Zeitschriften und Ausgaben

Volumen 22 (2022): Heft 3 (September 2022)

Volumen 22 (2022): Heft 2 (June 2022)

Volumen 22 (2022): Heft 1 (March 2022)

Volumen 21 (2021): Heft 4 (December 2021)

Volumen 21 (2021): Heft 3 (September 2021)

Volumen 21 (2021): Heft 2 (June 2021)

Volumen 21 (2021): Heft 1 (March 2021)

Volumen 20 (2020): Heft 6 (December 2020)
Special Heft on New Developments in Scalable Computing

Volumen 20 (2020): Heft 5 (December 2020)
Special issue on Innovations in Intelligent Systems and Applications

Volumen 20 (2020): Heft 4 (November 2020)

Volumen 20 (2020): Heft 3 (September 2020)

Volumen 20 (2020): Heft 2 (June 2020)

Volumen 20 (2020): Heft 1 (March 2020)

Volumen 19 (2019): Heft 4 (November 2019)

Volumen 19 (2019): Heft 3 (September 2019)

Volumen 19 (2019): Heft 2 (June 2019)

Volumen 19 (2019): Heft 1 (March 2019)

Volumen 18 (2018): Heft 5 (May 2018)
Special Thematic Heft on Optimal Codes and Related Topics

Volumen 18 (2018): Heft 4 (November 2018)

Volumen 18 (2018): Heft 3 (September 2018)

Volumen 18 (2018): Heft 2 (June 2018)

Volumen 18 (2018): Heft 1 (March 2018)

Volumen 17 (2017): Heft 5 (December 2017)
Special Heft With Selected Papers From The Workshop “Two Years Avitohol: Advanced High Performance Computing Applications 2017

Volumen 17 (2017): Heft 4 (November 2017)

Volumen 17 (2017): Heft 3 (September 2017)

Volumen 17 (2017): Heft 2 (June 2017)

Volumen 17 (2017): Heft 1 (March 2017)

Volumen 16 (2016): Heft 6 (December 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016

Volumen 16 (2016): Heft 5 (October 2016)
Heft Title: Special Heft on Application of Advanced Computing and Simulation in Information Systems

Volumen 16 (2016): Heft 4 (December 2016)

Volumen 16 (2016): Heft 3 (September 2016)

Volumen 16 (2016): Heft 2 (June 2016)

Volumen 16 (2016): Heft 1 (March 2016)

Volumen 15 (2015): Heft 7 (December 2015)
Special Heft on Information Fusion

Volumen 15 (2015): Heft 6 (December 2015)
Special Heft on Logistics, Informatics and Service Science

Volumen 15 (2015): Heft 5 (April 2015)
Special Heft on Control in Transportation Systems

Volumen 15 (2015): Heft 4 (November 2015)

Volumen 15 (2015): Heft 3 (September 2015)

Volumen 15 (2015): Heft 2 (June 2015)

Volumen 15 (2015): Heft 1 (March 2015)

Volumen 14 (2014): Heft 5 (December 2014)
Special Heft

Volumen 14 (2014): Heft 4 (December 2014)

Volumen 14 (2014): Heft 3 (September 2014)

Volumen 14 (2014): Heft 2 (June 2014)

Volumen 14 (2014): Heft 1 (March 2014)

Volumen 13 (2013): Heft Special-Heft (December 2013)

Volumen 13 (2013): Heft 4 (December 2013)
The publishing of the present issue (Volumen 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1.

