- Coding theory and cryptography
- graph theory and CDMA systems
- Cryptographic Implementations and Security
- Cybersecurity and Information Systems
- Chaos-based Image/Signal Encryption
- GNSS positioning and interference
- Cellular Automata and Applications
- Ionosphere and magnetosphere dynamics
- Advanced Wireless Communication Techniques
- Advanced Computational Techniques in Science and Engineering
- Error Correcting Code Techniques
- Information Systems and Technology Applications
- Varied Academic Research Topics
- Radiomics and Machine Learning in Medical Imaging
- Glioma Diagnosis and Treatment
- Ferroptosis and cancer prognosis
- MicroRNA in disease regulation
- Mathematical Control Systems and Analysis
- Geophysics and Gravity Measurements
- Epigenetics and DNA Methylation
- Advanced Scientific Research Methods
- Advanced Data Processing Techniques
- Wireless Communication Networks Research
- Cancer Genomics and Diagnostics
- Digital Media Forensic Detection
National University Odesa Law Academy
2024-2025
Kazan Federal University
2021-2023
Center for Systems Biology
2017-2023
Harvard University
2017-2023
Odessa National Polytechnic University
2013-2022
Institute of Physics
2021-2022
Glioma diagnosis is based on histomorphology and grading; however, such classification does not have predictive clinical outcome after glioblastomas developed. To date, no bona fide biomarkers that significantly translate into a survival benefit to glioblastoma patients been identified. We previously reported the IDH mutant G-CIMP-high subtype would be predecessor G-CIMP-low subtype. Here, we performed comprehensive DNA methylation longitudinal analysis of diffuse gliomas from 77 (200...
The S-box is a key component of modern ciphers, determining the quality and performance cryptographic algorithms in which it applied. Many constructions for synthesizing high-quality S-boxes have been established, those based on Galois fields theory—for example, Nyberg construction applied AES algorithm—are particularly important. An integral affine transformation, used to improve avalanche correlation properties S-box. In this paper, new approach adopted transformations quaternary matrices...
The widespread use of block symmetric ciphers in modern information security systems makes the task increasing their efficiency urgent, as well synthesizing high-quality cryptographic primitives used ciphers, primarily S-boxes. In particular, S-boxes must have good avalanche characteristics not only component Boolean functions, but also functions many-valued logic. this paper, we propose a recursive method for synthesis large lengths that satisfy strict criterion 4-functions. As raw material...
A large number of genomic and imaging datasets are being produced by consortia that seek to characterize healthy disease tissues at single-cell resolution. While much effort has been devoted capturing information related biospecimen experimental procedures, the metadata standards describe data matrices analysis workflows them relatively lacking. Detailed schema needed facilitate sharing interoperability across groups promote provenance for reproducibility. To address this need, we developed...
Abstract A prototype of a low-cost GNSS receiver assembled on base the u-blox ZED-F9P module is described in paper. The original (OGNSS-R) allows made parallel registration 184 channels entire frequency range (1176 ÷ 1610 MHz) main (GPS, GLONASS, Galileo, Beidou) and recording raw data carrier-phase, pseudorange (code) signal strength measurements. obtained processing to calculate slant total electron content (TEC), TEC variations other most popular TEC-based indices ionospheric activity....
SUMMARY Histomorphology and current grading schemes are unable to predict glioma relapse malignant tumor progression. We reported that the IDH-mutant associated Glioma-CpG Island Methylator Phenotype (G-CIMP) can be further divided into two clinically distinct subtypes independent of histopathological (G-CIMP-high -low) with evidence correlation Here we performed a comprehensive epigenomic analysis 74 longitudinally collected samples (grade II-IV) understand recurrence from G-CIMP-high...
ГЕНЕРАТОР КЛЮЧЕВЫХ ПОСЛЕДОВАТЕЛЬНОСТЕЙ НА ОСНОВЕ ДУАЛЬНЫХ ПАР БЕНТ-ФУНКЦИЙМ.І.Мазурков, М
The S-box is the most important component of modern cryptographic algorithms which largely determines quality transformation.The method estimating S-boxes employs their representation as Boolean functions to criteria are applied.Such include: nonlinearity, correlation immunity, an error propagation criterion, and a strict avalanche criterion.Nevertheless, it obvious that cryptanalyst not constrained in ways representing cipher components, particular, using many-valued logic.The design...
Practical application of advanced algebraic constructions in modern communication systems based on MC-CDMA (Multi Code Division Multiple Access) technology and cryptography necessitates their further research. One the most commonly used construction is binary bent-function having a uniform amplitude spectrum Walsh-Hadamard transform and, accordingly, maximal distance from codewords affine code. In addition to bent-functions researchers are currently focuses development synthesis methods...
The current stage in the development of cryptography is characterized by attention researchers to methods many-valued logic. Of particular importance are three-valued logic, which used quantum cryptography, as well cryptographic algorithms with an increased level strength, implemented on binary computers. This circumstance leads need for further improvement constructing high-quality primitives. paper devoted generalization definition correlation immunity logic functions context properties...
Cryptographic methods today are a crucial tool for constructing information security systems. At the same time, to solve problem of encrypting large amounts information, block or stream symmetric ciphers mainly preferred because their efficiency and proven cryptographic strength, including against perspective quantum cryptanalysis. The effectiveness modern largely depends on S-boxes applied in construction, quality which determines degree implementation concepts diffusion confusion by...
Recognizing the sounding objects in scenes is a longstanding objective embodied AI, with diverse applications robotics and AR/VR/MR. To that end, Audio-Visual Segmentation (AVS), taking as condition an audio signal to identify masks of target input image synchronous camera microphone sensors, has been recently advanced. However, this paradigm still insufficient for real-world operation, mapping from 2D images 3D missing. address fundamental limitation, we introduce novel research problem,...
The article is devoted to research of the application artificial intelligence in military sphere. Due rapid development information technologies and growth data volumes, use becoming more relevant for effective latest solving tasks. purpose determine how can help improve performance military. hypothesis that operations lead improved efficiency accuracy decision-making. paper discusses main possibilities using sphere specifics advantages its use. Research indicates implementation identify...
The paper is devoted to the research of interrelation between classes such perfect algebraic constructions as binary arrays and bentsequences.The normal form bent-sequences length 16 n that generate order 4 N , are presented.The exact number in full set 64 found.The lower bound cardinality class 8 improved.