Keyboard dynamic analysis by Alexnet type neural network

S Toliupa, I Tereikovskyi, O Tereikovskyi… - 2020 IEEE 15th …, 2020 - ieeexplore.ieee.org
In this article has been reviewed questions of development neural network analysis tools of
keyboard handwriting indicators for personality and user emotions recognition. Installed …

Procedure for adapting a neural network to eye iris recognition

S Toliupa, L Tereikovska, I Tereikovskyi… - … on Problems of …, 2020 - ieeexplore.ieee.org
The article is devoted to the problem of adapting the structural parameters of a convolutional
neural network to iris recognition during biometric authentication and iridology. It is shown …

Determination of Signs of Information and Psychological Influence in the Tone of Sound Sequences

O Yudin, S Toliupa, O Korchenko… - 2020 IEEE 2nd …, 2020 - ieeexplore.ieee.org
The article is devoted to the development of information technology for recognizing the
destructive influences in the non-verbal content of the sound sequences of multimedia …

Parameter Definition for Multilayer Perceptron Intended for Speaker Identification

I Tereikovskyi, I Subach, O Tereikovskyi… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
The article deals with the improvement of speaker identification tools. The prospects of
neural network identification tools are established. Authors show that ways of improving …

Deep Neural Network Model for Recognition of Speaker's Emotion

S Toliupa, I Tereikovskyi, L Tereikovska… - … on Problems of …, 2020 - ieeexplore.ieee.org
The article is devoted to the development of neural network tools for recognizing the
speaker's emotions. It is determined that a deep neural network of the multi-layer perceptron …

Evaluation of Information Security Software Using Quality and Reliability Criteria

M Karpinski, R Ziubina, A Azatov… - 2020 IEEE 5th …, 2020 - ieeexplore.ieee.org
It is determined that the stable operation of critical infrastructure depends on the reliability
and continuity of software for the protection of information resources. Failure to operate a …

One-periodic template marks model of normal behavior of the safety parameters of information systems networking resources

S Toliupa, V Nakonechnyi, I Tereikovskyi… - … and Technology (PIC …, 2019 - ieeexplore.ieee.org
The article is devoted to improvement cyber-attacks recognition systems on network
resources of information systems. By analogy with the classification of technical systems …

Analysis of network information security issues under the background of big data

X Zhao, L Lin, T Guo, J Du, B Feng - Applied Mathematics and …, 2023 - sciendo.com
With the progress of the times, big data will follow the development of the Internet and show
a broader development space. But the characteristics of big data itself also make it more …

Low-Resource Convolution Neural Network for Keyboard Recognition of the User

S Toliupa, L Tereikovska, O Korystin… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
The article is devoted to the improvement of neural network tools for recognizing the user's
identity by their keyboard handwriting. It is shown that the most promising recognition tools …

Метод фільтрації біометричних параметрів на основі вейвлет-перетворень.

L Tereikovska - COMPUTER-INTEGRATED TECHNOLOGIES …, 2021 - cit-journal.com.ua
The article is devoted to the problem of improving the means of hidden monitoring of the
face and emotions of operators of information and control systems based on biometric …