Volumen 13 (2013): Heft 3 (September 2013)

Volumen 13 (2013): Heft 2 (June 2013)

Volumen 13 (2013): Heft 1 (March 2013)

Volumen 12 (2012): Heft 4 (December 2012)

Volumen 12 (2012): Heft 3 (September 2012)

Volumen 12 (2012): Heft 2 (June 2012)

Volumen 12 (2012): Heft 1 (March 2012)

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

Volumen 18 (2018): Heft 5 (May 2018)
Special Thematic Heft on Optimal Codes and Related Topics

Zeitschriftendaten
Format
Zeitschrift
eISSN
1314-4081
Erstveröffentlichung
13 Mar 2012
Erscheinungsweise
4 Hefte pro Jahr
Sprachen
Englisch

Suche

9 Artikel
Uneingeschränkter Zugang

Preface

Online veröffentlicht: 26 May 2018
Seitenbereich: 3 - 3

Zusammenfassung

Abstract

This volume contains selected papers from the Eighth International Workshop on Optimal Codes and Related Topics (OCRT’2017) organized as minisymposium during the conference Mathematical days in Sofia (10-14 July 2017). This workshop was organized by the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences. There were 37 participants and 26 contributed talks.

Uneingeschränkter Zugang

On Tight Optimal Conflict-Avoiding Codes for 3, 4, 5 and 6 Active Users

Online veröffentlicht: 26 May 2018
Seitenbereich: 5 - 11

Zusammenfassung

Abstract

We classify tight optimal conflict-avoiding codes of weights 3, 4, 5 and 6 and given small lengths.

Schlüsselwörter

  • Conflict-avoiding codes
  • tight optimal codes
  • protocol sequences
Uneingeschränkter Zugang

Software Approaches and Methods to Ensure the Security of Interactive Systems

Online veröffentlicht: 26 May 2018
Seitenbereich: 12 - 20

Zusammenfassung

Abstract

In the paper are studied methods for protection of interactive systems and digital archives against unauthorized distribution of digital content. We make an overview of steganographic methods and image protection schemes. An improved watermark error correction scheme is presented. The studies contribute to the overall development of the North+region, provide future generations with widespread public access to digital materials. We achieve a long-term storage, secure data protection and interactive web presence.

Schlüsselwörter

  • Data protection
  • watermarking
  • error-correcting codes
Uneingeschränkter Zugang

Parallel Fast Walsh Transform Algorithm and Its Implementation with CUDA on GPUs

Online veröffentlicht: 26 May 2018
Seitenbereich: 21 - 43

Zusammenfassung

Abstract

Some of the most important cryptographic characteristics of the Boolean and vector Boolean functions (nonlinearity, autocorrelation, differential uniformity) are connected with the Walsh spectrum. In this paper, we present several algorithms for computing the Walsh spectrum implemented in CUDA for parallel execution on GPU. They are based on the most popular sequential algorithm. The algorithms differ in the complexity of implementations, resources used, optimization strategies and techniques. In the end, we give some experimental results.

Schlüsselwörter

  • Walsh transform
  • CUDA C
  • GPU
  • Fast Walsh transform
  • Parallel algorithms
Uneingeschränkter Zugang

About an Approach for Constructing Combinatorial Objects

Online veröffentlicht: 26 May 2018
Seitenbereich: 44 - 53

Zusammenfassung

Abstract

The classification of combinatorial objects consists of two sub-problems – construction of objects with given properties and rejection of isomorphic objects. In this paper, we consider generation of combinatorial objects that are uniquely defined by a matrix. The method that we present is implemented by backtrack search. The used approach is close to dynamic programming.

Schlüsselwörter

  • Partitioning of integers
  • generating combinatorial objects
  • backstrack search
Uneingeschränkter Zugang

On Almost Complete Caps in PG(N, q)

Online veröffentlicht: 26 May 2018
Seitenbereich: 54 - 62

Zusammenfassung

Abstract

We propose the concepts of almost complete subset of an elliptic quadric in the projective space PG(3, q) and of almost complete cap in the space PG(N, q), N ≥ 3, as generalizations of the concepts of almost complete subset of a conic and of almost complete arc in PG(2, q). Upper bounds of the smallest size of the introduced geometrical objects are obtained by probabilistic and algorithmic methods.

