E.4 CODING AND INFORMATION THEORY | Article |
ADAPTIVE CODING SCHEME FOR RAPIDLY CHANGING COMMUNICATION CHANNELS |
Abstract: In this paper we investigate the problem of reliable and efficient data transmission over rapidly changing communication channels. A typical example of such channel would be high-speed free |
E.3 DATA ENCRYPTION | Article |
ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM |
Abstract: The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of
natural numbers N is presented. The security parameters are defined and preliminary secur |
E.1 DATA STRUCTURES | Article |
BUILDING DATA WAREHOUSES USING NUMBERED INFORMATION SPACES |
Abstract: An approach for organizing the information in the data warehouses is presented in the paper. The
possibilities of the numbered information spaces for building data warehouses are discussed. |
E.1 DATA STRUCTURES | Article |
CONSTRUCTION OF MORPHOSYNTACTIC DISTANCE ON SEMANTIC STRUCTURES |
Abstract: When a natural language is introduced in a computer we have several problems to automate it, this is
because it is difficult to make a computer relate concepts in a rich and always changing |
E.4 CODING AND INFORMATION THEORY | Article |
FORMALIZATION OF STRUCTURAL CONSTRAINTS OF RELATIONSHIPS ... |
Abstract: The basic conceptions of the model „entity-relationship” as entities, relationships, structural constraints
of the relationships (index cardinality, participation degree, and structural |
E.3 DATA ENCRYPTION | Article |
KEY AGREEMENT PROTOCOL (KAP) BASED ON MATRIX POWER FUNCTION* |
Abstract: The key agreement protocol (KAP) is constructed using matrix power functions. These functions are
based on matrix ring action on some matrix set. Matrix power functions have some indication |
E.3 DATA ENCRYPTION | Article |
KEY AGREEMENT PROTOCOL USING ELLIPTIC CURVE MATRIX POWER FUNCTION* |
Abstract: The key agreement protocol (KAP) using elliptic curve matrix power function is presented. This function
pretends be a one-way function since its inversion is related with bilinear equatio |
E.1 DATA STRUCTURES | Article |
LARGE VLSI ARRAYS – POWER AND ARCHITECTURAL PERSPECTIVES |
Abstract: A novel approach to power reduction in VLSI arrays is proposed. This approach includes recognition of
the similarities in architectures and power profiles of different types of arrays, adap |
E.1 DATA STRUCTURES | Article |
LOGARITHMIC DISTANCES IN GRAPHS |
Abstract: The walk distances in graphs are defined as the result of appropriate transformations of the
P1
k=0(tA)k
proximity measures, where A is the weighted adjacency matrix of a graph and t is a |
E.4 CODING AND INFORMATION THEORY | Article |
Lossless Tomography Data Compression Method |
Abstract: This paper presents a complex compression method of tomographic data without loss. The proposed
method is based on the classic and modified lossless data compression algorithms, which allow |
E.1 DATA STRUCTURES | Article |
MAIN DIFFERENCES BETWEEN MAP/REDUCE AND COLLECT/REPORT PARADIGMS |
Abstract: This article presents main differences between Map/Reduce (MRP) and Collect/Report
(CRP) paradigms. The most important difference is that in MRP the calculations and data must be all
compl |
E.3 DATA ENCRYPTION | Article |
MATRIX POWER S-BOX ANALYSIS1 |
Abstract: Construction of symmetric cipher S-box based on matrix power function and dependant on key is
analyzed. The matrix consisting of plain data bit strings is combined with three round key matr |
E.1 DATA STRUCTURES | Article |
MEMBRANE STRUCTURE SIMPLIFICATION |
Abstract: Idempotent operators are one of the possible criterions for simplification trees. These operators act
over internal nodes of trees. Moreover, they transform structural equivalent sub-trees |
E.3 DATA ENCRYPTION | Article |
On a public key encryption algorithm based on Permutation Polynomials and ... |
Abstract: In this paper a modification of public key encryption system presented in [Khachatryan, Kyureghyan, 2015]
and performance analysis are presented. As described in [Khachatryan, Kyureghyan, 2 |
E.2 DATA STORAGE REPRESENTATIONS | Article |
PECULIARITIES OF LINKED DATA PROCESSING IN SEMANTIC APPLICATIONS |
Abstract: Nowadays linked data popularity increases along with information description in the form of RDFtriplets.
Efficient implementation of users’ interaction with these kinds of data requires s |
E. Data | Article |
PRESENTATION OF PRODUCTION ORIENTED DATA AND KNOWLEDGE |
Abstract: This article describes a concept of presentation of knowledge and information in a manufacturing
company. The main idea of application mechanism construction is technique of graphic present |
E.1 DATA STRUCTURES | Article |
REPRESENTING TREE STRUCTURES BY NATURAL NUMBERS |
Abstract: Transformation of data structures into natural numbers using the classical approach of gödelization process can be a very powerful tool in order to encode some properties of data structures |
E.1 DATA STRUCTURES | Article |
SEMANTIC CONSTRUCTION OF UNIVOCAL LANGUAGE |
Abstract: In this paper a solution is propose to organize the space of words that exist in a specific language in
their different semantic categories. By taking a natural language, we're going to de |
E.2 DATA STORAGE REPRESENTATIONS | Article |
STORING RDF GRAPHS USING NL-ADDRESSING |
Abstract: NL-addressing is a possibility to access information using natural language
words as addresses of the information stored in the multi-dimensional numbered
information spaces. For this purp |
E. Data | Article |
THERMALS MAP – ASSIST FLIGHT SYSTEM |
Abstract: The article presents proposition of the assist pilot system. The system helps pilot with correct decision
of cross country flights. Presentation of specially calculated information stored b |
E.5 FILES | Article |
THERMALS MAP – ASSIST FLIGHT SYSTEM |
Abstract: The article presents proposition of the assist pilot system. The system helps pilot with correct decision
of cross country flights. Presentation of specially calculated information stored b |
E.4 CODING AND INFORMATION THEORY | Article |
TRANSLITERATION AND LONGEST MATCH STRATEGY |
Abstract: A natural requirement on transliteration systems is that transliteration and its inversion could be easily performed. To make this requirement more precise, we consider a text transduction a |
E.2 DATA STORAGE REPRESENTATIONS | Article |
UNIVERSAL AND DETERMINED CONSTRUCTORS OF MULTISETS OF OBJECTS |
Abstract: This paper contains analysis of creation of sets and multisets as an approach for modeling of some
aspects of human thinking. The creation of sets is considered within constructive object-o |
E.0 GENERAL | Article |
Using Decision Theory Methods to Optimize the Access Networks Synthesis Process |
Abstract: Using the methods of the theory of decision-making to optimize the synthesis of access
networks. Analyzed the synthesis of access networks and the use of decision theory for optimization.
|
E.4 CODING AND INFORMATION THEORY | Article |
ИССЛЕДОВАНИЕ И МОДЕЛИРОВАНИЕ НЕЙРОСЕТЕВОГО МЕТОДА ОБНАРУЖЕНИЯ И КЛАССИФИКАЦИИ... |
Аннотация: Рассматриваются возможности и перспективы применения нейросетевых технологий
для распознавани |