32 results on '"Sultanow, Eldar"'
Search Results
2. Diophantine imaging reveals the broken symmetry of sums of integer cubes
- Author
-
Sultanow, Eldar, Henkel, Max, and Aberkane, Idriss J.
- Published
- 2024
- Full Text
- View/download PDF
3. Enabling Quantum Cybersecurity Analytics in Botnet Detection: Stable Architecture and Speed-up through Tree Algorithms
- Author
-
Tehrani, Madjid, Sultanow, Eldar, Buchanan, William J, Amir, Malik, Jeschke, Anja, Chow, Raymond, and Lemoudden, Mouad
- Subjects
I.2 ,Quantum Physics ,FOS: Physical sciences ,Quantum Physics (quant-ph) - Abstract
For the first time, we enable the execution of hybrid machine learning methods on real quantum computers with 100 data samples and real-device-based simulations with 5,000 data samples, thereby outperforming the current state of research of Suryotrisongko and Musashi from 2022 who were dealing with 1,000 data samples and quantum simulators (pure software-based emulators) only. Additionally, we beat their reported accuracy of $76.8\%$ by an average accuracy of $89.0\%$, all within a total execution time of 382 seconds. %They did not report their execution time. We achieve this significant progress through two-step strategy: Firstly, we establish a stable quantum architecture that enables us to execute HQML algorithms on real quantum devices. Secondly, we introduce new hybrid quantum binary classification algorithms based on Hoeffding decision tree algorithms. These algorithms speed up the process via batch-wise execution, reducing the number of shots required on real quantum devices compared to conventional loop-based optimizers. Their incremental nature serves the purpose of online large-scale data streaming for DGA botnet detection, and allows us to apply hybrid quantum machine learning to the field of cybersecurity analytics. We conduct our experiments using the Qiskit library with the Aer quantum simulator, and on three different real quantum devices from MS Azure Quantum: IonQ, Rigetti, and Quantinuum. This is the first time these tools are combined in this manner., 29 pages, 3 figures, 5 tables
- Published
- 2023
4. Machine Learning Class Numbers of Real Quadratic Fields
- Author
-
Amir, Malik, He, Yang-Hui, Lee, Kyu-Hwan, Oliver, Thomas, and Sultanow, Eldar
- Subjects
FOS: Computer and information sciences ,High Energy Physics - Theory ,Computer Science - Machine Learning ,High Energy Physics - Theory (hep-th) ,Mathematics - Number Theory ,FOS: Mathematics ,FOS: Physical sciences ,11R29, 11R80, 62R99 ,Number Theory (math.NT) ,Machine Learning (cs.LG) - Abstract
We implement and interpret various supervised learning experiments involving real quadratic fields with class numbers 1, 2 and 3. We quantify the relative difficulties in separating class numbers of matching/different parity from a data-scientific perspective, apply the methodology of feature analysis and principal component analysis, and use symbolic classification to develop machine-learned formulas for class numbers 1, 2 and 3 that apply to our dataset., 26 pages, 20 figures
- Published
- 2022
5. Predict better with less training data using a QNN
- Author
-
Reese, Barry D., Kowalik, Marek, Metzl, Christian, Bauckhage, Christian, and Sultanow, Eldar
- Subjects
FOS: Computer and information sciences ,Quantum Physics ,Computer Science - Machine Learning ,I.5.1 ,FOS: Physical sciences ,81P68 ,Quantum Physics (quant-ph) ,Machine Learning (cs.LG) - Abstract
Over the past decade, machine learning revolutionized vision-based quality assessment for which convolutional neural networks (CNNs) have now become the standard. In this paper, we consider a potential next step in this development and describe a quanvolutional neural network (QNN) algorithm that efficiently maps classical image data to quantum states and allows for reliable image analysis. We practically demonstrate how to leverage quantum devices in computer vision and how to introduce quantum convolutions into classical CNNs. Dealing with a real world use case in industrial quality control, we implement our hybrid QNN model within the PennyLane framework and empirically observe it to achieve better predictions using much fewer training data than classical CNNs. In other words, we empirically observe a genuine quantum advantage for an industrial application where the advantage is due to superior data encoding., 23 pages, 15 figures
- Published
- 2022
6. Infrastructure anomaly detection: A cloud-native architecture at Germany’s Federal Employment Agency
- Author
-
Herget, Gebhard, Sultanow, Eldar, Chircu, Alina, Ludsteck, Johannes, Hammer, Sebastian, Koch, Christian, Reuter, Willy, and Seßler, Matthias
- Subjects
Time Series||Enterprise Architecture||Exponential Smoothing||Cloud||Azure||Distributed Denial of Service||Infrastructure Anomaly Detection System - Abstract
In prior research we explored the use of time series analysis methods to detect one class of information technology (IT) infrastructure anomalies - Distributed Denial of Service (DDoS) attacks. The results of this prior work were a mathematical model and a prototype implementation that were concretely trialed and operated in the data centers of Germany's Federal Employment Agency (FEA). With this paper, we go one step further and generalize as well as optimize the mathematical model and create higher performance and scalability for an updated prototype through targeted use of cloud technologies. The starting point of our generalization is the Exponential Smoothing (E-S) approach, which underlies, for example, the well-known Holt-Winters method. This method is used to predict univariate time series. To detect anomalies (such as DDoS attacks) in infrastructure data, we extend the E-S approach to enable it to forecast multivariate time series. In this optimization of our method and our prototype, we take an exploratory, agile approach. Furthermore, we present a cloud-native architecture stack which we pilot in Azure.
