


default search action
1st IntelITSIS 2020: Khmelnytskyi, Ukraine
- Tetiana Hovorushchenko, Oleg Savenko, Peter T. Popov, Sergii Lysenko:

Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, Khmelnytskyi, Ukraine, June 10-12, 2020. CEUR Workshop Proceedings 2623, CEUR-WS.org 2020
Session 1: Intelligent Information Technologies
- Iurii Krak, Anatolii Pashko, Oleg Stelia, Olexander Barmak, Sergey Pavlov:

Selection Parameters in the ECG Signals for Analysis of QRS Complexes. 1-13 - Tetiana Hovorushchenko, Alla Herts, Yelyzaveta Hnatchuk:

Information Technology for Legal Regulation of the Dental Services Contract. 14-24 - Tatiana Neskorodieva, Eugene Fedorov, Ivan Izonin:

Forecast Method for Audit Data Analysis by Modified Liquid State Machine. 25-35 - Serhii A. Lupenko, Iaroslav V. Lytvynenko, Nataliia Stadnyk, Halyna Osukhivska, Natalia Kryvinska:

Modification of the Software System for the Automated Determination of Morphological and Rhythmic Diagnostic Signs by Electrocardio Signals. 36-46 - Tetiana Hovorushchenko, Artem Boyarchuk, Oleh Borovyk, Dmytro Medzatyi, Mykola Krasovskyi:

Structure of Multifunctional Cooperative Robotics System based on the Ontological Approach. 47-56 - Rykhard Bohush, Sergey Ablameyko, Yahor Adamovskiy, Dmitry Glukhov:

Effective Object Localization in Images by Calculating Ratio and Distance Between Pixels. 57-66 - Vita Kashtan, Volodymyr V. Hnatushenko:

A Wavelet and HSV Pansharpening Technology of High Resolution Satellite Images. 67-76 - Oleksii Ivanov, Liudmyla Koretska, Volodymyr Lytvynenko:

Intelligent Modeling of Unified Communications Systems Using Artificial Neural Networks (short paper). 77-84 - Artem Boyarchuk, Olga Pavlova, Mykyta Bodnar, Ivan Lopatto:

Approach to the Analysis of Software Requirements Specification on Its Structure Correctness. 85-95 - Olexander Barmak, Iurii Krak, Eduard Manziuk, Volodymyr Lytvynenko, Oleg Kalyta:

Classification Technology Based on Hyperplanes for Visual Analytics with Implementations for Different Subject Areas. 96-106 - Pavlo Radiuk, Hakan Kutucu:

Heuristic Architecture Search Using Network Morphism for Chest X-Ray Classification. 107-121 - Kateryna Yalova, Kseniia Yashyna, Nataliia Savina:

Medical Information System Development: Practical Aspects. 122-132 - Tetiana Kysil, Ivan Izonin, Olha Hovorushchenko:

Information Technology for Choosing the Trademark Considering the Attitude of Consumer (short paper). 133-140 - Elena Odarushchenko, Oleg Odarushchenko, Valentina Butenko, Vyacheslav Kharchenko, Larysa Degtyareva:

Development of Wearable Solutions for Healthcare: Initial Stages Analysis and Case Study. 153-163 - Vyacheslav Gorev, Alexander Gusev, Valerii Korniienko:

On the Telecommunication Traffic Forecasting in a Fractional Gaussian Noise Model. 164-173
Session 2: Systems of Information Security
- Oleg Bisikalo, Oksana V. Kovtun, Viacheslav Kovtun, Victoria Vysotska:

Research of Pareto-Optimal Schemes of Control of Availability of the Information System for Critical Use. 174-193 - Andrii Nicheporuk, Vadym Paiuk, Bohdan Savenko, Oleg Savenko, Olena Geidarova:

Detecting Software Malicious Implant Based on Anomalies Research on Local Area Networks. 194-207 - Kira Bobrovnikova, Sergii Lysenko, Piotr Gaj, Valeriy Martynyuk, Dmytro Denysiuk:

Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis. 208-218 - Mykola Stetsyuk, Leonid Bedratyuk, Bohdan Savenko, Vasyl Stetsyuk, Oleg Savenko:

Providing the Resilience and Survivability of Specialized Information Technology Across Corporate Computer Networks. 219-238 - Roman Belfer, Antonina Kashtalian, Andrii Nicheporuk, George Markowsky, Anatoliy Sachenko:

Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication. 239-251 - Olha Yanholenko, Olga Cherednichenko, Olena Yakovleva, Denis Arkatov:

A Model for Estimating the Security Level of Mobile Applications: a Fuzzy Logic Approach. 252-266 - Kostiantyn Zashcholkin, Oleksandr Drozd, Olena Ivanova, Pavlo Bykovyy:

Formation of the Interval Stego Key for the Digital Watermark Used in Integrity Monitoring of FPGA-based Systems. 267-276 - Volodymyr Sherstjuk, Maryna Zharikova, Ruslan Levkivskiy:

Computational Model of Soft Safety Domains and Rough Motion Corridors within Configuration Spaces. 277-293 - Mykhaylo Voynarenko, Oksana Mykoliuk, Valentyna Bobrovnyk, Michal Gregus, Oleksiy Svistunov:

A Forecast Model of Energy Security Level in The System of Managing Energy Efficiency at Enterprises. 294-306 - Sergii Lysenko, Kira Bobrovnikova, Peter T. Popov, Viacheslav Kharchenko, Dmytro Medzatyi:

Spyware Detection Technique Based on Reinforcement Learning. 307-316 - Oleksii Duda, Nataliia Kunanets, Serhii V. Martsenko, Oleksandr Matsiuk, Volodymyr Pasichnyk:

Building Secure Urban Information Systems Based on IoT Technologies. 317-328 - Oleksandr Tymchenko

, Bohdana Havrysh, Aneta Poniszewska-Maranda, Bohdan Kovalskyi, Oleksandr O. Tymchenko
, Kateryna Havrysh:
Development and Research of VAD-Based Speech Signal Segmentation Algorithms. 329-339 - Lubomir Sikora, Rostislav Tkachuk, Natalia Lysa, Ivanna Dronyuk, Olga Fedevych:

Information and Logic Cognitive Technologies of Decision-making in Risk Conditions. 340-356 - Oleksandr Drozd, Igor Kovalev, Oleksandr Martynyuk, Kostiantyn Zashcholkin, Julia V. Drozd:

A Method of Developing a Checkable Self-Recovery Floating-Point Pipeline System. 357-367

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














