Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Бази даних


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
 Найдено в других БД:Eлектронний каталог (13262)Зведений електронний каталог «Правова освіта. Правова культура» (21)
Формат представлення знайдених документів :
полныйинформационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

<.>U=0$<.>

Загальна кількість знайденихдокументів : 20
Показані документи с 1 по 20
1.
Yevseiev, S.
    Development and analysis of gametheoretical models of security systems agents interaction [Текст] / S. Yevseiev, O. Milov, S. Milevskyi, O. Voitko, M. Kasianenko, Y. Melenti, S. Pohasii, H. Stepanov, O. Turinskyi, S. Turinskyi // Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P. 15-29
   Перевод заглавия: Разработка и анализ теоретико-игровых моделей взаимодействия агентов систем безопасности
УДК
ББК З81
РУБ DOI: https://doi.org/10.15587/1729-4061.2020.201418

Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope

Текст - 0 байт
Текст,
Текст - 0 байт
Текст

Найти похожие

2.
Barannik, N.
    Constructing the code description of the transformant DCT taking into account their structural features [Text] / Barannik N., Tverdokhlib V., Eliseev E., Zakomorna K., Vorontsova N., Shmakov V. // ATIT 2020 - Proceedings: 2020 2nd IEEE International Conference on Advanced Trends in Information Theory. - 2020. - Ст. № 9349255. - P. 34-37
   Перевод заглавия: Построение кодового описания трансформантов DCT с учетом их структурных особенностей
УДК
РУБ DOI: 10.1109/ATIT50783.2020.9349255

Аннотация: An approach to the construction of a code description of DCT transformants, taking into account the structural features of their binary representation, is presented. It is shown that the proposed model for constructing the code has the ability to reduce the initial number of bits, and also allows you to form a code description of the transformant by a set of independent code blocks. This makes it possible to use this coding method in a video bit rate control system.

Текст - 0 байт
Текст

Найти похожие

3.
Savytska, L. .
    Using Word2vec technique to determine semantic and morphologic similarity in embedded words of the Ukrainian language [Текст] / L. Savytska, N. Vnukova, I. Bezugla, V. Pyvovarov, M.T. Subay // Computational Linguistics and Intelligent Systems (CoLInS 2021) : 5th International Conference, Lviv, Ukraine (22-23 April 2021). - Lviv, 2021. - Vol. 1: Main Conference. - P. 235-248. - (CEUR Workshop Proceedings ; Vol. 2870)
   Перевод заглавия: Використання методики Word2vec для визначення семантичної та морфологічної подібності у вбудованих словах української мови
УДК

Аннотация: The study presents the word translation into vectors of real numbers (word embeddings), one of the most important topics in natural language processing. Word2vec is the latest techniques developed by Tomas Mikolov to study high quality vectors. The majority of studies on clustering the word vectors were made in English. Dmitry Chaplinsky has already counted and published vectors for the Ukrainian language by using LexVec, Word2vec and GloVe techniques, obtained from fiction, newswire and ubercorpus texts, for VESUM dictionary and other related NLP tools for the Ukrainian language. There was no research done on the vectors by using Word2vec technique to create Ukrainian corpus, obtained from Wikipedia dump as the main source. The collection contains more than two hundred and sixty one million words. The dictionary of words (unique words) obtained from the corpus is more than seven hundred and nine thousand. The research using machine technology Word2vec is of great practical importance to computerise many areas of linguistic analysis. The open-source Python programming language was used to obtain word vectors with Word2vec techniques and to calculate the cosine proximity of the vectors. In order to do machine learning with Word2vec techniques on Python, a resource containing open source licensed software libraries called "Gensim" was used. Calculations regarding the cosine affinities of the obtained vectors were made using "Gensim" libraries. The research examining the clustering of the word vectors obtained from the Ukrainian corpus was made considering the two sub-branches of linguistics, semantics and morphology (language morphology). Firstly, it was investigated how accurately the vectors are obtained from the Ukrainian corpus and how the words represent the cluster they belong to. Secondly, it was investigated how word vectors are clustered and associated respectively to the morphological features of the suffixes of the Ukrainian language.

Текст - 0 байт
Текст

Найти похожие

4.

