Index

Index is my personal knowledge repository where I document technical findings, research, my work, the work of others, and other useful information. This project serves two purposes: to organize my own learning and to share practical knowledge with the broader community.
Stop Fighting Your ROS 2 Environment: Build Faster, Reproducibly, Anywhere
Blog

Stop Fighting Your ROS 2 Environment: Build Faster, Reproducibly, Anywhere

You're a ROS developer. You love building cool robot applications, tackling complex navigation challenges, and making hardware *do things*. What you probably *don't* love is the endless cycle of dependency conflicts, the "works on my machine" nightmares, being chained to specific Ubuntu versions, or wrestling with Docker just to get a consistent build.
Mykhailo Marynenko

Mykhailo Marynenko

Devising a method for detecting and correcting multi-bit data transmission errors in IoT systems based on the Golay code
Paper

Devising a method for detecting and correcting multi-bit data transmission errors in IoT systems based on the Golay code

The object of this study is information systems within the Internet of Things. The task addressed involves devising an innovative method for detecting and correcting multi-bit data transmission errors in the Internet of Things networks based on Golay codes. As the main result of the research, a method has been devised for detecting and correcting multi-bit data transmission errors based on Golay codes during byte-by-byte transmission of an information block.
Systems and methods for data quality and validity improvement in education institutional, degree, and course license management
Patent

Systems and methods for data quality and validity improvement in education institutional, degree, and course license management

Systems and methods for providing an accreditation management system (AMS) to validate educational resources by performing content validation operations comprising applying a cryptographic hash function to educational resources to generate a content validation hash, receiving a data stream from a computing device of a student user engaged with the educational resources, applying the cryptographic hash function to each educational resource to generate a content consumption hash, and comparing the content validation hash to the content consumption hash.
Mykhailo Marynenko