Abstract is missing.
- Intelligent System for Building Separation on a Semantically Segmented Map (keynote)Volodymyr V. Hnatushenko, Vadym Zhernovyi, Iryna Udovyk, Olga Shevtsova. 1-11 [doi]
- Intelligent Information Technology for Providing Human Resources to Projects in a Multi-Project Environment (keynote)Nataliia Dotsenko, Dmytro Chumachenko, Yuliia Husieva, Iryna Kadykova, Igor Chumachenko. 12-23 [doi]
- HealthSupervisor: Mobile Application for Round-the-Clock Remote Monitoring of the Human Functional State (keynote)Anatoliy Melnyk, Yurii Morozov, Bohdan Havano, Petro Hupalo. 24-37 [doi]
- Towards an Efficient Knowledge-based Recommendation SystemHouda El Bouhissi, Micipsa Adel, Anis Ketam, Abdel-Badeeh M. Salem. 38-49 [doi]
- Intelligent Solar Tracking System as a Prospect for Developing the Alternative Energetics in UkraineMykola Skyba, Tetiana Hovorushchenko, Valeriy Martynyuk, Olexander Zasornov, Olga Pavlova. 50-61 [doi]
- Current State of the Problem of Gene Expression Data Processing and Extraction to Solve the Reverse Engineering Tasks in the Field of BioinformaticsSergii Babichev, Mykhailo Yasinskyi, Lyudmyla Yasinska-Damri, Yurii Ratushniak, Volodymyr Lytvynenko. 62-71 [doi]
- Intelligent Information Technology for Supporting the Medical Decision-Making Considering the Legal BasisTetiana Hovorushchenko, Yelyzaveta Hnatchuk, Alla Herts, Oksana Onyshko. 72-82 [doi]
- Modeling with Fuzzy Logic the Migration Capacity of UV-ink Components as a Factor of Potentially Harmful Pollution of PackagingVyacheslav Repeta, Valeriy Zhydetskyy, Olga Cherednichenko, Ihor Liakh. 83-89 [doi]
- Neural Network Forecasting Using Big DataSergey Ivanov, Nataliia Maksyshko, Mykola Ivanov. 90-98 [doi]
- Using the Actor-Critic Method for Population Diversity in Neuroevolutionary SynthesisSerhii Leoshchenko, Andrii O. Oliinyk, Sergey Subbotin, Vadym Shkarupylo. 99-107 [doi]
- Convolutional hyper basis function neural network and its online learning in the image recognition taskYevgeniy V. Bodyanskiy, Anastasiia Deineko, Oleksandr Hontsa, Oleksandr Zeleniy. 108-117 [doi]
- Neural Approach for Named Entity RecognitionKateryna Yalova, Kseniia Yashyna, Iryna Ivanochko. 118-126 [doi]
- Formation of Linear Characteristic of Normalized Raster Transformation for Rhombic ElementsBohdan Durnyak, Mikola Lutskiv, Petro Shepita, Danylo Hunko, Nataliia Savina. 127-133 [doi]
- Intelligent System for Supporting Collaborative Decision Making by the Pilot/Air Traffic Controller in Flight EmergenciesYuliya Sikirda, Tetiana Shmelova, Vyacheslav Kharchenko, Mykola Kasatkin. 127-141 [doi]
- Determination of the Optical Density of Two-Parameter Tone Transfer for a Short Printing System of the Sixth DimensionBohdan Durnyak, Mikola Lutskiv, Petro Shepita, Roman Karpyn, Nataliia Savina. 134-140 [doi]
- Intelligent Information System for the Determination of Iron in Coagulants Based on a Neural NetworkAndrii Safonyk, Maksym Mishchanchuk, Volodymyr Lytvynenko. 142-150 [doi]
- Information Technology for Extraction of Coherent Text Fragments from Scientometric DatabasesSvitlana Petrasova, Nina Khairova. 151-157 [doi]
- Method for Determining the Informativeness of the Software Requirements SpecificationsIvan Lopatto, Mykyta Lebiga, Yurii Forkun, Artem Boyarchuk. 158-167 [doi]
- Intelligent Information Technologies Implementation to the Process of Professional Self-identificationBohdan Yeremenko, Yuliia Riabchun, Vitalii Ploskiy, Iryna Aznaurian, Daoud Mezzane, Natalia Kryvinska. 168-177 [doi]
- Method for Automatic Processing of Audit Content Based on Bidirectional Neural Network MappingTatiana Neskorodieva, Eugene Fedorov. 178-189 [doi]
- Formal Model of Trustworthy Artificial Intelligence Based on StandardizationEduard Manziuk, Olexander Barmak, Iurii Krak, Olexander Mazurets, Tetiana Skrypnyk. 190-197 [doi]
- Stochastic Game Model of Data ClusteringPetro Kravets, Yevhen Burov, Oksana Oborska, Victoria Vysotska, Lyudmyla Dzyubyk, Vasyl Lytvyn. 198-213 [doi]
- Detection of Early Pneumonia on Individual CT Scans with Dilated ConvolutionsIurii Krak, Olexander Barmak, Pavlo Radiuk. 214-227 [doi]
- Modification of the "Piramidal" Algorithm of the Small Time Series ForecastingYuriy Turbal, Mariana Turbal, Andriy Bomba, Abd Alkaleg Hsen Driwi, Nataliia Kunanets. 223-232 [doi]
- Intellectual Information System for Supporting Text Data Rephrasing Processes Based on Deep LearningNickolay Rudnichenko, Vladimir Vychuzhanin, Natalia Shibaeva, Svetlana Antoshchuk, Igor Petrov. 228-237 [doi]
- Decision-Support System for Spatially Distributed Multi-Hazard Risk AnalysisMaryna Zharikova, Volodymyr Sherstjuk, Bohdan Sakovych, Tetyana, Tety. 233-245 [doi]
- Optimal Selection of Membership Functions Types for Fuzzy Control and Decision Making SystemsOleksiy V. Kozlov. 238-247 [doi]
- Intelligent Method of a Competitive Product Choosing based on the Emotional Feedbacks ColoringRoman Gramyak, Hrystyna Lipyanina-Goncharenko, Anatoliy Sachenko, Taras Lendyuk, Diana Zahorodnia. 246-257 [doi]
- Method of Forecasting the Characteristics and Evaluating the Implementation Success of IT Projects Based on Requirements AnalysisYelyzaveta Hnatchuk, Olga Pavlova, Krystyna Havrylyuk. 248-258 [doi]
- Intelligent Decision Support Agent Based on Fuzzy Logic in Athletes' Adaptive E-Learning SystemsYaroslav Hnatchuk, Alina Hnatchuk, Maryan Pityn, Ivan Hlukhov, Olga Cherednichenko. 258-265 [doi]
- Modeling of Alternatives and Defining the Best Options for Websites DesignVsevolod Senkivskyy, Iryna Pikh, Sergii Babichev, Alona Kudriashova, Nataliia Senkivska. 259-270 [doi]
- Method of Assessing the Influence of Personnel Competence on Institutional Information SecurityIhor Pilkevych, Oleg Boychenko, Nadiia Lobanchykova, Tetiana A. Vakaliuk, Serhiy Semerikov. 266-275 [doi]
- Information Model for Determining the Significance of Factors Influencing the Level of Digital Noise in Photographic ImagesBohdan Kovalskyi, Artem Boyarchuk, Myroslava Dubnevych, Tetyana Holubnyk. 271-279 [doi]
- Precision Automated Phonetic Analysis of Speech Signals for Information Technology of Text-dependent Authentication of a Person by VoiceOleg Bisikalo, Olesia Boivan, Nina Khairova, Oksana V. Kovtun, Viacheslav Kovtun. 276-288 [doi]
- Automatic Processing of Digital X-ray Medical Images by Bilateral Filtration MethodSerhiy Balovsyak, Mariana Borcha, Michal Gregus ml., Khrystyna Odaiska, Nataliya Serpak. 280-294 [doi]
- Fractional Gaussian Noise Traffic Prediction Based on the Walsh FunctionsVyacheslav Gorev, Alexander Gusev, Valerii Korniienko. 289-300 [doi]
- Air Pollution Prediction as a Source for Decision Making Framework in Medical DiagnosisValerii Lovkin, Andrii O. Oliinyk, Yurii Lukashenko. 295-302 [doi]
- Same Bit-Size Moduli Formation of Residue Number System for Application in Asymmetric CryptographyMykhailo Kasianchuk, Ihor Yakymenko, Vasyl Yatskiv, Stepan Ivasiev, Andriy Sverstiuk. 301-308 [doi]
- Synthesis and Research of a Model of Factors of Infographics Compositional Design with Elements of Visual CommunicationOleksandr Tymchenko, Nataliia Kunanets, Svitlana Vasiuta, Olha Sosnovska, Orest Khamula. 303-222 [doi]
