2018 IEEE Second International Conference on Data Stream Mining &Amp; Processing (DSMP) 2018
DOI: 10.1109/dsmp.2018.8478513
|View full text |Cite
|
Sign up to set email alerts
|

Neural-Like Means for Data Streams Encryption and Decryption in Real Time

Abstract: The "model of successive geometric transformations" paradigm has been adapted for the implementation of parallel-streaming neural network encryption-decryption of data in real time. A model and structure of a parallel-streaming neural-like element for the mode have been developed. Keywords-intensive data stream; neural networks; geometric transformations model I. INTRODUCTION The latest information technologies are becoming global in the modern world. Their development and development of communications provide… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 11 publications
0
9
0
1
Order By: Relevance
“…The synthesis of data acquisition, exchange and storage module (DAESM) is proposed to carry out on the basis of the method for time allocation of memory resources between external devices (workstations, microprocessor systems, intelligent sensors and actuators), which are connected to DAESM via industrial network interfaces [46]. According to this method, each j-th device, cyclically with a given period T j , is given a fixed time interval to memory access.…”
Section: The Methods For Conflict-free Data Exchangementioning
confidence: 99%
See 1 more Smart Citation
“…The synthesis of data acquisition, exchange and storage module (DAESM) is proposed to carry out on the basis of the method for time allocation of memory resources between external devices (workstations, microprocessor systems, intelligent sensors and actuators), which are connected to DAESM via industrial network interfaces [46]. According to this method, each j-th device, cyclically with a given period T j , is given a fixed time interval to memory access.…”
Section: The Methods For Conflict-free Data Exchangementioning
confidence: 99%
“…Thus, the developed methodology of IT for data acquisition and processing in EEMIS includes new and improved methods and models [45][46][47][48][49][50][51][52][53][54][55]: the method for synthesis of data acquisition and processing tools [41], the method for conflict-free exchange between data acquisition and processing tools in EEMIS [46], the method for intelligent tools implementation based on artificial neural networks [47] and models for analysis of structure dynamics of the synthesized tools of data acquisition and processing based on simple, colored and hierarchical Petri nets [48].…”
Section: The Structure Of Information Technology For Data Acquisition and Processing In The Eemismentioning
confidence: 99%
“…The study of the main trends in the area of UAV onboard systems development for real-time cryptographic data protection shows that neural network methods are increasingly used for performing data encryption and decryption in such systems [28][29][30][31][32]. These publications show that the implementation of neural network methods of cryptographic data protection is performed generally by software.…”
Section: Related Workmentioning
confidence: 99%
“…The SGTM neural-like structure is also used to build encryption systems and data transmission of increased cryptocurrency [24]. To increase the speed of operation in the application mode and illustrate this procedure, [10] proposes a transition diagram from the neural network form to the polynomial one of SGTM neural-like structure application.…”
Section: Introductionmentioning
confidence: 99%