User profiles for Vasyl Rabyk
![]() | Vasyl Rabyk, Рабик Василь Григоровичassociate professor, Ivan Franko National University of Lviv, Львівський національний … Verified email at lnu.edu.ua Cited by 274 |
Hardware implementation of sigmoid activation functions using FPGA
The methods of approximation of the sigmoid function are developed and modified, using
piecewise linear approximation and approximation by a second order polynomial. The …
piecewise linear approximation and approximation by a second order polynomial. The …
Hardware components for nonlinear neuro-like data protection in mobile smart systems
Rapid grows and expansion smart systems application, wide use data transmission networks
require cryptographic protection of such data. Graph model of nonlinear neuro-like data …
require cryptographic protection of such data. Graph model of nonlinear neuro-like data …
Design of the processors for fast cosine and sine Fourier transforms
To solve large number of digital signal processing problems, such as on-board radar-location
or hydro-acoustic systems, it is necessary to perform discrete trigonometric transforms over …
or hydro-acoustic systems, it is necessary to perform discrete trigonometric transforms over …
Structure and software model of a parallel-vertical multi-input adder for FPGA implementation
In this paper parallel-vertical approach to realization of group summation has been
analyzed. Analytical expression for synthesis of a 7-input single-digit adder have been …
analyzed. Analytical expression for synthesis of a 7-input single-digit adder have been …
Implementation of FPGA-based barker's-like codes
Pseudorandom code sequences with a low level of side lobe autocorrelation function have
been used in radars, communication systems and information security. The results of the …
been used in radars, communication systems and information security. The results of the …
Method of synthesis and practical realization of quasi-barker codes
The work is consided the method of obtaining quasi-barker codes based on numerical
rulers namely bundles. Their advantages, basic parameters and areas of use are given. The …
rulers namely bundles. Their advantages, basic parameters and areas of use are given. The …
Simulation Model of Cryptographic Data Protection Based on a Neural-Like Network with Nonlinear Synaptic Connections
A method of cryptographic data protection using neural-like networks based on the model of
geometric transformations is proposed. Algorithms for non-iterative training of neural-like …
geometric transformations is proposed. Algorithms for non-iterative training of neural-like …
Floating-Point Number Scalar Product Hardware Implementation for Embedded Systems
An algorithm for calculating the scalar product of operands in floating-point format using a
table-algorithmic method and an algorithm for forming tables of macro-partial products are …
table-algorithmic method and an algorithm for forming tables of macro-partial products are …
Designing features of hardware and software tools for intelligent processing of intensive data streams
…, O Skorokhoda, T Tesliuk, V Rabyk - 2016 IEEE First …, 2016 - ieeexplore.ieee.org
Requirements and design phases of hardware and software intellectual processing of
intensive data streams in real time have been examined. Design principles of hardware and …
intensive data streams in real time have been examined. Design principles of hardware and …
Implementation of Base Components of Neuro-like Cryptographic Data Protection Systems on FPGA
The implementation of the base components of neuro-like cryptographic data protection
systems using FPGA is considered. The structure of the data encryption module using …
systems using FPGA is considered. The structure of the data encryption module using …