Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "symmetric" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Self-Adaptive Differential Evolution with Hybrid Rules of Perturbation for Dynamic Optimization
Autorzy:
Trojanowski, K.
Raciborski, M.
Kaczyński, P.
Powiązania:
https://bibliotekanauki.pl/articles/308439.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
adaptive differential evolution
dynamic optimization
symmetric a-stable distribution
Opis:
In this paper an adaptive differential evolution approach for dynamic optimization problems is studied. A new benchmark suite Syringa is also presented. The suite allows to generate test-cases from a multiple number of dynamic optimization classes. Two dynamic benchmarks: Generalized Dynamic Benchmark Generator (GDBG) and Moving Peaks Benchmark (MPB) have been simulated in Syringa and in the presented research they were subject of the experimental research. Two versions of adaptive differential evolution approach, namely the jDE algorithm have been heavily tested: the pure version of jDE and jDE equipped with solutions mutated with a new operator. The operator uses a symmetric ?-stable distribution variate for modification of the solution coordinates.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 4; 20-30
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cryptographic Protection of Removable Media with a USB Interface for Secure Workstation for Special Applications
Autorzy:
Chudzikiewicz, J.
Furtak, J.
Powiązania:
https://bibliotekanauki.pl/articles/309355.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
filter driver
removable media protection
symmetric and asymmetric encryption
Opis:
This paper describes one of the essential elements of Secure Workstation for Special Applications (SWSA) to cryptographic protection of removable storage devices with USB interface. SWSA is a system designed to process data classified to different security domains in which the multilevel security is used. The described method for protecting data on removable Flash RAM protects data against unauthorized access in systems processing the data, belonging to different security domains (with different classification levels) in which channel the flow of data must be strictly controlled. Only user authenticated by the SWSA can use the removable medium in the system, and the data stored on such media can be read only by an authorized user by the SWSA. This solution uses both symmetric and asymmetric encryption algorithms. The following procedures are presented: creating protected a file (encryption), generating signatures for the file and reading (decryption) the file. Selected elements of the protection systems implementation of removable Flash RAM and the mechanisms used in implementation the Windows have been described.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 22-31
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Parallel Algorithms for Forward and Back Substitution in Linear Algebraic Equations of Finite Element Method
Autorzy:
Fialko, Sergiy
Powiązania:
https://bibliotekanauki.pl/articles/308616.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
finite element method
multithreaded parallelization
sparse symmetric matrices
triangular solution
Opis:
This paper considers several algorithms for parallelizing the procedure of forward and back substitution for high-order symmetric sparse matrices on multi-core computers with shared memory. It compares the proposed approaches for various finite-element problems of structural mechanics which generate sparse matrices of different structures.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 4; 20-29
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Investigation of Vehicular S-LSTM NOMA Over Time Selective Nakagami-m Fading with Imperfect CSI
Autorzy:
Shankar, Ravi
Chaudhary, Bhanu Pratap
Mishra, Ritesh Kumar
Powiązania:
https://bibliotekanauki.pl/articles/2174454.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
inter-symbol interference
MIMO
NOMA
orthogonal frequency division multiplexing
OFDM
S-LSTM
zero-mean circularly symmetric complex Gaussian
ZM-CSCG
Opis:
In this paper, the performance of a deep learningbased multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) system is investigated for 5G radio communication networks. We consider independent and identically distributed (i.i.d.) Nakagami-m fading links to prove that when using MIMO with the NOMA system, the outage probability (OP) and end-to-end symbol error rate (SER) improve, even in the presence of imperfect channel state information (CSI) and successive interference cancellation (SIC) errors. Furthermore, the stacked long short-term memory (S-LSTM) algorithm is employed to improve the system’s performance, even under time-selective channel conditions and in the presence of terminal’s mobility. For vehicular NOMA networks, OP, SER, and ergodic sum rate have been formulated. Simulations show that an S-LSTM-based DL-NOMA receiver outperforms least square (LS) and minimum mean square error (MMSE) receivers. Furthermore, it has been discovered that the performance of the end-to-end system degrades with the growing amount of node mobility, or if CSI knowledge remains poor. Simulated curves are in close agreement with the analytical results.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 4; 47--59
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies