Mykhailo Kasianchuk

ORCID: 0000-0002-4469-8055
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Residue Arithmetic
  • Chaos-based Image/Signal Encryption
  • Cybersecurity and Information Systems
  • Coding theory and cryptography
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Educational Innovations and Challenges
  • Innovative Educational Technologies
  • Advanced Data Processing Techniques
  • Legal and Policy Issues
  • Security, Politics, and Digital Transformation
  • Neural Networks and Applications
  • Intuitionistic Fuzzy Systems Applications
  • Education and Professional Development
  • Information Systems and Technology Applications
  • Crime Patterns and Interventions
  • Numerical Methods and Algorithms
  • Stalking, Cyberstalking, and Harassment
  • Digital and Cyber Forensics
  • Commutative Algebra and Its Applications
  • Enterprise Management and Information Systems
  • Educational Leadership and Innovation
  • Cloud Data Security Solutions
  • Aerospace, Electronics, Mathematical Modeling
  • Fractal and DNA sequence analysis

West Ukrainian National University
2016-2025

National University of the West
2021

Increasing internal state security requires an understanding of the factors that influence commission repetitive crimes (recidivism) since crime is not caused by public danger but criminal person. Against background informatization information activities law enforcement agencies, there no doubt about expediency using artificial intelligence algorithms and blockchain technology to predict prevent crimes. The prediction machine-learning models for identifying significant (individual...

10.3390/info14030161 article EN cc-by Information 2023-03-03

In the digital society, states' information security has become one of key elements ensuring competitiveness and sustainable development state, guaranteeing its integrity in general.An important component state is internal which must ensure personal public safety citizens.Modern Ukraine building a new system criminal justice, requires for risk assessment support optimal decision-making.Today, applied research analytical software have acquired special meaning.In paper, there built set models...

10.24425/ijet.2023.144365 article EN cc-by-nc-nd International Journal of Electronics and Telecommunications 2022-12-27

The paper develops a symmetric cryptoalgorithm based on hierarchical system of remainder classes that allows to efficiently encrypt text messages using the remainders from dividing numerical form plaintext into corresponding modules. peculiarity this algorithm is its stepwise structure, which gradually reduce bit depth modules and operands at each level. software implementation relevant experimental studies have shown abovementioned highly resistant cryptanalytic attacks due multi-level...

10.47839/ijc.24.1.3880 article EN International Journal of Computing 2025-03-31

This paper presents a new encryption technique, which combines affine ciphers and the residue number system. makes it possible to eliminate shortcomings vulnerabilities of ciphers, are sensitive cryptanalysis, using advantages system, i.e., parallelization calculation processes, performing operations on low bit numbers, linear combination encrypted residues. A mathematical apparatus graphic scheme system is developed, corresponding example given. Special cases such as shift considered. The...

10.3390/cryptography9020026 article EN cc-by Cryptography 2025-04-24

Blockchain technology has emerged as a transformative solution to address specific aspects of emergency management systems by providing decentralized and distributed ledger infrastructure that enhances data immutability, transparency, traceability. This study presents comprehensive bibliometric analysis blockchain applications in covering the period from 2017 2024 based on 248 research articles indexed Web Science Core Collection. The examines collaboration networks, co-citation patterns,...

10.3390/app15105405 article EN cc-by Applied Sciences 2025-05-12

Distance education has become the mandatory component of higher establishments all over world including Ukraine regarding COVID-19 lockdown and intentions Universities to render valuable knowledge provide safe educational experience for students. The present study aimed explore student’s academic staff’s attitude towards e-learning most complicated challenges online learning distance education. Our findings disclosed that using Zoom, Moodle, Google Meet, BigBlueButton Cisco quite popular...

10.55056/cte.237 article EN cc-by CTE Workshop Proceedings 2021-03-19

In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on polynomial residue number system for first time. The main feature proposed approach is that when reconstructing method undetermined coefficients, multiplication performed not found base numbers but arbitrarily selected polynomials. latter, together with pairwise coprime residues class system, serve as keys algorithm. Schemes and examples implementation developed encryption algorithm are...

