{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:16:21Z","timestamp":1760148981645,"version":"build-2065373602"},"reference-count":65,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T00:00:00Z","timestamp":1687910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["22-71-10046"],"award-info":[{"award-number":["22-71-10046"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>This article presents a study related to increasing the performance of distributed computing systems. The essence of fog computing lies in the use of so-called edge devices. These devices are low-power, so they are extremely sensitive to the computational complexity of the methods used. This article is aimed at improving the efficiency of calculations while maintaining an appropriate level of reliability by applying the methods of the Residue Number System (RNS). We are investigating methods for determining the sign of a number in the RNS based on the core function in order to develop a new, fast method. As a result, a fast method for determining the sign of a number based on the Akushsky core function, using approximate calculations, is obtained. Thus, in the course of this article, a study of methods for ensuring reliability in distributed computing is conducted. A fast method for determining the sign of a number in the RNS based on the core function using approximate calculations is also proposed. This result is interesting from the point of view of nebulous calculations, since it allows maintaining high reliability of a distributed system of edge devices with a slight increase in the computational complexity of non-modular operations.<\/jats:p>","DOI":"10.3390\/computation11070124","type":"journal-article","created":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:41:45Z","timestamp":1687999305000},"page":"124","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Fast Operation of Determining the Sign of a Number in RNS Using the Akushsky Core Function"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2359-1291","authenticated-orcid":false,"given":"Egor","family":"Shiriaev","sequence":"first","affiliation":[{"name":"Faculty of Mathematics and Computer Science, North-Caucasus Federal University, 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0337-0093","authenticated-orcid":false,"given":"Nikolay","family":"Kucherov","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science, North-Caucasus Federal University, 355017 Stavropol, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7066-0061","authenticated-orcid":false,"given":"Mikhail","family":"Babenko","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science, North-Caucasus Federal University, 355017 Stavropol, Russia"}]},{"given":"Anton","family":"Nazarov","sequence":"additional","affiliation":[{"name":"Faculty of Mathematics and Computer Science, North-Caucasus Federal University, 355017 Stavropol, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2023,6,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Yi, S., Li, C., and Li, Q. (2015, January 21). A Survey of Fog Computing: Concepts, Applications and Issues. Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China.","DOI":"10.1145\/2757384.2757397"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Priyadarshini, R., Barik, R.K., and Dubey, H. (2018). Deepfog: Fog Computing-Based Deep Neural Architecture for Prediction of Stress Types, Diabetes and Hypertension Attacks. Computation, 6.","DOI":"10.3390\/computation6040062"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/j.future.2019.02.012","article-title":"IoT-Enabled Smart Grid via SM: An Overview","volume":"96","author":"Abujubbeh","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Su, K., Li, J., and Fu, H. (2011, January 9\u201311). Smart City and the Applications. Proceedings of the 2011 International Conference on Electronics, Communications and Control (ICECC), Ningbo, China.","DOI":"10.1109\/ICECC.2011.6066743"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3555802","article-title":"Edge Computing with Artificial Intelligence: A Machine Learning Perspective","volume":"55","author":"Hua","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5434","DOI":"10.1109\/JIOT.2020.2979353","article-title":"Distributed Online Optimization of Fog Computing for Internet of Things under Finite Device Buffers","volume":"7","author":"Ren","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3348","DOI":"10.1109\/TII.2020.2978946","article-title":"Dynamic Resource Allocation and Computation Offloading for Iot Fog Computing System","volume":"17","author":"Chang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Abouaomar, A., Cherkaoui, S., Kobbane, A., and Dambri, O.A. (2019, January 9\u201313). A Resources Representation for Resource Allocation in Fog Computing Networks. Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa Village, HI, USA.","DOI":"10.1109\/GLOBECOM38437.2019.9014146"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Huang, C., Wang, H., Zeng, L., and Li, T. (2022). Resource Scheduling and Energy Consumption Optimization Based on Lyapunov Optimization in Fog Computing. Sensors, 22.","DOI":"10.3390\/s22093527"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Isupov, K. (2021). High-Performance Computation in Residue Number System Using Floating-Point Arithmetic. Computation, 9.","DOI":"10.3390\/computation9020009"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MCAS.2015.2484118","article-title":"Residue Number Systems: A New Paradigm to Datapath Optimization for Low-Power and High-Performance Digital Signal Processing Applications","volume":"15","author":"Chang","year":"2015","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Cluzeau, M. (2006, January 9\u201314). Block Code Reconstruction Using Iterative Decoding Techniques. Proceedings of the 2006 IEEE International Symposium on Information Theory, Washington, DC, USA.","DOI":"10.1109\/ISIT.2006.261971"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/26.898239","article-title":"A Quasi-Orthogonal Space-Time Block Code","volume":"49","author":"Jafarkhani","year":"2001","journal-title":"IEEE Trans. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/18.21228","article-title":"Minimal Trellises for Block Codes","volume":"34","author":"Muder","year":"1988","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1137\/0137027","article-title":"A Connection between Block and Convolutional Codes","volume":"37","author":"Solomon","year":"1979","journal-title":"SIAM J. Appl. Math."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1109\/18.771146","article-title":"Space-Time Block Codes from Orthogonal Designs","volume":"45","author":"Tarokh","year":"1999","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1147\/rd.282.0124","article-title":"Error-Correcting Codes for Semiconductor Memory Applications: A State-of-the-Art Review","volume":"28","author":"Chen","year":"1984","journal-title":"IBM J. Res. Dev."},{"key":"ref_18","unstructured":"Choukroun, Y., and Wolf, L. (2022). Error Correction Code Transformer. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1103\/PhysRevA.55.900","article-title":"Theory of Quantum Error-Correcting Codes","volume":"55","author":"Knill","year":"1997","journal-title":"Phys. Rev. A"},{"key":"ref_20","unstructured":"Peterson, W.W., Peterson, W., Weldon, E.J., and Weldon, E.J. (1972). Error-Correcting Codes, MIT Press."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIT.1962.1057684","article-title":"Bit Loss and Gain Correction Code","volume":"8","author":"Sellers","year":"1962","journal-title":"IRE Trans. Inf. Theory"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Lamehamedi, H., Szymanski, B., Shentu, Z., and Deelman, E. (2002, January 23\u201325). Data Replication Strategies in Grid Environments. Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, Beijing, China.","DOI":"10.1109\/ICAPP.2002.1173605"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Babenko, M., Tchernykh, A., Pulido-Gaytan, B., Cort\u00e9s-Mendoza, J.M., Shiryaev, E., Golimblevskaia, E., Avetisyan, A., and Nesmachnow, S. (2021, January 17\u201321). RRNS Base Extension Error-Correcting Code for Performance Optimization of Scalable Reliable Distributed Cloud Data Storage. Proceedings of the 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Portland, OR, USA.","DOI":"10.1109\/IPDPSW52791.2021.00087"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1134\/S0361768821080089","article-title":"Algorithm for Constructing Modular Projections for Correcting Multiple Errors Based on a Redundant Residue Number System Using Maximum Likelihood Decoding","volume":"47","author":"Babenko","year":"2021","journal-title":"Program Comput. Soft"},{"key":"ref_25","unstructured":"Di Claudio, E.D., Orlandi, G., and Piazza, F. (1988, January 11\u201314). Parallel Error Correction Algorithm in RNS VLSI Digital Circuits. Proceedings of the ICASSP-88., International Conference on Acoustics, Speech, and Signal Processing, New York, NY, USA."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Gladkov, A., Gladkova, N., and Kucherov, N. (2022, January 25\u201328). Analytical Review of Methods for Detection, Localization and Error Correction in the Residue Number System. Proceedings of the International Conference on Mathematics and its Applications in New Computer Systems, Munich, Germany.","DOI":"10.1007\/978-3-030-97020-8_46"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Shiryaev, E., Bezuglova, E., Babenko, M., Tchernykh, A., Pulido-Gaytan, B., and Cort\u00e9s-Mendoza, J.M. (2021, January 24\u201325). Performance Impact of Error Correction Codes in RNS with Returning Methods and Base Extension. Proceedings of the 2021 International Conference Engineering and Telecommunication (En&T), Online.","DOI":"10.1109\/EnT50460.2021.9681756"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tay, T.F., and Chang, C.-H. (2014, January 1\u20135). A New Algorithm for Single Residue Digit Error Correction in Redundant Residue Number System. Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, Australia.","DOI":"10.1109\/ISCAS.2014.6865493"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Pontarelli, S., Cardarilli, G.C., Re, M., and Salsano, A. (2008, January 1\u20133). A Novel Error Detection and Correction Technique for RNS Based FIR Filters. Proceedings of the 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, Boston, MA, USA.","DOI":"10.1109\/DFT.2008.32"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Mohan, P.A., and Ananda Mohan, P.V. (2016). Residue Number Systems: Theory and Applications, Birkh\u00e4user.","DOI":"10.1007\/978-3-319-41385-3"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1049\/el:19820632","article-title":"Residue Number System Error Checking Using Expanded Projection","volume":"18","author":"Jenkins","year":"1982","journal-title":"Electron. Lett."},{"key":"ref_32","unstructured":"Tay, T.F., and Chang, C.-H. (2017). Embedded Systems Design with Special Arithmetic and Number Systems, Springer."},{"key":"ref_33","first-page":"1190","article-title":"Comparison of Asymmetric Algorithms in Cryptography","volume":"3","author":"Garg","year":"2014","journal-title":"J. Comput. Sci. Mob. Comput."},{"key":"ref_34","unstructured":"Milanov, E. (2023, June 27). The RSA Algorithm. RSA Lab. 2009, 1\u201311. Available online: https:\/\/sites.math.washington.edu\/~morrow\/336_09\/papers\/Yevgeny.pdf."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M. (1997, January 17\u201321). Efficient Generation of Shared RSA Keys. Proceedings of the Advances in Cryptology\u2014CRYPTO\u201997: 17th Annual International Cryptology Conference, Santa Barbara, CA, USA. Proceedings 17.","DOI":"10.1007\/BFb0052253"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"da Silva, J.C.L. (2010, January 17\u201320). Factoring Semiprimes and Possible Implications for RSA. Proceedings of the 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel, Eilat, Israel.","DOI":"10.1109\/EEEI.2010.5661953"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Park, J.M., Chong, E.K., and Siegel, H.J. (2003, January 13\u201316). Constructing Fair-Exchange Protocols for E-Commerce via Distributed Computation of RSA Signatures. Proceedings of the Twenty-Second Annual Symposium on Principles of Distributed Computing, Boston, MA, USA.","DOI":"10.1145\/872035.872060"},{"key":"ref_38","first-page":"471","article-title":"Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security","volume":"4","author":"Jamaludin","year":"2020","journal-title":"Int. J. Inf. Syst. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Ren, W., and Miao, Z. (2010, January 12\u201315). A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication. Proceedings of the 2010 Second International Conference on Modeling, Simulation and Visualization Methods, Las Vegas, NV, USA.","DOI":"10.1109\/WMSVM.2010.48"},{"key":"ref_40","first-page":"372","article-title":"Hybrid Encryption\/Decryption Technique Using New Public Key and Symmetric Key Algorithm","volume":"6","author":"Kuppuswamy","year":"2014","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"ref_41","first-page":"34","article-title":"A Design of Security Protocol Using Hybrid Encryption Technique (AES-Rijndael and RSA)","volume":"17","author":"Ramaraj","year":"2009","journal-title":"Int. J. Comput. Internet Manag."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Jintcharadze, E., and Iavich, M. (2020, January 4\u20137). Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. Proceedings of the 2020 IEEE East-West Design & Test Symposium (EWDTS), Varna, Bulgaria.","DOI":"10.1109\/EWDTS50664.2020.9224901"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Alkady, Y., Habib, M.I., and Rizk, R.Y. (2013, January 28\u201329). A New Security Protocol Using Hybrid Cryptography Algorithms. Proceedings of the 2013 9th International Computer Engineering Conference (ICENCO), Giza, Egypt.","DOI":"10.1109\/ICENCO.2013.6736485"},{"key":"ref_44","unstructured":"Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., and Xing, C. (June, January 30). Secret-Sharing Schemes: A Survey. Proceedings of the Coding and Cryptology, Qingdao, China."},{"key":"ref_45","first-page":"47","article-title":"A Multi-Secret Sharing Scheme Based on the CRT and RSA","volume":"2","author":"Dong","year":"2015","journal-title":"Int. J. Electron. Inf. Eng."},{"key":"ref_46","unstructured":"Mignotte, M. (April, January 29). How to Share a Secret. Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","article-title":"A Modular Approach to Key Safeguarding","volume":"29","author":"Asmuth","year":"1983","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Gomathisankaran, M., Tyagi, A., and Namuduri, K. (2011, January 23\u201325). HORNS: A Homomorphic Encryption Scheme for Cloud Computing Using Residue Number System. Proceedings of the 2011 45th Annual Conference on Information Sciences and Systems, Baltimore, MD, USA.","DOI":"10.1109\/CISS.2011.5766176"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Chiroma, H., Abdulhamid, S.M., Fournier-Viger, P., and Garcia, N.M. (2021). Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics: Theories and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-030-66288-2"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/TETC.2019.2902799","article-title":"Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme","volume":"9","author":"Polyakov","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_51","unstructured":"Canteaut, A., and Standaert, F.-X. (2021, January 17\u201321). High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2021, Zagreb, Croatia."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Kim, A., Papadimitriou, A., and Polyakov, Y. (2022, January 1\u20132). Approximate Homomorphic Encryption with Reduced Approximation Error. Proceedings of the Topics in Cryptology\u2013CT-RSA 2022: Cryptographers\u2019 Track at the RSA Conference 2022, Virtual Event. Proceedings.","DOI":"10.1007\/978-3-030-95312-6_6"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/s10559-022-00494-7","article-title":"Residue Number System Asymmetric Cryptoalgorithms","volume":"58","author":"Nykolaychuk","year":"2022","journal-title":"Cybern. Syst. Anal."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Kalmykov, I.A., Pashintsev, V.P., Tyncherov, K.T., Olenev, A.A., and Chistousov, N.K. (2022). Error-Correction Coding Using Polynomial Residue Number System. Appl. Sci., 12.","DOI":"10.3390\/app12073365"},{"key":"ref_55","first-page":"14","article-title":"A Generalized Residue Number System Design Approach for Ultra-Low Power Arithmetic Circuits Based on Deterministic Bit-Streams","volume":"1","author":"Givaki","year":"2023","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Garner, H.L. (1959, January 3\u20135). The Residue Number System. Proceedings of the Western Joint Computer Conference, San Francisco, CA, USA.","DOI":"10.1145\/1457838.1457864"},{"key":"ref_57","unstructured":"Pei, D., Salomaa, A., and Ding, C. (1996). Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography, World Scientific."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1145\/321662.321665","article-title":"On Euclid\u2019s Algorithm and the Theory of Subresultants","volume":"18","author":"Brown","year":"1971","journal-title":"J. ACM"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Kocherov, Y.N., Samoylenko, D.V., and Koldaev, A.I. (2018, January 2\u20134). Development of an Antinoise Method of Data Sharing Based on the Application of a Two-Step-Up System of Residual Classes. Proceedings of the 2018 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, Russian.","DOI":"10.1109\/FarEastCon.2018.8602764"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Gbolagade, K.A., and Cotofana, S.D. (2009, January 24\u201327). An O(n) Residue Number System to Mixed Radix Conversion Technique. Proceedings of the 2009 IEEE International Symposium on Circuits and Systems, Taipei, Taiwan.","DOI":"10.1109\/ISCAS.2009.5117800"},{"key":"ref_61","unstructured":"Akushsky, I.Y., Akushsky, V.M., and Pak, I.T. (1977). Theory of Coding and Optimization of Complex Systems, Nauka."},{"key":"ref_62","unstructured":"Akushsky, I.Y., Burtsev, V.M., and Pak, N.T. (1977). Theory of Coding and Optimization of Complex Systems, Nauka."},{"key":"ref_63","first-page":"189","article-title":"An Approximate Method for Performing Non-Modular Operations in a System of Residual Classes","volume":"6","author":"Chervyakov","year":"2012","journal-title":"Fundam. Res."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Babenko, M., and Golimblevskaia, E. (2021, January 26\u201329). About One Property of Number Rank in RNS. Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, FL, USA.","DOI":"10.1109\/ElConRus51938.2021.9396072"},{"key":"ref_65","unstructured":"(2023, May 23). NTL: A Library for Doing Number Theory. Available online: https:\/\/libntl.org\/."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/11\/7\/124\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:03:03Z","timestamp":1760126583000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/11\/7\/124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,28]]},"references-count":65,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2023,7]]}},"alternative-id":["computation11070124"],"URL":"https:\/\/doi.org\/10.3390\/computation11070124","relation":{},"ISSN":["2079-3197"],"issn-type":[{"type":"electronic","value":"2079-3197"}],"subject":[],"published":{"date-parts":[[2023,6,28]]}}}