default search action
CITRisk 2021: Kherson, Ukraine
- Stefan Wolfgang Pickl, Volodymyr Lytvynenko, Maryna Zharikova, Volodymyr Sherstjuk:
Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), Kherson, Ukraine, September 16-17, 2021. CEUR Workshop Proceedings 3101, CEUR-WS.org 2022 - Preface. 1-5
Session 1: Computational Models and Methods for Risk-Informed Systems
- Pavel Khanenko, Peter I. Kogut, Mykola V. Uvarov:
On variational problem with nonstandard growth conditions for the restoration of clouds corrupted satellite images. 6-25 - Tetiana Hovorushchenko:
Method of the software risks management. 26-38 - Sergiy Gnatyuk, Dinara Ospanova, Volodymyr Lytvynenko, Zhazira Amirgaliyeva, Nurali Nabot Shohiyon:
Assessing Risk of Enterprise Bankruptcy by Indicators of Financial and Economic Activity Using Bayesian Networks. 39-50 - Volodymyr V. Hrytsyk, Mariia Nazarkevych:
Research on the increase of information theory in the era of the ending of silicon electronics and new types of risks. 51-64 - Oleksandr Arkhypov, Yevheniia Arkhypova, Jan Krejci:
Adaptation of a risk-based approach to the tasks of building and functioning of information security systems. 65-82 - Maryna Zharikova, Gonzalo Barbeito, Marian Sorin Nistor, Stefan Wolfgang Pickl:
Spatially-distributed multi-hazard risk analysis. 83-92 - Volodymyr Sherstjuk, Maryna Zharikova, Ibraim Didmanidze, Irina Dorovskaja, Svitlana Vyshemyrska:
Risk modeling during complex dynamic system evolution using abstract event network model. 93-110 - Maryna Zharikova, Andrzej Smolarz, Pawel Komada, Volodymyr Sherstyuk, Bohdan Sakovych:
Situation diagnosis based on multi-hazard risk assessment (short paper). 111-118 - Viktor Mashkov, Igor Nevliudov, Yurii Romashov:
Computing the risk of failures for high-temperature pressurized pipelines. 119-136
Session 2: Intelligent Information Technologies for Risk-Informed Systems
- Iurii Krak, Hrygorii Kudin, Mykola Efremov, Alexander Samoylov, Vladislav A. Kuznetsov, Yedilkhan Amirgaliyev, Veda Kasianiuk:
Hyperplane clasterization of the small data based on pseudo-inverse and projective matrices (short paper). 137-145 - Oleksandr Tymchenko, Bohdana Havrysh, Andrian Kobevko, Orest Khamula:
Method of construction of fuzzy tree of solutions for network protection against DoS-attacks. 146-157 - Vsevolod Senkivskyy, Sergii Babichev, Iryna Pikh, Alona Kudriashova, Nataliia Senkivska, Iryna Kalynii:
Forecasting the reader's demand level based on factors of interest in the book. 158-175 - Tatiana Neskorodieva, Eugene Fedorov, Pavlo Rymar, Oleksii Smirnov:
Neural network modeling method of transformations data of audit production with returnable waste. 176-191 - Olexiy Azarov, Leonid Krupelnitskyi, Hanna Rakytyanska, Jan Fesl:
Reconstruction of acoustic surfaces from incomplete data as an identification problem based on fuzzy relations. 192-207 - Nataliya Boyko, Anastasiia Hrynyshyn:
Using recurrent neural network to noise absorption from audio files. 208-226 - Nataliya Boyko, Mariia Rizhko:
Application of semantic segmentation of clouds of points for preservation of cultural heritage. 227-240 - Volodymyr Sherstjuk, Libor Dostálek, Raisa Zakharchenko, Leonid Zakharchenko, Olena Shtutsa, Kostiantyn Sokol:
The use of a neural network to minimize the risks of positive assessment of academically dishonest students. 245-252 - Dmitriy Klyushin, Pavel Yakovlev:
Novel test for survival data analysis of cancer patients (short paper). 253-259
Session 3: Information Technologies for Diagnostic, Modeling, and Monitoring
- Anastasiya Doroshenko, Kvitoslava Obelovska, Olha Bilyk:
Risk analysis of personal data loss in wireless sensor networks. 260-274 - Orken Mamyrbayev, Anzhelika Azarova, Liliia Nikiforova, Aliya Kalizhanova, Anatolii Shyian, Olga Ruzakova, Nataliia Savina:
Mathematical model and method of enterprise financial risk assessment based on threshold elements. 275-291 - Oleksandra S. Bulgakova, Viktor Mashkov, Viacheslav V. Zosimov, Pavlo Popravkin:
Risk of Information Loss using JWT token (short paper). 292-299 - Viktor Perederyi, Eugene Borchik, Waldemar Wójcik, Oksana Ohnieva:
Assessment and information security provision of the decision support process in technogenic object management systems. 300-313 - Sergii Babichev, Tetiana V. Kril, Stella B. Shekhunova, Waldemar Wójcik:
Geo-informational approach to risk analysis of slope mass movement (short paper). 314-321 - Ivan Ostroumov, Oleg Ivashchuk, Sergii Babichev:
Risk of mid-air collision estimation using minimum spanning tree of air traffic graph. 322-334 - Tetiana Shmelova, Nina Rizun, Svitlana Kredentsar, Maksym Yastrub:
Enhancement of the methodology for the selection of the optimal location of the Remote Tower Centre. 335-346 - Tetiana Shmelova, Antonio Chialastri, Yuliya Sikirda, Maxim Yatsko:
Models of decision-making by the pilot in emergency "Engine failure during take-off". 347-365 - Svitlana Bordiuzhenko, Oleksandr Sobol, Olena Liashevska, Dimiter Velev, Plamena Zlateva:
Development of a mobile application for calculation of fire risks in the Android Studio environment (short paper). 366-373 - Jan Fesl, Lyubov Tupychak, Lubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Olga Fedevych:
Information technologies for operational staff training for man-made systems under threats and risks. 374-387 - Nadia Pasieka, Zora Ríhová, Marta Vohnoutová, Nelly Lysenko, Oleksandra Lysenko, Vasyl Sheketa, Mykola Pasyeka, Nataliia Kulchytska:
Designing risk resilient networked high-load computing web-systems for information flow processing. 388-403 - Lubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Volodymyr Sabat, Olga Fedevych:
Information technology of risk assessment for automated control systems of printing production. 404-418 - Lubomir Sikora, Natalia Lysa, Jan Krejcí, Rostislav Tkachuk, Olga Fedevych:
Cognitive and information decision-making technologies and risk assessment in technogenic systems. 419-433 - Andrzej Smolarz, Nadia Pasieka, Andrzej Kotyra, Vasyl Sheketa, Mykola Pasieka, Svitlana Chupakhina, Petro Krul, Mykola Suprun:
Using hash functions to protect critical messages from changes in risky computing systems. 434-444
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.