


default search action
AdvAIT 2024: Khmelnytskyi, Ukraine / Zilina, Slovakia
- Tetiana Hovorushchenko, Elena Zaitseva, Sergii Lysenko, Vitaly G. Levashenko:
Proceedings of the 1st International Workshop on Advanced Applied Information Technologies with CEUR-WS, Khmelnytskyi, Ukraine, Zilina, Slovakia, December 5, 2024. CEUR Workshop Proceedings 3899, CEUR-WS.org 2025
Advanced Applied Information Technologies
- Natalya Sokolova, Volodymyr V. Hnatushenko:
Information technologies in IT education as a factor of digitalization of Ukrainian society. 1-13 - Volodymyr V. Hnatushenko, Victor Shuleshko, Tetiana Bulana, Bohdan Molodets:
Information system to enhance agricultural production efficiency based on sustainable development principles. 14-25 - Khrystyna Lipianina-Honcharenko, Mykola Telka, Nazar Melnyk:
Comparison of ResNet, EfficientNet, and Xception architectures for deepfake detection. 26-34 - Vyacheslav Repeta, Tetiana Kukura, Yurii Kukura, Ihor Myklushka, Bohdan Durniak:
Assessment and prognostic models of the efficiency of anilox rollers cleaning process. 35-44 - Bohdana Havrysh, Dmytro Palamarchuk, Oleksandr Tymchenko, Bohdan Kovalskyi, Orest Khamula:
Efficiency of optimization algorithms in the problem of graphic objects placement. 45-54 - Tetiana Hovorushchenko, Vitalii Alekseiko, Vitaly G. Levashenko:
Machine learning methods' comparison for land surface temperatures forecasting due to climate classification. 55-68 - Olga Pavlova, Eleonora Zabarna, Marharyta Pierkova, Andrii Kuzmin, Sava Kostiuk:
Mathematical model for digital transformation of business processes in the coordinates of digital marketing. 69-77 - Mykola Fedoniuk, Olga Pavlova, Vitalina Fedoniuk, Dominika Riznyk, Ihor Konstankevych:
GIS-based remote sensing identification method of thermal pollution in cities: case study of Lutsk, Ukraine and Lublin, Poland. 78-83 - Olena Sobko, Olexander Mazurets, Maryna Molchanova, Iurii Krak, Olexander Barmak:
Method for analysis and formation of representative text datasets. 84-98 - Iryna Pikh, Vsevolod Senkivskyy, Alona Kudriashova, Lyubov Tupychak, Roman Andriiv:
Formation of an indicator of the information message reliability level by fuzzy logic toolkit. 99-112 - Alona Kudriashova, Iryna Pikh, Vsevolod Senkivskyy, Irina Kalinina, Yurii Slipetskyi:
Hierarchical modeling of factors influencing the quality of interactive editions design. 113-128 - Yurii-Antonii Zborivskyi, Alla Herts, Yelyzaveta Hnatchuk, Inna Martyniuk, Artem Boyarchuk:
Decision support system for enforcement of child support obligations. 129-138 - Volodymyr Tsikalo, Yelyzaveta Hnatchuk, Tetiana Hovorushchenko, Alla Herts, Elena Zaitseva:
Information technology for verification of the legality of the mortgage agreement for an enterprise as a single property complex. 139-149 - Serhii Svystun, Oleksandr Melnychenko, Pavlo Radiuk, Oleg Savenko, Andrii Lysyi:
Distributed intelligent system architecture for UAV-Assisted monitoring of wind energy infrastructure. 150-161 - Oksana Desyatnyuk, Fedir Tkachyk, Svitlana Sachenko, Danylo Severynenko, Iryna Novosad:
Dynamics of tax revenue growth in ensuring regional development using machine learning. 162-171 - Grygorii Diachenko, Ivan Laktionov, Dmytro Moroz, Maryna Derzhevetska, Sergii Semenov:
A computerized method for predicting the risk of powdery mildew in wheat based on software analysis of soil and climatic monitoring data. 172-185 - Anatoliy Sachenko, Victoria Vysotska, Serhii Vladov, Viktor Vasylenko, Maciej Dobrowolski:
Hybrid method for restoring missing sensor data with adaptive control based on neuro-fuzzy networks. 186-200 - Nataliia Petliak, Yurii Klots, Vira Titova, Abdel-Badeeh M. Salem:
Attack detection system based on network traffic analysis by means of fuzzy inference. 201-213 - Oleg Riznyk, Yurii Kynash:
Information in image using ideal ring bundles. 214-223 - Yuriy Stetsyuk, Mykola Stetsyuk, Kyrylo Voznyi, Vadym Paiuk, Miroslav Kvassay:
A model of a centralized security system, as an information technology for the synthesis of an OS architecture protected against the leakage of confidential information. 224-233 - leksandr Kozelskiy, Antonina Kashtalian, Vasyl Stetsyuk, Dmytro Martiniuk, Anatoliy Sachenko:
A model of an intelligent clustering system with an external module for the architecture of RTOS with intensive changes of states regarding their flexibility and balancing. 234-243 - Maksym Yu. Chaikovskyi, Inna I. Chaikovska, Tomas Sochor, Inna Martyniuk, Oleksii Lyhun:
Modeling the detection process of polymorphic malware based on the Lotka-Volterra model. 244-253 - Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Nazerke Baisholan:
Experimental study of the method for prioritizing IT incidents at critical information infrastructure facilities of the state. 254-265 - Liubomyr S. Sikora, Nataliia Lysa, Olga Fedevych, Nazarii Khyliak:
Cybersecurity of hierarchical structured systems in emergency response. 266-276 - Dmytro Denysiuk, Oleg Savenko, Sergii Lysenko, Bohdan Savenko, Andrii Nicheporuk:
Detecting software implants using system decoys. 277-287 - Oleksandr Bokhonko, Sergii Lysenko, Piotr Gaj:
Development of the social engineering attack models. 288-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.