-
The dimensionality of a coiled helical coil
Abstract: The helical coil is ubiquitous in biological and natural systems and often it is the basic form that leads to complex structures. This paper considers the question of its dimensionality in biological information as the helical coil goes through recursive coiling as happens to DNA and RNA molecules in chromatin. It has been shown that the dimensionality of coiled coils is virtually equal to e. Of t… ▽ More
Submitted 11 April, 2024; originally announced July 2024.
Comments: 10 pages, 8 figures
-
The geometry of chromatin
Abstract: We investigate the large-scale geometry of the DNA-protein complex of chromatin using a generalized optimality principle, which requires that not only should all sub-parts of a natural process be optimal but also the unfolding of higher recursive levels. It was shown previously that an information-theoretic geometry of the genetic code data, together with the principle of maximum entropy, explains… ▽ More
Submitted 11 December, 2023; originally announced February 2024.
Comments: 12 pages
-
The base-e representation of numbers and the power law
Abstract: Some properties of the optimal representation of numbers are investigated. This representation, which is to the base-e, is examined for coding of integers. An approximate representation without fractions that we call WF is introduced and compared with base-2 and base-3 representations, which are next to base-e in efficiency. Since trees are analogous to number representation, we explore the releva… ▽ More
Submitted 21 March, 2020; v1 submitted 28 February, 2020; originally announced March 2020.
Comments: 12 pages; with correction of typographical errors
Journal ref: Circuits, Systems, and Signal Processing (2020)
-
On Ternary Coding and Three-Valued Logic
Abstract: Mathematically, ternary coding is more efficient than binary coding. It is little used in computation because technology for binary processing is already established and the implementation of ternary coding is more complicated, but remains relevant in algorithms that use decision trees and in communications. In this paper we present a new comparison of binary and ternary coding and their relative… ▽ More
Submitted 13 July, 2018; originally announced July 2018.
Comments: 12 pages
-
Variations on the Newcomb-Benford Law
Abstract: The Newcomb-Benford Law, which is also called the first digit phenomenon, has applications in diverse phenomena ranging from social and computer networks, engineering systems, natural sciences, and accounting. In forensics, it has been used to determine intrusion in a computer server based on the measured expectations of first digits of time varying values of data, and to check whether the informa… ▽ More
Submitted 14 June, 2018; originally announced June 2018.
Comments: 10 pages
-
Order Effects for Queries in Intelligent Systems
Abstract: This paper examines common assumptions regarding the decision-making internal environment for intelligent agents and investigates issues related to processing of memory and belief states to help obtain better understanding of the responses. In specific, we consider order effects and discuss both classical and non-classical explanations for them. We also consider implicit cognition and explore if c… ▽ More
Submitted 8 April, 2018; originally announced April 2018.
Comments: 11 pages; 5 figures
Report number: Plenary Lecture, TSC2018 (East-West Forum), Tucson, April 2, 2018
-
On the Algebra in Boole's Laws of Thought
Abstract: This article explores the ideas that went into George Boole's development of an algebra for logical inference in his book The Laws of Thought. We explore in particular his wife Mary Boole's claim that he was deeply influenced by Indian logic and argue that his work was more than a framework for processing propositions. By exploring parallels between his work and Indian logic, we are able to explai… ▽ More
Submitted 13 March, 2018; originally announced March 2018.
Comments: 11 pages
Journal ref: Current Science, vol.. 114, pp. 2570-2573, 2018
-
Reasoning in a Hierarchical System with Missing Group Size Information
Abstract: The paper analyzes the problem of judgments or preferences subsequent to initial analysis by autonomous agents in a hierarchical system where the higher level agents does not have access to group size information. We propose methods that reduce instances of preference reversal of the kind encountered in Simpson's paradox.
Submitted 7 February, 2018; originally announced February 2018.
Comments: 9 pages
-
Learning Based on CC1 and CC4 Neural Networks
Abstract: We propose that a general learning system should have three kinds of agents corresponding to sensory, short-term, and long-term memory that implicitly will facilitate context-free and context-sensitive aspects of learning. These three agents perform mututally complementary functions that capture aspects of the human cognition system. We investigate the use of CC1 and CC4 networks for use as models… ▽ More
Submitted 22 December, 2017; originally announced December 2017.
Comments: 5 pages.arXiv admin note: text overlap with arXiv:0809.5087; text overlap with arXiv:cs/0601129 by other authors
-
Reasoning in Systems with Elements that Randomly Switch Characteristics
Abstract: We examine the issue of stability of probability in reasoning about complex systems with uncertainty in structure. Normally, propositions are viewed as probability functions on an abstract random graph where it is implicitly assumed that the nodes of the graph have stable properties. But what if some of the nodes change their characteristics? This is a situation that cannot be covered by abstracti… ▽ More
Submitted 13 December, 2017; originally announced December 2017.
