default search action
1st IntelITSIS 2020: Khmelnytskyi, Ukraine
- Tetiana Hovorushchenko, Oleg Savenko, Peter T. Popov, Sergii Lysenko:
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, Khmelnytskyi, Ukraine, June 10-12, 2020. CEUR Workshop Proceedings 2623, CEUR-WS.org 2020
Session 1: Intelligent Information Technologies
- Iurii Krak, Anatolii Pashko, Oleg Stelia, Olexander Barmak, Sergey Pavlov:
Selection Parameters in the ECG Signals for Analysis of QRS Complexes. 1-13 - Tetiana Hovorushchenko, Alla Herts, Yelyzaveta Hnatchuk:
Information Technology for Legal Regulation of the Dental Services Contract. 14-24 - Tatiana Neskorodieva, Eugene Fedorov, Ivan Izonin:
Forecast Method for Audit Data Analysis by Modified Liquid State Machine. 25-35 - Serhii A. Lupenko, Iaroslav V. Lytvynenko, Nataliia Stadnyk, Halyna Osukhivska, Natalia Kryvinska:
Modification of the Software System for the Automated Determination of Morphological and Rhythmic Diagnostic Signs by Electrocardio Signals. 36-46 - Tetiana Hovorushchenko, Artem Boyarchuk, Oleh Borovyk, Dmytro Medzatyi, Mykola Krasovskyi:
Structure of Multifunctional Cooperative Robotics System based on the Ontological Approach. 47-56 - Rykhard Bohush, Sergey Ablameyko, Yahor Adamovskiy, Dmitry Glukhov:
Effective Object Localization in Images by Calculating Ratio and Distance Between Pixels. 57-66 - Vita Kashtan, Volodymyr V. Hnatushenko:
A Wavelet and HSV Pansharpening Technology of High Resolution Satellite Images. 67-76 - Oleksii Ivanov, Liudmyla Koretska, Volodymyr Lytvynenko:
Intelligent Modeling of Unified Communications Systems Using Artificial Neural Networks (short paper). 77-84 - Artem Boyarchuk, Olga Pavlova, Mykyta Bodnar, Ivan Lopatto:
Approach to the Analysis of Software Requirements Specification on Its Structure Correctness. 85-95 - Olexander Barmak, Iurii Krak, Eduard Manziuk, Volodymyr Lytvynenko, Oleg Kalyta:
Classification Technology Based on Hyperplanes for Visual Analytics with Implementations for Different Subject Areas. 96-106 - Pavlo Radiuk, Hakan Kutucu:
Heuristic Architecture Search Using Network Morphism for Chest X-Ray Classification. 107-121 - Kateryna Yalova, Kseniia Yashyna, Nataliia Savina:
Medical Information System Development: Practical Aspects. 122-132 - Tetiana Kysil, Ivan Izonin, Olha Hovorushchenko:
Information Technology for Choosing the Trademark Considering the Attitude of Consumer (short paper). 133-140 - Elena Odarushchenko, Oleg Odarushchenko, Valentina Butenko, Vyacheslav Kharchenko, Larysa Degtyareva:
Development of Wearable Solutions for Healthcare: Initial Stages Analysis and Case Study. 153-163 - Vyacheslav Gorev, Alexander Gusev, Valerii Korniienko:
On the Telecommunication Traffic Forecasting in a Fractional Gaussian Noise Model. 164-173
Session 2: Systems of Information Security
- Oleg Bisikalo, Oksana V. Kovtun, Viacheslav Kovtun, Victoria Vysotska:
Research of Pareto-Optimal Schemes of Control of Availability of the Information System for Critical Use. 174-193 - Andrii Nicheporuk, Vadym Paiuk, Bohdan Savenko, Oleg Savenko, Olena Geidarova:
Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks. 194-207 - Kira Bobrovnikova, Sergii Lysenko, Piotr Gaj, Valeriy Martynyuk, Dmytro Denysiuk:
Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis. 208-218 - Mykola Stetsyuk, Leonid Bedratyuk, Bohdan Savenko, Vasyl Stetsyuk, Oleg Savenko:
Providing the Resilience and Survivability of Specialized Information Technology Across Corporate Computer Networks. 219-238 - Roman Belfer, Antonina Kashtalian, Andrii Nicheporuk, George Markowsky, Anatoliy Sachenko:
Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication. 239-251 - Olha Yanholenko, Olga Cherednichenko, Olena Yakovleva, Denis Arkatov:
A Model for Estimating the Security Level of Mobile Applications: a Fuzzy Logic Approach. 252-266 - Kostiantyn Zashcholkin, Oleksandr Drozd, Olena Ivanova, Pavlo Bykovyy:
Formation of the Interval Stego Key for the Digital Watermark Used in Integrity Monitoring of FPGA-based Systems. 267-276 - Volodymyr Sherstjuk, Maryna Zharikova, Ruslan Levkivskiy:
Computational Model of Soft Safety Domains and Rough Motion Corridors within Configuration Spaces. 277-293 - Mykhaylo Voynarenko, Oksana Mykoliuk, Valentyna Bobrovnyk, Michal Gregus, Oleksiy Svistunov:
A Forecast Model of Energy Security Level in The System of Managing Energy Efficiency at Enterprises. 294-306 - Sergii Lysenko, Kira Bobrovnikova, Peter T. Popov, Viacheslav Kharchenko, Dmytro Medzatyi:
Spyware Detection Technique Based on Reinforcement Learning. 307-316 - Oleksii Duda, Nataliia Kunanets, Serhii V. Martsenko, Oleksandr Matsiuk, Volodymyr Pasichnyk:
Building Secure Urban Information Systems Based on IoT Technologies. 317-328 - Oleksandr Tymchenko, Bohdana Havrysh, Aneta Poniszewska-Maranda, Bohdan Kovalskyi, Oleksandr O. Tymchenko, Kateryna Havrysh:
Development and Research of VAD-Based Speech Signal Segmentation Algorithms. 329-339 - Lubomir Sikora, Rostislav Tkachuk, Natalia Lysa, Ivanna Dronyuk, Olga Fedevych:
Information and Logic Cognitive Technologies of Decision-making in Risk Conditions. 340-356 - Oleksandr Drozd, Igor Kovalev, Oleksandr Martynyuk, Kostiantyn Zashcholkin, Julia V. Drozd:
A Method of Developing a Checkable Self-Recovery Floating-Point Pipeline System. 357-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.