{"title":"APPROACHES TO CONFIRMING MUTUAL SYNCHRONIZATION IN TREE-LIKE PARITY MACHINES","authors":"M. Aleksandrov","doi":"10.31474/1996-1588-2021-2-33-65-69","DOIUrl":null,"url":null,"abstract":"This paper presents the experimental results of comparing algorithms for confirming the completion of mutual synchronization using polynomial and hash functions. The approach based on the polynomial function was experimentally tested for resistance to failure. All experiments were performed on neural networks with an architecture that uses real numbers with float accuracy. As a result, the approach using the polynomial function was not sufficiently resistant to failure and does not exceed the approach using the hash function in speed. The tasks of further research are determined.","PeriodicalId":104072,"journal":{"name":"Scientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific papers of Donetsk National Technical University. Series: Informatics, Cybernetics and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31474/1996-1588-2021-2-33-65-69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper presents the experimental results of comparing algorithms for confirming the completion of mutual synchronization using polynomial and hash functions. The approach based on the polynomial function was experimentally tested for resistance to failure. All experiments were performed on neural networks with an architecture that uses real numbers with float accuracy. As a result, the approach using the polynomial function was not sufficiently resistant to failure and does not exceed the approach using the hash function in speed. The tasks of further research are determined.