- Cybersecurity and Information Systems
- Advanced Data Processing Techniques
- Coding theory and cryptography
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- Hydrology and Sediment Transport Processes
- Advanced Malware Detection Techniques
- Information Systems and Technology Applications
- Tree Root and Stability Studies
- Advanced Computational Techniques in Science and Engineering
- Cryptography and Residue Arithmetic
- Economic and Technological Systems Analysis
- Soil erosion and sediment transport
- Business and Economic Development
- Advanced Data Storage Technologies
- Technology and Human Factors in Education and Health
- Mathematical Control Systems and Analysis
- Energy Efficient Wireless Sensor Networks
- Cloud Data Security Solutions
- Aeolian processes and effects
- Advanced Research in Systems and Signal Processing
- Scientific Research and Philosophical Inquiry
- Enterprise Management and Information Systems
- stochastic dynamics and bifurcation
Ternopil Ivan Pului National Technical University
2023-2025
University School of Physical Education in Kraków
2025
Państwowa Wyższa Szkoła Zawodowa w Nowym Sączu
2013-2024
State University "Kyiv Aviation Institute"
2024
University of Bielsko-Biała
2014-2023
West Ukrainian National University
2022
Lviv Polytechnic National University
2022
Polish Academy of Sciences
2013-2018
Institute of Geophysics
2013-2018
Increasing internal state security requires an understanding of the factors that influence commission repetitive crimes (recidivism) since crime is not caused by public danger but criminal person. Against background informatization information activities law enforcement agencies, there no doubt about expediency using artificial intelligence algorithms and blockchain technology to predict prevent crimes. The prediction machine-learning models for identifying significant (individual...
Factorization is one of the most important problems in theory numbers and a modern asymmetric cryptography. Known methods factorization are quite cumbersome; therefore, require significant computational resources for processing multi-bit numbers. The relevance problem dictated also by uncertainty regarding theoretical foundation stability disclosure cryptosystems. advanced method on basis Fermat's theorem with help system residual classes has been developed this article. operation squaring...
In this article we consider the methodological basis for constructing a method monitoring bit rate of video stream in conditions changes parameters network channels. The work using interpolation mechanisms discrete-cosine transform frame and also recombination transformants planes described. Shows essence mean square error level control mechanism during transmitting.
In the digital society, states' information security has become one of key elements ensuring competitiveness and sustainable development state, guaranteeing its integrity in general.An important component state is internal which must ensure personal public safety citizens.Modern Ukraine building a new system criminal justice, requires for risk assessment support optimal decision-making.Today, applied research analytical software have acquired special meaning.In paper, there built set models...
The problem of nonlinear substitution generation (S-boxes) is investigated in many related works symmetric key cryptography. In particular, the strength ciphers to linear cryptanalysis directly nonlinearity substitution. addition being highly nonlinear, S-boxes must be random, i.e., not contain hidden mathematical constructs that facilitate algebraic cryptanalysis. such substitutions a complex combinatorial optimization problem. Probabilistic algorithms are used solve it, for instance...
In the rapidly evolving field of digital asset management, centralized and decentralized global registries have become essential tools for organizing, tracking, distributing assets. However, existing systems often face challenges regarding security, censorship resistance, interoperability, customizability, scalability. This research paper aims to address these gaps by proposing a novel registry system based on blockchain technology non-fungible tokens (NFTs). The makes several key...
From the financial and medical sectors to various supply chains, most industries have seen a sea change due blockchain [...]
The S-box is a key component of modern ciphers, determining the quality and performance cryptographic algorithms in which it applied. Many constructions for synthesizing high-quality S-boxes have been established, those based on Galois fields theory—for example, Nyberg construction applied AES algorithm—are particularly important. An integral affine transformation, used to improve avalanche correlation properties S-box. In this paper, new approach adopted transformations quaternary matrices...
The motion of bedload particles is diffusive and occurs within at least three scale ranges: local, intermediate global, each which with a distinctly different diffusion regime. However, these regimes, extensions the ranges boundaries between them remain to be better defined quantified. These issues are explored using Lagrangian model saltating grains over uniform fixed bed. combines deterministic particle dynamics stochastic characteristics such as probability distributions step lengths...
Pseudorandom sequence generation is used in many industries, including cryptographic information security devices, measurement technology, and communication systems. The purpose of the present work to research additive Fibonacci generators (AFG) modified AFG (MAFG) with modules p prime numbers, designed primarily for their hardware implementation. known MAFG, as any pseudorandom sequences, are arguments tremendous values. At same time, there specific difficulties defining statistical...
The paper presents a novel method based on autoencoder neural networks for detection and correction of ECG heartbeats outliers. Commonly., with serious waveform distortions are treated as abnormal skipped from the analysis. However., this leads to poorer statistics., which might be significant in biometric applications. idea is increase number valid using powerful self-learning techniques corrupted segments. In series experiments., optimal architecture detecting electrocardiogram (ECG)...
Abstract Four aquatic plants (i.e., Potamogeton pectinatus L., crispus Myriophyllum spicatum and Ceratophyllum demersum L.) that commonly grow in European lowland rivers lakes exhibit a variety of morphologies differences the internal structures their stem cross sections were selected to investigate influence initial conditions on biomechanical tests. A new method sample testing wet is proposed employed using bench‐top machine. The obtained characteristics, such as breaking strain, force,...
In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on polynomial residue number system for first time. The main feature proposed approach is that when reconstructing method undetermined coefficients, multiplication performed not found base numbers but arbitrarily selected polynomials. latter, together with pairwise coprime residues class system, serve as keys algorithm. Schemes and examples implementation developed encryption algorithm are...
Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends network parameters and number confirmation blocks. These results can be used to define how many blocks vendor should wait after correspondent transaction before sending goods or services.
Distributed Denial of Service (DDoS) attacks are still one the major cybersecurity threats and focus much research on developing DDoS attack mitigation detection techniques. Being able to model can help researchers develop effective countermeasures. Modeling attacks, however, is not an easy task because modern huge simulating them would be impossible in most cases. That’s why use tools like network simulators for modeling attacks. Simulation a widely used technique networking research, but...
This paper presents a basic model that shows the relationship between diameter of stem and its flexural rigidity. The was developed from experimental measurements biomechanical traits (i.e., tensile bending like maximum forces, stresses, moduli elasticity, rigidity, strain) three freshwater macrophyte species (Elodea canadensis Michx., Potamogeton pectinatus L., P. crispus L.), reflecting seasonal changes in plant biomechanics throughout vegetative season. These were obtained with use...
In this paper, the theoretical foundations of developed methods for finding remains multi-digit numbers and Mersenne number in a binary system are given, use which allows reducing time complexity. The numerical experiments characteristics program implementations proposed approaches classical method given. scheme algorithm remainder is
Intensive development of information systems has led to an increase in malicious software, which is associated with the emergence new types cyber attacks. Expanding impact attacks aimed at a variety resources system initiates creation special countermeasures that can be effective threats from unknown or ill-defined properties. There are enough developments, used solve problems identification, for example, method linguistic etalons formation detection intrusion systems, does not disclose...
The following topics are dealt with: learning (artificial intelligence); particle swarm optimisation; wireless sensor networks; feature extraction; evolutionary computation; convolutional neural nets; image classification; search problems.
The objective of the paper was to reveal main techniques and means ensuring integrity data persistent stored database modules implemented in accordance with recommendations Clark–Wilson model as a methodological basis for building system that ensures integrity. considered built according schema universal relations. mechanisms developed process researching problem programs such were based on provisions relational theory, Row Level Security technology, potential modern blockchain model,...
Pseudorandom number and bit sequence generators are widely used in cybersecurity, measurement, other technology fields. A special place among such is occupied by additive Fibonacci (AFG). By itself, a generator not cryptographically strong. Nevertheless, when as primary it can be quite resistant to cryptanalysis generators. This paper proposes modification AGF, the essence of which use prime numbers modules recurrent equations describing operation made possible ensure constancy repetition...
The existence of modern humanity directly depends on environmental security. Human society, biodiversity, ecosystems, and climate safety are interdependent. anthropogenic influence that causes irreversible change threatens both the ecosystem’s humans’ survival. To maintain a balance between human well-being safe environment, it is important to have diverse knowledge interrelations technological impact natural environment an understanding action strategies mitigate ensure sustainable...