Mathematical Model for Finding Probability of Detecting Victims of Man-Made Disasters Using Distributed Computer System with Reconfigurable Structure and …

G Krivoulya, I Ilina, V Tokariev… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Issues related to the development of a method for planning the stages of rescuing victims of
man-made disasters using computer distributed systems with programmable logic and a …

Method of determining trust and protection of personal data in social networks

O Laptiev, V Savchenko, A Kotenko… - International …, 2021 - search.proquest.com
The analysis of parameters of social networks (information transfer to other users, traffic
density, probability of network construction) is carried out. Three variants of solving the …

The neural network models effectiveness for face detection and face recognition

K Smelyakov, A Chupryna… - 2021 IEEE Open …, 2021 - ieeexplore.ieee.org
The paper is devoted to estimation of the effectiveness of the use of modern convolutional
neural networks for face detection and face recognition. On standard and custom datasets …

Effectiveness of preprocessing algorithms for natural language processing applications

K Smelyakov, D Karachevtsev… - … on Problems of …, 2020 - ieeexplore.ieee.org
this article is devoted to identifying features and analyzing the effectiveness of stop word
removal, stemming and text lemmatization algorithms that are used in the widely used NLTK …

[PDF][PDF] Comprehensive methods of evaluation of distance learning system functioning

O Barabash, O Laptiev, V Sobchuk… - … Journal of Computer …, 2021 - researchgate.net
Given recent events, training during quarantine can only take place remotely. To ensure
quality training, communication must be seamless. To do this, the network must function …

Information security of Ukraine: social and humanitarian aspects

N Averianova, T Voropayeva - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The article is devoted to the analysis of social and humanitarian aspects of Information
security of Ukraine. The armed conflict on the territory of Ukraine is considered as an …

Method of searching for information objects in unified information space

A Dodonov, V Mukhin, V Zavgorodnii… - System research and …, 2021 - journal.iasa.kpi.ua
The article discusses the concept and principles of building unified information space and
presents a scheme for its formation. The article considers formation of unified information …

Research and Development of Information Technology for Determining Shoe Size by Image

I Sakharov, K Smelyakov… - 2023 IEEE Open …, 2023 - ieeexplore.ieee.org
The paper is devoted to the problem of developing information technology for determining
the shoe size by a two-dimensional image. To solve this problem, it was chosen a real data …

[PDF][PDF] Cyber Resilience and Fault Tolerance of Artificial Intelligence Systems: EU Standards, Guidelines, and Reports.

O Lemeshko, M Yevdokymenko, O Yeremenko… - CPITS, 2020 - ceur-ws.org
The problem of ensuring cyber resilience and fault tolerance of artificial intelligence systems
is urgent. The paper proposes methods for ensuring cyber resilience and fault tolerance of …

[PDF][PDF] SEGMENTING OPTICAL-ELECTRONIC IMAGES ACQUIRED FROM SPACE OBSERVATION SYSTEMS BASED ON THE FIREFLY ALGORITHM

H Khudov, O Makoveichuk… - Eastern-European …, 2023 - pdfs.semanticscholar.org
The quality of segmentation of optoelectronic images by the method based on the firefly
algorithm was evaluated in comparison with methods based on the particle swarm algorithm …