А. В. Соколов

ORCID: 0000-0003-0283-7229
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • graph theory and CDMA systems
  • Cryptographic Implementations and Security
  • Cybersecurity and Information Systems
  • Chaos-based Image/Signal Encryption
  • GNSS positioning and interference
  • Cellular Automata and Applications
  • Ionosphere and magnetosphere dynamics
  • Advanced Wireless Communication Techniques
  • Advanced Computational Techniques in Science and Engineering
  • Error Correcting Code Techniques
  • Information Systems and Technology Applications
  • Varied Academic Research Topics
  • Radiomics and Machine Learning in Medical Imaging
  • Glioma Diagnosis and Treatment
  • Ferroptosis and cancer prognosis
  • MicroRNA in disease regulation
  • Mathematical Control Systems and Analysis
  • Geophysics and Gravity Measurements
  • Epigenetics and DNA Methylation
  • Advanced Scientific Research Methods
  • Advanced Data Processing Techniques
  • Wireless Communication Networks Research
  • Cancer Genomics and Diagnostics
  • Digital Media Forensic Detection

National University Odesa Law Academy
2024-2025

Kazan Federal University
2021-2023

Center for Systems Biology
2017-2023

Harvard University
2017-2023

Odessa National Polytechnic University
2013-2022

Institute of Physics
2021-2022

Glioma diagnosis is based on histomorphology and grading; however, such classification does not have predictive clinical outcome after glioblastomas developed. To date, no bona fide biomarkers that significantly translate into a survival benefit to glioblastoma patients been identified. We previously reported the IDH mutant G-CIMP-high subtype would be predecessor G-CIMP-low subtype. Here, we performed comprehensive DNA methylation longitudinal analysis of diffuse gliomas from 77 (200...

10.1016/j.celrep.2018.03.107 article EN cc-by Cell Reports 2018-04-01

The S-box is a key component of modern ciphers, determining the quality and performance cryptographic algorithms in which it applied. Many constructions for synthesizing high-quality S-boxes have been established, those based on Galois fields theory—for example, Nyberg construction applied AES algorithm—are particularly important. An integral affine transformation, used to improve avalanche correlation properties S-box. In this paper, new approach adopted transformations quaternary matrices...

10.3390/electronics14102094 article EN Electronics 2025-05-21

The widespread use of block symmetric ciphers in modern information security systems makes the task increasing their efficiency urgent, as well synthesizing high-quality cryptographic primitives used ciphers, primarily S-boxes. In particular, S-boxes must have good avalanche characteristics not only component Boolean functions, but also functions many-valued logic. this paper, we propose a recursive method for synthesis large lengths that satisfy strict criterion 4-functions. As raw material...

10.1080/09720529.2021.1964727 article EN Journal of Discrete Mathematical Sciences and Cryptography 2022-03-08

A large number of genomic and imaging datasets are being produced by consortia that seek to characterize healthy disease tissues at single-cell resolution. While much effort has been devoted capturing information related biospecimen experimental procedures, the metadata standards describe data matrices analysis workflows them relatively lacking. Detailed schema needed facilitate sharing interoperability across groups promote provenance for reproducibility. To address this need, we developed...

10.1101/2023.03.06.531314 preprint EN cc-by bioRxiv (Cold Spring Harbor Laboratory) 2023-03-07

Abstract A prototype of a low-cost GNSS receiver assembled on base the u-blox ZED-F9P module is described in paper. The original (OGNSS-R) allows made parallel registration 184 channels entire frequency range (1176 ÷ 1610 MHz) main (GPS, GLONASS, Galileo, Beidou) and recording raw data carrier-phase, pseudorange (code) signal strength measurements. obtained processing to calculate slant total electron content (TEC), TEC variations other most popular TEC-based indices ionospheric activity....

10.1088/1742-6596/1991/1/012020 article EN Journal of Physics Conference Series 2021-07-01

SUMMARY Histomorphology and current grading schemes are unable to predict glioma relapse malignant tumor progression. We reported that the IDH-mutant associated Glioma-CpG Island Methylator Phenotype (G-CIMP) can be further divided into two clinically distinct subtypes independent of histopathological (G-CIMP-high -low) with evidence correlation Here we performed a comprehensive epigenomic analysis 74 longitudinally collected samples (grade II-IV) understand recurrence from G-CIMP-high...

10.1101/156646 preprint EN bioRxiv (Cold Spring Harbor Laboratory) 2017-06-28

ГЕНЕРАТОР КЛЮЧЕВЫХ ПОСЛЕДОВАТЕЛЬНОСТЕЙ НА ОСНОВЕ ДУАЛЬНЫХ ПАР БЕНТ-ФУНКЦИЙМ.І.Мазурков, М

10.15276/opu.3.42.2013.30 article RU cc-by Odes’kyi Politechnichnyi Universytet Pratsi 2013-12-05

The S-box is the most important component of modern cryptographic algorithms which largely determines quality transformation.The method estimating S-boxes employs their representation as Boolean functions to criteria are applied.Such include: nonlinearity, correlation immunity, an error propagation criterion, and a strict avalanche criterion.Nevertheless, it obvious that cryptanalyst not constrained in ways representing cipher components, particular, using many-valued logic.The design...

10.31772/2587-6066-2019-20-2-183-190 article EN Siberian Journal of Science and Technology 2019-01-01

Practical application of advanced algebraic constructions in modern communication systems based on MC-CDMA (Multi Code Division Multiple Access) technology and cryptography necessitates their further research. One the most commonly used construction is binary bent-function having a uniform amplitude spectrum Walsh-Hadamard transform and, accordingly, maximal distance from codewords affine code. In addition to bent-functions researchers are currently focuses development synthesis methods...

10.21122/2309-4923-2017-1-77-85 article EN cc-by «System analysis and applied information science» 2017-05-04

The current stage in the development of cryptography is characterized by attention researchers to methods many-valued logic. Of particular importance are three-valued logic, which used quantum cryptography, as well cryptographic algorithms with an increased level strength, implemented on binary computers. This circumstance leads need for further improvement constructing high-quality primitives. paper devoted generalization definition correlation immunity logic functions context properties...

10.1080/09720529.2020.1781882 article EN Journal of Discrete Mathematical Sciences and Cryptography 2020-10-11

10.15276/opu.1.43.2014.31 article EN cc-by Odes’kyi Politechnichnyi Universytet Pratsi 2014-06-10

Cryptographic methods today are a crucial tool for constructing information security systems. At the same time, to solve problem of encrypting large amounts information, block or stream symmetric ciphers mainly preferred because their efficiency and proven cryptographic strength, including against perspective quantum cryptanalysis. The effectiveness modern largely depends on S-boxes applied in construction, quality which determines degree implementation concepts diffusion confusion by...

10.23939/ujit2023.02.041 article EN Ukrainian Journal of Information Technology 2023-01-01

Recognizing the sounding objects in scenes is a longstanding objective embodied AI, with diverse applications robotics and AR/VR/MR. To that end, Audio-Visual Segmentation (AVS), taking as condition an audio signal to identify masks of target input image synchronous camera microphone sensors, has been recently advanced. However, this paradigm still insufficient for real-world operation, mapping from 2D images 3D missing. address fundamental limitation, we introduce novel research problem,...

10.48550/arxiv.2411.02236 preprint EN arXiv (Cornell University) 2024-11-04

10.3103/s0735272717120032 article EN Radioelectronics and Communications Systems 2017-12-01

The article is devoted to research of the application artificial intelligence in military sphere. Due rapid development information technologies and growth data volumes, use becoming more relevant for effective latest solving tasks. purpose determine how can help improve performance military. hypothesis that operations lead improved efficiency accuracy decision-making. paper discusses main possibilities using sphere specifics advantages its use. Research indicates implementation identify...

10.28925/2663-4023.2024.25.161176 article EN cc-by-nc-sa Cybersecurity Education Science Technique 2024-01-01

The paper is devoted to the research of interrelation between classes such perfect algebraic constructions as binary arrays and bentsequences.The normal form bent-sequences length 16 n  that generate order 4 N , are presented.The exact number in full set 64 found.The lower bound cardinality class 8 improved.

10.32782/cmis/2353-27 article EN 2019-01-01
Coming Soon ...