Abstract is missing.
- Modelling the Decision Making Process on Legal Conducting the Surrogate MotherhoodTetiana Hovorushchenko, Alla Herts, Yelyzaveta Hnatchuk. 1-5 [doi]
- Analysis of Trade-offs in Fault-Tolerant Distributed Computing and Replicated DatabasesAnatoliy Gorbenko, Andrii Karpenko, Olga Tarasyuk. 1-6 [doi]
- Research of safety and survivability models of the information system for critical useOleg V. Bisikalo, Viacheslav V. Kovtun, Oksana V. Kovtun, Volodimir B. Romanenko. 7-12 [doi]
- Dependability Assessment for SCADA System Considering Usage of Cloud ResourcesOleg Ivanchenko, Vyacheslav Kharchenko, Eugene Brezhnev, Yuriy Ponochovnyi, Borys Moroz, Leonid Kabak. 13-17 [doi]
- Resource allocation for hierarchical widget systemViktoriia Merlak, Heorhii Kuchuk. 18-22 [doi]
- Advanced Performance-Based Fast ReRouting Model with Path ProtectionOleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Batoul Sleiman, Pavel Segec, Jozef Papán. 23-28 [doi]
- Reliability Assessment of Large Systems That Fail as a Result of Damage AccumulationLev Raskin, Oksana Sira, Yurii Parfenyuk. 29-33 [doi]
- Routing an Unmanned Aerial Vehicle During NPP Monitoring in the Presence of an Automatic Battery Replacement Aerial SystemHerman Fesenko, Ihor Kliushnikov, Vyacheslav Kharchenko, Serhii Rudakov, Elena Odarushchenko. 34-39 [doi]
- Structured Argumentation for Assurance Case of Monitoring System based on UAVsVladimir V. Sklyar, Vyacheslav Kharchenko. 40-46 [doi]
- Improvement of the Quasi Delay-Insensitive Pipeline Noise ImmunityYuri Stepchenkov, Yuri Rogdestvenski, Anton N. Kamenskih, Yuri Diachenko, Denis Diachenko. 47-51 [doi]
- Reversible Majority Voter Based on Fredkin GatesSergey F. Tyurin. 52-57 [doi]
- Using Natural Version Redundancy of FPGA Projects in Area of Critical ApplicationsOleksandr Drozd, Vitaliy A. Romankevich, Mykola Kuznietsov, Myroslav Drozd, Oleksandr Martynyuk. 58-64 [doi]
- The Minimizating of Hardware for Implementation of Pseudo LRU Algorithm for Cache MemoryVadym Puidenko, Vyacheslav Kharchenko. 65-71 [doi]
- Method and tool for support of software requirements profile quality assessmentOleksandr Gordieiev, Daria Gordieieva, Andrii Tryfonov, Vladyslav Dokukin, Elena Odarushchenko. 72-79 [doi]
- Software Fault Insertion Testing for SIL Certification of Safety PLC-Based SystemOleg Odarushchenko, Oleksiy Striuk, Kostiantyn Leontiiev, Elena Odarushchenko. 80-84 [doi]
- Verification of FPGA control systems by analyzing the correctness of state diagramsMaryna Miroshnyk, Alexander Shkil, Elvira Kulak, Dariia Rakhlis, Inna Filippenko, Anatolii Miroshnyk. 85-89 [doi]
- Assumption Modes and Effect Analysis of XMECA: Expert based safety assessmentKostiantyn Leontiiev, Eugene Babeshko, Vyacheslav Kharchenko. 90-94 [doi]
- Evaluation system for user authentication methods on mobile devicesDmytro Progonov, Veronika Prokhorchuk, Andriy Oliynyk. 95-101 [doi]
- Predicting malicious hosts by blacklisted IPv4 address density estimationDmytro Likhomanov, Vladyslav Poliukh. 102-109 [doi]
- Paradigm Changes that Strengthen the Financial Security of the State through FINTECH DevelopmentNatalia N. Sirenko, Igor P. Atamanyuk, Yuriy Volosyuk, Anastasiya Poltorak, Olha Melnyk, Polina Fenenko. 110-116 [doi]
- Approach to Sustainable Trust and Reputation Evaluation in Distributed Mobile Networks of the Internet of ThingsVictoriia Turkina, Dmytro Ihnatiev. 117-121 [doi]
- Availability Model of Two-Zone Physical Security System considering Cyber Attacks and Software UpdateVyacheslav Kharchenko, Yuriy Ponochovnyi, Al-Khafaji Ahmed Waleed, Oleg Ivanchenko, Dmytro Uzun, Larysa Degtyareva. 122-126 [doi]
- A Cyberattacks Detection Technique Based on Evolutionary AlgorithmsSergii Lysenko, Kira Bobrovnikova, Roman Shchuka, Oleg Savenko. 127-132 [doi]
- The Complex Method of Intrusion Detection Based on Anomaly Detection and Misuse DetectionTamara Radivilova, Lyudmyla Kirichenko, Abed Saif Alghawli, Andrii Ilkov, Maxim Tawalbeh, Petro Zinchenko. 133-137 [doi]
- Availability Models of Industrial Internet of Things Wired System Considering CyberattacksMaryna Kolisnyk, Vyacheslav Kharchenko, Iryna Piskachova. 138-144 [doi]
- Techniques for Raising the Remainder to a Power in the System of Residual ClassesVictor Krasnobayev, Alexandr Kuznetsov, Irina Lokotkova, Anastasiia Kiian, Tetiana Kuznetsova. 145-150 [doi]
- Determination of Positional Characteristics of Numbers in the Residual Class SystemVictor Krasnobayev, Alexandr Kuznetsov, Victoria Popenko, Anna Kononchenko, Tetiana Kuznetsova. 151-156 [doi]
- The Method of Searching for Differential Trails of ARX-based Block Cipher CypressMariia Rodinko, Roman Oliynykov. 157-160 [doi]
- Adaptive Pseudo-Random Sequence Generation for Spread Spectrum Image SteganographyAlexandr Kuznetsov, Oleksii Smirnov, Alexander Onikiychuk, Tymur Makushenko, Olha Anisimova, Anna Arischenko. 161-165 [doi]
- New Approach to the Implementation of Post-Quantum Digital Signature SchemeAlexandr Kuznetsov, Anastasiia Kiian, Vitalina Babenko, Iryna Perevozova, Iryna Chepurko, Oleksii Smirnov. 166-171 [doi]
- Testing of Code-Based Pseudorandom Number Generators for Post-Quantum ApplicationAlexandr Kuznetsov, Anastasiia Kiian, Oleksii Smirnov, Alla Cherep, Meruert Kanabekova, Iryna Chepurko. 172-177 [doi]
- FPGA Based Digital Quantum Computer VerificationValerii Hlukhov. 178-182 [doi]
- Experimental Study of Secure PRNG for Q-trits Quantum Cryptography ProtocolsSergiy Gnatyuk, Tetiana Okhrimenko, Olena Azarenko, Andriy Fesenko, Rat Berdibayev. 183-188 [doi]
- Universal Meta-Definition of IntelligenceAnatoly Shevchenko, Alexander Sosnitsky. 189-195 [doi]
- Combination of Digital Twin and Artificial Intelligence in Manufacturing Using Industrial IoTVyacheslav Kharchenko, Oleg Illiashenko, Olga Morozova, Sergii Sokolov. 196-201 [doi]
- An Analytical Method for Generating a Data Set for a Neural Model of a Conveyor LineOleh Pihnastyi, Georgii Kozhevnikov, Tetiana Bondarenko. 202-206 [doi]
- IoT-complex for Monitoring and Analysis of Motor Highway Condition Using Artificial Neural NetworksRoman Leizerovych, Galyna V. Kondratenko, Ievgen V. Sidenko, Yuriy P. Kondratenko. 207-212 [doi]
- Informational and extreme machine learning for onboard recognition system of ground objectsOlena Protsenko, Taras Savchenko, Mykyta Myronenko, Oleksandr Prikhodchenko. 213-218 [doi]
- A Deep Learning Approach to Locate Buggy FilesBo Jiang, Pengfei Liu, Jie Xu. 219-223 [doi]
- The viability of dynamic systems in difficult conditions: cognitive aspectsGalyna Mygal, Valeriy Mygal. 224-229 [doi]
- Cognitive Modeling of the Consumer Market: Sensitivity and Scenario AnalysisPetr Makarenko, Yulia Makarenko, Mikola Mogilat, Anton Neklesa, Olena Ponochovna. 230-235 [doi]