Comments: 10 pages
-
Probability Reversal and the Disjunction Effect in Reasoning Systems
Abstract: Data based judgments go into artificial intelligence applications but they undergo paradoxical reversal when seemingly unnecessary additional data is provided. Examples of this are Simpson's reversal and the disjunction effect where the beliefs about the data change once it is presented or aggregated differently. Sometimes the significance of the difference can be evaluated using statistical tests… ▽ More
Submitted 12 September, 2017; originally announced September 2017.
Comments: 11 pages
-
The Limits to Machine Consciousness
Abstract: It is generally accepted that machines can replicate cognitive tasks performed by conscious agents as long as they are not based on the capacity of awareness. We consider several views on the nature of subjective awareness, which is fundamental for self-reflection and review, and present reasons why this property is not computable. We argue that consciousness is more than an epiphenomenon and assu… ▽ More
Submitted 17 July, 2017; originally announced July 2017.
Comments: 14 pages, 8 figures
Journal ref: Journal of Artificial Intelligence and Consciousness, August 2021
-
Binary Prime Tableau Sequences
Abstract: This paper proposes a new class of random sequences called binary primes tableau (PT) sequences that have potential applications in cryptography and communications. The PT sequence of rank p is obtained from numbers arranged in a tableau with p columns where primes are marked off until each column has at least one prime and where the column entries are added modulo 2. We also examine the dual to t… ▽ More
Submitted 16 April, 2017; originally announced April 2017.
Comments: 10
-
On Quantum Decision Trees
Abstract: Quantum decision systems are being increasingly considered for use in artificial intelligence applications. Classical and quantum nodes can be distinguished based on certain correlations in their states. This paper investigates some properties of the states obtained in a decision tree structure. How these correlations may be mapped to the decision tree is considered. Classical tree representations… ▽ More
Submitted 8 March, 2017; originally announced March 2017.
Comments: 9 pages, 7 figures
-
The Absent-Minded Driver Problem Redux
Abstract: This paper reconsiders the problem of the absent-minded driver who must choose between alternatives with different payoff with imperfect recall and varying degrees of knowledge of the system. The classical absent-minded driver problem represents the case with limited information and it has bearing on the general area of communication and learning, social choice, mechanism design, auctions, theorie… ▽ More
Submitted 19 February, 2017; originally announced February 2017.
Comments: 9 pages, 3 figures
-
An Epistemic View of Quantum Communication
Abstract: This paper presents an epistemological perspective on quantum communication between parties that highlights the choices that must be made in order to send and obtain information. The notion of information obtained in such a communication is a property associated with the observers and while dependent on the nature of the physical system its fundamental basis is epistemic. We argue that the observa… ▽ More
Submitted 20 July, 2016; originally announced July 2016.
Comments: 11 pages in Presented at International Conference on Quantum and Beyond. Linnaeus University, Vaxjo, Sweden, June 13-16, 2016
-
The binary primes sequence for computational hardening of pseudorandom sequences
Abstract: This paper proposes the use of the binary primes sequence to strengthen pseudorandom (PN) decimal sequences for cryptography applications. The binary primes sequence is added to the PN decimal sequence (where one can choose from many arbitrary shift values) and it is shown that the sum sequence has improved autocorrelation properties besides being computationally hard. Also, an analysis on the com… ▽ More
Submitted 1 June, 2016; originally announced June 2016.
Comments: 8 pages
-
The Narayana Universal Code
Abstract: This paper presents a method of universal coding based on the Narayana series. The rules necessary to make such coding possible have been found and the length of the resulting code has been determined to follow the Narayana count.
Submitted 26 January, 2016; originally announced January 2016.
Comments: 9 pages, 2 figures
-
State Ensembles and Quantum Entropy
Abstract: This paper considers quantum communication involving an ensemble of states. Apart from the von Neumann entropy, it considers other measures one of which may be useful in obtaining information about an unknown pure state and another that may be useful in quantum games. It is shown that under certain conditions in a two-party quantum game, the receiver of the states can increase the entropy by addin… ▽ More
Submitted 31 August, 2015; originally announced September 2015.
