Results 61 to 70 of about 12,980 (220)

On the Algebraic Immunity of Boolean Function

open access: yesTELKOMNIKA Indonesian Journal of Electrical Engineering, 2014
In view of the construction requirements of Boolean functions with many good cryptography properties, through the analysis of the relationship between the function values on the vectors with weight not more than d  and the algebraic immunity, a method to determine the higher order algebraic immunity function is given.
Cao Hao, Wang Huige
openaire   +1 more source

Glymphatic dysfunction couples with cortical excitation–inhibition imbalance in epilepsy: Evidence from Rasmussen encephalitis

open access: yesEpilepsia, EarlyView.
Cong Fu et al. demonstrate that glymphatic system dysfunction is linked to enhanced inhibitory cortical activity using diffusion MRI and EEG. These findings highlight a mechanistic link between perivascular fluid dynamics and neuronal activity, suggesting a role for glymphatic function in maintaining cortical stability in epilepsy.
Cong Fu   +11 more
wiley   +1 more source

Random Chemostats with Competition and Different Kinetics to Investigate the Growth of the Gut Microbiome

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT We investigate some chemostat models incorporating wall growth, competition, random fluctuations on the dilution rate, and different consumption functions (Monod and Haldane). We analyze the asymptotic behavior of the solutions of the corresponding random differential systems to establish conditions on the model parameters under which the ...
Javier López‐de‐la‐Cruz   +2 more
wiley   +1 more source

A Graph Theoretic Approach to Construct Desired Cryptographic Boolean Functions

open access: yesAxioms, 2019
In this paper, we present four product operations to construct cryptographic boolean functions from smaller ones with predictable Walsh spectrum. A lot of cryptographic properties of boolean functions can be presented by their Walsh spectrum.
Modjtaba Ghorbani   +3 more
doaj   +1 more source

Mathematical Analysis and Simulations of a Cancer Model With Interleukins and Delayed Immunotherapy

open access: yesMathematical Methods in the Applied Sciences, EarlyView.
ABSTRACT A new system of delayed differential equations for tumor‐immune system interactions is proposed and studied. The system describes the interactions between tumor cells and the immune system at the most aggressive phase of cancer, where tumor cells have developed mechanisms from earlier stages to evade immune responses.
Laid Boudjellal   +2 more
wiley   +1 more source

Hybrid tabu search algorithm for excellent Boolean function

open access: yesTongxin xuebao, 2022
Boolean function in symmetric cryptographic algorithm must satisfy excellent cryptographic criteria to ensure the security of the algorithm.By combining the advantages of tabu search algorithm and hill climbing algorithm, a new heuristic generation ...
Weiqiong WANG   +3 more
doaj   +2 more sources

Optimal Control of Tuberculosis: A Review

open access: yes, 2014
We review the optimal control of systems modeling the dynamics of tuberculosis. Time dependent control functions are introduced in the mathematical models, representing strategies for the improvement of the treatment and cure of active infectious and/or ...
Silva, Cristiana J.   +1 more
core   +1 more source

An Innovative Approach to Multi‐Valued Logic

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
The current generation of computer systems operates on the principles of binary logic, which encompasses both logical and arithmetic operations. However, silicon technology has reached its peak performance, prompting researchers to explore alternative methods for enhancing computational efficiency. One such method is the adoption of Multi‐Valued Logic (
Ali Mokhtari, Peyman Kabiri
wiley   +1 more source

Constructing Two Classes of Boolean Functions With Good Cryptographic Properties

open access: yesIEEE Access, 2019
Wu et al. proposed a generalized Tu-Deng conjecture over $\mathbb {F}_{2^{rm}}\times {\mathbb {F}_{2^{m}}}$ , and constructed Boolean functions with good properties. However the proof of the generalized conjecture is still open.
Yindong Chen   +3 more
doaj   +1 more source

Multiscale model for the effects of adaptive immunity suppression on the viral therapy of cancer

open access: yes, 2013
Oncolytic virotherapy - the use of viruses that specifically kill tumor cells - is an innovative and highly promising route for treating cancer. However, its therapeutic outcomes are mainly impaired by the host immune response to the viral infection.
Ferreira, Silvio C   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy