Showing: 13 - 18 of 19 RESULTS
Information Technology and CybersecurityPerformance testing of an exact algorithm for the Subset Sum Problem on different personal computers

Performance testing of an exact algorithm for the Subset Sum Problem on different personal computers

Performance testing of an exact algorithm for the Subset Sum Problem on different personal computers Mykhailo Lenskyi ORCID: https://orcid.org/0009-0001-1445-2142 Oles Honchar Dnipro National University Hanna Mykhalchuk ORCID: https://orcid.org/0000-0002-5476-6349 Oles Honchar Dnipro National University This paper investigates the performance of an exact algorithm for the NP-complete Subset Sum Problem on different personal computers. The Subset Sum Problem asks whether there exists a subset of a given set of integers that sums up to a specified target value. Finding exact solutions for …

Information Technology and CybersecurityDecision Support Information Technology in Video Surveillance and Monitoring Tasks

Decision Support Information Technology in Video Surveillance and Monitoring Tasks

Decision Support Information Technology in Video Surveillance and Monitoring Tasks Kostiantyn Sukovenko ORCID: https://orcid.org/0009-0002-8109-9382 Oles Honchar Dnipro National University In today’s world, video surveillance plays a crucial role in ensuring security and control in various sectors. One of the key elements of this technology is automated video analysis, which utilizes artificial intelligence algorithms for object recognition, behavior analysis, and anomaly detection. This article discusses the information technology of decision support in video surveillance and monitoring tasks in response to the …

Information Technology and CybersecurityComparison of Multiprocessor and Multi-Threaded Implementations of the Entropy Approach to Impute Gaps in Data in Python

Comparison of Multiprocessor and Multi-Threaded Implementations of the Entropy Approach to Impute Gaps in Data in Python

Comparison of Multiprocessor and Multi-Threaded Implementations of the Entropy Approach to Impute Gaps in Data in Python Oleksii Zemlianyi ORCID: https://orcid.org/0009-0001-6157-8725 Oles Honchar Dnipro National University Oleh Baibuz ORCID: https://orcid.org/0000-0001-7489-6952 Oles Honchar Dnipro National University The comparison of sequential, multi-processor, and multi-threaded implementations of the entropy-based approach for data imputation is being considered in Python programming language. The main goal of the work is to investigate approaches to optimizing computations when implementing the entropy-based approach for data imputation. The authors …

Information Technology and CybersecurityAdvantages of Logarithmic Signatures in the Implementation of Crypto Primitives

Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives

Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives Yevhen Kotukh ORCID: https://orcid.org/0000-0003-4997-620X Dnipro University of Technology Hennadii Khalimov ORCID: https://orcid.org/0000-0002-2054-9186 Kharkiv National University of Radio Electronics Computationally complex tasks, or “hard problems” for brevity, is a broad term that encompasses problems that require a significant number of resources to solve. Cryptography uses them by establishing an equivalence between the security of a scheme and the intractability of a complex problem. Two hard problems have been widely used in …

Information Technology and CybersecurityEstimates of the approximation errors of the classes of continuous

Estimates of the approximation errors of the classes of continuous

Estimates of the approximation errors of the classes of continuous Oleksandr Shchytov ORCID: https://orcid.org/0000-0002-1435-2918 TEC-Lyceum No. 100 Mykola Mormul ORCID: https://orcid.org/0000-0002-8036-3236 University of Customs and Finance In the metrics of continuous and non-decreasing functions φ(x), the following are obtained: a) estimates of the approximation of the classes of 1-periodic functions W^(2ν+1) Hω* (ν ∈ N), where ω(t) is an upwardly convex modulus of continuity, and by interpolating the functions f(t) ∈ W^(2ν+1) Hω*; b) by piecewise constant functions σ_n (f,t) …

Information Technology and CybersecurityCyber Risk Insurance as a Component of an Effective Management System: The Case of Ukraine

Cyber Risk Insurance as a Component of an Effective Management System: The Case of Ukraine

Cyber Risk Insurance as a Component of an Effective Management System: The Case of Ukraine Hanna Niameshchuk ORCID: https://orcid.org/0000-0003-3199-8988 Oles Honchar Dnipro National University Veronika Bila ORCID: https://orcid.org/0009-0002-6810-0473 Oles Honchar Dnipro National University The development of the digital economy, driven by constant technological advancements, raises cybersecurity concerns. Modern organizations naturally respond to increased cyberattack risks by demanding corresponding insurance services. Ukrainian insurance companies are diversifying their product policies in response to the heightened issue of cyber risks, identifying leakage of …