Skip to main content

Showing 1–50 of 73 results for author: Kak, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02493  [pdf

    physics.bio-ph cs.DC cs.IT

    The dimensionality of a coiled helical coil

    Authors: Subhash Kak

    Abstract: The helical coil is ubiquitous in biological and natural systems and often it is the basic form that leads to complex structures. This paper considers the question of its dimensionality in biological information as the helical coil goes through recursive coiling as happens to DNA and RNA molecules in chromatin. It has been shown that the dimensionality of coiled coils is virtually equal to e. Of t… ▽ More

    Submitted 11 April, 2024; originally announced July 2024.

    Comments: 10 pages, 8 figures

  2. arXiv:1807.06419  [pdf

    cs.AI

    On Ternary Coding and Three-Valued Logic

    Authors: Subhash Kak

    Abstract: Mathematically, ternary coding is more efficient than binary coding. It is little used in computation because technology for binary processing is already established and the implementation of ternary coding is more complicated, but remains relevant in algorithms that use decision trees and in communications. In this paper we present a new comparison of binary and ternary coding and their relative… ▽ More

    Submitted 13 July, 2018; originally announced July 2018.

    Comments: 12 pages

  3. arXiv:1804.02759  [pdf

    cs.AI

    Order Effects for Queries in Intelligent Systems

    Authors: Subhash Kak

    Abstract: This paper examines common assumptions regarding the decision-making internal environment for intelligent agents and investigates issues related to processing of memory and belief states to help obtain better understanding of the responses. In specific, we consider order effects and discuss both classical and non-classical explanations for them. We also consider implicit cognition and explore if c… ▽ More

    Submitted 8 April, 2018; originally announced April 2018.

    Comments: 11 pages; 5 figures

    Report number: Plenary Lecture, TSC2018 (East-West Forum), Tucson, April 2, 2018

  4. arXiv:1803.04994  [pdf

    cs.AI

    On the Algebra in Boole's Laws of Thought

    Authors: Subhash Kak

    Abstract: This article explores the ideas that went into George Boole's development of an algebra for logical inference in his book The Laws of Thought. We explore in particular his wife Mary Boole's claim that he was deeply influenced by Indian logic and argue that his work was more than a framework for processing propositions. By exploring parallels between his work and Indian logic, we are able to explai… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 11 pages

    Journal ref: Current Science, vol.. 114, pp. 2570-2573, 2018

  5. arXiv:1802.04093  [pdf

    cs.AI

    Reasoning in a Hierarchical System with Missing Group Size Information

    Authors: Subhash Kak

    Abstract: The paper analyzes the problem of judgments or preferences subsequent to initial analysis by autonomous agents in a hierarchical system where the higher level agents does not have access to group size information. We propose methods that reduce instances of preference reversal of the kind encountered in Simpson's paradox.

    Submitted 7 February, 2018; originally announced February 2018.

    Comments: 9 pages

  6. arXiv:1712.09331  [pdf

    cs.NE

    Learning Based on CC1 and CC4 Neural Networks

    Authors: Subhash Kak

    Abstract: We propose that a general learning system should have three kinds of agents corresponding to sensory, short-term, and long-term memory that implicitly will facilitate context-free and context-sensitive aspects of learning. These three agents perform mututally complementary functions that capture aspects of the human cognition system. We investigate the use of CC1 and CC4 networks for use as models… ▽ More

    Submitted 22 December, 2017; originally announced December 2017.

    Comments: 5 pages.arXiv admin note: text overlap with arXiv:0809.5087; text overlap with arXiv:cs/0601129 by other authors

  7. arXiv:1712.04909  [pdf

    cs.AI

    Reasoning in Systems with Elements that Randomly Switch Characteristics

    Authors: Subhash Kak

    Abstract: We examine the issue of stability of probability in reasoning about complex systems with uncertainty in structure. Normally, propositions are viewed as probability functions on an abstract random graph where it is implicitly assumed that the nodes of the graph have stable properties. But what if some of the nodes change their characteristics? This is a situation that cannot be covered by abstracti… ▽ More

    Submitted 13 December, 2017; originally announced December 2017.