S98

    Synergy of building cybersecurity systems [Електронний ресурс] : monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milova, O. Korol, Y. Melenti and others. - Kharkiv : PC TECHNOLOGY CENTER, 2021. - 175 p.
Перевод заглавия: Синергія побудови систем кібербезпеки
   Перевод заглавия: Синергія побудови систем кібербезпеки
УДК
РУБ DOI: 10.15587/978-617-7319-31-2

Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Свободных экз. нет

Найти похожие

5.
Yevseiev, S. .
    Development of a method for assessing forecast of social impact in regional communities [Текст] / S. Yevseiev, Y. Ryabukha, O. Milov, S. Milevskyi, S. Pohasii, Y. Ivanchenko, I. Ivanchenko, Y. Melenti, I. Opirskyy, I. Pasko // Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P. 30-43
   Перевод заглавия: Розробка методики оцінки прогнозу соціального впливу в регіональних громадах
УДК
РУБ DOI: 10.15587/1729-4061.2021.249313

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст

Найти похожие

6.
Havrylov, D. .
    Possible Ways of Video Processing at the Quantization Stage [Текст] / D. Havrylov, V. Yeroshenko, R. Onyshchenko, K. Zakomorna, M. Savchuk, O. Karaban // 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT) : 21-25 Sept. 2021. - Lviv, 2021. - P. 51-55
   Перевод заглавия: Можливі способи обробки відео на етапі квантування
УДК
РУБ DOI: 10.1109/AICT52120.2021.9628893

Аннотация: The aim of the article is to build a method of video processing with the possibility of its protection at the stage of quantization with subsequent arithmetic coding. That will allow at preservation of structural - statistical regularity to provide a necessary level of availability, reliability and confidentiality at video data transmission. Providing the required level of availability involves reducing the video volume by 30% compared to the original volume. In this case, the provision of the required level of reliability is confirmed by estimating the peak signal-to-noise ratio for the authorized user, which is PSNRaBT 20 dB. Ensuring the required level of confidentiality is confirmed by estimating the peak signal-to-noise ratio for unauthorized access, which is PSNRHC 9 dB. The scientific novelty of the obtained results lies in the following: for the first time two methods of video image processing at the quantization stage are proposed. The method of using encryption tables has greater cryptographic stability, and the method of using the key matrix has greater speed. At the same time, the use of arithmetic coding will satisfy the need for availability by reducing the initial volume.

Анотація - 0 байт
Анотація

Найти похожие

7.
Tverdokhlib, V. .
    Technology increasing capacity protected channel delivery video data telecommunication systems critical infrastructure [Текст] / V. Tverdokhlib, K. O. Zakomorna, D. Dvukhglavov, O. Oleksin, D. Zhuikov, V. Kryvonos // 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT). - 2021. - P. 57-60
   Перевод заглавия: Технологія збільшення потужності захищених каналів доставки відеоданих телекомунікаційних систем критичної інфраструктури
УДК
РУБ DOI: 10.1109/Atit54053.2021.9678736

Аннотация: The technology of video stream closure has been developed, which is based on the detection and closure of significant structural units. This technology employs the introduction of the closure marker into the code structure of the video stream for use on unmanned aerial vehicles. This makes it possible to meet departmental requirements for the speed of transmission in conditions of increased frame rates. At the same time, the quality of the updated video data is higher than when using other concealment methods. This is since the encoding process takes into account the processing of the base video frame substantial structural units.

Анотація - 0 байт
Анотація

Найти похожие

8.
Milov, O. .
    Cyber Terrorism as an Object of Modeling [Electronic resource] / O. Milov, Y. Melenti, S. Milevskyi, S. Pohasii, S. Yevseiev // CEUR Workshop Proceedings : Proceedings of the 3rd International Conference on Information Security and Information Technologies (ISecIT 2021), co-located with 1st International Forum "Digital Reality" (DRForum 2021), Odesa, Ukraine, September 13-19, 2021. - Odesa, 2021. - Vol. 3200: Information Security and Information Technologies, ISecIT 2021. - P. 204-210
   Перевод заглавия: Кібертероризм як об’єкт моделювання
УДК

Аннотация: The article examines issues related to the characteristics of cyber terrorism, as well as related concepts of terrorism and cyberspace. The definitions of these concepts are given. The types of cyber threats directly related to cyber terrorism are identified. The differences and similarities of the mentioned cyber threats are described. A structure that reflects the main features of cyber terrorism, which should be included in the model of cyber terrorism is presented.

