This is TikiWiki v1.9.8.3 -Sirius- © 2002–2007 by the Tiki community Fri 22 of Nov, 2024 [13:50 UTC]
Menu

Category E. Data

Browse in:
All Wiki pages Image galleries Images File galleries Blogs Trackers Items Surveys Articles

search category: deep:

Hide subcategories objects

Current category: Top  ::  ITHEA Classification Structure  ::  E. Data
..
 

Objects (35)

E.4 CODING AND INFORMATION THEORY Article ADAPTIVE CODING SCHEME FOR RAPIDLY CHANGING COMMUNICATION CHANNELS Abstract: In this paper we investigate the problem of reliable and efficient data transmission over rapidly changing communication channels. A typical example of such channel would be high-speed free  
E.3 DATA ENCRYPTION Article ASYMMETRIC CIPHER PROTOCOL USING DECOMPOSITION PROBLEM Abstract: The asymmetric cipher protocol based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security parameters are defined and preliminary secur 
E.1 DATA STRUCTURES Article BUILDING DATA WAREHOUSES USING NUMBERED INFORMATION SPACES Abstract: An approach for organizing the information in the data warehouses is presented in the paper. The possibilities of the numbered information spaces for building data warehouses are discussed. 
E.1 DATA STRUCTURES Article CONSTRUCTION OF MORPHOSYNTACTIC DISTANCE ON SEMANTIC STRUCTURES Abstract: When a natural language is introduced in a computer we have several problems to automate it, this is because it is difficult to make a computer relate concepts in a rich and always changing 
E.4 CODING AND INFORMATION THEORY Article FORMALIZATION OF STRUCTURAL CONSTRAINTS OF RELATIONSHIPS ... Abstract: The basic conceptions of the model „entity-relationship” as entities, relationships, structural constraints of the relationships (index cardinality, participation degree, and structural 
E.3 DATA ENCRYPTION Article KEY AGREEMENT PROTOCOL (KAP) BASED ON MATRIX POWER FUNCTION* Abstract: The key agreement protocol (KAP) is constructed using matrix power functions. These functions are based on matrix ring action on some matrix set. Matrix power functions have some indication 
E.3 DATA ENCRYPTION Article KEY AGREEMENT PROTOCOL USING ELLIPTIC CURVE MATRIX POWER FUNCTION* Abstract: The key agreement protocol (KAP) using elliptic curve matrix power function is presented. This function pretends be a one-way function since its inversion is related with bilinear equatio 
E.1 DATA STRUCTURES Article LARGE VLSI ARRAYS – POWER AND ARCHITECTURAL PERSPECTIVES Abstract: A novel approach to power reduction in VLSI arrays is proposed. This approach includes recognition of the similarities in architectures and power profiles of different types of arrays, adap 
E.1 DATA STRUCTURES Article LOGARITHMIC DISTANCES IN GRAPHS Abstract: The walk distances in graphs are defined as the result of appropriate transformations of the P1 k=0(tA)k proximity measures, where A is the weighted adjacency matrix of a graph and t is a 
E.4 CODING AND INFORMATION THEORY Article Lossless Tomography Data Compression Method Abstract: This paper presents a complex compression method of tomographic data without loss. The proposed method is based on the classic and modified lossless data compression algorithms, which allow 
E.1 DATA STRUCTURES Article MAIN DIFFERENCES BETWEEN MAP/REDUCE AND COLLECT/REPORT PARADIGMS Abstract: This article presents main differences between Map/Reduce (MRP) and Collect/Report (CRP) paradigms. The most important difference is that in MRP the calculations and data must be all compl 
E.3 DATA ENCRYPTION Article MATRIX POWER S-BOX ANALYSIS1 Abstract: Construction of symmetric cipher S-box based on matrix power function and dependant on key is analyzed. The matrix consisting of plain data bit strings is combined with three round key matr 
E.1 DATA STRUCTURES Article MEMBRANE STRUCTURE SIMPLIFICATION Abstract: Idempotent operators are one of the possible criterions for simplification trees. These operators act over internal nodes of trees. Moreover, they transform structural equivalent sub-trees 
E.3 DATA ENCRYPTION Article On a public key encryption algorithm based on Permutation Polynomials and ... Abstract: In this paper a modification of public key encryption system presented in [Khachatryan, Kyureghyan, 2015] and performance analysis are presented. As described in [Khachatryan, Kyureghyan, 2 
E.2 DATA STORAGE REPRESENTATIONS Article PECULIARITIES OF LINKED DATA PROCESSING IN SEMANTIC APPLICATIONS Abstract: Nowadays linked data popularity increases along with information description in the form of RDFtriplets. Efficient implementation of users’ interaction with these kinds of data requires s 
E. Data Article PRESENTATION OF PRODUCTION ORIENTED DATA AND KNOWLEDGE Abstract: This article describes a concept of presentation of knowledge and information in a manufacturing company. The main idea of application mechanism construction is technique of graphic present 
E.1 DATA STRUCTURES Article REPRESENTING TREE STRUCTURES BY NATURAL NUMBERS Abstract: Transformation of data structures into natural numbers using the classical approach of gödelization process can be a very powerful tool in order to encode some properties of data structures 
E.1 DATA STRUCTURES Article SEMANTIC CONSTRUCTION OF UNIVOCAL LANGUAGE Abstract: In this paper a solution is propose to organize the space of words that exist in a specific language in their different semantic categories. By taking a natural language, we're going to de 
E.2 DATA STORAGE REPRESENTATIONS Article STORING RDF GRAPHS USING NL-ADDRESSING Abstract: NL-addressing is a possibility to access information using natural language words as addresses of the information stored in the multi-dimensional numbered information spaces. For this purp 
E. Data Article THERMALS MAP – ASSIST FLIGHT SYSTEM Abstract: The article presents proposition of the assist pilot system. The system helps pilot with correct decision of cross country flights. Presentation of specially calculated information stored b 
E.5 FILES Article THERMALS MAP – ASSIST FLIGHT SYSTEM Abstract: The article presents proposition of the assist pilot system. The system helps pilot with correct decision of cross country flights. Presentation of specially calculated information stored b 
E.4 CODING AND INFORMATION THEORY Article TRANSLITERATION AND LONGEST MATCH STRATEGY Abstract: A natural requirement on transliteration systems is that transliteration and its inversion could be easily performed. To make this requirement more precise, we consider a text transduction a 
E.2 DATA STORAGE REPRESENTATIONS Article UNIVERSAL AND DETERMINED CONSTRUCTORS OF MULTISETS OF OBJECTS Abstract: This paper contains analysis of creation of sets and multisets as an approach for modeling of some aspects of human thinking. The creation of sets is considered within constructive object-o 
E.0 GENERAL Article Using Decision Theory Methods to Optimize the Access Networks Synthesis Process Abstract: Using the methods of the theory of decision-making to optimize the synthesis of access networks. Analyzed the synthesis of access networks and the use of decision theory for optimization.  
E.4 CODING AND INFORMATION THEORY Article ИССЛЕДОВАНИЕ И МОДЕЛИРОВАНИЕ НЕЙРОСЕТЕВОГО МЕТОДА ОБНАРУЖЕНИЯ И КЛАССИФИКАЦИИ... Аннотация: Рассматриваются возможности и перспективы применения нейросетевых технологий для распознавани 

Page: 1/2  [next]
1   2  
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.21 secs ]   [ Memory usage: 9.12MB ]   [ GZIP Disabled ]   [ Server load: 0.47 ]