default search action
IT&I 2022: Kyiv, Ukraine
- Anatoly Anisimov, Vitaliy Snytyuk, Aldrich Chris, Andreas Pester, Frédéric Mallet, Hiroshi Tanaka, Iurii Krak, Karsten Henke, Oleg Chertov, Oleksandr Marchenko, Sándor Bozóki, Vitaliy V. Tsyganok, Vladimir Vovk:
Selected Papers of the IX International Scientific Conference "Information Technology and Implementation" (IT&I-2022). Conference Proceedings Kyiv, Ukraine, November 30 - December 02, 2022. CEUR Workshop Proceedings 3347, CEUR-WS.org 2023
Section 1: Artificial Intelligence Technologies
- Oleksii Bychkov, Oleksii Ivanchenko, Kateryna Merkulova, Yelyzaveta Zhabska:
Enhancement of Information Technology for Person Identification Based on Image Quality Features. 1-10 - Serhii Vladov, Yurii Shmelov, Ruslan Yakovliev, Olha Ivanovska:
Modified Neural Network Method for Trend Analysis of Helicopter Turboshaft Engine Parameters at Flight Modes. 11-29 - Eugene Fedorov, Olga Nechyporenko:
Method of Dynamic Stock Buffer Management Based on a Connectionist Expert System. 30-41 - Victor L. Timchenko, Yuriy P. Kondratenko, Vladik Kreinovich:
Decision Support System for the Safety of Ship Navigation Based on Optical Color Logic Gates. 42-52 - Ali Mekhtiyev, Aliya Alkina, Assiya Sarinova, Ilyas Kazambayev, Lalita Kirichenko:
Development of an Automatic System for Monitoring the Integrity of Power Cables Using Quasi-Distributed Fiber-Optic Sensors. 53-68 - Bohdan Koval, Iulia Khlevna:
Anomalies Analysis and Detection Using Computer Vision for Finding Defects in Plant Leaves Images. 69-79 - Yuriy P. Zaychenko, Helen Zaichenko, Oleksii Kuzmenko:
Investigation of Artificial Intelligence Methods in the Short-Term and Middle-Term Forecasting in Financial Sphere. 80-89 - Alexey Kutyrev, Nikolay A. Kiktev, Oleksii Kalivoshko, Ruslan S. Rakhmedov:
Recognition and Classification Apple Fruits Based on a Convolutional Neural Network Model. 90-101 - Volodymyr Taranukha:
Survey on Plagiarism Challenges. 102-111
Section 2: Data Analytics & E-commerce, E-government and E-learning Technologies
- Galyna Chornous, Yana Fareniuk:
Optimization of Marketing Decisions Based on Machine Learning: Case for Telecommunications. 112-124 - Oksana Shymanska, Oleksandr Dluhopolskyi, Alina Zhukovska, Nataliia Bolkvadze, Anzhela Lohush:
Business Reputation Strategy of Enterprise in Social Media: Molokiya's Case. 125-136 - Tetyana Sergeyeva, Sergiy Bronin, Tadej Glazar, Jim Njoo:
E-learning Research within New European Paradigm. 137-147 - Valentyna Pleskach, Viacheslav V. Zosimov, Oleksandra S. Bulgakova, Mariia Pleskach, Eva Volnyanska:
C2C Application as an Example of Eshop for Handmade: Tools, Security Issues, Basic Technologies. 148-158
Section 3: Mathematical Foundations of Information Technology
- Lyudmyla Kirichenko, Tamara Radivilova, Oksana Pichugina, Larysa Chala, Danyil Khandak:
Trend Detection in Short Time Series Using Discrete Wavelet Transform. 159-168 - Hryhorii Hnatiienko, Vitaliy Snytyuk, Nataliia Tmienova, Dmytro Zatonatskiy, Oksana Zhylinska:
Mathematical Support of the Task of Determining the Strategic Directions of Development and Priorities of the Organization. 169-184 - Oleksiy Oletsky, Dmytro Dosyn:
Some Ways of Counteracting Possible Manipulations Within the AHP on The Base of Weighted Linear Equations. 185-194 - Dmytro O. Terletskyi, Sergey V. Yershov:
Fuzzy Conceptual Knowledge Extraction and Retrieval Within Fuzzy Classes Decomposition. 195-211
Section 4: Cyberspace Protection Technologies
- Yanina Shestak, Serhii Toliupa, Anatolii Shevchenko, Anna Torchylo, Ogbu James Onyigwang:
Data Processing Centre's Cyberattack Protection Directions on the Base of Neural Network Algorithms. 212-221 - Artem Khovrat, Volodymyr Kobziev, Alexei Nazarov, Sergiy Yakovlev:
Parallelization of the VAR Algorithm Family to Increase the Efficiency of Forecasting Market Indicators During Social Disaster. 222-233 - Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Oksana Zhyharevych, Artem Polozhentsev:
Method for Calculating the Criticality Level of Sectoral Information and Telecommunication Systems. 234-245
Section 5: Network and Internet Technologies
- Valery Zivakin, Oleksandr Kozachuk, Pylyp Prystavka, Olha Cholyshkina:
Training set AERIAL SURVEY for Data Recognition Systems From Aerial Surveillance Cameras. 246-255 - Andrii Kopp, Dmytro Orlovskyi:
Towards the Enterprise Architecture Web Mining Approach and Software Tool. 256-268 - Myroslava Gladka, Alexander Kuchansky, Mykola Kostikov, Rostyslav Lisnevskyi:
A Model of the Application of IoT Devices Based on RFID to Ensure the Safety of the Military and Civilian Population under War Conditions. 269-278 - Olga Leshchenko, Yuri Kravchenko, Nazar Yaroshchuk, Pavlo Krasnopyorov:
Information Modeling through GIS for Visualizing Air Alarms. 279-289 - Ali Mekhtiyev, Aliya Alkina, Alexandr Neftissov, Ilyas Kazambayev, Lalita Kirichenko:
Overview of Intelligent Systems for Monitoring the Integrity of Technical Objects Based on Distributed Fiber-optic Sensors. 290-306
Short Papers
- Vitaliy Kobets, Serhii Savchenko:
Building an Optimal Investment Portfolio with Python Machine Learning Tools. 307-315 - Igor Zavgorodnii, Iryna Perova, Olena Litovchenko, Tetiana Bahlaienko:
Pre-pathological Diagnostic Criteria for Professional Burnout in Healthcare Workers. 316-324 - Olena Liashenko, Bohdan Yakymchuk:
Modeling the Optimal Grocery Store Trading Area using Machine Learning Methods. 325-333 - Beibut Amirgaliyev, Dana Rakym, Shynar Bolatova:
A Study on Station-Based Carsharing Service's Price Prediction Methods. 334-340 - Volodymyr Kubytskyi, Taras Panchenko:
An Effective Approach to Image Embeddings for E-Commerce. 341-349 - Dmitriy Klyushin, Irina Martynenko:
Nonparametric Change Point Detection in Time Series Using Dempster-Hill procedure. 350-357 - Petro Snitsarenko, Yuri Sarychev, Andrii Fesenko, Viktor Zubkov, Yurii Pishchanskyi:
Management of Security Risks of Information Resources in Information and Telecommunication Systems Using Expert Procedures. 358-366 - Alan Nafiiev, Hlib Kholodulkin, Andrii Rodionov, Dmytro Lande:
Comparative Analysis of Machine Learning Models with Different Types of Data Representations for Detecting Malicious Files. 367-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.