- Cryptography and Residue Arithmetic
- Chaos-based Image/Signal Encryption
- Cybersecurity and Information Systems
- Coding theory and cryptography
- Cryptography and Data Security
- Cryptographic Implementations and Security
- Educational Innovations and Challenges
- Innovative Educational Technologies
- Advanced Data Processing Techniques
- Legal and Policy Issues
- Security, Politics, and Digital Transformation
- Neural Networks and Applications
- Intuitionistic Fuzzy Systems Applications
- Education and Professional Development
- Information Systems and Technology Applications
- Crime Patterns and Interventions
- Numerical Methods and Algorithms
- Stalking, Cyberstalking, and Harassment
- Digital and Cyber Forensics
- Commutative Algebra and Its Applications
- Enterprise Management and Information Systems
- Educational Leadership and Innovation
- Cloud Data Security Solutions
- Aerospace, Electronics, Mathematical Modeling
- Fractal and DNA sequence analysis
West Ukrainian National University
2016-2025
National University of the West
2021
Increasing internal state security requires an understanding of the factors that influence commission repetitive crimes (recidivism) since crime is not caused by public danger but criminal person. Against background informatization information activities law enforcement agencies, there no doubt about expediency using artificial intelligence algorithms and blockchain technology to predict prevent crimes. The prediction machine-learning models for identifying significant (individual...
In the digital society, states' information security has become one of key elements ensuring competitiveness and sustainable development state, guaranteeing its integrity in general.An important component state is internal which must ensure personal public safety citizens.Modern Ukraine building a new system criminal justice, requires for risk assessment support optimal decision-making.Today, applied research analytical software have acquired special meaning.In paper, there built set models...
The paper develops a symmetric cryptoalgorithm based on hierarchical system of remainder classes that allows to efficiently encrypt text messages using the remainders from dividing numerical form plaintext into corresponding modules. peculiarity this algorithm is its stepwise structure, which gradually reduce bit depth modules and operands at each level. software implementation relevant experimental studies have shown abovementioned highly resistant cryptanalytic attacks due multi-level...
This paper presents a new encryption technique, which combines affine ciphers and the residue number system. makes it possible to eliminate shortcomings vulnerabilities of ciphers, are sensitive cryptanalysis, using advantages system, i.e., parallelization calculation processes, performing operations on low bit numbers, linear combination encrypted residues. A mathematical apparatus graphic scheme system is developed, corresponding example given. Special cases such as shift considered. The...
Blockchain technology has emerged as a transformative solution to address specific aspects of emergency management systems by providing decentralized and distributed ledger infrastructure that enhances data immutability, transparency, traceability. This study presents comprehensive bibliometric analysis blockchain applications in covering the period from 2017 2024 based on 248 research articles indexed Web Science Core Collection. The examines collaboration networks, co-citation patterns,...
Distance education has become the mandatory component of higher establishments all over world including Ukraine regarding COVID-19 lockdown and intentions Universities to render valuable knowledge provide safe educational experience for students. The present study aimed explore student’s academic staff’s attitude towards e-learning most complicated challenges online learning distance education. Our findings disclosed that using Zoom, Moodle, Google Meet, BigBlueButton Cisco quite popular...
In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on polynomial residue number system for first time. The main feature proposed approach is that when reconstructing method undetermined coefficients, multiplication performed not found base numbers but arbitrarily selected polynomials. latter, together with pairwise coprime residues class system, serve as keys algorithm. Schemes and examples implementation developed encryption algorithm are...
The improvement of the implementation RSA cryptographic algorithm for encrypting / decoding information flows based on use vector-modular method modular exponential is presented in this paper. This makes it possible to replace complex operation multiplication with addition operation, which increases speed cryptosystem. scheme algorithms and exponentiation presented. analytical graphical comparison time complexities proposed known approaches shows that reduces temporal complexity compared...
In this paper, the theoretical foundations of developed methods for finding remains multi-digit numbers and Mersenne number in a binary system are given, use which allows reducing time complexity. The numerical experiments characteristics program implementations proposed approaches classical method given. scheme algorithm remainder is
The method for finding inverse element by the module is based on stepwise addition of residue developed in this paper. This allows avoiding performing complex arithmetic operations and implementing calculations numbers much lower bit compared to classical approach Euclid's algorithm its consequences. Analytical expressions time complexity characteristics are obtained their graphic depending built. Software hardware modules specified methods basis environment development AldecActive-HDL 9.1...
The following topics are dealt with: learning (artificial intelligence); particle swarm optimisation; wireless sensor networks; feature extraction; evolutionary computation; convolutional neural nets; image classification; search problems.
The existence of modern humanity directly depends on environmental security. Human society, biodiversity, ecosystems, and climate safety are interdependent. anthropogenic influence that causes irreversible change threatens both the ecosystem’s humans’ survival. To maintain a balance between human well-being safe environment, it is important to have diverse knowledge interrelations technological impact natural environment an understanding action strategies mitigate ensure sustainable...
CI/CD systems allow automation of the processes software development, testing, and delivery, which greatly simplifies work developers. Kubernetes, an open-source container orchestration platform, has become increasingly popular among developers due to its ability automate deployment, scaling, management containerized applications. However, with growing use security concerns have emerged, highlighting numerous vulnerabilities in design, implementation, operation Kubernetes environment. In...
The article analyzes the concept of "competence", "research competence", outlines that components research competence students are: knowledge, abilities, skills, abilities and experience activities. Based on analysis scientific methodological literature, it has been determined is ability participants in educational process to perform tasks involving modeling physical astronomical phenomena processes using specialized software environment. study focuses possibilities information communication...
This paper presents the implementation of ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on application vector-modular method modular exponentiation and multiplication. allows us to replace complex operation with multiplication last one addition that increases speed cryptosystem. In accordance this, reduce temporal complexity in comparison classical one.
This paper presents the theoretical foundations of finding inverse a polynomial modulo in ring Z[x] based on method undetermined coefficients. The use latter makes it possible to significantly reduce time complexity calculations avoiding operation greatest common divisor. An example calculating proposed approach is given. Analytical expressions complexities developed and classical methods depending degrees polynomials are built. graphic dependence performing presented, which shows advantages...
Internal security of the state is one prerequisites for sustainable development. To ensure public safety and personal citizens, it necessary to develop effective measures reduce crime prevent in future. The starting point development practical implementation an strategy combat or certain crimes criminological forecasting. Individual forecasting aimed at determining possibility committing a (crimes) future by person group persons. For risk assessment, following are traditionally used machine...