2018
DOI: 10.1007/978-3-319-96755-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Fraktal and Differential Properties of the Inversor of Digits of Q s-Representation of Real Number

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 12 publications
0
7
0
1
Order By: Relevance
“…Indeed conventional type-I [1][2][3][4][5] or type-II [4][5][6] formulations of the seesaw mechanism lead typically to Majorana neutrinos, irrespective of whether the seesaw is realized at high or at low mass scale, in the spirit of the models considered in [7]. Until the observation of neutrinoless double beta decay [8] becomes unambiguously confirmed [9] the possibility remains that neutrinos can be Dirac particles after all.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed conventional type-I [1][2][3][4][5] or type-II [4][5][6] formulations of the seesaw mechanism lead typically to Majorana neutrinos, irrespective of whether the seesaw is realized at high or at low mass scale, in the spirit of the models considered in [7]. Until the observation of neutrinoless double beta decay [8] becomes unambiguously confirmed [9] the possibility remains that neutrinos can be Dirac particles after all.…”
Section: Introductionmentioning
confidence: 99%
“…Automation of the modern technological processes leads to the creation of the complex dynamic models. The behavior of such models has a fractal structure [5]. Many processes are described by nonlinear dynamical systems of complex structure that have global attractors [6][7][8].…”
Section: Mathematical Model Of the Production Process Management System Of An Industrial Enterprisementioning
confidence: 99%
“…Thus, a channel is called hidden if it was not specifically designed and was not originally designed to transmit information in an electronic data processing system, such channels include digital steganography algorithms in spatial and frequency domains based on the impossibility ("weakness" of perception of information as visual system and the human auditory system). Such a container can be images (images, videos), audio and text files [11][12][13][14].. Crypto-infrastructure with a loophole (Backdoor, Trapdoor) is an algorithm that contains some hidden structure (loophole) that ensures the existence of a hidden channel of information transmission; knowledge of this structure allows you to get secret information (for example, about the secret key). Without knowledge of the loophole, the algorithm seems reliable.…”
Section: Literature Analysis and Problem Statementmentioning
confidence: 99%