[HTML][HTML] Onboard Neuro-Fuzzy Adaptive Helicopter Turboshaft Engine Automatic Control System

S Vladov, M Bulakh, V Vysotska, R Yakovliev - Energies, 2024 - mdpi.com
A modified onboard neuro-fuzzy adaptive (NFA) helicopter turboshaft engine (HTE)
automatic control system (ACS) is proposed, which is based on a circuit consisting of a …

[HTML][HTML] Emerging trends in biomedical trait-based human identification: A bibliometric analysis

N Girdhar, D Sharma, R Kumar, M Sahu, CC Lin - SLAS technology, 2024 - Elsevier
Personal human identification is a crucial aspect of modern society with applications
spanning from law enforcement to healthcare and digital security. This bibliometric paper …

[HTML][HTML] Unlocking Security for Comprehensive Electroencephalogram-Based User Authentication Systems

AEK Khalil, JA Perez-Diaz, JA Cantoral-Ceballos… - Sensors, 2024 - mdpi.com
With recent significant advancements in artificial intelligence, the necessity for more reliable
recognition systems has rapidly increased to safeguard individual assets. The use of brain …

Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity

V Buhas, I Ponomarenko, V Bugas… - … in Information and …, 2021 - elibrary.kubg.edu.ua
In today's world, a great number of organizations generate and accumulate large amounts of
information, which is of great value to owners, and is also considered by attackers as a …

[PDF][PDF] Correlation Method of Dangerous Objects Detection for Aviation Security Systems

M Zaliskyi, S Migel, A Osipchuk, D Bakhtiiarov - Human factors, 2023 - ceur-ws.org
Aviation security services have significant value for aviation safety. Aviation security services
include personnel and technical equipment for dangerous and prohibited object detection …

[PDF][PDF] Pseudorandom sequence generator based on the computation of ln 2

I Opirskyy, O Harasymchuk, O Mykhaylova… - 2024 - ceur-ws.org
This paper discusses creating a pseudorandom sequence generator using the natural
logarithm of the number 2 (ln 2) calculator. Pseudorandom sequence generators are key …

[PDF][PDF] A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management.

O Kuznetsov, E Frontoni, V Katrich, O Kobylianska… - CPITS II, 2023 - ceur-ws.org
Existing digital identification systems are often vulnerable to attacks as they are commonly
based on authentication methods such as passwords, PIN codes, biometric data, etc., which …

[PDF][PDF] Study of the Profitability of the Enterprise based on the Method of Machine Learning without a Teacher.

M Nazarkevych, H Nazarkevych, R Moravskyi… - CPITS, 2022 - ceur-ws.org
Abstract Machine learning methods, which are used in the framework of predicting the
solution of methods of adaptive management of the enterprise's goods sales, have been …

[PDF][PDF] Assessing neural network accuracy algorithm in graphic content recognition

A Sahun, V Khaidurov, V Lakhno - 2024 - ceur-ws.org
The study presents the results of applying the main known metrics used to evaluate the
performance and accuracy of algorithms and neural network models on different classes for …

[PDF][PDF] Robustness of Fingerprint Liveness Detection based on Convolutional Neural Networks

Y Myshkovskyi, M Nazarkevych - 2023 - ceur-ws.org
With the advancement of digital systems, biometric authentication methods, especially
fingerprint recognition, have become an integral component of various security protocols …