Comments: 12 pages, 5 figures
Journal ref: Int. J. Theoretical Physics (2016) 55: 3017-3026
-
Two Power Series Models of Self-Similarity in Social Networks
Abstract: Two power series models are proposed to represent self-similarity and they are compared to the Zipf and Benford distributions. Since evolution of a social network is associated with replicating self-similarity at many levels, the nature of interconnections can serve as a measure of the optimality of its organization. In contrast with the Zipf distribution where the middle term is the harmonic mean… ▽ More
Submitted 24 June, 2015; originally announced June 2015.
Comments: 12 pages, 4 figures. arXiv admin note: text overlap with arXiv:0812.2891 by other authors without attribution
-
Connectivity in Social Networks
Abstract: The value of a social network is generally determined by its size and the connectivity of its nodes. But since some of the nodes may be fake ones and others that are dormant, the question of validating the node counts by statistical tests becomes important. In this paper we propose the use of the Benford's distribution to check on the trustworthiness of the connectivity statistics. Our experiments… ▽ More
Submitted 10 June, 2015; originally announced June 2015.
Comments: 8 pages, 5 figures
-
Multiparty Probability Computation and Verification
Abstract: A multiparty computation protocol is described in which the parties can generate different probability events that is based on the sharing of a single anonymized random number, and also perform oblivious transfer. A method to verify the correctness of the procedure, without revealing the random numbers used by the parties, is proposed.
Submitted 28 May, 2015; v1 submitted 19 May, 2015; originally announced May 2015.
Comments: 8 pages, 4 figures; Corrected typographical errors
-
Oblivious Transfer Protocol with Verification
Abstract: Although random sequences can be used to generate probability events, they come with the risk of cheating in an unsupervised situation. In such cases, the oblivious transfer protocol may be used and this paper presents a variation to the DH key-exchange to serve as this protocol. A method to verify the correctness of the procedure, without revealing the random numbers used by the two parties, is a… ▽ More
Submitted 2 April, 2015; originally announced April 2015.
Comments: 7 pages, 2 figures
-
arXiv:1503.05793 [pdf, ps, other]
Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption
Abstract: This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attac… ▽ More
Submitted 19 March, 2015; originally announced March 2015.
Journal ref: International Journal on Cryptography and Information Security, Vol. 5, No. 3/4, pp. 1-13 (2015)
-
A Class of Random Sequences for Key Generation
Abstract: This paper investigates randomness properties of sequences derived from Fibonacci and Gopala-Hemachandra sequences modulo m for use in key distribution applications. We show that for sequences modulo a prime a binary random sequence B(n) is obtained based on whether the period is p-1 (or a divisor) or 2p+2 (or a divisor). For the more general case of arbitrary m, we use the property if the period… ▽ More
Submitted 12 March, 2015; originally announced March 2015.
Comments: 7 pages; 4 figures
-
Extended Unary Coding
Abstract: Extended variants of the recently introduced spread unary coding are described. These schemes, in which the length of the code word is fixed, allow representation of approximately n^2 numbers for n bits, rather than the n numbers of the standard unary coding. In the first of two proposed schemes the spread increases, whereas in the second scheme the spread remains constant.
Submitted 3 February, 2015; originally announced February 2015.
Comments: 5 pages
-
Friendship Paradox and Attention Economics
Abstract: The friendship paradox is revisited by considering both local and global averages of friends. How the economics of attention affects the recruitment of friends is examined. Statistical implications of varying individual attentions are investigated and it is argued that this is one reason why the mean of friends is higher than the median in social networks. The distribution of friends skews to the… ▽ More
Submitted 22 December, 2014; originally announced December 2014.
Comments: 8 pages, 4 figures
-
Spread Unary Coding
Abstract: Unary coding is useful but it is redundant in its standard form. Unary coding can also be seen as spatial coding where the value of the number is determined by its place in an array. Motivated by biological finding that several neurons in the vicinity represent the same number, we propose a variant of unary numeration in its spatial form, where each number is represented by several 1s. We call thi… ▽ More
Submitted 2 December, 2014; originally announced December 2014.
Comments: 5 pages, 2 figures
-
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography
Abstract: The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. We call this method double-signature double lock cryptography and it can be implemented in ways that go beyond hash-… ▽ More
Submitted 13 November, 2014; originally announced November 2014.
Comments: 8 pages, 6 figures
-
Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array
Abstract: This note looks at the efficiency of the cross-wired mesh array in the context of matrix multiplication. It is shown that in case of repeated operations, the average number of steps to multiply sets of nxn matrices on a 2D cross-wired mesh array approaches n.
Submitted 12 November, 2014; originally announced November 2014.
Comments: 5 pages
-
Quantum Darwinism and Computability Theory
Abstract: This paper examines whether unitary evolution alone is sufficient to explain emergence of the classical world from the perspective of computability theory. Specifically, it looks at the problem of how the choice related to the measurement is made by the observer viewed as a quantum system. In interpretations where the system together with the observers is completely described by unitary transforma… ▽ More
Submitted 23 October, 2014; originally announced October 2014.
Comments: 6 pages, 3 figures
-
Quantum Measurement Complexity
Abstract: This paper explores the problem of quantum measurement complexity. In computability theory, the complexity of a problem is determined by how long it takes an effective algorithm to solve it. This complexity may be compared to the difficulty for a hypothetical oracle machine, the output of which may be verified by a computable function but cannot be simulated on a physical machine. We define a quan… ▽ More
Submitted 29 April, 2014; originally announced April 2014.
Comments: 12 pages, 3 figures
Journal ref: NeuroQuantology 12: 374-381 (2014)
-
Guaman Poma's Yupana and Inca Astronomy
Abstract: An explanation is provided for the Inca counting board described by Guaman Poma in 1615. Although the board could have been used in more than one way, we show that based on certain reasonable assumptions regarding non-uniform representation of numbers its most likely use was counting in multiples of 6, 24, and 72. The independent numbers represented on its five rows are 92, 31, 29, 79, and 56 that… ▽ More
Submitted 17 February, 2014; v1 submitted 29 January, 2014; originally announced January 2014.
Comments: 11 pages, 15 figures
Journal ref: Indian Journal of History of Science, vol. 54.4, December 2019, pp. 397-404
-
Veiled Nonlocality and Cosmic Censorship
Abstract: The premise that consciousness has a quantum mechanical basis or correlate implies that its workings have a nonlocal component. To check whether consciousness as an entity leaves a physical trace, we propose that laboratory searches for such a trace should be for nonlocality, where probabilities do not conform to local expectations. Starting with the idea that nonlocality may be veiled as one of t… ▽ More
Submitted 26 March, 2014; v1 submitted 7 January, 2014; originally announced January 2014.
Comments: 7 pages, 1 figure
-
A Key Set Cipher for Wireless Sensor Networks
Abstract: This paper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks and similar resource-constrained applications. A specific cryptographic scheme described in the paper is based on the use of a family of self-inverting matrices derived from the number theoretic Hilbert transform in conjunction with the Blom's scheme. In a randomized version of… ▽ More
Submitted 9 December, 2013; originally announced December 2013.
Comments: 12 pages, 2 figures
-
A Class of Orthogonal Sequences
Abstract: This paper presents a class of random orthogonal sequences associated with the number theoretic Hilbert transform. We present a constructive procedure for finding the random sequences for different modulus values. These random sequences have autocorrelation function that is zero everywhere excepting at the origin. These sequences may be used as keys and in other cryptography applications.
Submitted 26 November, 2013; originally announced November 2013.
Comments: 8 pages, 2 figures
-
Threshold Quantum Cryptography
Abstract: Most current research on quantum cryptography requires transmission and reception of single photons that creates severe implementation challenges and limits range. This paper argues for the development of threshold quantum cryptography protocols in which the system is secure so long as the number of photons being exchanged between Alice and Bob is below a specified threshold. We speak of a (p-k-n)… ▽ More
Submitted 23 October, 2013; originally announced October 2013.
Comments: 10 pages, 4 figures. arXiv admin note: text overlap with arXiv:1206.6778
-
From the No-Signaling Theorem to Veiled Nonlocality
Abstract: According to the no-signaling theorem, the nonlocal collapse of the wavefunction of an entangled particle by the measurement on its twin particle at a remote location cannot be used to send useful information. Given that experiments on nonlocal correlations continue to have loopholes, we propose a stronger principle that the nonlocality of quantum mechanics itself is veiled. In practical terms, de… ▽ More
Submitted 24 September, 2013; originally announced September 2013.
Comments: 11 pages
Journal ref: NeuroQuantology 12: 12-20 (2014)
-
Probability and the Classical/Quantum Divide
Abstract: This paper considers the problem of distinguishing between classical and quantum domains in macroscopic phenomena using tests based on probability and it presents a condition on the ratios of the outcomes being the same (Ps) to being different (Pn). Given three events, Ps/Pn for the classical case, where there are no 3-way coincidences, is one-half whereas for the quantum state it is one-third. Fo… ▽ More
Submitted 9 September, 2013; originally announced September 2013.
Comments: 12 pages; 1 figure
Journal ref: NeuroQuantology, vol. 11, pp. 600-606, 2013
-
The Number Theoretic Hilbert Transform
Abstract: This paper presents a general expression for a number-theoretic Hilbert transform (NHT). The transformations preserve the circulant nature of the discrete Hilbert transform (DHT) matrix together with alternating values in each row being zero and non-zero. Specific examples for 4-point, 6-point, and 8-point NHT are provided. The NHT transformation can be used as a primitive to create cryptographica… ▽ More
Submitted 5 August, 2013; originally announced August 2013.
