Data Set Used
This paper shows the potential of neural networks based on the Adaptive Resonance Theory as tools that generate warning signals when bankruptcy of a company is expected (bankruptcy prediction problem). Using that class of neural networks is still unexplored to date. We examined four of the most popular networks of the class – fuzzy, distributed, instance… (More)
The genus Aphalloides Dollfus, Chabaud & Golvan, 1957 consists of two species parasitic in the body cavity of sand gobies. Its systematic position in the superfamily Opisthorchioidea Looss, 1899 is unresolved and it has been placed by various authors in three families, i.e. Cryptogonimidae Ward, 1917, Heterophyidae Leiper, 1909 and Opisthorchiidae Looss,… (More)
The need of software-flexible stream ciphers has led to several alternative proposals in the last few years. One of them is a new Pseudo Random Number Generator (PRNG), named N-adic Summation-Shrinking (NSumSG), which architecture is described in this paper. It uses N-1 parallel working slave summation generators and one N-adic summation generator,… (More)
We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and substitution and Duffing map based on substitution. Comprehensive security analysis has been performed on the designed scheme using key space analysis, visual testing, histogram analysis, information entropy calculation, correlation coefficient analysis,… (More)
The article suggests a formal model of Distributed Database Management Systems (DDBMS) and an approach for Distributed Database Systems (DDB) modeling. It is suggested to use general purpose system simulation (GPSS) for simulation modeling. Queuing systems models modelling the execution of two-phase locking (2PL) in DDB with Data replication are suggested:… (More)
This paper discusses recent attacks against summation, shrinking and self-shrinking stream ciphers. Some attacks against shrinking stream cipher are applicable also against self-shrinking stream cipher.