10.1155/2024/4894415 article EN cc-by Journal of Applied Mathematics 2024-01-01

The improvement of the implementation RSA cryptographic algorithm for encrypting / decoding information flows based on use vector-modular method modular exponential is presented in this paper. This makes it possible to replace complex operation multiplication with addition operation, which increases speed cryptosystem. scheme algorithms and exponentiation presented. analytical graphical comparison time complexities proposed known approaches shows that reduces temporal complexity compared...

10.1109/tcset.2018.8336262 article EN 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET) 2018-02-01

In this paper, the theoretical foundations of developed methods for finding remains multi-digit numbers and Mersenne number in a binary system are given, use which allows reducing time complexity. The numerical experiments characteristics program implementations proposed approaches classical method given. scheme algorithm remainder is

10.1109/acitt.2019.8779899 article EN 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) 2019-06-01

The method for finding inverse element by the module is based on stepwise addition of residue developed in this paper. This allows avoiding performing complex arithmetic operations and implementing calculations numbers much lower bit compared to classical approach Euclid's algorithm its consequences. Analytical expressions time complexity characteristics are obtained their graphic depending built. Software hardware modules specified methods basis environment development AldecActive-HDL 9.1...

10.1109/idaacs.2017.8095054 article EN 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2017-09-01

The following topics are dealt with: learning (artificial intelligence); particle swarm optimisation; wireless sensor networks; feature extraction; evolutionary computation; convolutional neural nets; image classification; search problems.

10.1109/idaacs.2019.8924395 article EN 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2019-09-01

The existence of modern humanity directly depends on environmental security. Human society, biodiversity, ecosystems, and climate safety are interdependent. anthropogenic influence that causes irreversible change threatens both the ecosystem’s humans’ survival. To maintain a balance between human well-being safe environment, it is important to have diverse knowledge interrelations technological impact natural environment an understanding action strategies mitigate ensure sustainable...

10.1155/2023/5584750 article EN cc-by Complexity 2023-11-07

CI/CD systems allow automation of the processes software development, testing, and delivery, which greatly simplifies work developers. Kubernetes, an open-source container orchestration platform, has become increasingly popular among developers due to its ability automate deployment, scaling, management containerized applications. However, with growing use security concerns have emerged, highlighting numerous vulnerabilities in design, implementation, operation Kubernetes environment. In...

10.1109/acit58437.2023.10275654 article EN 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) 2023-09-21

The article analyzes the concept of "competence", "research competence", outlines that components research competence students are: knowledge, abilities, skills, abilities and experience activities. Based on analysis scientific methodological literature, it has been determined is ability participants in educational process to perform tasks involving modeling physical astronomical phenomena processes using specialized software environment. study focuses possibilities information communication...

10.1109/acit54803.2022.9913116 article EN 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) 2022-09-26

This paper presents the implementation of ELGamal cryptoalgorithm for information flows encryption / decryption, which is based on application vector-modular method modular exponentiation and multiplication. allows us to replace complex operation with multiplication last one addition that increases speed cryptosystem. In accordance this, reduce temporal complexity in comparison classical one.

10.1109/tcset49122.2020.235572 article EN 2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET) 2020-02-01

This paper presents the theoretical foundations of finding inverse a polynomial modulo in ring Z[x] based on method undetermined coefficients. The use latter makes it possible to significantly reduce time complexity calculations avoiding operation greatest common divisor. An example calculating proposed approach is given. Analytical expressions complexities developed and classical methods depending degrees polynomials are built. graphic dependence performing presented, which shows advantages...

10.7494/csci.2024.25.2.5740 article EN publisher-specific-oa Computer Science 2024-07-03

Internal security of the state is one prerequisites for sustainable development. To ensure public safety and personal citizens, it necessary to develop effective measures reduce crime prevent in future. The starting point development practical implementation an strategy combat or certain crimes criminological forecasting. Individual forecasting aimed at determining possibility committing a (crimes) future by person group persons. For risk assessment, following are traditionally used machine...

10.24425/ijet.2024.149598 article EN cc-by-nc-nd International Journal of Electronics and Telecommunications 2024-07-25

10.1109/acit62333.2024.10712566 article EN 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) 2024-09-19

10.1109/acit62333.2024.10712567 article EN 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) 2024-09-19
Coming Soon ...