Cryptautomata: definition, cryptanalysis, example for encryption. The
operation (functioning) of any
network Nk in the discrete time is described by the canonical
Analysis of Non-preemptive Scheduling for 5G Network Model Within Slicing Framework for mobile
networks operators allowing significant changes in their range of services and daily
operations Modeling the utilization of a multi-tenant band in 3GPP LTE system with Licensed Shared Access network operator). At any point of time, the frequency bands can be utilized by only a single party
A combined method for variational inequalities with monotone operatorsA relaxation iterative
method is suggested for variational inequalities whose basic
operator Methodology for studying the influence of face rotation angle on the face detection accuracy gradients and the
method based on convolutional neural
networks were selected. The angles of head tilt
The effect of the neural activity on topological properties of growing neural networks growth
network not depending on
network’s activity. By using the random graphs theory
methods