Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Uliana Iatsykovska"'
Autor:
Volodymyr Ponomar, Tomasz Gancarczyk, Maryna Yesina, Yurij Gorbenko, Uliana Iatsykovska, Mikolaj Karpinski
Publikováno v:
IDAACS
The paper deals with the possible comparative analysis methods of the cryptographic primitives' properties. Methods of comparative analysis – analytic hierarchy process and variations of weight indices methods are investigated and analyzed. Conclus
Autor:
Igor Kogut, Uliana Iatsykovska, Victor Holota, Roman Kochan, Tomasz Gancarczyk, Volodymyr Gryga, Stanislaw Rajba
Publikováno v:
IDAACS
Web of Science
Web of Science
The paper conducted analysis of matrix and multilayer structures of algorithms for multiplication of binary numbers and determined their advantages and disadvantages. The hardware and time characteristics of matrix and multilayer binary number multip
Autor:
Aleksandra Klos-Witkowska, Rafal Szklarczyk, Uliana Iatsykovska, Pawel Falat, Bogdan Buyak, Grigory Tereshchuk, Halina Falfushynska
Publikováno v:
IDAACS
Publons
Publons
Distance education and blended learning has been becoming a major alternative to traditional teaching all over the world. The paper discloses the benefits and disadvantages of e-learning at Ukrainian Universities in particular at Ternopil V. Hnatiuk
Autor:
Nataliia Zhukovska, Aleksandra Klos-Witkowska, Viktor Zhukovskyy, Ihor Pazdriy, Uliana Iatsykovska, Anatoliy Vlasyuk
Publikováno v:
IDAACS
The statement was formulated and the mathematical modeling of the stressed-strained state (SSS) problem of the soil mass considering mass and heat transfer under filtering of salt solutions in the three-dimensional case was conducted. There is obtain
Autor:
Aigul Shaikhanova, Uliana Iatsykovska, Mikolaj Karpinski, Yuliia Khokhlachova, Lesia Korkishko, Anatolii Balyk
Publikováno v:
IDAACS
Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a grea