Secure two-way on-line communication by using quasigroup enciphering with almost public key.
The article focuses on the application of the segmentation algorithm based on the numerical solution of the Allen-Cahn non-linear diffusion partial differential equation. This equation is related to the motion of curves by mean curvature. It exhibits several suitable mathematical properties including stable solution profile. This allows the user to follow accurately the position of the segmentation curve by bringing it quickly to the vicinity of the segmented object and by approaching the details...
This paper describes an analytical study of open two-node (tandem) network models with blocking and truncation. The study is based on semi-Markov process theory, and network models assume that multiple servers serve each queue. Tasks arrive at the tandem in a Poisson fashion at the rate λ, and the service times at the first and the second node are nonexponentially distributed with means sA and sB , respectively. Both nodes have buffers with finite capacities. In this type of network, if the second...
Fehr et al. (2010) proposed the first sender-equivocable encryption scheme secure against chosen-ciphertext attacks (NCCCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attacks (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attacks of a new primitive, the “crossauthentication code”. However, the security of the cross-authentication code cannot be guaranteed when all the keys used in the code are exposed. Our...
The paper investigates the sensitivity of safe ship control to inaccurate data from the ARPA anti-collision radar system and to changes in the process control parameters. The system structure of safe ship control in collision situations and computer support programmes exploring information from the ARPA anti-collision radar are presented. Sensitivity characteristics of the multistage positional non-cooperative and cooperative game and kinematics optimization control algorithms are determined through...
When proposing and processing uncertainty decision-making algorithms of various kinds and purposes, we more and more often meet probability distributions ascribing non-numerical uncertainty degrees to random events. The reason is that we have to process systems of uncertainties for which the classical conditions like -additivity or linear ordering of values are too restrictive to define sufficiently closely the nature of uncertainty we would like to specify and process. In cases of non-numerical...
Sampling theory for multi-band signals is shown to have a logical structure similar to that of Fourier analysis.
The aim is to reconstruct a signal function x ∈ L₂ if the phase of the Fourier transform [x̂] and some additional a-priori information of convex type are known. The problem can be described as a convex feasibility problem. We solve this problem by different Fejér monotone iterative methods comparing the results and discussing the choice of relaxation parameters. Since the a-priori information is partly related to the spectral space the Fourier transform and its inverse have to be applied in each...
Signals generated in circuits that include nano-structured elements typically have strongly distinct characteristics, particularly the hysteretic distortion. This is due to memristance, which is one of the key electronic properties of nanostructured materials. In this article, we consider signals generated from a memrsitive circuit model. We demonstrate numerically that such signals can be efficiently represented in certain custom-designed nonorthogonal bases. The proposed method ensures that the...
The 2010 study of the Shannon entropy of order nine Sudoku and Latin square matrices by Newton and DeSalvo [Proc. Roy. Soc. A 2010] is extended to natural magic and Latin squares up to order nine. We demonstrate that decimal and integer measures of the Singular Value sets, here named SV clans, are a powerful way of comparing different integer squares. Several complete sets of magic and Latin squares are included, including the order eight Franklin subset which is of direct relevance...
This paper is concerned with the fusion of information from process data and process connectivity and its subsequent use in fault diagnosis and process hazard assessment. The Signed Directed Graph (SDG), as a graphical model for capturing process topology and connectivity to show the causal relationships between process variables by material and information paths, has been widely used in root cause and hazard propagation analysis. An SDG is usually built based on process knowledge as described by...