    Comments: 10 pages

  8. arXiv:1709.04029  [pdf

    cs.AI

    Probability Reversal and the Disjunction Effect in Reasoning Systems

    Authors: Subhash Kak

    Abstract: Data based judgments go into artificial intelligence applications but they undergo paradoxical reversal when seemingly unnecessary additional data is provided. Examples of this are Simpson's reversal and the disjunction effect where the beliefs about the data change once it is presented or aggregated differently. Sometimes the significance of the difference can be evaluated using statistical tests… ▽ More

    Submitted 12 September, 2017; originally announced September 2017.

    Comments: 11 pages

  9. The Limits to Machine Consciousness

    Authors: Subhash Kak

    Abstract: It is generally accepted that machines can replicate cognitive tasks performed by conscious agents as long as they are not based on the capacity of awareness. We consider several views on the nature of subjective awareness, which is fundamental for self-reflection and review, and present reasons why this property is not computable. We argue that consciousness is more than an epiphenomenon and assu… ▽ More

    Submitted 17 July, 2017; originally announced July 2017.

    Comments: 14 pages, 8 figures

    Journal ref: Journal of Artificial Intelligence and Consciousness, August 2021

  10. arXiv:1704.08718  [pdf

    cs.CR

    Binary Prime Tableau Sequences

    Authors: Prashanth Busireddygari, Subhash Kak

    Abstract: This paper proposes a new class of random sequences called binary primes tableau (PT) sequences that have potential applications in cryptography and communications. The PT sequence of rank p is obtained from numbers arranged in a tableau with p columns where primes are marked off until each column has at least one prime and where the column entries are added modulo 2. We also examine the dual to t… ▽ More

    Submitted 16 April, 2017; originally announced April 2017.

    Comments: 10

  11. arXiv:1703.03693  [pdf

    cs.AI

    On Quantum Decision Trees

    Authors: Subhash Kak

    Abstract: Quantum decision systems are being increasingly considered for use in artificial intelligence applications. Classical and quantum nodes can be distinguished based on certain correlations in their states. This paper investigates some properties of the states obtained in a decision tree structure. How these correlations may be mapped to the decision tree is considered. Classical tree representations… ▽ More

    Submitted 8 March, 2017; originally announced March 2017.

    Comments: 9 pages, 7 figures

  12. arXiv:1702.05778  [pdf

    cs.AI cs.GT

    The Absent-Minded Driver Problem Redux

    Authors: Subhash Kak

    Abstract: This paper reconsiders the problem of the absent-minded driver who must choose between alternatives with different payoff with imperfect recall and varying degrees of knowledge of the system. The classical absent-minded driver problem represents the case with limited information and it has bearing on the general area of communication and learning, social choice, mechanism design, auctions, theorie… ▽ More

    Submitted 19 February, 2017; originally announced February 2017.

    Comments: 9 pages, 3 figures

  13. arXiv:1606.00410  [pdf

    cs.CR

    The binary primes sequence for computational hardening of pseudorandom sequences

    Authors: B. Prashanth Reddy, Subhash Kak

    Abstract: This paper proposes the use of the binary primes sequence to strengthen pseudorandom (PN) decimal sequences for cryptography applications. The binary primes sequence is added to the PN decimal sequence (where one can choose from many arbitrary shift values) and it is shown that the sum sequence has improved autocorrelation properties besides being computationally hard. Also, an analysis on the com… ▽ More

    Submitted 1 June, 2016; originally announced June 2016.

    Comments: 8 pages

  14. arXiv:1601.07110  [pdf

    cs.IT cs.CR

    The Narayana Universal Code

    Authors: Krishnamurthy Kirthi, Subhash Kak

    Abstract: This paper presents a method of universal coding based on the Narayana series. The rules necessary to make such coding possible have been found and the length of the resulting code has been determined to follow the Narayana count.