Текст - 0 байт
Текст

Найти похожие

9.
Chornyi, O. .
    Information technologies for visualization of diagnostic results of future engineers competences in multidimensional non-metric spaces [Текст] / O. Chornyi, L. Herasymenko, L. Holubnycha, L. Zelenska, N. Dzyna, V. Tytiuk // Journal of Theoretical and Applied Information Technology. - 2022. - Vol. 100, Iss. 20. - P. 5906-5917. - References: p. 5915-5917
   Перевод заглавия: Інформаційні технології для візуалізації результатів діагностики компетенцій майбутніх інженерів у багатовимірних неметричних просторах
УДК

Аннотация: The problem of using information technologies to visualize the results of diagnostics of professional competences development on the example of students of engineering specialties is topical. The purpose of the manuscript is to identify the possibilities of information technologies for data visualization in multidimensional non-metric spaces using the example of identifying the level of formation of individual competencies of future electrical engineers. Methods for achieving the stated purpose were the following: theoretical (analysis and synthesis) ones facilitated the development of the "Chernoff face"designer program based on the MATLAB software package; empirical (expert assessment and surveying) ones helped to identify criteria and means of diagnosing the formation of professional competencies and create the most optimal image of the "Chernoff faces". The results revealed that in educational process visualization is capable of ensuring emotionality, ease and speed of perception of the necessary information by students; structuring data into a coherent image; analysing the visualized information according to specific criteria and indicators; demonstrating the relationships between the various analysed indicators; preventing information overload; supporting attention, activating thinking and memory. Moreover, various methods of visualizing the level of competence formation increase the effectiveness of the perception of diagnostic results and the possibility of adjusting educational and methodical trajectories. The authors have developed a designer program and have proposed fragments of the program code for creating "Chernoff faces"based on the MATLAB software package, which allow students to visualize the level of formation of professional competences and provide the possibility of developing a strategy for their improvement.

Текст - 0 байт
Текст

Найти похожие

10.
Barkovska, O. .
    Impact of Stemming on Efficiency of Messages Likelihood Definition in Telegram Newsfeeds [Текст] / O. Barkovska, P. Rusnak, V. Tkachov, T. Muzyka // 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek) : Conference Proceedings, 03-07 October 2022. - 2022. - P. 1-5
   Перевод заглавия: Вплив стемінгу на ефективність визначення вірогідності повідомлень у стрічках новин Telegram
УДК
РУБ DOI: 10.1109/KhPIWeek57572.2022.9916415

Аннотация: The work is dedicated to the development of the system to define the credibility of text messages posted in Telegram newsfeeds. The topicality of the work is stipulated by the concentration of information and its ability to influence shaping of the social opinions on the state relations and political moods via news feeds in messengers and social networks, the number of which is constantly growing and supported by bots and biased authors. The proposed system functions on the basis of coordination of text parsing, text processing, database with messages from the official sources of information, and the client (author) database. The degree of similarity of the generated text messages is determined on the basis of defining Damerau-Levenshtein distance in the Text Processing Module. The work shows it is possible to increase the efficiency (up to 1,44 times for messages of around 1500 symbols) of the given module performance through incoming messages stemming at the preprocessing stage because this enables to reduce the computational complexity of Damerau-Levenshtein method at the expense of word shortening to their stem via neglecting auxiliary parts such as suffixes and endings. Thus, stemming helps to reduce the amount of symbols to be processed at the very stage of Damera u-Levenshtein algorithm application, which proves feasibily of applying stemming in the preprocessing block.

Анотація - 0 байт
Анотація

Найти похожие

11.
Martynenko, G. .
    Integrated Software for Numerical Calculation of Active Magnetic Bearings Force Characteristics with Data Accumulation for Various Parameters [Текст] / G. Martynenko, V. Martynenko, I. Pidkurkova // 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek) : Conference Proceedings, 03-07 October 2022. - Kharkiv, 2022. - P. 1-6
   Перевод заглавия: Комплексне програмне забезпечення для чисельного розрахунку силових характеристик активних магнітних підшипників з накопиченням даних за різними параметрами
УДК
РУБ DOI: 10.1109/KhPIWeek57572.2022.9916476

