Search Results

1 - 10 of 81 items :

  • "Bratislava" x
  • Mathematics x
Clear All
On Partitions and Periodic Sequences

Analytic Number Theory. Nauka, Moscow, 1971; English transl.: Amer. Math. Soc., Vol. 68, Providence, RI, 1981. (In Russian) [PAS] PAŠTÉKA, M.: Density and related topics, Veda, Bratislava; Academia, Prague, 2017. [PAS1] _____ On four approaches to density, Veda, Bratislava, Peter Lang, Frankfurt am Main, 2013. [PAS2] _____ Remarks on one type of uniform distribution, Unif. Distrib. Theory 2 (2007), 79–92. [Ra] RAUZY, G.: Propriétés statistique de suites arithmétiques . Collection SUP, Le Mathématicien 15, Presses Universitaires de France

Open access
Tatra Mountains Mathematical Publications
The Journal of Slovak Academy of Sciences
Open access
Cryptanalysis of the Columnar Transposition Using Meta-Heuristics

in Cryptanalysis). Aegean Park Press, Laguna Hills, California, 1976. [10] KVASNIČKA, V.—POSPÍCHAL, J.—TIŇO, P.: Evolučné algoritmy .Vydavateľstvo STU, Bratislava, 2000. [11] LASRY, G.: A Methodology of Cryptanalysis of Classical Ciphers with Search meta-heuristics . PhD. Thesis, Kassel University, 2017. [12] MATTHEWS, R. A. J.: The Use of Genetic Algorithms in Cryptanalysis , Cryptologia, 17 (1993), n. 2, 187–201. [13] ÓLAFSSON, S.: Metaheuristics . In: Handbooks in Operations Research and Management Science Vol. 13 , 2006, pp. 633

Open access
A Three–Level Aggregation Model for Evaluating Software Usability by Fuzzy Logic

Journal of General Systems 30 (2): 133–154. Kacprzyk, J., Yager, R.R. and Zadrożny S. (2000). A fuzzy logic based approach to linguistic summaries of databases, International Journal of Applied Mathematics and Computer Science 10 (4): 813–834. Králiková, L. (2017). Testovanie efektívnosti softvéru v podnikovej praxi z hľadiska užívateľov (Software Effectiveness Testing in Business Practice from a User Perspective) , Master thesis, University of Economics in Bratislava, Bratislava. Likert, R. (1932). A technique for the measurement of attitudes

Open access
Convergence of the Numerical Scheme for Regularised Riemannian Mean Curvature Flow Equation

] ______ Co-volume level set method in subjective surface based medical image segmentation, in: Handbook of Medical Image Analysis: Segmentation and Registration Models (J. Suri et al., eds.), Springer, New York, 2005, pp. 583–626. [5] MIKULA, K.—RAMAROSY, N.: Semi-implicit finite volume scheme for solving nonlinear diffusion equations in image processing, Numer. Math. 89 (2001), 561–590. [6] TIBENSKÝ, M.: Využitie Metód Založených na Level Set Rovnici v Spracovaní Obrazu. Faculty of mathematics, physics and informatics, Comenius University, Bratislava

Open access
Application and Misapplication of the Czechoslovak STP Cipher During WWII
(Report on an Unpublished Manuscript)

-1943], Karolinum, ´Ustav mezinárodn´ıch vztah˚u, Praha, 1997. (In Czech) [23] MORAVEC, F.: Špi´on jemuˇz nevĕŘili. [A Spy Who Was Not Believed], Leda, Praha, 2014. (In Czech) [24] PORUBSKÝ, Š.: STP cipher of the Czechoslovak in-exile Ministry of Defence in London during WWII, in: Proceedings of EuroHCC’17, 3rd European Historical Ciphers Colloquium, 2017, Smolenice Castle, Slovakia (J. von zurGathen et al., eds.), Slovak University of Technology in Bratislava, 2017, pp. 47-66. [25] Lieutenant colonel Karol Cigáˇn-an embittered

Open access
Evolutionary Computation in Cryptanalysis of Classical Ciphers

References [1] American National Corpus Project [2] ANTAL, E.: Modern Cryptanalysis of Classical Ciphers. PhD Thesis, Slovak University of Technology, Bratislava, 2017. (In Slovak) [3] ANTAL, E.-VARGA, J.: Zodiac, In:Mikul´aˇssk´a kryptobes´ıdka, 2010; Sborn´ık pˇr´ıspˇevk˚u, Praha, 2.-3. 12. 2010. Praha: Trusted Network Solutions 2010, pp. 89-90. (In Slovak) [4] CLARK, A. J.: Optimisation Heuristics for Cryptology. PhD Thesis, Queensland University of

Open access
Steganalysis of StegoStorage system

References [1] KOŠDY, M.: Steganographic File System Based on JPEG Files: Master’s Thesis. FEI STU, Bratislava, 2013. [2] BÖHME, R.: Advanced Statistical Steganalysis. Springer-Verlag, Berlin, 2010. [3] ZHANG, W.-LI, S.: Security measurements of steganographic systems, in: Proc. of the 2nd Internat. Conf. Applied Cryptography and Network Security-ACNS ’04 (M. Jakobsson et al., eds.), Yellow Mountain, China, 2004, Lecture Notes in Comput. Sci., Vol. 3089, Springer-Verlag, Berlin, 2004, pp. 194

Open access
Stability Properties of a Discretized Neutral Delay Differential Equation

switches in linear scalar neutral delay equation, Funkcial. Ekvac. 34 (1991), 187-209. [5] GUGLIELMI, N.: Delay dependent stability regions of Θ -methods for delay differential equations, IMA J. Numer. Anal. 18 (1998), 399-418. [6] HRABALOVÁ, J.: On stability intervals of Euler methods for a delay differential equation, in: Proc. of APLIMAT-11th Internat. Conf. on Appl. Math. (M. Kováčová, ed.), 2012, Bratislava, STU Bratislava, pp. 153-160. [7] KOLMANOVSKII, V.-MYSHKIS, A.: Introduction to the Theory and

Open access