- Published
- 2022
- Full Text
- View/download PDF
7. The Order of Euler’s Totient Function
- Author
-
Cox, Darrell, Ghosh, Sourangshu, and Sultanow, Eldar
- Subjects
Mathematics::General Mathematics ,Mathematics::Number Theory ,Mathematics::Metric Geometry ,algebra_number_theory - Abstract
The Mobius function is commonly used to define Euler’s totient function and the Mangoldt function. Similarly, the summatory Mobius function (the Mertens function) is used to define the summatory totient function and the summatory Mangoldt function (the second Chebyshev function). Analogues of the product formula for the totient function are introduced. An analogue of the summatory totient function with many additive properties is introduced.
- Published
- 2021
8. An algorithm for linearizing Collatz convergence
- Author
-
Rahn, Alexander, Henkel, Max, Ghosh, Sourangshu, Sultanow, Eldar, Aberkane, Idriss, Nuremberg Institut of Technology, University of Applied Science Schmalkalden, Indian Institute of Technology Kharagpur (IIT Kharagpur), Universität Potsdam, and Complex System Digital Campus (CSDC)
- Subjects
[MATH.MATH-DS]Mathematics [math]/Dynamical Systems [math.DS] ,[NLIN.NLIN-CD]Nonlinear Sciences [physics]/Chaotic Dynamics [nlin.CD] ,[MATH.MATH-NT]Mathematics [math]/Number Theory [math.NT] - Abstract
The Collatz dynamic is known to generate a complex quiver of sequences over natural numbers which inflation propensity remains so unpredictable it could be used to generate reliable proof of work algorithms for the cryptocurrency industry; it has so far resisted every attempt at linearizing its behavior. Here we establish an ad hoc equivalent of modular arithmetic for Collatz sequences, based on five arithmetic rules we prove apply on the entire Collatz dynamical system and which iteration exactly define the full basin of attraction leading to any odd number. We further simulate these rules to gain insight on their quiver geometry and computational properties, and observe they allow to linearize the proof of convergence of the full rows of the binary tree over odd numbers in their natural order, a result which, along with the full description of the basin of any odd number, has never been achieved before. We then provide two theoretical programs to explain why the five rules allow to linearize Collatz convergence, one in ZFC and one in Peano arithmetic.
- Published
- 2021
9. The Farey Sequence and the Mertens Function
- Author
-
Cox, Darrell, Sultanow, Eldar, and Sourangshu Ghosh
- Subjects
Mathematics - Number Theory ,Mathematics::Number Theory ,FOS: Mathematics ,11B57, 11A25 (Primary) 11M26 (Secondary) ,Number Theory (math.NT) - Abstract
Franel and Landau derived an arithmetic statement involving the Farey sequence that is equivalent to the Riemann hypothesis. Since there is a relationship between the Mertens function and the Riemann hypothesis, there should be a relationship between the Mertens function and the Farey sequence. Functions of subsets of the fractions in Farey sequences that are analogous to the Mertens function are introduced. Mikolas proved that the sum of certain Mertens function values is 1. Results analogous to Mikolas theorem are the defining property of these functions. A relationship between the Farey sequence and the Riemann hypothesis other than the Franel-Landau theorem is postulated. This conjecture involves a theorem of Mertens and the second Chebyshev function., 9 Pages, 4 Figures, 8 References
- Published
- 2021
10. Collatz convergence is a Hydra game
- Author
-
Rahn, Alexander, Sultanow, Eldar, and Aberkane, Idriss J.
