The present application is related to U.S. patent application Ser. No. 12/364,533, filed Feb. 3, 2009, assigned to the assignee of the present application and hereby incorporated by reference
Minimal polynomials are widely used in symbolic computation. Computing the minimal polynomial of a radical expression (or more simply “radical” as used herein) is a basic problem in symbolic computation. Some examples include factorization of polynomials in an algebraic extension field, rationalization of denominators, and simplification of complex expressions.
Determining the minimal polynomial of radicals over a ring is a well known question for problems related to algebraic extension. One conventional technique used by computational software programs finds an annihilation polynomial, factors the polynomial, and then finds the minimal polynomial from the factors. However, there are drawbacks to such conventional techniques. Any improvement in computing the minimal polynomials for radicals over the ring Z of integer numbers or the field (or ring, as a field is also a ring) Q of rational numbers that improves the performance of computational software programs is thus desirable.
This Summary is provided to introduce a selection of representative concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used in any way that would limit the scope of the claimed subject matter.
Briefly, various aspects of the subject matter described herein are directed towards a technology by which a minimal polynomial is efficiently determined for radicals over the ring Z of integer numbers or the ring Q of rational numbers based upon a level permutation set. The levels of the radicals are processed into a permutation group, from which the level permutation set is obtained. An annihilation polynomial is found by approximating the elements of the level permutation set. The annihilation polynomial is factored into its factors, which are then traversed to find the minimal polynomial by locating a factor with its leading coefficient less than one. Iterating with higher precision in approximation is performed if needed to find a factor with its leading coefficient less than one.
Other advantages may become apparent from the following detailed description when taken in conjunction with the drawings.
The present invention is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
Various aspects of the technology described herein are generally directed towards finding an annihilation polynomial for radicals over a ring using a level permutation group method, along with a numerical method to compute the annihilation polynomial and select the minimal polynomial from factors. In general, these methods are used in a computational software program to efficiently find the minimal polynomial for radicals.
It should be understood that any of the examples described herein are non-limiting examples. As such, the present invention is not limited to any particular embodiments, aspects, concepts, structures, functionalities or examples described herein. Rather, any of the embodiments, aspects, concepts, structures, functionalities or examples described herein are non-limiting, and the present invention may be used in various ways that provide benefits and advantages in computing in general.
The level permutation set 116 is processed by a numerical method mechanism 118, which includes an approximation/annihilation polynomial computation mechanism 120 that computes an annihilation polynomial 122 based upon elements of the level permutation set 116. The annihilation polynomial 122 is factored by a factor mechanism 124 (e.g., using known algorithms) into a set of factors 126. A selection mechanism 128 selects the minimal polynomial from the factors 126.
Radicals are defined herein to be nested radicals or the results of nested radicals after arithmetic operations. If the ring to which the items in these nested radical belong is known, the radicals are said to be radicals over the ring. For example,
are radicals over Q if ¾ is viewed as an element in Q. They are radicals over Z if ¾ is viewed as 3 divided by 4. And
are radicals over Q[x, y].
To get an image of radicals, the items under i radical signs are considered to be at the (i+1)th-level. Taking
as an example, the first level (with no higher radical signs) are items from the above example are:
The second level comprises items under one radical sign, which are
These can also be obtained by collecting the first level of items in the first level. As can be seen, the third level comprises
the fourth level comprises 3, √{square root over (5)} and the fifth level is 5.
These primitive items have certain level properties, including that a first level property is that the (i+1)th level can be obtained by collecting the first levels of items in the ith level. A second level property is that every item in the ith level either belongs to the ring, or is a rational power of results after arithmetic operations of items in the (i+1)th level. By the first property the levels 114 of a radical are found by the level finding mechanism 110. The second property may be used to find the annihilation polynomial.
For radicals α, suppose its kth level is known, which is {a1, a2, . . . , an}. According to the second property, ai has the form
or belongs to the ring. If ai has the form
then let
Let Pi be the permutation group on Ai. If ai belongs to the ring, then let Ai={a1} and Pi={id}. Also, if ai=aj, then Pi=Pj. With these permutation groups a kth level permutation group may be constructed.
The kth level permutation group Uk is defined to be:
Uk=P1P2 . . . Pn
and every element uk in Uk has the form
uk=σ1kσ2k . . . σnk, σik ε Pi and σik=σjk if ai=αj,
with the action uk(α)=α′, where α′ is the result obtained after changing every ai in kth-level to σik(ai). Generally, the union of all the kth-level permutation groups is said to be a level permutation set.
At the same time, successive actions of elements in this group are not allowed, because after the first action, α is changed to α′. but the second action may not belong to the permutation group of α′. Therefore a modification is made to define successive actions. Considering successive actions σ2σ1(α), to make this successive action have meaning, let σ1(α)=α′ and σ2 be elements in the level permutation group of α′. Additionally, this rule can be applied to σn . . . σ2σ1(α).
By way of example, suppose
To find its levels:
To construct successive actions, first, taking an arbitrary action in the level permutation group of α, selecting
Next, find the level permutation set of α′ and select one element. Suppose σ21 is selected, whereby
The following theorem provides a theoretical foundation to find a minimal polynomial. For a radicals α over ring V (which can be Z, Q, Q[x], Q[x, y, . . . , z], Z[x], Z[x, y, . . . , z]) with n levels, let the level permutation set γ(α)={σ1σ2 . . . σn(α)|σi ε ith-level permutataion group}; then if there is no division operation in α, the annihilation polynomial f(x)=Πβεγ(α)(x−β) ε V[x].