Schlüsselwörter

  • Projective space
  • complete cap
  • complete arc
  • almost complete cap
  • almost complete arc
Uneingeschränkter Zugang

New Results on Binary Codes Obtained by Doubling Construction

Online veröffentlicht: 26 May 2018
Seitenbereich: 63 - 76

Zusammenfassung

Abstract

Binary codes created by doubling construction, including quasi-perfect ones with distance d = 4, are investigated. All [17·2r−6, 17·2r−6 − r, 4] quasi-perfect codes are classified. Weight spectrum of the codes dual to quasi-perfect ones with d = 4 is obtained. The automorphism group Aut(C) of codes obtained by doubling construction is studied. A subgroup of Aut(C) is described and it is proved that the subgroup coincides with Aut(C) if the starting matrix of doubling construction has an odd number of columns. (It happens for all quasi-perfect codes with d = 4 except for Hamming one.) The properness and t-properness for error detection of codes obtained by doubling construction are considered.

Schlüsselwörter

  • Linear binary codes
  • doubling construction
  • quasi-perfect codes
  • automorphism group of a code
  • proper and t-proper codes
Uneingeschränkter Zugang

Sequential Decoding on Syndrome Trellises for Nonparametric Detection

Online veröffentlicht: 26 May 2018
Seitenbereich: 77 - 86

Zusammenfassung

Abstract

The following paper adapts the classical Zigangirov-Jelinek algorithm to the decoding of nonbinary block codes under severe mixed jamming. To ensure reliable communications in this scenario we combine reception techniques based on distribution free statistical tests with sequential decoding on syndrome trellises. It will be shown that the proposed approach can ensure relatively high transmission rate with reasonable complexity.

Schlüsselwörter

  • Nonparametric detection
  • syndrome trellis
  • sequential decoding
  • decoding complexity
Uneingeschränkter Zugang

On the Classification of Splitting (v, u×c, λ) BIBDs

Online veröffentlicht: 26 May 2018
Seitenbereich: 87 - 94

Zusammenfassung

Abstract

The (v, u×c, λ)-splitting balanced incomplete block designs correspond to c-splitting authentication codes. We classify splitting balanced incomplete block designs with definite parameters.

Schlüsselwörter

  • Splitting balanced incomplete block design
  • splitting authentication code
9 Artikel
Uneingeschränkter Zugang

Preface

Online veröffentlicht: 26 May 2018
Seitenbereich: 3 - 3

Zusammenfassung

Abstract

This volume contains selected papers from the Eighth International Workshop on Optimal Codes and Related Topics (OCRT’2017) organized as minisymposium during the conference Mathematical days in Sofia (10-14 July 2017). This workshop was organized by the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences. There were 37 participants and 26 contributed talks.

Uneingeschränkter Zugang

On Tight Optimal Conflict-Avoiding Codes for 3, 4, 5 and 6 Active Users

Online veröffentlicht: 26 May 2018
Seitenbereich: 5 - 11

Zusammenfassung

Abstract

We classify tight optimal conflict-avoiding codes of weights 3, 4, 5 and 6 and given small lengths.

Schlüsselwörter

  • Conflict-avoiding codes
  • tight optimal codes
  • protocol sequences
Uneingeschränkter Zugang

Software Approaches and Methods to Ensure the Security of Interactive Systems

Online veröffentlicht: 26 May 2018
Seitenbereich: 12 - 20

Zusammenfassung

Abstract

In the paper are studied methods for protection of interactive systems and digital archives against unauthorized distribution of digital content. We make an overview of steganographic methods and image protection schemes. An improved watermark error correction scheme is presented. The studies contribute to the overall development of the North+region, provide future generations with widespread public access to digital materials. We achieve a long-term storage, secure data protection and interactive web presence.

Schlüsselwörter

  • Data protection
  • watermarking
  • error-correcting codes
Uneingeschränkter Zugang

Parallel Fast Walsh Transform Algorithm and Its Implementation with CUDA on GPUs

Online veröffentlicht: 26 May 2018
Seitenbereich: 21 - 43

Zusammenfassung

Abstract

Some of the most important cryptographic characteristics of the Boolean and vector Boolean functions (nonlinearity, autocorrelation, differential uniformity) are connected with the Walsh spectrum. In this paper, we present several algorithms for computing the Walsh spectrum implemented in CUDA for parallel execution on GPU. They are based on the most popular sequential algorithm. The algorithms differ in the complexity of implementations, resources used, optimization strategies and techniques. In the end, we give some experimental results.

