Review of Animal Remote Managing and Monitoring System
Livestock is an integral part of everyday life contributing to the social, cultural, and economic
sectors. Livestock farming faces challenges in animal remote management and monitoring …
sectors. Livestock farming faces challenges in animal remote management and monitoring …
Steganography over redundant residue number system codes
MA Belhamra, EM Souidi - Journal of Information Security and Applications, 2020 - Elsevier
In this paper we define steganography over Redundant Residue Number System (RRNS)
Codes. We describe distortion-less RRNS based steganographic schemes, analyse their …
Codes. We describe distortion-less RRNS based steganographic schemes, analyse their …
Data Reduction Algorithms for Wireless Sensor Networks Applications
MK Hussein - 2021 3rd International Congress on Human …, 2021 - ieeexplore.ieee.org
Nowadays, wireless sensor networks (WSNs) appear as an active research area due to
challenging issues, including power consumption, routing algorithms, efficiency, and so on …
challenging issues, including power consumption, routing algorithms, efficiency, and so on …
[PDF][PDF] Development of a control system for computations in BOINC with homomorphic encryption in residue number system
In this paper, we propose approaches to constructing reliable schemes using the Residue
Number System (RNS) for the BOINC volunteer computing systems. We show that …
Number System (RNS) for the BOINC volunteer computing systems. We show that …
[PDF][PDF] Neural network method for base extension in residue number system.
Confidential data security is associated with the cryptographic primitives, asymmetric
encryption, elliptic curve cryptography, homomorphic encryption, cryptographic …
encryption, elliptic curve cryptography, homomorphic encryption, cryptographic …
A high-speed residue-to-binary converter based on approximate Chinese Remainder Theorem
NN Kucherov, VA Kuchukov… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
Modular arithmetic, used in solving tasks related to increasing the productivity, reliability and
safety of stand-alone devices. The limited computing resources of devices imposes …
safety of stand-alone devices. The limited computing resources of devices imposes …
Adaptive encrypted cloud storage model
E Lopez-Falcon, A Tchernykh… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
In this paper, we propose an adaptive model of data storage in a heterogeneous distributed
cloud environment. Our system utilizes the methods of secret sharing schemes and error …
cloud environment. Our system utilizes the methods of secret sharing schemes and error …
MS scheduler: New, scalable, and high-performance sparse AVX-2 parity encoding and decoding technique for erasure-coded cloud storage systems
M Pirahandeh, DH Kim - Future Generation Computer Systems, 2022 - Elsevier
In cloud storage scenarios, each chunk with multiple symbols of a coding strip resides in a
different node and, hence, on a different disk. Existing STAIR and sector-disk (SD) …
different node and, hence, on a different disk. Existing STAIR and sector-disk (SD) …
Эффективное сравнение чисел в системе остаточных классов на основе позиционной характеристики
МГ Бабенко, АН Черных, НИ Червяков… - Труды Института …, 2019 - cyberleninka.ru
Операция сравнения чисел широко используется при реализации большинства
современных алгоритмов. Реализация алгоритма сравнения чисел в системе …
современных алгоритмов. Реализация алгоритма сравнения чисел в системе …
On reverse converters for arbitrary multi-moduli RNS
P Patronik - Integration, 2020 - Elsevier
In this paper, we propose a new design of reverse converters for residue number systems
with arbitrary moduli sets consisting of any number of odd moduli and one even modulus of …
with arbitrary moduli sets consisting of any number of odd moduli and one even modulus of …