Аннотация: The paper proposes a technique and a software tool for calculating the force characteristics of a radial active magnetic bearing with an eight-pole stator with a known control law. It is based on the application of the finite element method implemented in a software package for a general technical analysis of physical processes. The procedure for constructing a computational model, electromagnetic analysis, and displaying graphical and numerical results is implemented in the form of a program code in a parametric programming language of the software package itself. The main program created in C++ is a software integrated with it. It performs an interaction between the user and the software package by setting the bearing parameters, the control law and the initial data of a variant parametric analysis of magnetic forces depending on the position of the rotor in active magnetic bearings and control signals. The active magnetic bearing control law is control signals (control voltages) that are applied to electromagnet windings. Their values depend on the current position of the supporting sections of the rotor and, as an option, the instantaneous values of currents in circuits. All specified data are entered into the code for the software package prepared in advance and stored in the main program. After that, an analysis in the complex is launched in a hidden batch mode. The magnetic forces are calculated from the Maxwell tension tensor in a given cloud of points of the rotor position. The force characteristics are dependences of the restoring magnetic forces in the bearing depending on the displacement of the supporting sections of the rotor in two radial directions. They are also rendered in the main program. For the analyzed design variants of active magnetic bearings and control laws, storage in a database is provided with the possibility of subsequent download and display. The results of computational studies to determine the dependences of magnetic forces on rotor displacements for the design of an active magnetic bearing used in an experimental scale model of a turbocompressor of a gas compressor unit with active magnetic bearings are presented. Verification of the integrated software tool was performed by comparing the calculated and experimental data.

Анотація - 0 байт
Анотація

Найти похожие

12.
Kulyk, M. M.
    IT Implementation Processes in Libraries: Adopting Foreign Experience [Electronic resource] / M. M. Kulyk // University Library at a New Stage of Social Communications Development : Conference Proceedings, 6 October 2022. - Dnipro, 2022. - No. 7. - P. 86-94. - References : p. 91-94
   Перевод заглавия: Процеси впровадження ІТ у бібліотеках: переймаємо іноземний досвід
УДК
РУБ DOI: 10.15802/unilib/2022_270925

Аннотация: Objective. The purpose of the article is to study the problems of implementing IT technologies in university libraries of Ukraine in the context of foreign experience. The article examines the retrospective of development of library information systems, their effectiveness and problematic issues related to the transition of library staff to work with them. Methods. When writing the article, the review, comparative, and historical methods were used to summarize the research on the development of library information systems and to choose a sufficiently effective and convenient system among ILS (Integrated Library System), LSP (Library Service Platform), LMS (Library Management System) or LIMS (Library Information Management System) for domestic university libraries. Results. The article provides a periodization of the development of library systems from 1931 till 2022. Problematic issues for Ukrainian university libraries related to the replacement of software tools with modern software products are identified. Specialists of higher education libraries are suggested to use the web-resource “Library Technology Guides” to select the latest innovative automated library systems with their subsequent configuration. Conclusions. As a result, the ILS Koha is proposed as more adapted system in terms of financial costs and possibility of its further maintenance by existing specialists.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus

Найти похожие

13.
Yemanov, V. .
    Ranking Threats to Determine the Cost of Protecting Information in a Cybersecurity Environment [Текст] / V. Yemanov, V. Pasichnyk, I. Yevtushenko, S. Larin, O. Mykhailenko // Ingenierie des Systemes d'Information. - 2023. - Vol. 28, Iss. 1. - P. 77-84
   Перевод заглавия: Ранжування загроз для визначення вартості захисту інформації в середовищі кібербезпеки
УДК
РУБ DOI: 10.18280/isi.280108

Аннотация: The main purpose of the study is to rank certain threats in order to establish further costs for ensuring the protecting of information in the cybersecurity system. Research methodology is a set of methods that form a methodological approach. The main ones are the ranking method through the theory of fuzzy relations and the expert-step method. As a result, due to the ranking of the threats of the selected object, the permissible intensity of the decrease in the level of security and the costs of its provision were determined using the proposed methodology. The results obtained implied the use of modern ranking methods according to the given parameters. In our case, the results obtained allowed us to rank the existing list of threats in the cybersecurity system. The benefit of such results lies in the formation of an information basis for the adoption and implementation of management decisions.The study is limited by selecting only one socio-economic system and its information. The results obtained out in the article have practical and scientific value through a methodical approach to form requirements for the security of the cybersecurity system itself and information of a single object. In the future, more complex socio-economic systems and their cybersecurity should be chosen to apply the methodological approach proposed in the article.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus

Найти похожие

14.
Verbivska, L. .
    The Development of E-commerce in the Context of the Digitalization of the Economy [Текст] / L. Verbivska, N. Sarai, M. Ivashchenko, N. Havrylenko, O. Kuznietsova // Review of Economics and Finance. - 2023. - Vol. 21. - P. 577-583. - References : p. 582-583
   Перевод заглавия: Розвиток електронної комерції в контексті цифровізації економіки
УДК
РУБ DOI: 10.55365/1923.x2023.21.59

