Abstract is missing.
- Selection Parameters in the ECG Signals for Analysis of QRS ComplexesIurii Krak, Anatolii Pashko, Oleg Stelia, Olexander Barmak, Sergey Pavlov. 1-13 [doi]
- Information Technology for Legal Regulation of the Dental Services ContractTetiana Hovorushchenko, Alla Herts, Yelyzaveta Hnatchuk. 14-24 [doi]
- Forecast Method for Audit Data Analysis by Modified Liquid State MachineTatiana Neskorodieva, Eugene Fedorov, Ivan Izonin. 25-35 [doi]
- Modification of the Software System for the Automated Determination of Morphological and Rhythmic Diagnostic Signs by Electrocardio SignalsSerhii Lupenko, Iaroslav Lytvynenko, Nataliia Stadnyk, Halyna Osukhivska, Natalia Kryvinska. 36-46 [doi]
- Structure of Multifunctional Cooperative Robotics System based on the Ontological ApproachTetiana Hovorushchenko, Artem Boyarchuk, Oleh Borovyk, Dmytro Medzatyi, Mykola Krasovskyi. 47-56 [doi]
- Effective Object Localization in Images by Calculating Ratio and Distance Between PixelsRykhard Bohush, Sergey Ablameyko, Yahor Adamovskiy, Dmitry Glukhov. 57-66 [doi]
- A Wavelet and HSV Pansharpening Technology of High Resolution Satellite ImagesVita Kashtan, Volodymyr V. Hnatushenko. 67-76 [doi]
- Intelligent Modeling of Unified Communications Systems Using Artificial Neural Networks (short paper)Oleksii Ivanov, Liudmyla Koretska, Volodymyr Lytvynenko. 77-84 [doi]
- Approach to the Analysis of Software Requirements Specification on Its Structure CorrectnessArtem Boyarchuk, Olga Pavlova, Mykyta Bodnar, Ivan Lopatto. 85-95 [doi]
- Classification Technology Based on Hyperplanes for Visual Analytics with Implementations for Different Subject AreasOlexander Barmak, Iurii Krak, Eduard Manziuk, Volodymyr Lytvynenko, Oleg Kalyta. 96-106 [doi]
- Heuristic Architecture Search Using Network Morphism for Chest X-Ray ClassificationPavlo Radiuk, Hakan Kutucu. 107-121 [doi]
- Medical Information System Development: Practical AspectsKateryna Yalova, Kseniia Yashyna, Nataliia Savina. 122-132 [doi]
- Information Technology for Choosing the Trademark Considering the Attitude of Consumer (short paper)Tetiana Kysil, Ivan Izonin, Olha Hovorushchenko. 133-140 [doi]
- Development of Wearable Solutions for Healthcare: Initial Stages Analysis and Case StudyElena Odarushchenko, Oleg Odarushchenko, Valentina Butenko, Vyacheslav Kharchenko, Larysa Degtyareva. 153-163 [doi]
- On the Telecommunication Traffic Forecasting in a Fractional Gaussian Noise ModelVyacheslav Gorev, Alexander Gusev, Valerii Korniienko. 164-173 [doi]
- Research of Pareto-Optimal Schemes of Control of Availability of the Information System for Critical UseOleg Bisikalo, Oksana Kovtun, Viacheslav Kovtun, Victoria Vysotska. 174-193 [doi]
- Detecting Software Malicious Implant Based on Anomalies Research on Local Area NetworksAndrii Nicheporuk, Vadym Paiuk, Bohdan Savenko, Oleg Savenko, Olena Geidarova. 194-207 [doi]
- Technique for IoT Cyberattacks Detection Based on DNS Traffic AnalysisKira Bobrovnikova, Sergii Lysenko, Piotr Gaj, Valeriy Martynyuk, Dmytro Denysiuk. 208-218 [doi]
- Providing the Resilience and Survivability of Specialized Information Technology Across Corporate Computer NetworksMykola Stetsyuk, Leonid Bedratyuk, Bohdan Savenko, Vasyl Stetsyuk, Oleg Savenko. 219-238 [doi]
- Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes IndicationRoman Belfer, Antonina Kashtalian, Andrii Nicheporuk, George Markowsky, Anatoliy Sachenko. 239-251 [doi]
- A Model for Estimating the Security Level of Mobile Applications: a Fuzzy Logic ApproachOlha Yanholenko, Olga Cherednichenko, Olena Yakovleva, Denis Arkatov. 252-266 [doi]
- Formation of the Interval Stego Key for the Digital Watermark Used in Integrity Monitoring of FPGA-based SystemsKostiantyn Zashcholkin, Oleksandr Drozd, Olena Ivanova, Pavlo Bykovyy. 267-276 [doi]
- Computational Model of Soft Safety Domains and Rough Motion Corridors within Configuration SpacesVolodymyr Sherstjuk, Maryna Zharikova, Ruslan Levkivskiy. 277-293 [doi]
- A Forecast Model of Energy Security Level in The System of Managing Energy Efficiency at EnterprisesMykhaylo Voynarenko, Oksana Mykoliuk, Valentyna Bobrovnyk, Michal Gregus, Oleksiy Svistunov. 294-306 [doi]
- Spyware Detection Technique Based on Reinforcement LearningSergii Lysenko, Kira Bobrovnikova, Peter Popov, Viacheslav Kharchenko, Dmytro Medzatyi. 307-316 [doi]
- Building Secure Urban Information Systems Based on IoT TechnologiesOleksii Duda, Nataliia Kunanets, Serhii Martsenko, Oleksandr Matsiuk, Volodymyr Pasichnyk. 317-328 [doi]
- Development and Research of VAD-Based Speech Signal Segmentation AlgorithmsOleksandr Tymchenko, Bohdana Havrysh, Aneta Poniszewska-Maranda, Bohdan Kovalskyi, Oleksandr O. Tymchenko, Kateryna Havrysh. 329-339 [doi]
- Information and Logic Cognitive Technologies of Decision-making in Risk ConditionsLubomir Sikora, Rostislav Tkachuk, Natalia Lysa, Ivanna Dronyuk, Olga Fedevych. 340-356 [doi]
- A Method of Developing a Checkable Self-Recovery Floating-Point Pipeline SystemOleksandr Drozd, Igor Kovalev, Oleksandr Martynyuk, Kostiantyn Zashcholkin, Julia Drozd. 357-367 [doi]