- GPU Implementation of Quantum Secure ABC Cryptosystem on CudaSedat Akleylek, Ramazan Koyutürk, Hakan Kutucu. 309-316 [doi]
- Architecture of the Simulator of the Personal Local Wireless Networks: Examples of implementationOleksandr Tymchenko, Bohdana Havrysh, Mariya Nazarkevych, Oleksandr O. Tymchenko, Orest Khamula. 317-329 [doi]
- Application of Pseudo-Memory Finite Automata for Information EncryptionGulmira Shakhmetova, Zhanat Saukhanova, Nur Izura Udzir, Altynbek Sharipbay, Nurgazy Saukhanov. 330-339 [doi]
- Implementation of Control by Parameters of Client Automated Workplaces of Specialized Information Systems for Neutralization malwareMykola Stetsyuk, Vasyl Stetsyuk, Bohdan Savenko, Oleg Savenko, Maciej Dobrowolski. 340-352 [doi]
- Resilient Computer Systems Development for Cyberattacks ResistanceSergii Lysenko, Kira Bobrovnikova, Piotr Gaj, Tomas Sochor, Iryna Forkun. 353-361 [doi]
- Assessing Security Risks Method in E-Commerce System for IT Portfolio ManagementMyroslava Bublyk, Victoria Vysotska, Lyubomyr Chyrun, Valentyna Panasyuk, Oksana Brodyak. 362-379 [doi]
- Automated Compressed Image Recovery Implementation for Video Surveillance Systems as Information Security ImprovementIryna Moseenko, Ivanna Dronyuk, Olena Gorina, Halina Mykhailyshyn, Kateryna Dubska. 380-385 [doi]
- A System for Detecting Anomalies and Identifying Smart Home Devices Using Collective CommunicationAnastasiia Nicheporuk, Andrii Nicheporuk, Anatoliy Sachenko, Oleg Sachenko, Andrii Kazantsev. 386-397 [doi]
- Information-resource and Cognitive Concept of Threat's Influence Identification on Technogenic System Based on the Cause and Category Diagrams IntegrationLubomir Sikora, Rostislav Tkachuk, Natalia Lysa, Ivanna Dronyuk, Olga Fedevych, Romana Talanchuk. 398-416 [doi]
- Application of Multifactor Analysis for the Purpose of Detecting Malicious Software Implants of the Software in Local Computer NetworksVadym Paiuk, Volodymyr Kosenkov, Oleg Savenko, Andrii Nicheporuk, Olena Geidarova. 417-426 [doi]
- Authentication and Request Processing Model in High Load Modes for IoT ComponentsSergii Surkov, Oleksandr Martynyuk. 427-438 [doi]
- K-means Clustering of Honeynet Data with Unsupervised Representation LearningAntonina Kashtalian, Tomas Sochor. 439-449 [doi]
- The Cyber-Physical System for Increasing the Efficiency of the Iron Ore Desliming ProcessVolodymyr Morkun, Natalia V. Morkun, Andrii V. Pikilnyak, Serhiy Semerikov, Oleksandra Serdiuk, Irina Gaponenko. 450-459 [doi]
- IMECA Based Assessment of Internet of Drones Systems Cyber Security Considering Radio Frequency VulnerabilitiesVolodymyr Torianyk, Vyacheslav Kharchenko, Heorhii Zemlianko. 460-470 [doi]
- Checkability Important for Fail-Safety of FPGA-based Components in Critical SystemsOleksandr Drozd, Olena Ivanova, Kostiantyn Zashcholkin, Vitaliy A. Romankevich, Julia Drozd. 471-480 [doi]
- Models of Distributed Systems Testing Based on Energy Consumption in BehaviorOleksandr Martynyuk, Lyudmila Sugak, Hanna Stepova, Viktor Antoniuk, Igor Mileiko. 481-493 [doi]
- Data Structures and Lookup Algorithms Investigation for the IEEE 802.15.4 Security Procedures ImplementationViktor Melnyk. 494-513 [doi]
- Technique for IoT Cyberattacks Detection Based on the Energy Consumption AnalysisKira Bobrovnikova, Sergii Lysenko, Peter Popov, Dmytro Denysiuk, Andrii Goroshko. 514-526 [doi]
- An Approach to Stego-Container Organization in FPGA Systems for Approximate Data ProcessingKostiantyn Zashcholkin, Oleksandr Drozd, Olena Ivanova, Ruslan Shaporin, Mykola Kuznietsov. 527-536 [doi]