**Commenced**in January 2007

**Frequency:**Monthly

**Edition:**International

**Paper Count:**694

# Search results for: Polynomial approximate inverse

##### 694 Numerical Inverse Laplace Transform Using Chebyshev Polynomial

**Authors:**
Vinod Mishra,
Dimple Rani

**Abstract:**

In this paper, numerical approximate Laplace transform inversion algorithm based on Chebyshev polynomial of second kind is developed using odd cosine series. The technique has been tested for three different functions to work efficiently. The illustrations show that the new developed numerical inverse Laplace transform is very much close to the classical analytic inverse Laplace transform.

**Keywords:**
Chebyshev polynomial,
Numerical inverse Laplace transform,
Odd cosine series.

##### 693 Some Preconditioners for Block Pentadiagonal Linear Systems Based on New Approximate Factorization Methods

**Authors:**
Xian Ming Gu,
Ting Zhu Huang,
Hou Biao Li

**Abstract:**

In this paper, getting an high-efficiency parallel algorithm to solve sparse block pentadiagonal linear systems suitable for vectors and parallel processors, stair matrices are used to construct some parallel polynomial approximate inverse preconditioners. These preconditioners are appropriate when the desired target is to maximize parallelism. Moreover, some theoretical results about these preconditioners are presented and how to construct preconditioners effectively for any nonsingular block pentadiagonal H-matrices is also described. In addition, the availability of these preconditioners is illustrated with some numerical experiments arising from two dimensional biharmonic equation.

**Keywords:**
Parallel algorithm,
Pentadiagonal matrix,
Polynomial
approximate inverse,
Preconditioners,
Stair matrix.

##### 692 Approximate Method of Calculation of Inviscid Hypersonic Flow

**Authors:**
F. Sokhanvar,
A. B. Khoshnevis

**Abstract:**

**Keywords:**
Hypersonic flow,
Inverse problem method

##### 691 On a New Inverse Polynomial Numerical Scheme for the Solution of Initial Value Problems in Ordinary Differential Equations

**Authors:**
R. B. Ogunrinde

**Abstract:**

**Keywords:**
Differential equations,
Numerical,
Initial value
problem,
Polynomials.

##### 690 Transformations between Bivariate Polynomial Bases

**Authors:**
Dimitris Varsamis,
Nicholas Karampetakis

**Abstract:**

It is well known, that any interpolating polynomial p (x, y) on the vector space Pn,m of two-variable polynomials with degree less than n in terms of x and less than m in terms of y, has various representations that depends on the basis of Pn,m that we select i.e. monomial, Newton and Lagrange basis e.t.c.. The aim of this short note is twofold : a) to present transformations between the coordinates of the polynomial p (x, y) in the aforementioned basis and b) to present transformations between these bases.

**Keywords:**
Bivariate interpolation polynomial,
Polynomial basis,
Transformations.

##### 689 Recovering the Boundary Data in the Two Dimensional Inverse Heat Conduction Problem Using the Ritz-Galerkin Method

**Authors:**
Saeed Sarabadan,
Kamal Rashedi

**Abstract:**

**Keywords:**
Inverse problem,
parabolic equations,
heat equation,
Ritz-Galerkin method,
Landweber iterations.

##### 688 Approximations to the Distribution of the Sample Correlation Coefficient

**Authors:**
John N. Haddad,
Serge B. Provost

**Abstract:**

**Keywords:**
Sample correlation coefficient,
density approximation,
confidence intervals.

##### 687 Advanced ILQ Control for Buck-Converter viaTwo-Degrees of Freedom Servo-System

**Authors:**
Sidshchadhaa Aumted,
Shuhei Shiina,
Hiroshi Takami

**Abstract:**

In this paper, we propose an advanced ILQ control for the buck-converter via two-degrees of freedom servo-system. Our presented strategy is based on Inverse Linear Quadratic (ILQ) servo-system controller without solving Riccati-s equation directly. The optimal controller of the current and voltage control system is designed. The stability and robust control are analyzed. A conscious and persistent effort has been made to improve ILQ control via two-degrees of freedom guarantees the optimal gains on the basis of polynomial pole assignment, which our results of the proposed strategy shows that the advanced ILQ control can be controlled independently the step response and the disturbance response by appending a feed-forward compensator.

