Binary Sequences Derived from Dickson Permutation Polynomials over Binary Extension Field

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:dadada123sasasa
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In this paper, based on a result of Lidl and Mullen (Mathematical Journal of Okayama University, 1991), the maximum length and the second maximum length that can be attained by cycles of Dickson permutation polynomial (of the first kind) with parameter 1 are studied. Necessary and sufficient conditions for these two lengths to be attained are given, which are connected with Fermat primes and Mersenne primes, respectively. Furthermore, a class of coordinate sequences that maintains a large period is obtained, which is shown to be the coordinate sequences derived from cycles of the second maximum length. Explicit formulas for their periodicity and shift-equivalences are also presented.
其他文献
基于对城市给水处理技术的一些思考分析,首先分析出传统城市给水处理技术当中存在的问题;其次分析出提高城市给水处理技术的一些思考,进而提高城市供水的质量,保证城市的用水
Local binary pattern(LBP) is sensitive to noise. Noise-resistant LBP(NRLBP) addresses this problem by thresholding local neighboring pixels into three-valued states(i.e., 0, 1 and uncertain bits)and r
Compared with traditional endonasal endoscope, Virtual endonasal endoscope (VEE) is a computerized alternative solution with the advantages of being non-invasiv
A novel High-order extended Kalman Filter (HEKF) is designed for a class of complex dynamic systems with polynomial nonlinearities. The state and measurement mo
We proposes an improved grasshopper algorithm for global optimization problems. Grasshopper optimization algorithm (GOA) is a recently proposed meta-heuristic a
This paper presents the design and analysis of a distributed power amplifier with 6-dB bandwidth from 10MHz to 6GHz. To meet the stringent targeted specificatio
In a specific project, how to find a reasonable balance between a plurality of objectives and their optimal solutions has always been an important aspect for re
In recent decades, a number of protocols for Remote data integrity checking (RDIC) have been proposed.Identity (ID) based RDIC protocols are constructed to guar
Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe
In this paper, we propose a fully automatic mesh segmentation method, which divides meshes into sub-meshes recursively through spectral analysis. A common problem in the spectral analysis of geometric