Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.
Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.
Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.
Freedom of access to the global network. Ease of use compared with the library. The Internet is a cost-effective source of research and self-knowledge and confidence. Language tools that have the potential to translate pages. Disadvantages of the network.
Philosophy of Agile-management 3.0 as a factor in the development of technological progress in the context of a digital society. The concept of Agile management 3.0, its role in the preparation of a coach. The evolution of platforms in the service sector.
Цінності, засади та практики відомих методологій, що підтримують принципи гнучкої розробки програмного забезпечення. Характеристика відомим методологіям, що існують та застосовуються у сфері IT-менеджменту у переході до Agile; їх сильні та слабкі сторони.
Визначення гнучкості та факторів, які у процесі розробки програмного забезпечення можна контролювати завдяки неї. Характеристика відомих методологій, що існують та застосовуються у сфері IT-менеджменту у переході до Agile. Їх сильні та слабкі сторони.
A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.
The algorithm and program in MAPLE for the solution ordinary differential equations of IV order in the form of generalized power series. Some examples of the solution differential equations IV order. The singular regular points of differential equation.
Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.
A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.
Development of software and algorithm of the information system for monitoring fires. Possibilities detecting fire from sensor, predicting its spread and assessing the source of ignition. Realization of information through sound and visual signals.
Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.
Description of the developed energy saving algorithm for autonomous heating systems installed in heated premises. Determination of the moment of switching on for the transition to the specified nominal temperature after maintaining the set temperature.
The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
Kompyutinhove storage as one of the paradigms of periodic training neural networks through the use of rekurrentnoyi other indicators. The new approach, which focuses on learning fuzzy systems thatand its parameters are adapting their structure online.
Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.
To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.
Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.
Basic Notions of Systems and Signals. State-space Models. Process Modeling for Control Purposes. Input–output Models and Realization Theory. Controllability and Observability of LTI Systems. Stability and The Lyapunov Method. State Feedback Controllers.
There have been introduced the most commonly used electrical schemes of biological tissue, as well as their impedance phrases and application areas. An analysis of the adequate schemes and simulation of the MATLAB software environment has been performed.
A new model of the take-off weight of the aircraft determining process and the weight distribution of passengers’ law. A simulation of the operations in the preparation for departure process. The effect of weight on the passenger aircraft alignment.
Characteristics of the segment of cloud technologies in Russia, an analysis of their advantages and disadvantages. The main types of cloud services models, the problems of their use (confidentiality, security). Preferences of using clouds in Russia.
Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
The classical methods of active identification and adaptation of automatic control systems (ACS) were used. Test of ACS.Transient process which allows to obtain parameters of the object transfer function and calculate the conventional adjustment knob.
Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.
Consideration of scientific literature on the study of games from the point of view of ludology and narratology. Get an idea of the current state of research in ludology and narratology in various scientific fields. Method of quantitative research.
Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
Actions of the world governments and world organizations for identifying the current state of modern trends in the cybersecurity field. Structured information about the status of modern trends in the field of cybersecurity and information protection.