|
|
|
Deyuan Zhong, Liangda Fang and Quanlong Guan
Encoding a dictionary into another representation means that all the words can be stored in the dictionary in a more efficient way. In this way, we can complete common operations in dictionaries, such as (1) searching for a word in the dictionary, (2) ad...
ver más
|
|
|
|
|
|
|
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure...
ver más
|
|
|
|
|
|
|
Steven Parker, Mark Cronshaw, Eugenia Anagnostaki, Valina Mylona, Edward Lynch and Martin Grootveld
(1) Background: This five-year systematic review seeks to assess the impact of oral and peri-oral photobiomodulation therapies (PBMTs) on the adjunctive management of deeper tissue biofunction, pathologies related to pain and inflammatory disorders and p...
ver más
|
|
|
|
|
|
|
Muhammad Nafees Ulfat Khan, Weiping Cao, Zhiling Tang, Ata Ullah and Wanghua Pan
The rapid development of the Internet of Things (IoT) has opened the way for transformative advances in numerous fields, including healthcare. IoT-based healthcare systems provide unprecedented opportunities to gather patients? real-time data and make ap...
ver más
|
|
|
|
|
|
|
Padmanabhan Balasubramanian and Nikos E. Mastorakis
Multiplication is a fundamental arithmetic operation in electronic processing units such as microprocessors and digital signal processors as it plays an important role in various computational tasks and applications. There exist many designs of synchrono...
ver más
|
|
|
|
|
|
|
Luigi Rovito, Andrea De Lorenzo and Luca Manzoni
Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization technique...
ver más
|
|
|
|
|
|
|
Oleg A. Logachev,Sergei N. Fedorov,Valeriy V. Yashchenko
Pág. 27 - 31
Boolean functions that are maximally nonlinear, that is, having maximal Hamming distance from the set of affine Boolean functions, are widely used, for example, in the construction of ciphers, since they increase their security against ...
ver más
|
|
|
|
|
|
|
Stanislav Marochok and Pavol Zajac
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to provide security for cryptographic algorithms. There are several existing methods for generating strong cryptographic S-boxes, including stochastic search algorith...
ver más
|
|
|
|
|
|
|
Amir Zarringhalam, Saeed Shiry Ghidary, Ali Mohades and Seyed-Ali Sadegh-Zadeh
In this paper, the concept of ultrametric structure is intertwined with the SLAM procedure. A set of pre-existing transformations has been used to create a new simultaneous localization and mapping (SLAM) algorithm. We have developed two new parallel alg...
ver más
|
|
|
|
|
|
|
Francisco Miguel García-Olmedo, Jesús García-Miranda and Pedro González-Rodelas
The conjunctive normal form (CNF) algorithm is one of the best known and most widely used algorithms in classical logic and its applications. In its algebraic approach, it makes use in a loop of a certain well-defined operation related to the ?distributi...
ver más
|
|
|
|