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: 9 pages, 2 figures

  15. arXiv:1506.07497  [pdf

    cs.SI physics.soc-ph

    Two Power Series Models of Self-Similarity in Social Networks

    Authors: Subhash Kak

    Abstract: Two power series models are proposed to represent self-similarity and they are compared to the Zipf and Benford distributions. Since evolution of a social network is associated with replicating self-similarity at many levels, the nature of interconnections can serve as a measure of the optimality of its organization. In contrast with the Zipf distribution where the middle term is the harmonic mean… ▽ More

    Submitted 24 June, 2015; originally announced June 2015.

    Comments: 12 pages, 4 figures. arXiv admin note: text overlap with arXiv:0812.2891 by other authors without attribution

  16. arXiv:1506.03377  [pdf

    cs.SI

    Connectivity in Social Networks

    Authors: Sieteng Soh, Gongqi Lin, Subhash Kak

    Abstract: The value of a social network is generally determined by its size and the connectivity of its nodes. But since some of the nodes may be fake ones and others that are dormant, the question of validating the node counts by statistical tests becomes important. In this paper we propose the use of the Benford's distribution to check on the trustworthiness of the connectivity statistics. Our experiments… ▽ More

    Submitted 10 June, 2015; originally announced June 2015.

    Comments: 8 pages, 5 figures

  17. arXiv:1505.05081  [pdf

    cs.CR

    Multiparty Probability Computation and Verification

    Authors: Subhash Kak

    Abstract: A multiparty computation protocol is described in which the parties can generate different probability events that is based on the sharing of a single anonymized random number, and also perform oblivious transfer. A method to verify the correctness of the procedure, without revealing the random numbers used by the parties, is proposed.

    Submitted 28 May, 2015; v1 submitted 19 May, 2015; originally announced May 2015.

    Comments: 8 pages, 4 figures; Corrected typographical errors

  18. arXiv:1504.00601  [pdf

    cs.CR

    Oblivious Transfer Protocol with Verification

    Authors: Subhash Kak

    Abstract: Although random sequences can be used to generate probability events, they come with the risk of cheating in an unsupervised situation. In such cases, the oblivious transfer protocol may be used and this paper presents a variation to the DH key-exchange to serve as this protocol. A method to verify the correctness of the procedure, without revealing the random numbers used by the two parties, is a… ▽ More

    Submitted 2 April, 2015; originally announced April 2015.

    Comments: 7 pages, 2 figures

  19. Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption

    Authors: Kam Wai Clifford Chan, Mayssaa El Rifai, Pramode K. Verma, Subhash Kak, Yuhua Chen

    Abstract: This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the intercept-resend attack, the photon number splitting attack, and the man-in-the-middle attac… ▽ More

    Submitted 19 March, 2015; originally announced March 2015.

    Journal ref: International Journal on Cryptography and Information Security, Vol. 5, No. 3/4, pp. 1-13 (2015)

  20. arXiv:1503.03821  [pdf

    cs.CR

    A Class of Random Sequences for Key Generation

    Authors: Krishnamurthy Kirthi, Subhash Kak

    Abstract: This paper investigates randomness properties of sequences derived from Fibonacci and Gopala-Hemachandra sequences modulo m for use in key distribution applications. We show that for sequences modulo a prime a binary random sequence B(n) is obtained based on whether the period is p-1 (or a divisor) or 2p+2 (or a divisor). For the more general case of arbitrary m, we use the property if the period… ▽ More

    Submitted 12 March, 2015; originally announced March 2015.

    Comments: 7 pages; 4 figures

  21. arXiv:1502.00894  [pdf

    cs.IT

    Extended Unary Coding

    Authors: Subhash Kak

    Abstract: Extended variants of the recently introduced spread unary coding are described. These schemes, in which the length of the code word is fixed, allow representation of approximately n^2 numbers for n bits, rather than the n numbers of the standard unary coding. In the first of two proposed schemes the spread increases, whereas in the second scheme the spread remains constant.

    Submitted 3 February, 2015; originally announced February 2015.