**Keywords:**
Optimal voltage control,
inverse LQ design method,
second order polynomial,
two-degrees of freedom.

##### 686 A Novel Deinterlacing Algorithm Based on Adaptive Polynomial Interpolation

**Authors:**
Seung-Won Jung,
Hye-Soo Kim,
Le Thanh Ha,
Seung-Jin Baek,
Sung-Jea Ko

**Abstract:**

**Keywords:**
Deinterlacing,
polynomial interpolation.

##### 685 Factoring a Polynomial with Multiple-Roots

**Authors:**
Feng Cheng Chang

**Abstract:**

**Keywords:**
Polynomial roots,
greatest common divisor,
Longhand polynomial division,
Euclidean GCD Algorithm.

##### 684 Designing FIR Filters with Polynomial Approach

**Authors:**
Sunil Bhooshan,
Vinay Kumar

**Abstract:**

**Keywords:**
FIR filter,
Polynomial.

##### 683 Numerical Solution of Infinite Boundary Integral Equation by Using Galerkin Method with Laguerre Polynomials

**Authors:**
N. M. A. Nik Long,
Z. K. Eshkuvatov,
M. Yaghobifar,
M. Hasan

**Abstract:**

In this paper the exact solution of infinite boundary integral equation (IBIE) of the second kind with degenerate kernel is presented. Moreover Galerkin method with Laguerre polynomial is applied to get the approximate solution of IBIE. Numerical examples are given to show the validity of the method presented.

**Keywords:**
Approximation,
Galerkin method,
Integral
equations,
Laguerre polynomial.

##### 682 Blow up in Polynomial Differential Equations

**Authors:**
Rudolf Csikja,
Janos Toth

**Abstract:**

Methods to detect and localize time singularities of polynomial and quasi-polynomial ordinary differential equations are systematically presented and developed. They are applied to examples taken form different fields of applications and they are also compared to better known methods such as those based on the existence of linear first integrals or Lyapunov functions.

**Keywords:**
blow up,
finite escape time,
polynomial ODE,
singularity,
Lotka–Volterra equation,
Painleve analysis,
Ψ-series,
global existence

##### 681 An Iterative Algorithm to Compute the Generalized Inverse A(2) T,S Under the Restricted Inner Product

**Authors:**
Xingping Sheng

**Abstract:**

**Keywords:**
Generalized inverse A(2)
T,
S,
Restricted inner product,
Iterative method,
Orthogonal projection.

##### 680 On Generalized New Class of Matrix Polynomial Set

**Authors:**
Ghazi S. Kahmmash

**Abstract:**

New generalization of the new class matrix polynomial set have been obtained. An explicit representation and an expansion of the matrix exponential in a series of these matrix are given for these matrix polynomials.

**Keywords:**
Generating functions,
Recurrences relation and Generalization of the new class matrix polynomial set.

##### 679 Approximately Jordan Maps and Their Stability

**Authors:**
Nasrin Eghbali

**Abstract:**

In this paper we consider the approximate Jordan maps and boundedness of these maps. Also we investigate the stability of approximate Jordan maps and prove some stability properties for approximate Jordan maps.

**Keywords:**
Approximate Jordan map,
stability.

##### 678 Evolutionary Design of Polynomial Controller

**Authors:**
R. Matousek,
S. Lang,
P. Minar,
P. Pivonka

**Abstract:**

**Keywords:**
Evolutionary design,
Genetic algorithms,
PID controller,
Pole placement,
Polynomial controller

##### 677 Discrete Polynomial Moments and Savitzky-Golay Smoothing

**Authors:**
Paul O'Leary,
Matthew Harker

**Abstract:**

**Keywords:**
Gram polynomials,
Savitzky-Golay Smoothing,
Discrete Polynomial Moments

##### 676 Connectivity Estimation from the Inverse Coherence Matrix in a Complex Chaotic Oscillator Network

**Authors:**
Won Sup Kim,
Xue-Mei Cui,
Seung Kee Han

**Abstract:**

We present on the method of inverse coherence matrix for the estimation of network connectivity from multivariate time series of a complex system. In a model system of coupled chaotic oscillators, it is shown that the inverse coherence matrix defined as the inverse of cross coherence matrix is proportional to the network connectivity. Therefore the inverse coherence matrix could be used for the distinction between the directly connected links from indirectly connected links in a complex network. We compare the result of network estimation using the method of the inverse coherence matrix with the results obtained from the coherence matrix and the partial coherence matrix.

**Keywords:**
Chaotic oscillator,
complex network,
inverse coherence matrix,
network estimation.

##### 675 Approximation Algorithm for the Shortest Approximate Common Superstring Problem

**Authors:**
A.S. Rebaï,
M. Elloumi

**Abstract:**

**Keywords:**
Shortest approximate common superstring,
approximation algorithms,
strings overlaps,
complexities.

##### 674 Uncontrollable Inaccuracy in Inverse Problems

**Authors:**
Yu. Menshikov

**Abstract:**

In this paper the influence of errors of function derivatives in initial time which have been obtained by experiment (uncontrollable inaccuracy) to the results of inverse problem solution was investigated. It was shown that these errors distort the inverse problem solution as a rule near the beginning of interval where the solutions are analyzed. Several methods for removing the influence of uncontrollable inaccuracy have been suggested.