- Obstacle Avoidance Algorithm for Small Autonomous Mobile Robot Equipped with Ultrasonic SensorsMaryna Derkach, Danylo Matiuk, Inna Skarga-Bandurova. 236-241 [doi]
- Method of Automated Flight Route Planning for Unmanned Aerial Vehicles to Search for Stationary ObjectsOleksandr Tymochko, Oleksandr Timochko, Andrii Trystan, Olga Matiushchenko, Andrii Berezhnyi. 242-246 [doi]
- The Algorithm of UAV Automatic Landing System Using Computer VisionKostiantyn Dergachov, Serhii Bahinskii, Iryna Piavka. 247-252 [doi]
- Conveyor Model with Input and Output Accumulating BunkerOleh Pihnastyi, Georgii Kozhevnikov, Valery Khodusov. 253-258 [doi]
- Identification of the Optimal Parameters for Forecasting the State of Technical Objects Based on the Canonical Random Sequence DecompositionIgor P. Atamanyuk, Vyacheslav Shebanin, Yuriy P. Kondratenko, Valerii Havrysh, Vadim Lykhach, Sergey Kramarenko. 259-264 [doi]
- Hybrid Decision Support Methodology Based on Objective and Expert DataVitaliy V. Tsyganok, Sergii V. Kadenko, Oleh V. Andriichuk. 265-271 [doi]
- Increasing Reliability of Programming Interfaces Based on Fuzz TestingYaroslav Khortiuk, Galyna V. Kondratenko, Ievgen V. Sidenko, Yuriy P. Kondratenko. 272-277 [doi]
- Assessing the Perception of Abstract Paintings with Elements of Augmented RealityElena Golembovska, Vyacheslav Kharchenko, Igor Shostak, Mariia Danova, Olena Feoktystova. 278-283 [doi]
- Research Aspects for Secure Communication in the Industrial Internet of ThingsAxel Sikora, Andi Walz, Lukas Zimmermann. 284-289 [doi]
- Conceptual Basis of Cascading Differential Masking TechnologyMaksim Pavlenko, Maksym Kolmykov, Oleksandr Tymochko, Serhii Khmelevskiy, Volodymyr Larin. 290-294 [doi]
- Identification of a Person by Gait on the Basis of Wavelet TechnologyMykhailo Babii, Andrii Dikhtiarov. 295-300 [doi]
- Discrete Atomic Compression with Different Structures of Discrete Atomic Transform: Efficiency Comparison and Perspectives of Application to Digital Images Privacy ProtectionViktor Makarichev, Vladimir Lukin, Iryna Brysina. 301-306 [doi]
- A Two-step Procedure for Image Lossy Compression by ADCTC With a Desired QualityFangfang Li, Sergey S. Krivenko, Vladimir V. Lukin. 307-312 [doi]
- Using Internet of Things Technologies to Ensure Cargo Transportation SafetyIgor Shostak, Mariia Danova, Olga Morozova, Tamara Kliuieva. 313-319 [doi]
- Navigation Assistive Application for the Visually Impaired PeopleLuchsheva Oksana, Turkin Ihor, Luchshev Pavlo. 320-325 [doi]
- Development of the Flexible Traffic Control System Using the LabView and ThingSpeakAnatoliy Sachenko, Oleksandr Osolinskyi, Pavlo Bykovyy, Maciej Dobrowolski, Volodymyr Kochan. 326-330 [doi]
- IoT's Primary Information Load EstimationIgor Zhukov, Nickolay Pechurin, Lyudmila Kondratova. 331-335 [doi]
- Fusion Method of Primary Surveillance Radar Data and IFF systems DataIryna Svyd, Oleksandr Maltsev, Ivan Obod, Ganna Zavolodko. 336-340 [doi]
- Secondary Surveillance Radar Response Channel Information Security Improvement MethodIryna Svyd, Ivan Obod, Oleksandr Maltsev, Artem Hlushchenko. 341-345 [doi]
- Crop monitoring technology based on time series of satellite imageryNataliia Kussul, Andrii Shelestov, Bohdan Yailymov, Hanna Yailymova, Mykola Lavreniuk, Leonid Shumilo, Yuliia Bilokonska. 346-350 [doi]