    Comments: 5 pages

  22. arXiv:1412.7049  [pdf

    cs.SI

    Friendship Paradox and Attention Economics

    Authors: Subhash Kak

    Abstract: The friendship paradox is revisited by considering both local and global averages of friends. How the economics of attention affects the recruitment of friends is examined. Statistical implications of varying individual attentions are investigated and it is argued that this is one reason why the mean of friends is higher than the median in social networks. The distribution of friends skews to the… ▽ More

    Submitted 22 December, 2014; originally announced December 2014.

    Comments: 8 pages, 4 figures

  23. arXiv:1412.6122  [pdf

    cs.NE cs.IT

    Spread Unary Coding

    Authors: Subhash Kak

    Abstract: Unary coding is useful but it is redundant in its standard form. Unary coding can also be seen as spatial coding where the value of the number is determined by its place in an array. Motivated by biological finding that several neurons in the vicinity represent the same number, we propose a variant of unary numeration in its spatial form, where each number is represented by several 1s. We call thi… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

    Comments: 5 pages, 2 figures

  24. arXiv:1411.3645  [pdf

    cs.CR

    Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography

    Authors: Subhash Kak

    Abstract: The piggy bank idea allows one-way encryption of information that can be accessed only by authorized parties. Here we show how the piggy bank idea can be used to authenticate parties to counter man-in-the-middle (MIM) attack that can jeopardize the double-lock cryptography protocol. We call this method double-signature double lock cryptography and it can be implemented in ways that go beyond hash-… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

    Comments: 8 pages, 6 figures

  25. arXiv:1411.3273  [pdf

    cs.DC

    Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array

    Authors: Subhash Kak

    Abstract: This note looks at the efficiency of the cross-wired mesh array in the context of matrix multiplication. It is shown that in case of repeated operations, the average number of steps to multiply sets of nxn matrices on a 2D cross-wired mesh array approaches n.

    Submitted 12 November, 2014; originally announced November 2014.

    Comments: 5 pages

  26. arXiv:1312.2539  [pdf

    cs.CR

    A Key Set Cipher for Wireless Sensor Networks

    Authors: Subhash Kak

    Abstract: This paper proposes the use of sets of keys, together with corresponding identifiers, for use in wireless sensor networks and similar resource-constrained applications. A specific cryptographic scheme described in the paper is based on the use of a family of self-inverting matrices derived from the number theoretic Hilbert transform in conjunction with the Blom's scheme. In a randomized version of… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 12 pages, 2 figures

  27. arXiv:1311.6821  [pdf

    cs.CR

    A Class of Orthogonal Sequences

    Authors: Subhash Kak

    Abstract: This paper presents a class of random orthogonal sequences associated with the number theoretic Hilbert transform. We present a constructive procedure for finding the random sequences for different modulus values. These random sequences have autocorrelation function that is zero everywhere excepting at the origin. These sequences may be used as keys and in other cryptography applications.

    Submitted 26 November, 2013; originally announced November 2013.

    Comments: 8 pages, 2 figures

  28. arXiv:1310.6333  [pdf

    quant-ph cs.CR

    Threshold Quantum Cryptography

    Authors: Subhash Kak

    Abstract: Most current research on quantum cryptography requires transmission and reception of single photons that creates severe implementation challenges and limits range. This paper argues for the development of threshold quantum cryptography protocols in which the system is secure so long as the number of photons being exchanged between Alice and Bob is below a specified threshold. We speak of a (p-k-n)… ▽ More

    Submitted 23 October, 2013; originally announced October 2013.

    Comments: 10 pages, 4 figures. arXiv admin note: text overlap with arXiv:1206.6778

  29. arXiv:1309.2238  [pdf

    quant-ph cs.IT

    Probability and the Classical/Quantum Divide

    Authors: Subhash Kak

    Abstract: This paper considers the problem of distinguishing between classical and quantum domains in macroscopic phenomena using tests based on probability and it presents a condition on the ratios of the outcomes being the same (Ps) to being different (Pn). Given three events, Ps/Pn for the classical case, where there are no 3-way coincidences, is one-half whereas for the quantum state it is one-third. Fo… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

    Comments: 12 pages; 1 figure

    Journal ref: NeuroQuantology, vol. 11, pp. 600-606, 2013

  30. arXiv:1308.1688  [pdf

    cs.CR cs.IT math.NT

    The Number Theoretic Hilbert Transform

    Authors: Subhash Kak

    Abstract: This paper presents a general expression for a number-theoretic Hilbert transform (NHT). The transformations preserve the circulant nature of the discrete Hilbert transform (DHT) matrix together with alternating values in each row being zero and non-zero. Specific examples for 4-point, 6-point, and 8-point NHT are provided. The NHT transformation can be used as a primitive to create cryptographica… ▽ More

    Submitted 5 August, 2013; originally announced August 2013.