Comments: 11 pages
Journal ref: Circuits, Systems and Signal Processing 33 (2014) 2539-2548
-
Neural Network Capacity for Multilevel Inputs
Abstract: This paper examines the memory capacity of generalized neural networks. Hopfield networks trained with a variety of learning techniques are investigated for their capacity both for binary and non-binary alphabets. It is shown that the capacity can be much increased when multilevel inputs are used. New learning strategies are proposed to increase Hopfield network capacity, and the scalability of th… ▽ More
Submitted 30 July, 2013; originally announced July 2013.
Comments: 24 pages,17 figures
-
Residue Classes of the PPT Sequence
Abstract: Primitive Pythagorean triples (PPT) may be put into different equivalence classes using residues with respect to primes. We show that the probability that the smaller odd number associated with the PPT triple is divisible by prime p is 2/(p+1). We have determined the autocorrelation function of the Baudhayana sequences obtained from the residue classes and we show these sequences have excellent ra… ▽ More
Submitted 8 May, 2013; originally announced May 2013.
Comments: 8 pages, 4 figures
-
Generalized Public Key Transformations with Side Information
Abstract: This paper presents results on generalized public key cryptography with exponentials modulo primes and composite numbers where the map** is not one-to-one and the uniqueness is achieved by additional side information. Such transformations may be used for oblivious transfer and generate events of specific probabilities.
Submitted 16 April, 2013; originally announced April 2013.
Comments: 15 pages. arXiv admin note: text overlap with arXiv:1304.4273
-
The Quartic Public Key Transformation
Abstract: This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.
Submitted 15 April, 2013; originally announced April 2013.
Comments: 6 pages
-
Simulating Entanglement in Classical Computing
Abstract: This note shows how quantum entanglement may be simulated in classical computing. The simulated entanglement protocol is implemented using oblivious transfer in the simplest case and other many-to-one map**s in more general cases. For the case where the map** is of order k, we prove a theorem that gives us the function of the entangled state. A useful generalization beyond this research will b… ▽ More
Submitted 7 January, 2013; originally announced January 2013.
Comments: 7 pages, 2 figures
-
The Piggy Bank Cryptographic Trope
Abstract: This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. We present a basic two-pass cryptographic scheme that can serve as template for a variety of implementations. Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of… ▽ More
Submitted 1 January, 2013; originally announced January 2013.
Comments: 7 pages, 6 figures
Journal ref: Infocommunications Journal 6: 22-25 (2014)
-
Random Sequences from Primitive Pythagorean Triples
Abstract: This paper shows that the six classes of PPTs can be put into two groups. Autocorrelation and cross-correlation functions of the six classes derived from the gaps between each class type have been computed. It is shown that Classes A and D (in which the largest term is divisible by 5) are different from the other four classes in their randomness properties if they are ordered by the largest term.… ▽ More
Submitted 12 November, 2012; originally announced November 2012.
Comments: 10 pages, 6 figures
-
An Alignment Algorithm for Sequences
Abstract: This paper describes a new alignment algorithm for sequences that can be used for determination of deletions and substitutions. It provides several solutions out of which the best one can be chosen on the basis of minimization of gaps or other considerations. The algorithm does not use similarity tables and it performs aspects of both global and local alignment. The algorithm is compared with othe… ▽ More
Submitted 31 October, 2012; originally announced October 2012.
Comments: 8 pages
-
Random Sequences Based on the Divisor Pairs Function
Abstract: This paper investigates the randomness properties of a function of the divisor pairs of a natural number. This function, the antecedents of which go to very ancient times, has randomness properties that can find applications in cryptography, key distribution, and other problems of computer science. It is shown that the function is aperiodic and it has excellent autocorrelation properties.
Submitted 21 November, 2012; v1 submitted 10 October, 2012; originally announced October 2012.
Comments: 6 pages, 5 figures
-
Goldbach Circles and Balloons and Their Cross Correlation
Abstract: Goldbach partitions can be used in creation of ellipses and circles on the number line. We extend this work and determine the count and other properties of concentric Goldbach circles for different values of n. The autocorrelation function of this sequence with respect to even and odd values suggests that it has excellent randomness properties. Cross correlation properties of ellipse and circle se… ▽ More
Submitted 20 September, 2012; originally announced September 2012.
Comments: 9 pages, 7 figures