Sensor Node Communication based Selfish Node Detection in Mobile Wireless Sensor Networks

SJJ Thangaraj, N Ramshankar… - … on Intelligent and …, 2023 - ieeexplore.ieee.org
A mobile wireless sensor network (MWSN) is a self-configuring network that does not
require a fixed structure, which minimizes its operation time. At the same time, every node in …

A blueprint for precise and fault-tolerant analog neural networks

C Demirkiran, L Nair, D Bunandar, A Joshi - Nature Communications, 2024 - nature.com
Analog computing has reemerged as a promising avenue for accelerating deep neural
networks (DNNs) to overcome the scalability challenges posed by traditional digital …

Fast operation of determining the sign of a number in RNS using the Akushsky core function

E Shiriaev, N Kucherov, M Babenko, A Nazarov - Computation, 2023 - mdpi.com
This article presents a study related to increasing the performance of distributed computing
systems. The essence of fog computing lies in the use of so-called edge devices. These …

Reliablity and Security for Fog Computing Systems

E Shiriaev, T Ermakova, E Bezuglova, MA Lapina… - Information, 2024 - mdpi.com
Fog computing (FC) is a distributed architecture in which computing resources and services
are placed on edge devices closer to data sources. This enables more efficient data …

DT-RRNS: Routing protocol design for secure and reliable distributed smart sensors communication systems

A Gladkov, E Shiriaev, A Tchernykh, M Deryabin… - Sensors, 2023 - mdpi.com
A smart city has a complex hierarchical communication system with various components. It
must meet the requirements of fast connection, reliability, and security without data …

Self-learning activation functions to increase accuracy of privacy-preserving Convolutional Neural Networks with homomorphic encryption

B Pulido-Gaytan, A Tchernykh - PloS one, 2024 - journals.plos.org
The widespread adoption of cloud computing necessitates privacy-preserving techniques
that allow information to be processed without disclosure. This paper proposes a method to …

Improvement of the Cybersecurity of the Satellite Internet of Vehicles through the Application of an Authentication Protocol Based on a Modular Error-Correction Code

IA Kalmykov, AA Olenev, NV Kononova… - World Electric Vehicle …, 2024 - mdpi.com
The integration of the Internet of Vehicles (IoV) and low-orbit satellite Internet not only
increases the efficiency of traffic management but also contributes to the emergence of new …

On modular (CRT-based) secret sharing

NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way
that only certain subsets of them can recover the secret. The first SSSs were independently …

SNS-Based Secret Sharing Scheme for Security of Smart City Communication Systems

A Gladkov, E Shiriaev, A Tchernykh, M Deryabin… - … -American Congress of …, 2022 - Springer
A smart city has a complex hierarchical communication system with various components. It
must meet the requirements of fast communication, reliability, and security without …

Algorithm for constructing modular projections for correcting multiple errors based on a redundant residue number system using maximum likelihood decoding

M Babenko, A Nazarov, A Tchernykh… - … and Computer Software, 2021 - Springer
One of the most important applications of the Redundant Residual Numbers System (RRNS)
is to improve the fault tolerance of the data storage, processing, and transmission …