Otherwise, the annihilation polynomial f(x)=Πβεγ(α)(x−β) ε P[x], where P is the fraction field of V.
Algorithm for radicals α over ring Z (
Algorithm for radicals α over ring Q:
Step 210 or 310 represent outputting the resulting minimal polynomial, e.g., to another component of the computer software program for further processing or outputting to the user.
Exemplary Operating Environment
The invention is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to: personal computers, server computers, hand-held or laptop devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, and so forth, which perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in local and/or remote computer storage media including memory storage devices.
With reference to
The computer 410 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer 410 and includes both volatile and nonvolatile media, and removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computer 410. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above may also be included within the scope of computer-readable media.
The system memory 430 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 431 and random access memory (RAM) 432. A basic input/output system 433 (BIOS), containing the basic routines that help to transfer information between elements within computer 410, such as during start-up, is typically stored in ROM 431. RAM 432 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 420. By way of example, and not limitation,
The computer 410 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media, described above and illustrated in
The computer 410 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 480. The remote computer 480 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 410, although only a memory storage device 481 has been illustrated in
When used in a LAN networking environment, the computer 410 is connected to the LAN 471 through a network interface or adapter 470. When used in a WAN networking environment, the computer 410 typically includes a modem 472 or other means for establishing communications over the WAN 473, such as the Internet. The modem 472, which may be internal or external, may be connected to the system bus 421 via the user input interface 460 or other appropriate mechanism. A wireless networking component 474 such as comprising an interface and antenna may be coupled through a suitable device such as an access point or peer computer to a WAN or LAN. In a networked environment, program modules depicted relative to the computer 410, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
An auxiliary subsystem 499 (e.g., for auxiliary display of content) may be connected via the user interface 460 to allow data such as program content, system status and event notifications to be provided to the user, even if the main portions of the computer system are in a low power state. The auxiliary subsystem 499 may be connected to the modem 472 and/or network interface 470 to allow communication between these systems while the main processing unit 420 is in a low power state.
Conclusion
While the invention is susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions, and equivalents failing within the spirit and scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
6523053 | Lee et al. | Feb 2003 | B1 |
6701028 | Crandall | Mar 2004 | B1 |
7003715 | Thurston | Feb 2006 | B1 |
7137007 | Terao et al. | Nov 2006 | B2 |
7190681 | Wu | Mar 2007 | B1 |
7583747 | Damen et al. | Sep 2009 | B1 |
7979780 | Kamiya | Jul 2011 | B2 |
20050086484 | Muratani | Apr 2005 | A1 |
20060206554 | Lauter et al. | Sep 2006 | A1 |
20070300135 | Kamiya | Dec 2007 | A1 |
20100198902 | Yang et al. | Aug 2010 | A1 |
20120057695 | Lazich et al. | Mar 2012 | A1 |
Entry |
---|
Landau, Susan., “Simplification of Nested Radicals”, retrieved at <<http://historical.ncstrl.org/tr/ps/umass—cs/UM-CS-1990-113.ps>>, Jul. 16, 1993, pp. 1-34. |
Giesbrecht, et al., “Factoring and Decomposing Ore Polynomials over Fq (t)”, International Conference on Symbolic and Algebraic Computation, retrieved at <<http://www.cecm.sfu.ca˜pborwein/MITACS/papers/giesbrecht.pdf>>, Aug. 3-6, 2003, pp. 127-134. |
Armendariz, et al., “On the Computation of the Radical of Polynomial Complete Intersection Ideals”, Proceedings of the 11th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, retrieved at <<http://www.udesa.edu.ar/files/UAMat/Archivos/DOC05.PDF>>, Oct. 1995, pp. 1-20. |
Heintz, et al., “On the Time—Space Complexity of Geometric Elimination Procedures?”, Applicable Algebra in Engineering, Communication and Computing, retrieved at <<http://community.corest.com/˜wata/files/HeMaWa—2001.pdf>>, vol. 11, No. 4, 2001, pp. 1-57. |
Anai, et al., “Radical Representation of Polynomial Roots”, Journal of Japan Society for Symbolic and Algebraic Computation, retrieved at <<http://www.jssac.org/Editor/Suushiki/V09/No1/V9N1—108.pdf>>, vol. 9, No. 1, 2002, pp. 53-79. |
Kaltofen, et al., “Challenges of Symbolic Computation My Favorite Open Problems”, Journal of Symbolic Computation, retrieved at <<http://www4.ncsu.edu/˜kaltofen/bibliography/2K/Ka2K.pdf>>, vol. 29, No. 6, Jun. 2000, pp. 1-36. |
Shoup, Victor., “Efficient Computation of Minimal Polynomials in Algebraic Extensions of Finite Fields”, Proceedings of the 1999 international symposium on Symbolic and algebraic computation, retrieved at <<http://www.shoup.net/papers/mpol.ps>>, Mar. 11, 1999, pp. 1-15. |
Number | Date | Country | |
---|---|---|---|
20100262643 A1 | Oct 2010 | US |