An Approach to the Implementation of a Neural Network for Cryptographic Protection of Data Transmission at UAV

I Tsmots, V Teslyuk, A Łukaszewicz, Y Lukashchuk… - Drones, 2023 - mdpi.com
An approach to the implementation of a neural network for real-time cryptographic data
protection with symmetric keys oriented on embedded systems is presented. This approach …

An integral software solution of the SGTM neural-like structures implementation for solving different Data Mining Tasks

R Tkachenko - Lecture Notes in Computational Intelligence and …, 2022 - Springer
The paper presents a developed software solution that implements a new learning model
and application of artificial neural networks, ie the Successive Geometric Transformations …

On-line relaxation versus off-line spectral algorithm in the learning of polynomial neural units

V Kotsovsky, A Batyuk - Data Stream Mining & Processing: Third …, 2020 - Springer
The problem of the learning of polynomial threshold units over a fixed set of polynomials is
treated in the paper. We consider two approaches in the supervised learning: off-line …

Neural-like methods and hardware structures for real-time data encryption and decryption

I Tsmots, Y Tsymbal, O Skorokhoda… - 2019 IEEE 14th …, 2019 - ieeexplore.ieee.org
Combined method of cryptographic data protection based on the autoassociative neural
network using “model of successive geometric transformations” paradigm and XOR masking …

Development of a generalized model for parallel-streaming neural element and structures for scalar product calculation devices

I Tsmots, V Teslyuk, N Kryvinska, O Skorokhoda… - The Journal of …, 2023 - Springer
Nowadays, intensive streams of fuzzy input data need to be processed in real-time for
different fields of science and engineering. To solve this problem, a generalized model for …

[PDF][PDF] Method of Training and Implementation on the Basis of Neural Networks of Cryptographic Data Protection.

I Tsmots, V Teslyuk, Y Lukashchuk, Y Opotiak - COLINS, 2022 - ceur-ws.org
The analysis of publications is carried out, which indicates the urgency of the problem of
cryptographic encryption and decryption of real-time data for mobile robotic systems. The …

Methods for the Efficient Energy Management in a Smart Mini Greenhouse.

V Teslyuk, I Tsmots, T Teslyuk… - … , Materials & Continua, 2022 - search.ebscohost.com
To solve the problem of energy efficiency of modern enterprise it is necessary to reduce
energy consumption. One of the possible ways is proposed in this research. A multi-level …

Neural network technology for protecting cryptographic data

I Tsmots, V Rabyk, Y Lukaschuk… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
A neural network technology of cryptographic data protection has been developed, and an
algorithm for learning the neural networks based on principal components method has been …

Development of modules of neuro-like cryptographic encryption and decryption of data and their implementation on FPGA

I Tsmots, V Rabyk, O Berezky… - 2021 IEEE 16th …, 2021 - ieeexplore.ieee.org
The requirements are formed and the main stages of synthesis of cryptological encryption
and data decryption modules are explained. The tabular-algorithmic method of scalar …

[PDF][PDF] The Impact of the Covid-19 Pandemic on Students Studying in High Education Institutions.

M Nazarkevych, V Hrytsyk, A Kuza, O Shevchuk… - CPITS II (2), 2021 - ceur-ws.org
Nowadays in Ukraine, people must plan their future according to the specifics of new
relations-the new specifics of communications, labor organization etc. Each industry has …