Günter Pilz’s research while affiliated with Johannes Kepler University of Linz and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (19)


Applications of Groups
  • Chapter

January 1998

·

82 Reads

Rudolf Lidl

·

Günter Pilz

We now turn to some applications of group theory. The first application makes use of the observation that computing in ℤ can be replaced by computing in ℤn, if n is sufficiently large; ℤn can be decomposed into a direct product of groups with prime power order, so we can do the computations in parallel in the smaller components. In §25, we look at permutation groups and apply these to combinatorial problems of finding the number of “essentially different” configurations, where configurations are considered as “essentially equal” if the second one can be obtained from the first one, e.g., by a rotation or reflection.


Further Applications of Algebra

January 1998

·

15 Reads

This chapter contains several topics from various areas in which algebra can be applied. The material is mainly selected to give a brief indication of some further applications of algebraic concepts, mainly groups, semigroups, rings, and fields, without being able to go into much depth. Many results are given without proof. We refer the interested reader to the special literature on these topics in the Bibliography.


Cryptology

January 1998

·

22 Reads

The word cryptology stems from the Greek kryptos, “hidden,” and logos, “word.” Cryptology is the science of secure communications. Cryptology comprises cryptography and cryptanalysis, the former deals with methods to ensure the security, secrecy, or authenticity; the latter is concerned with methods of breaking secret messages or forging signals that will be accepted as authentic. In this chapter we will be concentrating mainly on those aspects of cryptography that rely on mathematical, in particular algebraic, techniques and tools.




Applications of Lattices

January 1998

·

39 Reads

One of the most important applications of lattice theory and also one of the oldest applications of modern algebra is the use of Boolean algebras in modeling and simplifying switching or relay circuits. This application will be described in §7. It should be noted that the algebra of switching circuits is presented here not only because of its importance today but also for historical reasons and because of its elegant mathematical formulation. The same theory will also describe other systems, e.g., plumbing systems, road systems with traffic lights, etc. Then we consider propositional logic and indicate connections to probability theory.


Coding Theory

January 1998

·

14 Reads

In many ways, coding theory or the theory of error-correcting codes represents a beautiful example of the applicability of abstract algebra. Applications of codes range from enabling the clear transmission of pictures from distant planets to securing the enjoyment of listening to noise-free CDs. A variety of algebraic concepts can be used to describe codes and their properties, including matrices, polynomials and their roots, linear shift registers, and discrete Fourier transforms. The theory is still relatively young, having started in 1948 with an influential paper by Claude Shannon. This chapter provides the reader with an introduction to the basic concepts of (block) codes, beginning in §16 with general background, §17 deals with properties of linear codes, §18 introduces cyclic codes, and §19 and §20 contain material on special cyclic codes.


Lattices

January 1998

·

10 Reads

In 1854, George Boole (1815–1864) introduced an important class of algebraic structures in connection with his research in mathematical logic. His goal was to find a mathematical model for human reasoning. In his honor these structures have been called Boolean algebras. They are special types of lattices. It was E. Schröder, who about 1890 considered the lattice concept in today’s sense. At approximately the same time, R. Dedekind developed a similar concept in his work on groups and ideals. Dedekind defined, in modern terminology, modular and distributive lattices, which are types of lattices of importance in applications. The rapid development of lattice theory proper started around 1930, when G. Birkhoff made major contributions to the. theory.


Finite Fields and Polynomials

January 1998

·

12 Reads

Finite fields give rise to particularly useful and, in our view, beautiful examples of the applicability of algebra. Such applications arise both within mathematics and in other areas; for example, in communication theory, in computing, and in statistics. In this chapter we present the basic properties of finite fields, with special emphasis on polynomials over these fields. The simplest finite field is the field 𝔽2 consisting of 0 and 1, with binary addition and imultiplication as operations. Many of the results for 𝔽2 can be extended to more general finite fields.


Automata

January 1984

·

12 Reads

·

1 Citation

One meets automata or machines in various forms such as calculating machines, computers, money changing devices, telephone switch boards and elevator or lift switchings. All of the above have one aspect in common, namely a “box” which can assume various “states”. These states can be transformed into other states by outside influences (called “inputs”), for instance by electrical or mechanical impulses. Often the automaton “reacts” and produces “outputs” like results of computations or change.


Citations (4)


... Then G 1 (q 1 , a))) and G ((q 1 , q 2 ) , a) = G 2 (q 2 , G 1 (q 1 , a)). The parallel connections 1 ∥ 2 works with A 1 = A 2 = A, B 1 = B 2 = B and gives ((q 1 , q 2 ) , a) = (F 1 (q 1 , a) , F 2 (q 2 , a)) and G ′ ((q 1 , q 2 ) , a) = G 1 (q 1 , a) + G 2 (q 2 , a). [10], [15]. ...

Reference:

SOME ASPECTS OF NON -LINEAR DYNAMICAL SYSTEMS CARRYING NEAR-RING STRUCTURE
Applied Abstract Algebra
  • Citing Book
  • January 1984

... The control systems theoretic model explains how the unsafe outcomes are result of inadequate interaction of five categorical factors relating to compliance with system engineering and related safety/human factors integration standards, business policy and integration of risk related policies, management policy and its implementation, risk management ( policy and its implementation) and biases in thinking at various levels of STS acting as disturbances. Control systems engineers may recognise Figure 1 from its similarity to data fusion filter algorithm in the form of Kalman filter (Lidl ,R;Pilz,G, 2004), (Rasmussen,J et al., 1994a). With reference to the above SIRI Cybernetic Risk Management Model (Appicharla.S, 2023a), the deviations from the best practices are high level latent failure contributors to the unsafe outcomes. ...

Applied Abstract Algebra
  • Citing Book
  • January 1998

The Mathematical Gazette