Schlüsselwörter

  • Walsh transform
  • CUDA C
  • GPU
  • Fast Walsh transform
  • Parallel algorithms
Uneingeschränkter Zugang

About an Approach for Constructing Combinatorial Objects

Online veröffentlicht: 26 May 2018
Seitenbereich: 44 - 53

Zusammenfassung

Abstract

The classification of combinatorial objects consists of two sub-problems – construction of objects with given properties and rejection of isomorphic objects. In this paper, we consider generation of combinatorial objects that are uniquely defined by a matrix. The method that we present is implemented by backtrack search. The used approach is close to dynamic programming.

Schlüsselwörter

  • Partitioning of integers
  • generating combinatorial objects
  • backstrack search
Uneingeschränkter Zugang

On Almost Complete Caps in PG(N, q)

Online veröffentlicht: 26 May 2018
Seitenbereich: 54 - 62

Zusammenfassung

Abstract

We propose the concepts of almost complete subset of an elliptic quadric in the projective space PG(3, q) and of almost complete cap in the space PG(N, q), N ≥ 3, as generalizations of the concepts of almost complete subset of a conic and of almost complete arc in PG(2, q). Upper bounds of the smallest size of the introduced geometrical objects are obtained by probabilistic and algorithmic methods.

Schlüsselwörter

  • Projective space
  • complete cap
  • complete arc
  • almost complete cap
  • almost complete arc
Uneingeschränkter Zugang

New Results on Binary Codes Obtained by Doubling Construction

Online veröffentlicht: 26 May 2018
Seitenbereich: 63 - 76

Zusammenfassung

Abstract

Binary codes created by doubling construction, including quasi-perfect ones with distance d = 4, are investigated. All [17·2r−6, 17·2r−6 − r, 4] quasi-perfect codes are classified. Weight spectrum of the codes dual to quasi-perfect ones with d = 4 is obtained. The automorphism group Aut(C) of codes obtained by doubling construction is studied. A subgroup of Aut(C) is described and it is proved that the subgroup coincides with Aut(C) if the starting matrix of doubling construction has an odd number of columns. (It happens for all quasi-perfect codes with d = 4 except for Hamming one.) The properness and t-properness for error detection of codes obtained by doubling construction are considered.

Schlüsselwörter

  • Linear binary codes
  • doubling construction
  • quasi-perfect codes
  • automorphism group of a code
  • proper and t-proper codes
Uneingeschränkter Zugang

Sequential Decoding on Syndrome Trellises for Nonparametric Detection

Online veröffentlicht: 26 May 2018
Seitenbereich: 77 - 86

Zusammenfassung

Abstract

The following paper adapts the classical Zigangirov-Jelinek algorithm to the decoding of nonbinary block codes under severe mixed jamming. To ensure reliable communications in this scenario we combine reception techniques based on distribution free statistical tests with sequential decoding on syndrome trellises. It will be shown that the proposed approach can ensure relatively high transmission rate with reasonable complexity.

Schlüsselwörter

  • Nonparametric detection
  • syndrome trellis
  • sequential decoding
  • decoding complexity
Uneingeschränkter Zugang

On the Classification of Splitting (v, u×c, λ) BIBDs

Online veröffentlicht: 26 May 2018
Seitenbereich: 87 - 94

Zusammenfassung

Abstract

The (v, u×c, λ)-splitting balanced incomplete block designs correspond to c-splitting authentication codes. We classify splitting balanced incomplete block designs with definite parameters.

Schlüsselwörter

  • Splitting balanced incomplete block design
  • splitting authentication code

Planen Sie Ihre Fernkonferenz mit Scienceendo