User profiles for Vasyl Rabyk

Vasyl Rabyk, Рабик Василь Григорович

associate professor, Ivan Franko National University of Lviv, Львівський національний …
Verified email at lnu.edu.ua
Cited by 274

Hardware implementation of sigmoid activation functions using FPGA

I Tsmots, O Skorokhoda, V Rabyk - 2019 IEEE 15th …, 2019 - ieeexplore.ieee.org
The methods of approximation of the sigmoid function are developed and modified, using
piecewise linear approximation and approximation by a second order polynomial. The …

Hardware components for nonlinear neuro-like data protection in mobile smart systems

…, V Teslyuk, Y Opotyak, V Rabyk - 2022 IEEE 17th …, 2022 - ieeexplore.ieee.org
Rapid grows and expansion smart systems application, wide use data transmission networks
require cryptographic protection of such data. Graph model of nonlinear neuro-like data …

Design of the processors for fast cosine and sine Fourier transforms

I Tsmots, V Rabyk, N Kryvinska, M Yatsymirskyy… - Circuits, Systems, and …, 2022 - Springer
To solve large number of digital signal processing problems, such as on-board radar-location
or hydro-acoustic systems, it is necessary to perform discrete trigonometric transforms over …

Structure and software model of a parallel-vertical multi-input adder for FPGA implementation

I Tsmots, O Skorokhoda, V Rabyk - 2016 XIth International …, 2016 - ieeexplore.ieee.org
In this paper parallel-vertical approach to realization of group summation has been
analyzed. Analytical expression for synthesis of a 7-input single-digit adder have been …

Implementation of FPGA-based barker's-like codes

I Tsmots, O Riznyk, V Rabyk, Y Kynash… - Lecture Notes in …, 2020 - Springer
Pseudorandom code sequences with a low level of side lobe autocorrelation function have
been used in radars, communication systems and information security. The results of the …

Method of synthesis and practical realization of quasi-barker codes

I Tsmots, V Rabyk, O Riznyk… - 2019 IEEE 14th …, 2019 - ieeexplore.ieee.org
The work is consided the method of obtaining quasi-barker codes based on numerical
rulers namely bundles. Their advantages, basic parameters and areas of use are given. The …

Simulation Model of Cryptographic Data Protection Based on a Neural-Like Network with Nonlinear Synaptic Connections

…, R Tkachenko, V Teslyuk, V Rabyk… - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
A method of cryptographic data protection using neural-like networks based on the model of
geometric transformations is proposed. Algorithms for non-iterative training of neural-like …

Floating-Point Number Scalar Product Hardware Implementation for Embedded Systems

I Tsmots, V Rabyk, V Teslyuk… - 2023 17th International …, 2023 - ieeexplore.ieee.org
An algorithm for calculating the scalar product of operands in floating-point format using a
table-algorithmic method and an algorithm for forming tables of macro-partial products are …

Designing features of hardware and software tools for intelligent processing of intensive data streams

…, O Skorokhoda, T Tesliuk, V Rabyk - 2016 IEEE First …, 2016 - ieeexplore.ieee.org
Requirements and design phases of hardware and software intellectual processing of
intensive data streams in real time have been examined. Design principles of hardware and …

Implementation of Base Components of Neuro-like Cryptographic Data Protection Systems on FPGA

I Tsmots, V Rabyk, R Tkachenko… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
The implementation of the base components of neuro-like cryptographic data protection
systems using FPGA is considered. The structure of the data encryption module using …