Articles with "number systems" as a keyword



Number systems over orders

Sign Up to like & get
recommendations!
Published in 2018 at "Monatshefte Fur Mathematik"

DOI: 10.1007/s00605-018-1191-x

Abstract: Let $${\mathbb {K}}$$K be a number field of degree k and let $${\mathcal {O}}$$O be an order in $${\mathbb {K}}$$K. A generalized number system over$${\mathcal {O}}$$O (GNS for short) is a pair $$(p,{\mathcal {D}})$$(p,D) where… read more here.

Keywords: mathcal mathcal; finiteness property; systems orders; number systems ... See more keywords

Symbolic Plithogenic Numbers in RSA Cryptography: A Path to Post-Quantum Security

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3620040

Abstract: The RSA algorithm, with its strong mathematical foundation rooted in number theory and its wide range of applications in secure communication, is one of the most widely used public-key encryption methods. However, advancements in classical… read more here.

Keywords: number systems; plithogenic numbers; cryptography; symbolic plithogenic ... See more keywords

A Survey and Comparative Analysis of Number Systems for Deep Neural Networks

Sign Up to like & get
recommendations!
Published in 2025 at "Proceedings of the IEEE"

DOI: 10.1109/jproc.2025.3578756

Abstract: Deep neural networks (DNNs) are indispensable in various artificial intelligence (AI) applications. However, their inherent complexity presents significant challenges, particularly when deploying them on resource-constrained devices. To overcome these hurdles, academia and industry are actively… read more here.

Keywords: number systems; survey; dnn performance; deep neural ... See more keywords

A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2020.3016842

Abstract: Cyber deception is one of the key approaches used to mislead attackers by hiding or providing inaccurate system information. There are two main factors limiting the real-world application of existing cyber deception approaches. The first… read more here.

Keywords: theoretic approach; private game; number systems; game theoretic ... See more keywords

Application of character estimates to the number of ????2-systems of the alternating group

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Group Theory"

DOI: 10.1515/jgth-2019-2049

Abstract: Abstract We use character theory and character estimates to show that the number of T2{T_{2}}-systems of the alternating group An{A_{n}} is at least 18⁢n⁢3⁢exp⁡(2⁢π6⁢n1/2)⁢(1+o⁢(1)).\frac{1}{8n\sqrt{3}}\exp\biggl{(}\frac{2\pi}{\sqrt{6}}n^{1/2}\biggr{)}(1+o(1)). Applying this result, we obtain a lower bound for the number… read more here.

Keywords: systems alternating; group; number systems; number ... See more keywords