- Subjects
General Mathematics (math.GM) ,Mathematics::General Mathematics ,FOS: Mathematics ,Nonlinear Sciences::Cellular Automata and Lattice Gases ,Mathematics - General Mathematics - Abstract
The Collatz dynamic is known to generate a complex quiver of sequences over natural numbers which inflation propensity remains so unpredictable it could be used to generate reliable proof of work algorithms for the cryptocurrency industry. Here we establish an ad hoc equivalent of modular arithmetic for Collatz sequences to automatically demonstrate the convergence of infinite quivers of numbers, based on five arithmetic rules we prove apply on the entire Collatz dynamic and which we further simulate to gain insight on their graph geometry and computational properties. We then formally demonstrate these rules define an automaton that is playing a Hydra game on the graph of undecided numbers we also prove is embedded in 24N-7, proving that in ZFC the Collatz conjecture is true, before giving a promising direction to also prove it in Peano arithmetic.
- Published
- 2021
11. A Reference Architecture for On-Premises Chatbots in Banks and Public Institutions
- Author
-
Koch, Christian, Linnik, Benjamin, Pelzel, Frank, Sultanow, Eldar, Welter, Sebastian, and Cox, Sean
- Subjects
Public Sector ,Chatbots ,Reference Architecture ,Capability Map ,Enterprise Architecture ,Banking ,Machine Learning Architecture - Abstract
Chatbots have the potential to significantly increase the efficiency of banks and public institutions. Both sectors, however, are subject to special regulations and restrictions in areas such as information security and data protection. The policies of these organizations therefore, in some cases, reject the use of cloud and proprietary products because in their view they lack transparency. As a result, the implementation of chatbots in banks and public institutions often focuses on open-source and on-premises solutions; however, there are hardly any scientific guidelines on how to implement these systems. Our paper aims to close this research gap. The article proposes a reference architecture for chatbots in banks and public institutions that are a.) based on open-source software and b.) are hosted on-premises. The framework is validated by case studies at TeamBank AG and the German Federal Employment Agency. Even if our architecture is designed for these specific industries, it may also add value in other sectors ��� as chatbots are expected to become increasingly important for the practical application of artificial intelligence in enterprises.
- Published
- 2021
- Full Text
- View/download PDF
12. Fermat's Last Theorem and Related Problems
- Author
-
Cox, Darrell, Sourangshu Ghosh, and Sultanow, Eldar
- Published
- 2021
- Full Text
- View/download PDF
13. 28. September - 2. Oktober 2020
- Author
-
Martel, Yannick, Roßmann, Arne, Sultanow, Eldar, Weiß, Oliver, Wissel, Matthias, Pelzel, Frank, and Seßler, Matthias
- Subjects
Machine Learning ,Software Architecture ,Artificial Intelligence ,MLOps ,Enterprise Architecture - Abstract
AI systems are increasingly evolving from laboratory experiments in data analysis to increments of productive software products. A professional AI platform must therefore not only function as a laboratory environment but must be designed and procured as a workbench for the development, productive implementation, operation and maintenance of ML models. Subsequently, it needs to integrate within a global software engineering approach. This way, Enterprise Architecture Management (EAM) must implement efficient governance of the development cycle, to enable organization-wide collaboration, to accelerate the go-live and to standardize operations. In this paper we highlight obstacles and show best practices on how architects can integrate data science and AI in their environment. Additionally, we suggest an integrated approach adapting the best practices from both the data science and DevOps.
- Published
- 2021
- Full Text
- View/download PDF
14. 28. September - 2. Oktober 2020
- Author
-
Breithaupt, Carsten, Vieracker, Jonas, Chircu, Alina, Cox, Sean, and Sultanow, Eldar
- Subjects
Lufthansa ,ComputingMilieux_THECOMPUTINGPROFESSION ,Crisis Management ,Enterprise Architecture - Abstract
In this paper we argue that the Enterprise Architect (EA) should be considered as a crisis manager. In times of a crisis organizations must create a holistic view on the situation and evaluate the proposed measures. Evaluation will be based on experience, data, upfront-created scenarios and assessments of risks, cost and benefits. The EA is already engaged in processes such as Continuity Management, Risk Management, IT Security, Business Process Management, IT Strategy, and others. Therefore, we propose that the EA is one good candidate (not the only one) for handling organizational crises. This paper presents a model of overall crisis management that incorporates an enterprise architecture view as well as related dimensions of crisis management: the ability to control a crisis, the level of communication during and after a crisis, the type of change brought by a crisis, the crisis' outcomes, its distribution within an enterprise, and an organization's criticality of business functions. Finally, we highlight how the EA role supports crisis management at Lufthansa, a top German aviation company.
- Published
- 2021
- Full Text
- View/download PDF
15. Divisions by Two in Collatz Sequences: A Data Science Approach (2nd ed.)
- Author
-
Koch, Christian, Sultanow, Eldar, and Cox, Sean
- Subjects
Zahlentheorie ,Collatz-Problem ,Data Science ,ddc:5 - Abstract
The Collatz conjecture is an unsolved number theory problem. We approach the question by examining the divisions by two that are performed within Collatz sequences. Aside from classical mathematical methods, we use techniques of data science. Based on the analysis of 10,000 sequences we show that the number of divisions by two lies within clear boundaries. Building on the results, we develop and prove an equation to calculate the maximum possible number of divisions by two for any given a Collatz sequence. Whenever this maximum is reached, a sequence leads to the result one, as conjectured by Lothar Collatz. Furthermore, we show how many divisions by two are required for a cycle of a specific length. The findings are valuable for further investigations and could form the basis for a comprehensive proof of the conjecture.
- Published
- 2020
16. Divisions by Two in Collatz Sequences
- Author
-
Koch, Christian, Sultanow, Eldar, Cox, Sean, and Technische Hochschule Nürnberg
- Subjects
Zahlentheorie ,Collatz-Problem ,5 Naturwissenschaften und Mathematik ,Data Science ,ddc:5 - Abstract
The Collatz conjecture is an unsolved number theory problem. We approach the question by examining the divisions by two that are performed within Collatz sequences. Aside from classical mathematical methods, we use techniques of data science. Based on the analysis of 10,000 sequences we show that the number of divisions by two lies within clear boundaries. Building on the results, we formulate and prove several theorems on the occurrence of cycles and the termination of Collatz sequences. The findings are useful for further investigations and could form the basis for a comprehensive proof of the conjecture.
- Published
- 2020
- Full Text
- View/download PDF
17. Text/Conference Paper
- Author
-
Chircu, Alina, Sultanow, Eldar, Baum, David, Koch, Christian, and Seßler, Matthias
- Subjects
Machine Learning ,Utilization ,Monitoring ,Time Series ,Response Time ,Data Center ,Forecasting ,Visualization - Abstract
In this paper, we present a novel tool for data center management that incorporates data visualization and machine learning capabilities. We developed the tool in the context of an action design research project conducted at a large government agency in Germany, which hosts three highly available data centers containing more than 10,000 servers. We derived the requirements for the tool from qualitative interviews with agency employees who are familiar with monitoring the data center infrastructure as well as from a review of existing data center and other large infrastructure monitoring solutions. We implemented a web-based 3D prototype for the tool as an Angular 6 application running on Node.js, and evaluated it with the same employees. Most participants preferred the new tool, which provided a significantly better option and enabled visualization of historical data for all server instances at the same time, as well as real-time charts. Planned improvements will take advantage of the full potential of machine learning for time series forecasting.
- Published
- 2019
- Full Text
- View/download PDF
18. Text/Conference Paper
- Author
-
Brockmann, Carsten, Sultanow, Eldar, and Czarnecki, Christian
- Subjects
Preface ,Digital Age ,Enterprise Architecture - Published
- 2019
- Full Text
- View/download PDF
19. Collatz Sequences in the Light of Graph Theory
- Author
-
Sultanow, Eldar, Koch, Christian, and Cox, Sean
- Subjects
Cayley Graph ,Mathematics::General Mathematics ,Binary Tree ,Collatz Conjecture ,ddc:300 ,Wirtschaftswissenschaften ,Nonlinear Sciences::Cellular Automata and Lattice Gases ,msc:11-XX - Abstract
It is well known that the inverted Collatz sequence can be represented as a graph or a tree. Similarly, it is acknowledged that in order to prove the Collatz conjecture, one must demonstrate that this tree covers all (odd) natural numbers. A structured reachability analysis is hitherto not available. This paper investigates the problem from a graph theory perspective. We define a tree that consists of nodes labeled with Collatz sequence numbers. This tree will be transformed into a sub-tree that only contains odd labeled nodes. The analysis of this tree will provide new insights into the structure of Collatz sequences. The findings are of special interest to possible cycles within a sequence. Next, we describe the conditions which must be fulfilled by a cycle. Finally, we demonstrate how these conditions could be used to prove that the only possible cycle within a Collatz sequence is the trivial cycle, starting with the number 1, as conjectured by Lothar Collatz.
- Published
- 2019
- Full Text
- View/download PDF
20. Introducing a Finite State Machine for processing Collatz Sequences
- Author
-
Sultanow, Eldar (Dr.), Volkov, Denis, and Cox, Sean
- Subjects
ddc:300 ,ddc:510 ,Wirtschaftswissenschaften ,msc:11-XX - Abstract
The present work will introduce a Finite State Machine (FSM) that processes any Collatz Sequence; further, we will endeavor to investigate its behavior in relationship to transformations of a special infinite input. Moreover, we will prove that the machine’s word transformation is equivalent to the standard Collatz number transformation and subsequently discuss the possibilities for use of this approach at solving similar problems. The benefit of this approach is that the investigation of the word transformation performed by the Finite State Machine is less complicated than the traditional number-theoretical transformation.
- Published
- 2017
21. A Reference Architecture for Digitalization in the Pharmaceutical Industry
- Author
-
Chircu, Alina M., Sultanow, Eldar, and Sözer, Levent D.
- Subjects
Augmented Reality ,Pharmaceutical Industry ,Reference Architecture ,Cognitive Computing ,Digitalization ,TOGAF ,Digital Transformation ,Internet of Things (IoT) - Abstract
Digital transformation (also called digitalization or, to a lesser extent, digitization) can enhance the customer experience, streamline operations, revolutionize existing business models, and disrupt entire industries. In this paper, we explore the opportunities for digital transformation in the pharmaceutical industry and develop a pharma-specific reference architecture for digitalization. We build on a model initially developed internally at Capgemini and show how it can be used to describe the use of several emerging digital transformation technologies: Internet of Things (IoT), Cognitive Computing (CC) and Augmented Reality (AR). Our analysis presents the architectural implications of each of these technologies for the pharma industry from the perspectives of four standard TOGAF domains (covering the technology, application, data and business architecture) and of four digitalization steps (Sense, Tag and Connect, Ingest, Analyze and Prepare, and Utilize). We also present an integrated view of the business capabilities all three technologies offer to organizations.