**Keywords:**
Inverse problems,
uncontrollable inaccuracy,
filtration.

##### 673 Segmentation of Piecewise Polynomial Regression Model by Using Reversible Jump MCMC Algorithm

**Authors:**
Suparman

**Abstract:**

Piecewise polynomial regression model is very flexible model for modeling the data. If the piecewise polynomial regression model is matched against the data, its parameters are not generally known. This paper studies the parameter estimation problem of piecewise polynomial regression model. The method which is used to estimate the parameters of the piecewise polynomial regression model is Bayesian method. Unfortunately, the Bayes estimator cannot be found analytically. Reversible jump MCMC algorithm is proposed to solve this problem. Reversible jump MCMC algorithm generates the Markov chain that converges to the limit distribution of the posterior distribution of piecewise polynomial regression model parameter. The resulting Markov chain is used to calculate the Bayes estimator for the parameters of piecewise polynomial regression model.

**Keywords:**
Piecewise,
Bayesian,
reversible jump MCMC,
segmentation.

##### 672 Study of Natural Convection Heat Transfer of Plate-Fin Heat Sink in a Closed Enclosure

**Authors:**
Han-Taw Chen,
Tzu-Hsiang Lin,
Chung-Hou Lai

**Abstract:**

**Keywords:**
Inverse method,
FLUENT,
Plate-fin heat sink,
Heat
transfer characteristics.

##### 671 Fuzzy Fingerprint Vault using Multiple Polynomials

**Authors:**
Daesung Moon,
Woo-Yong Choi,
Kiyoung Moon

**Abstract:**

Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.

**Keywords:**
Fuzzy vault,
fingerprint recognition multiple polynomials.

##### 670 Inverse Matrix in the Theory of Dynamic Systems

**Authors:**
R. Masarova,
M. Juhas,
B. Juhasova,
Z. Sutova

**Abstract:**

**Keywords:**
Dynamic system,
transfer matrix,
inverse matrix,
modeling.

##### 669 Comparison between Beta Wavelets Neural Networks, RBF Neural Networks and Polynomial Approximation for 1D, 2DFunctions Approximation

**Authors:**
Wajdi Bellil,
Chokri Ben Amar,
Adel M. Alimi

**Abstract:**

This paper proposes a comparison between wavelet neural networks (WNN), RBF neural network and polynomial approximation in term of 1-D and 2-D functions approximation. We present a novel wavelet neural network, based on Beta wavelets, for 1-D and 2-D functions approximation. Our purpose is to approximate an unknown function f: Rn - R from scattered samples (xi; y = f(xi)) i=1....n, where first, we have little a priori knowledge on the unknown function f: it lives in some infinite dimensional smooth function space and second the function approximation process is performed iteratively: each new measure on the function (xi; f(xi)) is used to compute a new estimate Ôêºf as an approximation of the function f. Simulation results are demonstrated to validate the generalization ability and efficiency of the proposed Beta wavelet network.

**Keywords:**
Beta wavelets networks,
RBF neural network,
training algorithms,
MSE,
1-D,
2D function approximation.

##### 668 Computable Function Representations Using Effective Chebyshev Polynomial

**Authors:**
Mohammed A. Abutheraa,
David Lester

**Abstract:**

We show that Chebyshev Polynomials are a practical representation of computable functions on the computable reals. The paper presents error estimates for common operations and demonstrates that Chebyshev Polynomial methods would be more efficient than Taylor Series methods for evaluation of transcendental functions.

**Keywords:**
Approximation Theory,
Chebyshev Polynomial,
Computable Functions,
Computable Real Arithmetic,
Integration,
Numerical Analysis.

##### 667 Implementation and Analysis of Elliptic Curve Cryptosystems over Polynomial basis and ONB

**Authors:**
Yong-Je Choi,
Moo-Seop Kim,
Hang-Rok Lee,
Ho-Won Kim

**Abstract:**

**Keywords:**
Elliptic Curve Cryptosystem,
Crypto Algorithm,
Polynomial Basis,
Optimal Normal Basis,
Security.

##### 666 Image Dehazing Using Dark Channel Prior and Fast Guided Filter in Daubechies Lifting Wavelet Transform Domain

**Authors:**
Harpreet Kaur,
Sudipta Majumdar

**Abstract:**

In this paper a method for image dehazing is proposed in lifting wavelet transform domain. Lifting Daubechies (D4) wavelet has been used to obtain the approximate image and detail images. As the haze is contained in low frequency part, only the approximate image is used for further processing. This region is processed by dehazing algorithm based on dark channel prior (DCP). The dehazed approximate image is then recombined with the detail images using inverse lifting wavelet transform. Implementation of lifting wavelet transform has the advantage of auxiliary memory saving, fast implementation and simplicity. Also, the proposed method deals with near white scene problem, blue horizon issue and localized light sources in a way to enhance image quality and makes the algorithm robust. Simulation results present improvement in terms of visual quality, parameters such as root mean square (RMS) contrast, structural similarity index (SSIM), entropy and execution time.

**Keywords:**
Dark channel prior,
image dehazing,
lifting wavelet transform.

##### 665 A New Approach to Polynomial Neural Networks based on Genetic Algorithm

**Authors:**
S. Farzi

**Abstract:**

**Keywords:**
GMDH,
GPNN,
GA,
PNN.