Аннотация: The development of e-commerce is an integral part of the modern market for goods and services, and against the background of the digitalization of companies, the introduction of sales of goods and promotion of ser-vices through online channels creates additional conditions for the development of new markets and strengthening its position in existing ones. After the COVID-19 pandemic, the promotion of products and services through the Inter-net became an opportunity to maintain an audience and ensure stable sales even in the face of a lockdown. Accord-ing to many scholars, partly due to e-commerce, markets were able to recover from the quarantine restrictions fairly quickly. Given the importance of the problem in question, the purpose of this article is to define the role of e-commerce in the process of digitalization of business based on the analysis of its development trends. The study is built in the context of consideration of the peculiarities of e-commerce organization for both the B2B and B2C seg-ments, focusing on determining the differences between these two types and the specifics of the use of e-commerce for each of these areas. The study also realized an analysis of statistical material which proves the extreme im-portance and steady growth of sales of goods and services with the use of electronic commerce. In addition, it is found that the main players in the market of digital sales of goods and services are China and the United States, as these are the countries where powerful sales platforms are registered and operate, viz: AliExpress and Amazon. As a result of the systematization of scientists' views on the prospects of e-commerce development, promising directions were formed and trends of development of this sphere in Ukraine in the period of post-war recovery were outlined, the advantages received by manufacturers and trade intermediaries in case of using e-commerce were concretized.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus

Найти похожие

15.

M78

    Modeling of security systems for critical infrastructure facilities [Електронний ресурс] : monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych, Y. Melenti and others. - Kharkiv : PC TECHNOLOGY CENTER, 2022. - 181 p.
Перевод заглавия: Моделювання систем безпеки об’єктів критичної інфраструктури
   Перевод заглавия: Моделювання систем безпеки об’єктів критичної інфраструктури
УДК
РУБ DOI: 10.15587/978-617-7319-57-2

Аннотация: The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Свободных экз. нет

Найти похожие

16.
Shevchenko, M. .
    The state of digitization of documentary heritage in scientific libraries of Ukraine [Електронний ресурс] = Dokumentinio paveldo skaitmeninimo būklė Ukrainos mokslinėse bibliotekose / M. Shevchenko, A. Solianyk // Knygotyra. - 2022. - Vol. 79. - P. 223-249. - References : p 247-249. - [Scopus. Вказана інша орг-ція]
   Перевод заглавия: Стан оцифрування документальної спадщини в наукових бібліотеках України
УДК
РУБ DOI: 10.15388/Knygotyra.2022.79.126

Аннотация: Based on the survey results of the leading scientific libraries of Ukraine, the article reveals the current trends in the digitization of library collections. The authors explore the current state of search services for digitized documents by libraries; user access modes to digital copies of documents (public, restricted, local); the ways to register the users for access to full-text digital repositories. The necessity of adopting the National Program for Digitization of Documentation Heritage and its implementation at the corporate level is substantiated. Recommendations for improving the efficiency of digitization of documents by libraries of Ukraine, improving search tools and user-friendly access to digital repositories are given.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus

Найти похожие

17.
Pashkov, V. M..
    The impact of the introduction of artificial intelligence technologies on the current human rights and freedoms concept [Електронний ресурс] / V. M. Pashkov, A. O. Harkusha, O. S. Soloviov // Polski Merkuriusz Lekarski Polish Medical Journal. - 2023. - Vol. 51. Iss. 6. - P. 646-653
   Перевод заглавия: Вплив впровадження технологій штучного інтелекту на сучасну концепцію прав і свобод людини
УДК
РУБ PMID: 38207067 + DOI: 10.36740/Merkur202306111

Аннотация: Artificial Intelligence (AI) has undeniably transformed the landscape of healthcare, offering unparalleled potential to enhance patient care, streamline diagnostics, and improve overall healthcare outcomes. As AI continues to make its way into the medical field, it has raised crucial questions about regulation, ethics, and patient safety and that is guiding us to the core question - how that will impact current human rights and freedoms concept, and is this concept ready for such an impact? The aim of the research is to identify and evaluate the potential impact of AI introduction in healthcare on modern human rights and freedoms concept, and on the basis of discovered complexities to propose ways to eliminate them. This study was conducted during June-October of 2023. Through a broad literature review, analysis of international and state regulation acts, scientific researches and opinions of progressive-minded people in this sphere this paper provide a guide to understanding the impact of AI introduction in healthcare on current human rights and freedoms concept. It is based on dialectical, comparative, analytic, synthetic and comprehensive methods.