- Published
- 2017
- Full Text
- View/download PDF
22. Integrate Enterprise Systems to our Hyperconnected World: Anything, Anywhere, Anytime through architectural design
- Author
-
Sultanow, Eldar, Brockmann, Carsten, Reneé Pratt, and Andresen, Katja
- Published
- 2013
- Full Text
- View/download PDF
23. BRINGING CLARITY TO THE JAVA IOT JUNGLE.
- Author
-
Sultanow, Eldar and Chircu, Alina
- Subjects
INTERNET of things ,JAVA programming language ,INFORMATION technology - Abstract
Everyone is talking about the Internet of Things (abbreviated as IoT) - by now the future of many industries is barely imaginable without it. IoT frameworks, technologies, cloud solutions, generic platforms and development tools are proliferating at a high rate. Even though experts recognize the need for coherent standards, the world of IoT resembles a jungle, with a myriad of different, non-standardized components. In this paper, we attempt to bring some clarity to the jungle by examining the existing challenges, summarizing the IoT frameworks, technologies and tools that are being developed for the popular Java software platform, and proposing a novel, integrated reference architecture for explaining how different IoT components can be organized by architecture layers and how they can work together. The reference architecture and related IoT components summaries can help software engineers and other IoT practitioners understand the building blocks for the design, development, implementation, operations and life-cycle management of end-to-end IoT solutions. They can also serve as organizing aids for researchers interested in IoT standards, methodologies, tools, and architectures or for educators interested in teaching these IoT concepts in the classroom. [ABSTRACT FROM AUTHOR]
- Published
- 2018
24. High Performance in Parallel Data Integration: An Empirical Evaluation of the Ratio Between Processing Time and Number of Physical Nodes
- Author
-
Seckendorff, Caspar Von and Sultanow, Eldar
- Subjects
Process delay ,efficiency ,parallel computing ,Hadoop ,speedup ,Amazon Elastic Compute Cloud (EC2) ,E-Commerce ,data integration ,Nutch - Abstract
Many studies have shown that parallelization decreases efficiency [1], [2]. There are many reasons for these decrements. This paper investigates those which appear in the context of parallel data integration. Integration processes generally cannot be allocated to packages of identical size (i. e. tasks of identical complexity). The reason for this is unknown heterogeneous input data which result in variable task lengths. Process delay is defined by the slowest processing node. It leads to a detrimental effect on the total processing time. With a real world example, this study will show that while process delay does initially increase with the introduction of more nodes it ultimately decreases again after a certain point. The example will make use of the cloud computing platform Hadoop and be run inside Amazon-s EC2 compute cloud. A stochastic model will be set up which can explain this effect., {"references":["Kumar, V.: Introduction to Parallel Computing, 2nd edition. Addison-\nWesley Longman Publishing Co., Inc., (2002)","Eager, D. L., Zahorjan, J., Lozowska, E. D.: Speedup Versus Efficiency\nin Parallel Systems. IEEE Transactions on Computers, Vol. 38, No. 3,\npp. 408--423 (1989)","Cutting, D.: Nutch: an Open-Source Platform for Web Search. In:\nBeigbeder, M., Yee, W. G. (eds.) Workshop on Open Source Web\nInformation Retrieval (OSWIR), pp. 31--33 (2005)","Khare, R., Cutting, D., Sitaker, K., Rifkin, A.: Nutch: A Flexible and\nScalable Open-Source Web Search Engine (2004)","Ghemawat, S., Gobioff, H., Leung, S.-T.: The Google File System.\nSOSP '03: Proceedings of 19th ACM symposium on Operating systems\nprinciples, ACM Press, pp. 29--43, NY (2003)","Dean, J., Ghemawat, S.: MapReduce: Simplified Data Processing on\nLarge Clusters, OSDI'04: Sixth Symposium on Operating System\nDesign and Implementation, San Francisco, CA (2004)","Cafarella, M. J., Etzioni, O.: A Search Engine for Natural Language\nApplications. WWW '05: Proceedings of the 14th international\nconference on World Wide Web, pp. 442--452. ACM Press, NY (2005)","Drost, I., Scheffer, T.: Thwarting the Nigritude Ultramarine: Learning to\nIdentify Link Spam. ECML, pp. 96--107 (2005)","Kimball, A., Michels-Slettvet, S., Bisciglia, C.: Cluster Computing for\nWeb-Scale Data Processing. SIGCSE '08: Proceedings of the 39th\nSIGCSE technical symposium on Computer science education, ACM,\npp. 116--120 (2008)\n[10] Butler, M. H., Rutherford, J.: Distributed Lucene : A distributed free\ntext index for Hadoop. HP Laboratories (2008)\n[11] Hasan, W., Motwani, R.: Optimization Algorithms for Exploiting the\nParallelism-Communication Tradeoff in Pipelined Parallelism. VLDB\n'94: Proceedings of the 20th International Conference on Very Large\nData Bases, Morgan Kaufmann Publishers Inc., pp. 36--47 (1994)\n[12] Ahn, J. H., Erez, M., Dally, W. J.: Tradeoff between Data-, Instruction-,\nand Thread-Level Parallelism in Stream Processors. ICS '07:\nProceedings of the 21st annual international conference on\nSupercomputing, ACM, pp. 126--137 (2007)\n[13] Amini, H., Kazakov D., Ridge, E.: Parallelism vs Communication\nOverhead Trade-off in a JADE Multi-Agent Implementation of Cellular\nAutomata. The First International Symposium on Nature-Inspired\nSystems for Parallel, Asynchronous and Decentralised Environments\n(NISPADE), AISB convention, Bristol (2006)\n[14] Balasubramonian, R., Dwarkadas, S., Albonesi, D. H.: Dynamically\nmanaging the communication-parallelism trade-off in future clustered\nprocessors. SIGARCH Comput. Archit. News, ACM, pp. 275--287\n(2003)\n[15] Zaharia, M., Konwinski, A., Joseph, A. D., Katz, R. H., Stoica, I.:\nImproving MapReduce Performance in Heterogeneous Environments.\n8th Symposium on Operating Systems Design and Implementation, pp.\n29--42 (2008)\n[16] Ukkonen, E.: Approximate string-matching with q-grams and maximal\nmatches. Theor. Comput. Sci., Elsevier Science Publishers Ltd., 92, pp.\n191--211 (1992)"]}
- Published
- 2009
- Full Text
- View/download PDF
25. Overcoming communication barriers for CMC in enterprises
- Author
-
Sultanow, Eldar (Dr.), Vladova, Gergana (Dr. rer. pol.), and Weber, Edzard (Dr. rer. pol.)
