ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Computing
Mathematics
Agronomy and forestry
Architecture and Urbanism
Physical
Communication
Biology
Pure sciences
all records (19)

Languages
English

Countries
Ukraine
Indonesia
USA
Australia
Canada
Iraq
Romania
Colombia
Croatia
Denmark
all records (13)

Years
2021
2020
2019
2018
2017
2016
2015
2014
2012
2011
all records (13)

Filter  
 
30  Articles
1 of 3 pages  |  10  records  |  more records»
Context. The problem to form generalized primitive matrixes on the Galois and Fibonacci any order over the field characteristics2 for the construction by the generators gamma functions for cryptographically stable algorithms of inline data encryption, fre... see more

Context. The problem to form generalized primitive matrixes on the Galois and Fibonacci any order over the field characteristics2 for the construction by the generators gamma functions for cryptographically stable algorithms of inline data encryption, fre... see more

A bipartite graph G(X,Y,E)G(X,Y,E) with vertex partition (X,Y)(X,Y) is said to have the Normalized Matching Property (NMP) if for any subset S?XS\subseteq X we have |N(S)||Y|=|S||X|\frac{|N(S)|}{|Y|}\geq\frac{|S|}{|X|}. In this paper, we prove the followi... see more

Due to an increase in the number of radio devices with different types of signals and to increase the speed of information transmission, it is necessary to take into account the increase in the probability of erroneous reception of signals as a result of ... see more

Context. Such perfect algebraic constructions of many-valued logic as ternary bent-functions and their truth tables which are called as 3-bent-sequences, are used very often in modern cryptographic algorithms, in particular, in pseudorandom sequence gener... see more

 Designed by algorithmic language C++ software, enables construction of pseudorandom sequence generators for Galois and Fibonacci schemes over polynomials forming 4 – 8 degrees.

In the queuing system, inter arrival variable and service time variable are probabilistic and its pattern follow a Poisson distribution. Simulations experiment for performance measurement of a queuing system required random data. In practice, random data ... see more

The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a ... see more

Path tracing is one of unbiased rendering methods. Said method relies on integral rendering equation to simulate wide variety of optical phenomena. In path tracing, integral part of rendering equation is calculated using Monte Carlo method, which makes th... see more

1 of 3 pages  |  10  records  |  more records»