DESCRIPTION OF ALGORITHMS FOR BALANCING NUMERICAL MATRICES AND THEIR DIVISION INTO HIERARCHICAL LEVELS ACCORDING TO THEIR TYPE AND COMPLEXITY
Article Sidebar
Open full text
Issue Vol. 11 No. 1 (2021)
-
THE SYSTEM FOR COMPLEX MAGNETIC SUSCEPTIBILITY MEASUREMENT OF NANOPARTICLES WITH 3D PRINTED CARCASS FOR INTEGRATED RECEIVE COILS
Mateusz Midura, Przemysław Wróblewski, Damian Wanta, Grzegorz Domański, Mateusz Stosio, Jacek Kryszyn, Waldemar T. Smolik4-9
-
MAGNETOELECTRIC COUPLING MEASUREMENT TECHNIQUES IN MULTIFERROIC MATERIALS
Jakub Grotel10-14
-
METHODS FOR DETECTING FIRES IN ECOSYSTEMS USING LOW-RESOLUTION SPACE IMAGES
Valerii Shvaiko, Olena Bandurka, Vadym Shpuryk, Yevhen V. Havrylko15-19
-
GENERATING FIRE-PROOF CURTAINS BY EXPLOSION-PRODUCTION OF WATER AEROSOL AS AN ELEMENT OF FIRE-SAFETY ENGINEERING
Grzegorz Śmigielski20-23
-
METHODS FOR ASSESSMENT AND FORECASTING OF ELECTROMAGNETIC RADIATION LEVELS IN URBAN ENVIRONMENTS
Denys Bakhtiiarov, Oleksandr Lavrynenko, Nataliia Lishchynovska, Ivan Basiuk, Tetiana Prykhodko24-27
-
METHOD FOR DETERMINING THE ACTUAL PRESSURE VALUE IN A MV VACUUM INTERRUPTER
Michał Lech, Damian Kostyła28-31
-
OVERVIEW OF FEATURE SELECTION METHODS USED IN MALIGNANT MELANOMA DIAGNOSTICS
Magdalena Michalska32-35
-
DEVELOPING SOLUTION FOR USING ARTIFICIAL INTELLIGENCE TO OBTAIN MORE ACCURATE RESULTS OF THE BASIC PARAMETERS OF RADIO SIGNAL PROPAGATION
Andrii Shchepak, Volodimir Parkhomenko, Vyacheslav Parkhomenko36-39
-
APPLICATION OF THE MATRIX FACTOR ANALYSIS METHOD FOR DETERMINING PARAMETERS OF THE OBJECTIVE FUNCTION FOR TRANSPORT RISK MINIMIZATION
Serhii Zabolotnii, Sergii Mogilei40-43
-
DESCRIPTION OF ALGORITHMS FOR BALANCING NUMERICAL MATRICES AND THEIR DIVISION INTO HIERARCHICAL LEVELS ACCORDING TO THEIR TYPE AND COMPLEXITY
Yuriy Khanas, Michał Borecki44-49
-
POLYPARAMETRIC BLOCK CODING
Julia Milova, Yuri Melnik50-53
-
NO-CODE APPLICATION DEVELOPMENT ON THE EXAMPLE OF LOGOTEC APP STUDIO PLATFORM
Monika Moskal54-57
-
THE TRAINING APPLICATION BASED ON VR INTERACTION SCENARIOS – WITH EXAMPLES FOR LOGISTICS
Wojciech Wlodyka, Dariusz Bober58-61
-
INVESTIGATION OF THE DEPENDENCE OF THE STRUCTURE OF SHIFT INDEXES VECTORS ON THE PROPERTIES OF RING CODES IN THE MOBILE NETWORKS OF THE INTERNET OF THINGS
Vladislav Kravchenko, Olena Hryshchenko, Viktoriia Skrypnik, Hanna Dudarieva62-64
Archives
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
Main Article Content
DOI
Authors
Abstract
This article describes a set of algorithms for so-called balancing of numerical matrices, which were developed by the author. Each section consists of several algorithms that are divided into different levels. The order of these levels depended on the chronology of the creation of certain algorithms. Chronology also affected the complexity of these balancing algorithms, so it can be argued that the algorithms are described in order from the simplest level to the most complex. It is important to emphasize that the purpose of the article is to describe the actions on matrices that determine the balancing algorithm of a certain level, and practical application will be the next step.
Keywords:
References
Agarwal S.: Symmetric Key Encryption using Iterated Fractal Functions. International Journal of Computer Network and Information Security 9(4)/2019, 1–9. DOI: https://doi.org/10.5815/ijcnis.2017.04.01
Anisimov A. V., Kulyabko P. P.: Information systems and databases: A textbook for students of the faculty computer science and cybernetics. Kyiv 2017.
Bogdanov A., Khovratovich D., Rechberger D.: Biclique Cryptanalysis of the Full AES. Advances in Cryptology – ASIACRYPT 2011. Lecture Notes in Computer Science 7073. Springer, Berlin 2011. DOI: https://doi.org/10.1007/978-3-642-25385-0_19
Borecki M.: Risk level analysis in the selected (initial) stage of the project life cycle. Management and production engineering review 11(4)/2020, 104–112.
Borecki M., Ciuba M., Kharchenko Y., Khanas Y.: Main aspects influencing the evaluation of atmospheric overvoltages in high-voltage networks. Bull. Pol. Ac.: Tech 69(1)/ 2021, 1–8.
Buryachok V. L.: The choice of a rational method of generating passwords among many existing. Information security 25(1)/2019, 59–64.
Buryachok V. L.: Generate a password for wireless networks using variable rule of complication. Information protection 21(1)/2019, 52–59. DOI: https://doi.org/10.18372/2410-7840.21.13547
Hughes J., Cybenko G.: Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity. Technology Innovation Management Review 2013, 15–24. DOI: https://doi.org/10.22215/timreview712
Isa M. A. M., Hashim H., Ab Manan J. L., Adnan S. F. S., Mhmod R.: RF simulator for cryptographic protocol. IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2014, 518–523. DOI: https://doi.org/10.1109/ICCSCE.2014.7072773
Josefsson S., Leonard S.: Textual Encodings of PKIX, PKCS, and CMS Structures. Internet Engineering Task Force April 2015. DOI: https://doi.org/10.17487/RFC7468
Khanas, Y., Borecki, M.: Research on the use of algorithms for matrix transformations for encrypting text information. Security and Privacy 3(6)/2020, 1–13. DOI: https://doi.org/10.1002/spy2.108
Khanas Y., Ivanciv R., Litvinko S.: The algorithm for minimizing matrices in the given direction of reduction and the rules for their restoration. Visnyk of the National University "Lviv Polytechnic" 882/2017, 12–17.
Khanas Y., Ivanciv R.: Application Mirroring of Matrices to Prevent Excessive Reduction. Perspective technologies and design methods of MEMST (MEMSTECH 2016), Lviv-Polyana 2016, 143–145. DOI: https://doi.org/10.1109/MEMSTECH.2016.7507535
Krasilenko V. G.: Multifunctional parametric matrix-algebraic models (MAM) of cryptographic transformations (CP) with modular operations and their modeling. 72 NPK – conference materials, Odessa 2017, 123–128.
Krasilenko V. G.: Improvement and modeling of electronic digital signatures of matrix type for textographic documents. Proceedings of the VI International Scientific and Practical Conference "Information Control Systems and Technologies" (IUST-Odessa-2017), Odessa 2017.
Krasylenko V. G., Nikitovich D. V., Yatskovskaya R. O., Yatskovsky V. I.: Simulation of advanced multi-step 2D RSA algorithms for cryptographic transformations and blind electronic digital signature. Information processing systems 1(156)/2019, 92–100.
Leurent G., Peyrin T.: SHA-1 is a Shambles. First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. Real World Crypto 2020.
Lobur M. V., Ivantsiv R. D., Kolesnyk K. K., Khanas Y. Y.: Development of an algorithm for reducing matrices depending on their size and content. Scientific and Technical Journal "Instrumentation Technology" 2/2016, 29–31.
Nazarkevich M. A., Dronyuk I. M., Troyan O. A., Tomashchuk T. Yu.: Development of a method of document protection by latent elements based on fractals. Information protection 17(1)/2015, 21–26.
Nikonov V. G., Zobov A. I.: On the possibility of using fractal models in the construction of information security systems. Computational nanotechnology 1/2017, 39–49.
Ortiz S. M., Parra O., Miguel J., Espitia R.: Encryption through the use of fractals. International Journal of Mathematical Analysis 11(21)/2017, 1029–1040. DOI: https://doi.org/10.12988/ijma.2017.710139
Wenliang Du: Computer Security: A Hands-on Approach. CreateSpace Independent Publishing Platform, 2017.
Article Details
Abstract views: 374
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