- Subjects
Wirtschaftswissenschaften - Published
- 2009
26. Towards Mobile Modeling of Knowledge and Business Processes.
- Author
-
Peinl, Rene, Sultanow, Eldar, and Brockmann, Carsten
- Published
- 2016
- Full Text
- View/download PDF
27. Resolve dissatisfactory communications.
- Author
-
Sultanow, Eldar, Weber, Edzard, and Lembcke, Robert
- Published
- 2010
- Full Text
- View/download PDF
28. An Information Technology Model for Pharmaceutical Supply Chain Security.
- Author
-
Sultanow, Eldar and Brockmann, Carsten
- Abstract
Abstract: How to ensure non‐manipulated, original pharmaceutical products to be sold to the final consumer is a matter of national interest. In this contribution we are going to present an approach which combines both information technology as well as process reengineering to ensure pharmaceutical correctness and safety of the drugs sold. Firstly, requirements for a model will be determined. Secondly, existing approaches and their pitfalls are presented. Finally, we will introduce a new model for controlling the security of pharmaceutical supply chains. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
29. Modeling of Processes, Systems and Knowledge: a Multi-Dimensional Comparison of 13 Chosen Methods.
- Author
-
Sultanow, Eldar, Xingxing Zhou, Gronau, Norbert, and Cox, Sean
- Subjects
KNOWLEDGE management ,COMPARATIVE studies ,INFORMATION resources management ,MATHEMATICAL models ,VISUAL perception - Abstract
Modeling methods are apposite for describing complex situations and their relations in the global world of business - a field which is heavily driven by information management systems. Many approaches attempting to discern differences among these methods already exist in literature; however, as we shall argue, to compare all the methods in one-dimension is not appropriate. By carrying on a broad literature study, this examination aims to identify various dimensions in order to create a multidimensional framework for compassion. Thirteen methods, which are based on different backgrounds, will be used as the objects for this evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2012
30. A Semantic e-Collaboration Approach to Enable Awareness in Globally Distributed Organizations.
- Author
-
Sultanow, Eldar, Weber, Edzard, and Cox, Sean
- Published
- 2011
- Full Text
- View/download PDF
31. An Algorithm for Linearizing the Collatz Convergence.
- Author
-
Rahn, Alexander, Sultanow, Eldar, Henkel, Max, Ghosh, Sourangshu, and Aberkane, Idriss J.
- Subjects
- *
ODD numbers , *MODULAR arithmetic , *NATURAL numbers , *COMPUTATIONAL geometry , *DYNAMICAL systems - Abstract
The Collatz dynamic is known to generate a complex quiver of sequences over natural numbers for which the inflation propensity remains so unpredictable it could be used to generate reliable proof-of-work algorithms for the cryptocurrency industry; it has so far resisted every attempt at linearizing its behavior. Here, we establish an ad hoc equivalent of modular arithmetics for Collatz sequences based on five arithmetic rules that we prove apply to the entire Collatz dynamical system and for which the iterations exactly define the full basin of attractions leading to any odd number. We further simulate these rules to gain insight into their quiver geometry and computational properties and observe that they linearize the proof of convergence of the full rows of the binary tree over odd numbers in their natural order, a result which, along with the full description of the basin of any odd number, has never been achieved before. We then provide two theoretical programs to explain why the five rules linearize Collatz convergence, one specifically dependent upon the Axiom of Choice and one on Peano arithmetic. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Cloud Computing for Big Data Entrepreneurship in the Supply Chain: Using SAP HANA for Pharmaceutical Track-and-Trace Analytics.
- Author
-
Chircu, Alina M., Sultanow, Eldar, and Chircu, Flavius C.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.