134   Artículos

 
en línea
Deyuan Zhong, Liangda Fang and Quanlong Guan    
Encoding a dictionary into another representation means that all the words can be stored in the dictionary in a more efficient way. In this way, we can complete common operations in dictionaries, such as (1) searching for a word in the dictionary, (2) ad... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed    
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure... ver más
Revista: Information    Formato: Electrónico

 
en línea
Steven Parker, Mark Cronshaw, Eugenia Anagnostaki, Valina Mylona, Edward Lynch and Martin Grootveld    
(1) Background: This five-year systematic review seeks to assess the impact of oral and peri-oral photobiomodulation therapies (PBMTs) on the adjunctive management of deeper tissue biofunction, pathologies related to pain and inflammatory disorders and p... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammad Nafees Ulfat Khan, Weiping Cao, Zhiling Tang, Ata Ullah and Wanghua Pan    
The rapid development of the Internet of Things (IoT) has opened the way for transformative advances in numerous fields, including healthcare. IoT-based healthcare systems provide unprecedented opportunities to gather patients? real-time data and make ap... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Padmanabhan Balasubramanian and Nikos E. Mastorakis    
Multiplication is a fundamental arithmetic operation in electronic processing units such as microprocessors and digital signal processors as it plays an important role in various computational tasks and applications. There exist many designs of synchrono... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Luigi Rovito, Andrea De Lorenzo and Luca Manzoni    
Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization technique... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Oleg A. Logachev,Sergei N. Fedorov,Valeriy V. Yashchenko     Pág. 27 - 31
Boolean functions that are maximally nonlinear, that is, having maximal Hamming distance from the set of affine Boolean functions, are widely used, for  example, in the construction of ciphers, since they increase their security  against  ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Stanislav Marochok and Pavol Zajac    
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to provide security for cryptographic algorithms. There are several existing methods for generating strong cryptographic S-boxes, including stochastic search algorith... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Amir Zarringhalam, Saeed Shiry Ghidary, Ali Mohades and Seyed-Ali Sadegh-Zadeh    
In this paper, the concept of ultrametric structure is intertwined with the SLAM procedure. A set of pre-existing transformations has been used to create a new simultaneous localization and mapping (SLAM) algorithm. We have developed two new parallel alg... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Francisco Miguel García-Olmedo, Jesús García-Miranda and Pedro González-Rodelas    
The conjunctive normal form (CNF) algorithm is one of the best known and most widely used algorithms in classical logic and its applications. In its algebraic approach, it makes use in a loop of a certain well-defined operation related to the ?distributi... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 8     Siguiente »