Перегляд за Автор "Shmatko, O. V."
Зараз показуємо 1 - 4 з 4
Результатів на сторінці
Налаштування сортування
Документ Guidance for course work on "Algorithms and Data Structures"(2016) Stratiienko, Nataliia Kostiantunivna; Shmatko, O. V.; Borodina, I. O.Guidance for course work on "Algorithms and Data Structures" is a part of methods of the course "Algorithms and Data Structures". Course work is performed in 3 semester. The course work must consolidates theoretical knowledge and practical skills obtained in the study of lecture and practical parts of the course. The guidance covers the key issues related to the course work, the processing of explanatory notes to course work, and the defense of student work.Документ Guidelines for individual assignments on discipline "Computer networks"(2017) Shmatko, O. V.; Borodina, I. O.Students are required to produce a term project building upon and complementing the material covered in class. The topic of the project should be related to making Ethernet cable, Network design, network security. A set of suggested projects is attached below. Each of you is required to pair up with another student to form a team of two members for the project. The final result of the project will be a technical report and a presentation. Students participate in computer networking courses during third course. Computer networking projects give students hands-on experience to learn and digest the course materials being taught. These course project also give students practical experience, especially for those who plan to continue their careers within the field.Документ Method of the horizon detection from electro-optical sensorsunder maritime environment(Харківський національний університет Повітряних Сил ім. Івана Кожедуба, 2018) Yevseiev, S. P.; Shmatko, O. V.; Liang, Dong; Babenko, E. V.A new method is presented to detect the sea sky line. In the first step, the original image is transformed into grayscale image and the sea-sky-line region is located by using the textural features gray-level co-occurrence ma-trix based on texture feature. In the second step, the adaptive segmentation thresholds are obtained by the OTSU algorithm, which produces a set of sea sky line candidate points. Finally, a simple clustering method is adopted to select appropriate points and transform them by straight line fitting. The results of experiments established on real-world sea-sky images demonstrate the effectiveness and robustness of the proposed approach.Документ Practical implementation of the Niederreiter modified cryptocode system on truncated elliptic codes(ПП "Технологічний Центр", 2018) Yevseiev, S. P.; Tsyhanenko, O. S.; Ivanchenko, Serhii; Aleksiyev, Volodymyr; Verheles, Dmytrо; Volkov, Sergey; Korolev, Roman; Kots, Hryhorii; Milov, Oleksandr; Shmatko, O. V.On the basis of the practical implementation of the classic Niederreiter scheme for non-binary codes, a pattern has been identified for practical implementation –fixing the admissible position vectors of the plaintext transformation based on equilibrium coding. The obtained set of position vectors of the error vector with a fixed set of masking matrices (the recipient's private key) allows us to obtain the algorithm for decoding the classical Niederreiter crypto-code scheme on non-binary codes. For this, a modification of the crypto-code system (CCS) is necessary. It is proposed to use the additional parameter of key data – the initialization vector (the set of invalid position vectors of the error vector). To counter the Sidelnikov attacks, it is proposed to use modified (shortened) algebraic-geometric (elliptic) codes (MEC). For this, it is necessary to use the second additional initialization vector (the set of positions for shortening the error vector). Based on the modification of the classical Niederreiter scheme on non-binary codes, applied algorithms for generating and decrypting a cryptogram in the Niederreiter modified crypto-code system based on modified (shortened) elliptic codes and software are proposed. To confirm the profitability of the proposed crypto-code system, the results of the comparative evaluation of energy consumption for the implementation of the classical Niederreiter scheme on elliptic codes and the implementation of the proposed system on modified elliptic codes are presented. The results confirm the possibility of practical implementation of the Niederreiter crypto-code system based on the proposed algorithms. At the same time, the required level of cryptographic strength of the crypto-code system, protection of the cryptosystem against the Sidelnikov attacks and an increase in the rate of cryptographic transformations by 3-5 times compared with the classical Niederreiter scheme are guaranteed.