    Comments: 11 pages

    Journal ref: Circuits, Systems and Signal Processing 33 (2014) 2539-2548

  31. arXiv:1307.8104  [pdf

    cs.NE

    Neural Network Capacity for Multilevel Inputs

    Authors: Matt Stowe, Subhash Kak

    Abstract: This paper examines the memory capacity of generalized neural networks. Hopfield networks trained with a variety of learning techniques are investigated for their capacity both for binary and non-binary alphabets. It is shown that the capacity can be much increased when multilevel inputs are used. New learning strategies are proposed to increase Hopfield network capacity, and the scalability of th… ▽ More

    Submitted 30 July, 2013; originally announced July 2013.

    Comments: 24 pages,17 figures

  32. arXiv:1305.1900  [pdf

    cs.CR

    Residue Classes of the PPT Sequence

    Authors: Subhash Kak

    Abstract: Primitive Pythagorean triples (PPT) may be put into different equivalence classes using residues with respect to primes. We show that the probability that the smaller odd number associated with the PPT triple is divisible by prime p is 2/(p+1). We have determined the autocorrelation function of the Baudhayana sequences obtained from the residue classes and we show these sequences have excellent ra… ▽ More

    Submitted 8 May, 2013; originally announced May 2013.

    Comments: 8 pages, 4 figures

  33. arXiv:1304.4651  [pdf

    cs.CR

    Generalized Public Key Transformations with Side Information

    Authors: Gunjan Talati, Subhash Kak

    Abstract: This paper presents results on generalized public key cryptography with exponentials modulo primes and composite numbers where the map** is not one-to-one and the uniqueness is achieved by additional side information. Such transformations may be used for oblivious transfer and generate events of specific probabilities.

    Submitted 16 April, 2013; originally announced April 2013.

    Comments: 15 pages. arXiv admin note: text overlap with arXiv:1304.4273

  34. arXiv:1304.4273  [pdf

    cs.CR

    The Quartic Public Key Transformation

    Authors: Gunjan Talati, Subhash Kak

    Abstract: This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols.

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 6 pages

  35. arXiv:1301.0313  [pdf

    cs.CR

    The Piggy Bank Cryptographic Trope

    Authors: Subhash Kak

    Abstract: This paper presents applications of the trope of the locked and sealed piggy-bank into which the secret can be easily inserted but from which it cannot be withdrawn without opening the box. We present a basic two-pass cryptographic scheme that can serve as template for a variety of implementations. Together with the sealed piggy-bank is sent a coded letter that lists and certifies the contents of… ▽ More

    Submitted 1 January, 2013; originally announced January 2013.

    Comments: 7 pages, 6 figures

    Journal ref: Infocommunications Journal 6: 22-25 (2014)

  36. arXiv:1211.2751  [pdf

    cs.CR

    Random Sequences from Primitive Pythagorean Triples

    Authors: Monisha Prabhu, Subhash Kak

    Abstract: This paper shows that the six classes of PPTs can be put into two groups. Autocorrelation and cross-correlation functions of the six classes derived from the gaps between each class type have been computed. It is shown that Classes A and D (in which the largest term is divisible by 5) are different from the other four classes in their randomness properties if they are ordered by the largest term.… ▽ More

    Submitted 12 November, 2012; originally announced November 2012.

    Comments: 10 pages, 6 figures

  37. arXiv:1210.8398  [pdf

    cs.IT

    An Alignment Algorithm for Sequences

    Authors: Sandeep Hosangadi, Subhash Kak

    Abstract: This paper describes a new alignment algorithm for sequences that can be used for determination of deletions and substitutions. It provides several solutions out of which the best one can be chosen on the basis of minimization of gaps or other considerations. The algorithm does not use similarity tables and it performs aspects of both global and local alignment. The algorithm is compared with othe… ▽ More

    Submitted 31 October, 2012; originally announced October 2012.

    Comments: 8 pages

  38. arXiv:1210.4614  [pdf

    cs.CR cs.IT

    Random Sequences Based on the Divisor Pairs Function

    Authors: Subhash Kak

    Abstract: This paper investigates the randomness properties of a function of the divisor pairs of a natural number. This function, the antecedents of which go to very ancient times, has randomness properties that can find applications in cryptography, key distribution, and other problems of computer science. It is shown that the function is aperiodic and it has excellent autocorrelation properties.

    Submitted 21 November, 2012; v1 submitted 10 October, 2012; originally announced October 2012.

    Comments: 6 pages, 5 figures

  39. arXiv:1209.4621  [pdf

    cs.CR

    Goldbach Circles and Balloons and Their Cross Correlation

    Authors: Krishnama Raju Kanchu, Subhash Kak

    Abstract: Goldbach partitions can be used in creation of ellipses and circles on the number line. We extend this work and determine the count and other properties of concentric Goldbach circles for different values of n. The autocorrelation function of this sequence with respect to even and odd values suggests that it has excellent randomness properties. Cross correlation properties of ellipse and circle se… ▽ More

    Submitted 20 September, 2012; originally announced September 2012.

    Comments: 9 pages, 7 figures

  40. arXiv:1209.1323  [pdf

    cs.SI physics.soc-ph

    An Empirical Study of How Users Adopt Famous Entities

    Authors: Sheng Yu, Subhash Kak

    Abstract: Users of social networking services construct their personal social networks by creating asymmetric and symmetric social links. Users usually follow friends and selected famous entities that include celebrities and news agencies. In this paper, we investigate how users follow famous entities. We statically and dynamically analyze data within a huge social networking service with a manually classif… ▽ More

    Submitted 6 September, 2012; originally announced September 2012.

    Comments: 7 pages, 10 figures

  41. arXiv:1209.0135  [pdf

    cs.CR

    Goldbach Triples and Key Distribution

    Authors: Deepthi Cherlopalle, Subhash Kak

    Abstract: This paper investigates the use of the number of Goldbach triples, or the number of three prime partitions of an odd number, for use in the generation and distribution of cryptographic keys. In addition to presenting randomness properties of these triples, which turn out to be similar to that of prime partitions of even numbers, we explore the question of restricted partition sets. We propose a pr… ▽ More

    Submitted 1 September, 2012; originally announced September 2012.

    Comments: 9 pages, 6 figures

  42. arXiv:1208.6198  [pdf

    cs.CR quant-ph

    Implementation of Secure Quantum Protocol using Multiple Photons for Communication

    Authors: Sayonnha Mandal, Gregory Macdonald, Mayssaa El Rifai, Nikhil Punekar, Farnaz Zamani, Yuhua Chen, Subhash Kak, Pramode K. Verma, Robert C Huck, James Sluss

    Abstract: The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, whic… ▽ More

    Submitted 30 August, 2012; originally announced August 2012.

    Comments: 6 pages, 3 figures

  43. arXiv:1208.1984  [pdf

    cs.CR

    Goldbach Ellipse Sequences for Cryptographic Applications

    Authors: Krishnama Raju Kanchu, Subhash Kak

    Abstract: The paper studies cryptographically useful properties of the sequence of the sizes of Goldbach ellipses. We show that binary subsequences based on this sequence have useful properties. They can be used to generate keys and to provide an index-based map** to numbers. The paper also presents a protocol for secure session keys that is based on Goldbach partitions.

    Submitted 9 August, 2012; originally announced August 2012.