- Image noise reduction by denoising autoencoderLev Yasenko, Yaroslav Klyatchenko, Oksana Tarasenko-Klyatchenko. 351-355 [doi]
- Methods of On-Line Computation Acceleration in Systems with Direct Connection between UnitsValerii Zhabin, Valentina Zhabina. 356-362 [doi]
- Regularization Method for the Clarke's Generalized Jacobian to Ensure the Formation of Nonsingular Systems for Inexact Newton MethodsSergii Saukh. 363-370 [doi]
- On Hoare Triples Applicability to Dependable System Specification SynthesisVadym Shkarupylo, Alexander Chemeris, Valentyna Dusheba, Ravil Kudermetov, Andrii O. Oliinyk. 371-375 [doi]
- FPGA as a Service Solutions Development StrategyArtem Perepelitsyn, Inna Zarizenko, Vitaliy Kulanov. 376-380 [doi]
- Digital Society Future Transformation Perspectives in the Informational AgeZlatogor Minchev. 381-388 [doi]
- Methods of Classification and Assessment of Critical Information Infrastructure ObjectsOleksandr Potii, Yuri Tsyplinsky. 389-393 [doi]
- Probabilistic approach for evaluation of organization of enterprise reengineeringHalyna Chmeruk, Tetiana Bludova. 394-398 [doi]
- Linear Regression Model for Substantiation of Sustainable State Policy in a Digital EconomyOleksandr Dorofyeyev, Tamara Lozinska, Yuriy Ponochovnyi, Tetiana Vlasenko. 399-403 [doi]
- Main Aspects of the Creation of Managing Information System at the Implementation of Precision FarmingOlena Kopishynska, Yurii Utkin, Oleksandr Galych, Mykola Marenych, Ihor Sliusar. 404-410 [doi]
- The Development of Educational Application with Virtual Reality Placing Objects System Using Snap Zone TechnologyViktoriya Saravas, Evgenii Pahalchuk, Andrii Molchan, Yuriy Kampov. 416-421 [doi]
- Webometrics ranking analysis and possible ways to improve the position of the universityIryna Yakymenko, Volodymyr Kazymyr, Svitlana Lytvyn. 422-426 [doi]
- Modeling the Distribution of Radionuclides in the Environment as a Result of Radiation AccidentsA. Y. Shamyna, A. D. Ardyako, A. K. Labokha. 427-430 [doi]
- Business Models of Collaborative Networked Organisations: Implications for Cybersecurity CollaborationTodor Tagarev, Yantsislav Yanakiev. 431-438 [doi]
- Governance of Collaborative Networked Organisations: Stakeholder RequirementsTodor Tagarev. 439-445 [doi]
- Development Principles for Electronic Voting System Using Distributed Ledger TechnologyKateryna Isirova, Oleksandr Potii. 446-450 [doi]
- Problems and Solutions for an IT-Dependent Information Society: Essence, Development and ProspectsLyudmila Vasylieva, Olga Procenko, Svitlana Chmykhun. 451-455 [doi]
- Logical Approach to the Research of Properties of Software Engineering EcosystemSergiy Kryvyi, Olena Grinenko, Volodymyr Opanasenko. 456-464 [doi]
- Concept of Intelligent Agent for Verification of Considering the Subject Area InformationTetiana Hovorushchenko, Ivan Lopatto, Olga Pavlova. 465-469 [doi]
- Integration of Security, Functional and Ecology Safety Management Systems: Concept and Industrial CaseSergiy Dotsenko, Herman Fesenko, Oleg Illiashenko, Vyacheslav Kharchenko, Valentin Moiseenko, Liudmyla Yermolenko. 470-474 [doi]
- Assurance levels for decision making in autonomous intelligent systems and their safetyYannick Fourastier, Claude Baron, Carsten Thomas, Philippe Esteban. 475-483 [doi]