Showing: 1 - 6 of 8 RESULTS
Information Technology and Cybersecurity (new)Development of software for applied statistical analysis of random variables

Development of software for applied statistical analysis of random variables

Development of software for applied statistical analysis of random variables Oleksii Klymenko ORCID: https://orcid.org/0009-0009-5164-1688 Oles Honchar Dnipro National University Classical applied mathematical statistics is a branch of mathematical science that deals with the development and application of mathematical methods and models for the collection, analysis, interpretation and presentation of empirical data. It includes a wide range of methods used to study patterns in data, estimate distribution parameters, test hypotheses, and make predictions. Classical applied mathematical statistics is used in various …

Information Technology and Cybersecurity (new)Performance testing of an exact algorithm for the Subset Sum Problem on different personal computers

Performance testing of an exact algorithm for the Subset Sum Problem on different personal computers

Performance testing of an exact algorithm for the Subset Sum Problem on different personal computers Mykhailo Lenskyi ORCID: https://orcid.org/0009-0001-1445-2142 Oles Honchar Dnipro National University Hanna Mykhalchuk ORCID: https://orcid.org/0000-0002-5476-6349 Oles Honchar Dnipro National University This paper investigates the performance of an exact algorithm for the NP-complete Subset Sum Problem on different personal computers. The Subset Sum Problem asks whether there exists a subset of a given set of integers that sums up to a specified target value. Finding exact solutions for …

Information Technology and Cybersecurity (new)Decision Support Information Technology in Video Surveillance and Monitoring Tasks

Decision Support Information Technology in Video Surveillance and Monitoring Tasks

Decision Support Information Technology in Video Surveillance and Monitoring Tasks Kostiantyn Sukovenko ORCID: https://orcid.org/0009-0002-8109-9382 Oles Honchar Dnipro National University In today’s world, video surveillance plays a crucial role in ensuring security and control in various sectors. One of the key elements of this technology is automated video analysis, which utilizes artificial intelligence algorithms for object recognition, behavior analysis, and anomaly detection. This article discusses the information technology of decision support in video surveillance and monitoring tasks in response to the …

Information Technology and Cybersecurity (new)Comparison of Multiprocessor and Multi-Threaded Implementations of the Entropy Approach to Impute Gaps in Data in Python

Comparison of Multiprocessor and Multi-Threaded Implementations of the Entropy Approach to Impute Gaps in Data in Python

Comparison of Multiprocessor and Multi-Threaded Implementations of the Entropy Approach to Impute Gaps in Data in Python Oleksii Zemlianyi ORCID: https://orcid.org/0009-0001-6157-8725 Oles Honchar Dnipro National University Oleh Baibuz ORCID: https://orcid.org/0000-0001-7489-6952 Oles Honchar Dnipro National University The comparison of sequential, multi-processor, and multi-threaded implementations of the entropy-based approach for data imputation is being considered in Python programming language. The main goal of the work is to investigate approaches to optimizing computations when implementing the entropy-based approach for data imputation. The authors …

Information Technology and Cybersecurity (new)Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives

Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives

Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives Yevhen Kotukh ORCID: https://orcid.org/0000-0003-4997-620X Dnipro University of Technology Hennadii Khalimov ORCID: https://orcid.org/0000-0002-2054-9186 Kharkiv National University of Radio Electronics Computationally complex tasks, or “hard problems” for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex problem. Two hard problems have been widely used in …

Information Technology and Cybersecurity (new)Estimates of the approximation errors of the classes of continuous

Estimates of the approximation errors of the classes of continuous

Estimates of the approximation errors of the classes of continuous Oleksandr Shchytov ORCID: https://orcid.org/0000-0002-1435-2918 TEC-Lyceum No. 100 Mykola Mormul ORCID: https://orcid.org/0000-0002-8036-3236 University of Customs and Finance In the metrics of continuous and non-decreasing functions φ(x), the following are obtained: a) estimates of the approximation of the classes of 1-periodic functions W^(2ν+1) Hω* (ν ∈ N), where ω(t) is an upwardly convex modulus of continuity, and by interpolating the functions f(t) ∈ W^(2ν+1) Hω*; b) by piecewise constant functions σ_n (f,t) …