    Comments: 8 pages, 5 figures, 4 tables

  44. arXiv:1207.6307  [pdf

    cs.CR

    On Randomness of Goldbach Sequences

    Authors: Krishnama Raju Kanchu, Subhash Kak

    Abstract: We consider the use of Goldbach numbers as random sequences. The randomness is analyzed in terms of the autocorrelation function of the sequence of number of partitions. The distinct representations of an even number n as the sum of two primes is a local maximum for multiples of the product of the consecutive smallest primes less than the number. Specific partitions, which we call Goldbach ellipse… ▽ More

    Submitted 26 July, 2012; originally announced July 2012.

    Comments: 10 pages, 5 figures, 5 tables

  45. arXiv:1206.6778  [pdf

    quant-ph cs.CR

    iAQC: The Intensity-Aware Quantum Cryptography Protocol

    Authors: Subhash Kak, Yuhua Chen, Pramode Verma

    Abstract: This paper reports a variant of the three-stage quantum cryptography protocol which can be used in low intensity laser output regimes. The variant, which tracks the intensity of the laser beam at the intermediate stages, makes the task of the eavesdropper harder than the standard K06 protocol. The constraints on the iAQC protocol are much less than those on BB84 and in principle it can not only be… ▽ More

    Submitted 11 October, 2013; v1 submitted 28 June, 2012; originally announced June 2012.

    Comments: 8 pages, 2 figures, corrected typographical errors

  46. arXiv:1203.1647  [pdf

    cs.SI physics.soc-ph

    A Survey of Prediction Using Social Media

    Authors: Sheng Yu, Subhash Kak

    Abstract: Social media comprises interactive applications and platforms for creating, sharing and exchange of user-generated contents. The past ten years have brought huge growth in social media, especially online social networking services, and it is changing our ways to organize and communicate. It aggregates opinions and feelings of diverse groups of people at low cost. Mining the attributes and contents… ▽ More

    Submitted 7 March, 2012; originally announced March 2012.

    Comments: 20 pages

  47. arXiv:1202.0200  [pdf

    cs.CR

    Increasing Randomness Using Permutations on Blocks

    Authors: Sindhu Chitikela, Subhash Kak

    Abstract: This paper investigates the effect of permutations on blocks of a prime reciprocal sequence on its randomness. A relationship between the number of permutations used and the improvement of performance is presented. This can be used as a method for increasing the cryptographic strength of pseudorandom sequences.

    Submitted 1 February, 2012; originally announced February 2012.

    Comments: 10 pages

  48. arXiv:1102.4573  [pdf

    cs.IT

    The Algebra of Two Dimensional Patterns

    Authors: Subhash Kak

    Abstract: The article presents an algebra to represent two dimensional patterns using reciprocals of polynomials. Such a representation will be useful in neural network training and it provides a method of training patterns that is much more efficient than a pixel-wise representation.

    Submitted 22 February, 2011; originally announced February 2011.

    Comments: 11 pages, 14 figures

  49. arXiv:1011.4093  [pdf

    cs.OH

    The Use of Rapid Digital Game Creation to Learn Computational Thinking

    Authors: Praveen Kuruvada, Daniel Asamoah, Nikunj Dalal, Subhash Kak

    Abstract: Computational Thinking (CT) has been described as a universally applicable ability such as reading and writing. In this paper, we describe an innovative pedagogy using Rapid Digital Game Creation (RDGC) for learning CT skills. RDGC involves the rapid building of digital games with high-level software that requires little or no programming knowledge. We analyze how RDGC supports various CT concepts… ▽ More

    Submitted 17 November, 2010; originally announced November 2010.

    Comments: 9 pages

  50. arXiv:1010.5421  [pdf, other

    cs.DC

    On the Mesh Array for Matrix Multiplication

    Authors: Subhash Kak

    Abstract: This article presents new properties of the mesh array for matrix multiplication. In contrast to the standard array that requires 3n-2 steps to complete its computation, the mesh array requires only 2n-1 steps. Symmetries of the mesh array computed values are presented which enhance the efficiency of the array for specific applications. In multiplying symmetric matrices, the results are obtained i… ▽ More

    Submitted 26 October, 2010; originally announced October 2010.

    Comments: 6 pages