabilities have been identified in the proposed method thus far. Furthermore, the study demonstrates that integrating CRT with Verkle trees ensures high scalability, making this approach promising for blockchain systems and other distributed systems requiring compact and efficient proofs.
Mathematics in India
Based on extensive research in Sanskrit sources, Mathematics in India chronicles the development of mathematical techniques and texts in South Asia from antiquity to the early modern period. Kim Plofker reexamines the few facts about Indian mathematics that have become common knowledge--such as the Indian origin of Arabic numerals--and she sets them in a larger textual and cultural framework. The book details aspects of the subject that have been largely passed over in the past, including the relationships between Indian mathematics and astronomy, and their cross-fertilizations with Islamic scientific traditions. Plofker shows that Indian mathematics appears not as a disconnected set of discoveries, but as a lively, diverse, yet strongly unified discipline, intimately linked to other Indian forms of learning.
Secondary Structure Prediction
This chapter contains sections titled: Introduction Thermodynamics Formal Background mfold and UNAFold Troubleshooting References