Web of Science - 0 байт
Web of Science,
Зміст випуску - 0 байт
Зміст випуску,
Scopus - 0 байт
Scopus

Найти похожие

18.
Peredrii, O. .
    Algorithmization of Intellectual Data Analysis for Measuring the Country’s Innovation Potential [Електронний ресурс] / O. Peredrii, N. Vnukova, D. Davydenko, V. Pyvovarov, S. Hlibko, N. Opeshko // CEUR Workshop Proceedings : 8th International Conference on Computational Linguistics and Intelligent Systems. Volume II: Modeling, Optimization, and Controlling in Information and Technology Systems Workshop (MOCITSW-CoLInS 2024), Lviv, 12-13 April, 2024. - Lviv, 2024. - Vol. 3668. - P. 269-281. - [DOI відсутній]
   Перевод заглавия: Алгоритмізація аналізу інтелектуальних даних для вимірювання інноваційного потенціалу країни
УДК

Аннотация: The article examines the key principles of using applied intelligent systems in the economic analysis of Ukraine’s innovation potential, which significantly improves the processes of management algorithm construction and, as a result, creates a favorable environment for innovative development. It presents an algorithm for measuring the country’s innovation potential, which is based on basic methods applied for the analysis, distribution, and classification of input data space. The advantages of applying the principal component method are identified, along with a procedure for using it to determine key indicators for assessing the country’s innovation potential. An approach to determining innovation potential is formed based on intelligent data processing, allowing for the analysis and visualization of large volumes of data, as well as the identification of trends, key factors, and indicators influencing innovation activity in Ukraine. The research also justifies the feasibility and proposes an approach to using modern intelligent systems for continuous monitoring and control of the level of innovation activity, as well as for identifying and forecasting risks and issues, and determining possible ways to address them.

Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus

Найти похожие

19.
Shapoval, R. V..
    Academic honesty: current status and forms of improvement [Електронний ресурс] = Honestidad académica: estado actual y formas de mejora = Академічна доброчесність: сучасний стан та шляхи удосконалення / R. V. Shapoval, V. Y. Nastyuk, M. I. Inshyn, A. A. Posashkov // Justicia. - 2021. - Vol. 26, iss. 39. - P. 37-46
УДК
РУБ DOI: 10.17081/just.26.39.4818

Аннотация: Objective: The purpose of this article is to analyze the current status of academic honesty, improvement of its organizational and legal principles. Method: To achieve this goal, such methods as logical-legal and systematic, dialectical and dogmatic, formal-logical, comparative analysis, was used. The interrelated application of these methods led to the science-based conclusions and suggestions. Results: The issues of the essence and significance of academic honesty, the current status of these issues problematic aspect, as well as the ways of qualitative improvement of the legal and organizational principles of academic honesty have been researched. It has been argued that academic honesty is an integral part of both ensuring the quality of higher education and conducting research. The legislative and doctrinal definition of the concept of «academic honesty» has been provided; the types of responsibility for the violation of academic honesty have been defined. Issues related to the formation and functioning of an atmosphere of mutual respect among scholars have been considered both to their own scientific works, and to scientific works of their colleagues. Conclusions: Based on the results of the conducted study, propositions to improve the legal principles for ensuring academic honesty in Ukraine have been formulated

Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus

Найти похожие

20.
Pashkov, V. .
    Stand-alone software as a medical device: qualification and liability issues [Електронний ресурс] / V. Pashkov, A. Harkusha, Y. Harkusha // Wiadomosci Lekarskie. - 2020. - Vol. 73, Iss. 10. - P. 2282-2288
   Перевод заглавия: Автономне програмне забезпечення як медичний пристрій: питання кваліфікації та відповідальності
УДК
РУБ DOI: https://doi.org/10.36740/WLek202010134

Аннотация: Through a broad literature review, analysis of EU, USA and Ukraine regulation acts, scientific researches and opinions of progressive-minded people in this sphere this paper provide a guide to understanding the essence of stand-alone software as a medical device and specifics of its regulation. It is based on dialectical, comparative, analytic, synthetic and comprehensive methods.

Web of Science - 0 байт
Web of Science,
Scopus - 0 байт
Scopus,
Текст - 0 байт
Текст

Найти похожие

 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава