APPLICATION OF OPERATOR-MATRIX METHOD AND DOUBLE KEY IN OBJECT ENCRYPTION

Authors          Gafurov M.Kh. – Candidate of technical sciences, associate professor, Tajik technical University, Khujand, Republic of Tajikistan, mirugaf56@gmail.com Annotation       This article discusses how to build an alphabet substitution, create and use a two-key cipher using the example of the operator-matrix substitution method. It should be noted that the operator-matrix substitution method has a high resistance of the encrypted object. The rapid development of science and technology, the digitalization of various spheres of society, the widespread use of modern technologies in the activities of…

Read More

MODEL-ORIENTED, DATA-ORIENTED OR HYBRID APPROACH IN MACHINE LEARNING

Authors           Maksudov Kh.T. – Candidate of Physical and Mathematical Sciences, Associate Professor of the Department of Digital Economics, Polytechnic Institute of Tajik Technical University, Khujand, Republic of Tajikistan, kh.maqsudov@gmail.com.             Inomov B.B. – senior lecturer, department of digital economy, Polytechnic Institute of Tajik Technical University, Khujand, Republic of Tajikistan, behruzinomov@gmail.com. Annotation         The article provides a detailed analysis of the three main approaches in machine learning – model-oriented, data-oriented and hybrid. The advantages and disadvantages of each are…

Read More