14   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Gleb Isaev     Pág. 18 - 24
The denition of the propagation criterion of Boolean functions was introduced by Bart Preneel and co-authors. This concept represent a set of vectors, for which the corresponding derivatives of a Boolean function are balanced.  I... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Oleg A. Logachev,Sergey N. Fedorov,Valeriy V. Yashchenko     Pág. 10 - 14
Fixing some ordering on the domain of real-valued functions of n Boolean variables (i. e. pseudo-Boolean functions) we can identify these functions (or rather tables of their values) with vectors in the Euclidean space R 2 n of dimension 2 n . From a per... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Oleg A. Logachev,Sergei N. Fedorov,Valeriy V. Yashchenko     Pág. 27 - 31
Boolean functions that are maximally nonlinear, that is, having maximal Hamming distance from the set of affine Boolean functions, are widely used, for  example, in the construction of ciphers, since they increase their security  against  ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Deyuan Zhong, Liangda Fang and Quanlong Guan    
Encoding a dictionary into another representation means that all the words can be stored in the dictionary in a more efficient way. In this way, we can complete common operations in dictionaries, such as (1) searching for a word in the dictionary, (2) ad... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Luigi Rovito, Andrea De Lorenzo and Luca Manzoni    
Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization technique... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Katsuaki Umiji, Koichi Kobayashi and Yuh Yamashita    
A probabilistic Boolean network (PBN) is well known as one of the mathematical models of gene regulatory networks. In a Boolean network, expression of a gene is approximated by a binary value, and its time evolution is expressed by Boolean functions. In ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mykhailo Solomko,Nataliia Khomiuk,Yakiv Ivashchuk,Vitalii Nazaruk,Vikroriia Reinska,Liudmyla Zubyk,Anzhela Popova     Pág. 19 - 34
The studies have established the possibility of reducing computational complexity, higher productivity of minimization of the Boolean functions in the class of expanded normal forms of the Sheffer algebra functions by the method of image transformations.... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Katerina Karelina     Pág. 28 - 35
The mapping  was introduced in one of the works devoted to the study of correlation-immune functions. This mapping allows to quickly increase the number of function's variables. It is the base of recursive method of synthesis correlation-immune Bool... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Katerina Karelina     Pág. 28 - 35
The mapping  was introduced in one of the works devoted to the study of correlation-immune functions. This mapping allows to quickly increase the number of function's variables. It is the base of recursive method of synthesis correlation-immune Bool... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Aleksey I. Pakhomchik, Vladimir V. Voloshinov, Valerii M. Vinokur and Gordey B. Lesovik    
There exists a wide range of constraint programming (CP) problems defined on Boolean functions depending on binary variables. One of the approaches to solving CP problems is using specific appropriate solvers, e.g., SAT solvers. An alternative is using t... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Stanislav Marochok and Pavol Zajac    
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to provide security for cryptographic algorithms. There are several existing methods for generating strong cryptographic S-boxes, including stochastic search algorith... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Igor S. Masich, Vadim S. Tyncheko, Vladimir A. Nelyub, Vladimir V. Bukhtoyarov, Sergei O. Kurashkin and Aleksey S. Borodulin    
Logical analysis of data (LAD), an approach to data analysis based on Boolean functions, combinatorics, and optimization, can be considered one of the methods of interpretable machine learning. A feature of LAD is that, among many patterns, different typ... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Fausto Pedro García Márquez, Isaac Segovia Ramírez, Behnam Mohammadi-Ivatloo and Alberto Pliego Marugán    
New wind turbines are becoming more complex and reliability analysis of them rising in complexity. The systems are composed of many components. Fault tree is used as an useful tool to analyze these interrelations and provide a scheme of the wind turbine,... ver más
Revista: Information    Formato: Electrónico

 
en línea
Huanyu Liao, Pavan Kumar Vaitheeswaran, Tao Song and Ganesh Subbarayan    
Point projection is an important geometric need when boundaries described by parametric curves and surfaces are immersed in domains. In problems where an immersed parametric boundary evolves with time as in solidification or fracture analysis, the projec... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »