PRACTICAL CLASSIFICATION TOPOLOGICAL STRUCTURES OF COMMUNICATION NETWORKS FOR MULTIPROCESSOR COMPUTER SYSTEMS
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2017, Vol 2, Issue 6
Abstract
Proposed by the working version of practical classification topological structures of communication networks for multiprocessor computer systems. Any n-dimensional non-full mesh structure presented here as the result of some operations on any basic graph of the set, including one-dimensional non-full mesh simple graphs and n-dimensional realization of the generalized full mesh structure. The main classification criterion, which was refined earlier, is the notion of dimension topological structure that eliminates the shortcomings and contradictions of the, well-known, authors such classifications.
Authors and Affiliations
Oleksii Тyrtyshnikov, Maryna Mavrina, Yuri Korzh
ОБЗОР ПРОТОКОЛОВ КОНСЕНСУСА ПРИМЕНЯЕМЫХ В ТЕХНОЛОГИЯХ БЛОКЧЕЙН
Рассмотрены категории популярных проколов консенсуса: Proof of Work и его гибриды, Proof of Stake (включает LPoS, Proof of Importance) и гибриды, DAGs и его разновидности. В статье описаны их алгоритмы, характеристики, о...
PROPOSALS OF COMPARATIVE ANALYSIS AND DECISION MAKING DURING THE COMPETITION REGARDING THE CERTAIN BENEFITS OF ASYMMETRIC POST QUANTUM CRYPTOGRAPHIC PRIMITIVES
The paper considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of system u...
Code-Based Public-Key Cryptosystems: the current state, the existing contradictions and prospects of practical use for the post-quantum period
Discusses the asymmetric cryptosystem based on algebraic coding, are investigated with temporary status, controversies and prospects of practical use for the post-quantum period. We propose a new scheme of crypto-transfo...
The algebraic immunity of nonlinear nodes symmetric ciphers
Researched methods for computing algebraic immunity cryptographic Boolean functions and nonlinear knots of replacements (substitutions) of symmetric ciphers. The presented results of a comparative analysis algebraic imm...
ДИСПЕРСИОННЫЙ АНАЛИЗ СЕТЕВОГО ТРАФИКА ДЛЯ ОБНАРУЖЕНИЯ ВТОРЖЕНИЙ В SMART GRIDS
Рассматриваются системы обнаружения и предотвращения вторжений в современных теле-коммуникационных системах и сетях. Исследуются методы мониторинга событий, состоящие в анализе сетевой активности отдельных служб и информ...