Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Базы данных


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
в найденном
 Найдено в других БД:Eлектронний каталог (278)Зведений електронний каталог «Правова освіта. Правова культура» (6)
Формат представлення знайдених документів :
полный информационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>K=TEC$<.>)

Загальна кількість знайденихдокументів : 46
Показані документи с 1 по 20
 1-20    21-40   41-46 
1.

Вид документа : Статья из сборника (однотомник)
Шифр издания :
Автор(ы) : Yevsieiev, Vadym, Honchar, Roman, Starodubtsev, Sergii, Melenti Y., Pavlenko, Sergey
Заглавие : Development of an algorithm and research of features for selecting devices to protect electric circuits from surges caused by thunderstorms
Место публикации : Proceedings of the 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2021: 4-6 Feb. 2021. - Tirunelveli; India, 2021. - Ст.9388398. - P.480-485
Ключевые слова (''Своб.индексиров.''): coordination--lightning--power supplies--buildings--surge protection--lightning protection--voltage control--контроль напряжения--молниезащита--источники питания--электричество--контроль напруги--блискавка--джерела живлення--електроенергія
Аннотация: Lightning strokes can cause considerable voltages in constructions of buildings, facilities, equipment. That may result in sparking, disruption to power supplies of electric energy consumers, equipment breakdowns etc. That is why it is strongly recommended (sometimes even compulsory) to install surge protective devices. Buildings and facilities (or their parts) depending on their purpose and thunderstorm intensities in the region they are located in, should be protected both from direct lightning strokes and from lightning secondary effects. The lightning protection project should have projects both for external and internal lightning protection systems. The paper suggests a algorithm for calculating the main of surge protective devices parameters are class, impulse current, nominal discharge current, maxi-mum discharge current, open-circuit voltage, maximum continuous operating voltage, maximum continuous operating current, voltage protection level, follow current, temporary overvoltage and response time. For microelectronic equipment the voltage protection the zone-selective system is required. The presented paper suggests an algorithm for selecting surge protective devices for power supply circuits of electrical energy consumers in order to ensure reliability of energy supply in conditions of thunderstorm activities. The algorithm is suggested with account of the requirements of relevant European and American standards. A study of features for selecting devices to protect electric circuits from surges caused by thunderstorms. For illustrative representation of implication of the suggested algorithm a functional mock-up for surge protection of a single-phase consumer at its plugging into the mains.
Анотація - 0 байт
Анотація
Найти похожие
2.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yevseiev, Serhii, Pohasii, Serhii, Milevskyi, Stanislav, Milov, Oleksandr, Melenti, Yevgen, Grod, Ivan, Berestov, Denis, Fedorenko, Ruslan, Kurchenko, Oleg
Заглавие : Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 5, No. 9 (113). - P.30-47
УДК : 681.32:007.5
Ключевые слова (''Своб.индексиров.''): critical infrastructure--lotka-volterra model--security level--security system--simulation method--threat classifier--критична інфраструктура--модель лотка-вольтерра--рівень безпеки--система безпеки--метод моделювання--класифікатор загроз--критическая инфраструктура--уровень безопасности--система безопасности--метод моделирования--классификатор угроз
Аннотация: The paper presents the results of the development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model. Security models of cyber-physical systems are proposed: “predator-prey” taking into account the computing capabilities and focus of targeted cyberattacks, “predator-prey” taking into account the possible competition of attackers in relation to the “prey”, “predato-prey” taking into account the relationships between “prey species” and “predator species”, “predator-prey” taking into account the relationship between “prey species” and “predator species”. Based on the proposed approach, the coefficients of the Lotka-Volterra model α=0.39, β=0.32, γ=0.29, φ=0.27 were obtained, which take into account the synergy and hybridity of modern threats, funding for the formation and improvement of the protection system, and also allow determining the financial and computing capabilities of the attacker based on the identified threats. The proposed method for assessing the security of cyber-physical systems is based on the developed threat classifier, allows assessing the current security level and provides recommendations regarding the allocation of limited protection resources based on an expert assessment of known threats. This approach allows offline dynamic simulation, which makes it possible to timely determine attackers' capabilities and form preventive protection measures based on threat analysis. In the simulation, actual bases for assessing real threats and incidents in cyberphysical systems can be used, which allows an expert assessment of their impact on both individual security services and security components (cyber security, information security and security of information). The presented simulation results do not contradict the graphical results of the classical Lotka-Volterra model, which indicates the adequacy of the proposed approach for assessing the security of cyber-physical systems.
Текст - 0 байт
Текст
Найти похожие
3.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yevseiev, Serhii, Ryabukha, Yurii, Milov, Oleksandr, Milevskyi, Stanislav, Pohasii, Serhii, Ivanchenko, Yevheniia, Ivanchenko, Ihor, Melenti, Yevgen, Opirskyy, Ivan, Pasko, Igor
Заглавие : Development of a method for assessing forecast of social impact in regional communities
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 6, Iss. 2 (114). - P.30-43
УДК : 004.056:004.738.5(045)
Ключевые слова (''Своб.индексиров.''): models of influence--rating of political parties--regional society--social networks--socio-cyber-physical system--моделі впливу--рейтинг політичних партій--регіональне товариство--соціальні мережі--соціально-кібер-фізична система--модели влияния--рейтинг политических партий--региональное общество--социальные сети--социо-кибер-физическая система
Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст
Найти похожие
4.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yevseiev, Serhii, Melenti, Yevgen, Voitko, Oleksandr, Hrebeniuk, Vitalii, Korchenko, Anna, Mykus, Serhii, Milov, Oleksandr, Prokopenko, Oleksandr, Sievierinov, Oleksandr, Chopenko, Dmytro
Заглавие : Development of a Concept for Building a Critical Infrastructure Facilities Security System
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 3. - P.63-83
ББК : Х621.162
Ключевые слова (''Своб.индексиров.''): concept--critical infrastructure--modeling method--security system--threat classifier--концепція--критична інфраструктура--метод моделювання--система безпеки--класифікатор загрози--концепция--критическая инфраструктура--метод моделирования--система безопасности--классификатор угрозы
Аннотация: To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)
Текст - 0 байт
Текст
Найти похожие
5.

Вид документа : Однотомное издание
Шифр издания :
Автор(ы) : Yevseiev S., Milov O., Milevskyi S., Voitko O., Kasianenko M., Melenti Y., Pohasii S., Stepanov H., Turinskyi O., Faraon S.
Заглавие : Development and analysis of gametheoretical models of security systems agents interaction
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2020. - Vol. 2. Issue 4. - P.15-29
УДК : 007
ББК : З81
Ключевые слова (''Своб.индексиров.''): game theory--теория игры--теорія гри--cybersecurity--кибербезопасность--кібербезпека--stackelberg games--игры штакельберга--ігри штакельберга--nash games--нэш игры--неш ігри--game equilibrium--игровое равновесие--ігрова рівновага--strategy--стратегия--стратегія
Аннотация: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope
Текст - 0 байт
Текст,
Текст - 0 байт
Текст
Найти похожие
6.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Yekimov, Sergey, Karmanny, Yevhenii, Zenin, Andrii, Zinovatna, Iliana, Sliusarenko, Serhii
Заглавие : Using the project method to improve environmental education for law students
Место публикации : E3S Web of Conferences. - 2021. - Vol. 265. - 5 p. - (Actual Problems of Ecology and Environmental Management (APEEM 2021)). - Art. № 07005
ББК : Х.х
Ключевые слова (''Своб.индексиров.''): engineering controlled terms--professional aspects--students--engineering uncontrolled terms--enviromental awareness--enviromental education--personal development--professional activities--professional education--project methods--technological change--training process--engineering main heading--environmental regulations--технические условия--профессиональные аспекты--студенты--инженерные бесконтролируемые условия--экологическая информация--экологическое образование--личное развитие--профессиональная деятельность--профессиональное образование--методы проекта--технологические изменения--процесс обучения--экологические нормы--технічні умови--професійні аспекти--студенти--екологічна інформація--екологічна освіта--особистий розвиток--професійна діяльність--професійна освіта--технологічні зміни--екологічні норми--процес навчання--методи проекту--інженерні безконтрольні умови
Аннотация: Training a modern professional who can use a creative approach within the framework of their professional activities, as well as to easily adapt to many modern technological changes, requires the use of modern innovative pedagogical technologies in the training process. When performing this study, we used the project method to increase environmental awareness and environmental thinking among students of the specialty law. Environmental education is learning through the environment, for the environment, and about the environment. The authors believe that it should be universal, and its components should be present in preschool, school, vocational, higher, and postgraduate professional education. We believe that the greatest effect can be achieved by continuing environmental education, provided that it becomes an indispensable attribute of personal development. The results of the implemented project showed that the students of law have increased their.
Текст - 0 байт
Текст
Найти похожие
7.

Вид документа : Статья из журнала
Шифр издания : Х624/Y33
Автор(ы) : Yavor, Olga, Nadon, Viktoriia, Ruban, Olena
Заглавие : Transformation of legal regulation of family relations under the impact of scientific progress
Место публикации : Astra Salvensis. - 2019. - No. 1. - P.523-537
ББК : Х624
Ключевые слова (''Своб.индексиров.''): клонирование--узаконенный аборт--репродуктивная технология искусственного осеменения--однополые браки--суррогатное--клонування--легалізований аборт--репродуктивна технологія штучного осеменіння--одностатеві шлюби--сурогатність--cloning--legalized abortion--reproductive technology of artificial insemination--same-sex marriages--surrogacy
Аннотация: The actuality of the problem is conditioned by the fact that in the conditions of growing scientific and technological progress and the strengthening of the role of the individual in public life there is an acute problem of the legal status of the family in modern human life. The achievements of science and technology and social changes in the society inevitably affect marriage and family relations. The purpose of this article is determining the changes in the family legislation under the impact of scientific progress, in particular, concerning the legal regulation of the issues of determining the child's origin when using artificial insemination technology, the responsibility of the surrogate mother in case of refusal to hand over the born child to the spouses, the regulation of cases related to such legally significant circumstances as changing the sex of a person and so on. The leading methods of research are the methods of analysis and synthesis used for structuring and analysis of the available information as well as the comparative method as a special-scientific method of research that allows to consider this problem by finding and comparing common and different legal phenomena in the regulation of these issues. The results of the undertaken study is determining the drawbacks in the legal regulation of doctrinal provisions on the legal assessment of certain legally significant circumstances which have the status of legal facts for the purposes of legal regulation, in particular, the wide spread of methods of vitro fertilization, cloning, sex change, surrogacy, among other things, in solving the matter of the child's origin. The practical significance of the obtained results lies in the possibility of implementing a number of international legal acts in the national legislation of Ukraine at the level of international legal acts by imposing the obligations on the states parties of the conventions of the quality protection and protection of human rights.
Текст - 0 байт
Текст
Найти похожие
8.

Вид документа : Статья из журнала
Шифр издания : З2/Y12
Автор(ы) : Yagup V., Yagup K., Kovalova Y., Kharchenko V., Besarab, Tetiana, Krasnov O., Domanskii I., Domanskii V., Kostin H., AbuGoukh H. G.
Заглавие : Analysis and optimization of the reactive power compensation modes in a power supply system
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2019. - Vol. 3, Issue: 8-99. - P.13-22
ББК : З2
Ключевые слова (''Своб.индексиров.''): система электроснабжения--реактивная мощность--режим компенсации--линия электропередачи--компенсирующее устройство
Аннотация: Представлено дослiдження режимiв в однофазнiй узагальненiй системi електропостачання в аспектi пiдвищення енергетичних показникiв в системi шляхом компенсацiї реактивної потужностi. Розглянутi три тестових варiанта системи електропостачання з рiзними спiввiдношеннями комплексних опорiв навантаження та лiнiї електропередачi. Показанi недолiки традицiйного методу розрахунку параметрiв компенсуючого пристрою, якi забезпечують часткову компенсацiю реактивної потужностi, що споживається лише навантаженням. Аналiз режиму часткової компенсацiї свiдчить про те, що зi збiльшенням реактивностi лiнiї електропередачi погiршуються енергетичнi показники, якi вдається отримати в результатi компенсацiї реактивної потужностi. З застосуванням пошукової оптимiзацiї показано, що для повної компенсацiї потрiбне збiльшення ємностi компенсатора. Метод пошукової оптимiзацiї реалiзований в пакетi програм комп'ютерної математики MathCAD за допомогою вирiшального блоку givenfind. Для цього використовуються рiвняння математичної моделi системи електропостачання на основi компонентних i топологiчних рiвнянь. В якостi додаткових умов використанi спiввiдношення, що визначають повну компенсацiю реактивної потужностi живильного джерела, а також умови фiзичної можливостi бути реалiзованим структури компенсуючого пристрою. Перемiнними оптимiзацiї є параметри дослiджуваного режиму i параметри компенсуючого пристрою. Представленi фрагменти текстiв програм з числовими результатами розв’язань, а також порiвняльнi таблицi результатiв аналiзу i оптимiзацiї режимiв компенсацiї реактивної потужностi в дослiджуваних системах електропостачання для всiх варiантiв їх параметрiв. Данi кiлькiснi оцiнки величини додаткової ємностi, яка обчислюється виходячи з умови компенсацiї нею реактивної потужностi в лiнiї електропередачi. Дослiдження, що проведенi в роботi, показали, що при збiльшеннi реактивного опору лiнiї електропередачi повна компенсацiя не може бути досягнута iз застосуванням поперечної компенсацiї i цьому явищу дана фiзична трактовка. Вона полягає в тому, що напруга на компенсуючому поперечному конденсаторi зменшується швидше, нiж зростає компенсована ним реактивна потужнiсть лiнiї електропередач. Показано, що в останньому випадку повна компенсацiя реактивної потужностi все ж може бути досягнута застосуванням комбiнованої поздовжньо-поперечної компенсацiї.
Текст - 0 байт
Текст, Работа с электронной копией документа возможна только в читальном зале библиотеки

Найти похожие
9.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Velychko, Olga, Datsok, Oleh, Perova, Iryna
Заглавие : Essential R Peak Detector Based on the Polynomial Fitting
Место публикации : Lecture Notes on Data Engineering and Communications Technologies. - 2022. - Vol. 77. - p.148-163
ББК : З
Ключевые слова (''Своб.индексиров.''): mobile application--mobile-based ecg system--polynomial fitting--r peak detection --мобільний додаток--мобільна екг-система--поліноміальний фітінг--r визначення піку--мобильное приложение--мобильная экг-система--полиномиальный фитинг--r обнаружение пиков
Аннотация: R peaks detection is one of the uncomplicated tasks, successfully solved for the stationary ECG systems. The finite computational capacities of the recent mobile devices circumscribe applying powerful methods for ECG waves recognition. Proposed in this paper method of R peaks detection is based on the evaluation of the shape of an m sample segment and oriented to develop specific mobile applications conjugated with a portable ECG device. R peaks recognition is performed with the parameters, obtained as the result of polynomial fitting an m sample segment and characterizing the segment shape and position of the segment central point relatively the focus point. The complex of criteria for R peak distinguish was defined as the result of analysis of testing signals from the MIT-BIH Arrhythmia Database. The algorithm for R peaks searching in an optionally defined time interval was developed and can be used for the formation of RR intervals array for the heart rate monitoring. The sensitivity of the method for the raw signals with positive R peaks and is 99.6%.
Анотація - 0 байт
Анотація
Найти похожие
10.

Вид документа : Однотомное издание
Шифр издания : Х062/T23
Автор(ы) : Tatsyi V., Getman A., Ivanov, Stanislav, Karasiuk V., Lugoviy O., Sokolov O.
Заглавие : Semantic network of knowledge in science of law
Место публикации : Proceedings of the IASTED International Conference on Automation, Control, and Information Technology - Information and Communication Technology, ACIT-ICT 2010 : International Conference on Automation, Control, and Information Technology, held June 15 - 18, 2010 in Novosibirsk, Russia: ACTA Press, 2010. - P.218-222
ББК : Х062
Ключевые слова (''Своб.индексиров.''): семантическая сеть знаний для юристов--правовая информация--онтология знаний--программный продукт--правовая база знаний--программное обеспечение--консультативная система
Аннотация: The manuscript deals with the task of creating a semantic network of knowledge for lawyers. The network takes into account the peculiarities of legal information: low degree of structure development; textual character; a substantial volume; usage of synonyms; descriptive nature and location in different sources. The structure of the knowledge database realizing ontology represented of legal information has been developed. The legal knowledge database is presented by notion system with a random set of connections. The work concerns the developed software package JURONT and methods of its usage. The software package consists of 4 products, ensuring all the regimes of this systems functioning. The tasks that can be solved on the legal knowledge database in this software package have been formulated. These materials will be applied in Yaroslav the Wise National Law Academy of Ukraine (Kharkiv, Ukraine) as a knowledge–oriented consultative system of students individual studying in speciality “Law” and checking their knowledge.
Анотація - 0 байт
Анотація,
Анотація - 0 байт
Анотація
Найти похожие
11.

Вид документа : Статья из журнала
Шифр издания : Х621.162/S53
Автор(ы) : Shapoval, Roman Volodymyrovych, Nastyuk, Vasyl Yakovych
Заглавие : International Expertise in Administrative Legal Support of National Security in Ukraine
Место публикации : Indian Journal of Science & Technology. - 2016. - Vol. 9, Issue 36. - P.1-9
ББК : Х621.162
Ключевые слова (''Своб.индексиров.''): административная правовая поддержка--международная экспертиза--национальная безопасность
Аннотация: Abstract Background/Objectives: This articles deals with research of international expertise in administrative legal support of national security aiming at its complex and comprehensive analysis. Methods: Methods of restructuring ideas and theories, system and structural and functional, formal legal analysis and forecasting were applied throughout this research to the very phenomena of national security and activity of subjects shaping and maintaining such phenomenon, based on the methodological position. Their application logics relies on an attempt to integrate methodological approaches of various disciplines into the research of national security, and support forms and methods. Findings: This article concludes that the national security is a complex phenomenon and thus a system of interacting components. This system comprises a certain set of concepts and provisions, social and political and legal institutions and establishments, certain means, methods and forms that prevent or ensure an adequate response to any arising dangers and threats. Comparative legal analysis of international expertise in Western European countries and the USA allowed determining new lines of improvement of the administrative legal regulation in the following areas: counteraction of extremist activity; counteraction of illegal migration; combating human trafficking. This article suggests dividing national security into the following types: foreign policy threats to national security, public security, economic security, foreign economic security, military security, information security, environmental and demographic security. National security doctrine in any country is the original conceptual model of stating and resolving a common integrated set of standardized tasks and problems associated with providing protection of national interests. Applications/Improvements: Academic novelty of this research is in an attempt of fundamental theoretical analysis of the phenomenon of 'national security' as a governmental legal phenomenon with strengthening perspectives in Ukraine, establishing equilibrium of public and personal interests, providing sound protection of individual rights and legal interests.
Текст - 0 байт
Текст
Найти похожие
12.

Вид документа : Статья из сборника (том многотомника)
Шифр издания : 004.4:811.161.2/S26
Автор(ы) : Savytska, Larysa, Vnukova, Nataliya, Bezugla, Iryna, Pyvovarov, Vasyl, Subay, M. Turgut
Заглавие : Using Word2vec technique to determine semantic and morphologic similarity in embedded words of the Ukrainian language
Место публикации : Computational Linguistics and Intelligent Systems (CoLInS 2021): 5th International Conference, Lviv, Ukraine (22-23 April 2021). - Lviv, 2021. - Vol. 1: Main Conference. - P.235-248. - (CEUR Workshop Proceedings; Vol. 2870)
УДК : 004.4:811.161.2
Ключевые слова (''Своб.индексиров.''): word2vec--nlp--cosine similarity--semantic relations--morphological (linguistics) relations--word vectors--word embedding--ukrainian language--програмне забезпечення--семантика мови--вектори слів--лінгвістичні відношення--морфологічні відношення--українська мова--нейролінгвістичне програмування--программное обеспечение--семантика языка--лингвистические отношения--морфологические системы--векторы слов--украинский язык--нейролингвистическое программирование
Аннотация: The study presents the word translation into vectors of real numbers (word embeddings), one of the most important topics in natural language processing. Word2vec is the latest techniques developed by Tomas Mikolov to study high quality vectors. The majority of studies on clustering the word vectors were made in English. Dmitry Chaplinsky has already counted and published vectors for the Ukrainian language by using LexVec, Word2vec and GloVe techniques, obtained from fiction, newswire and ubercorpus texts, for VESUM dictionary and other related NLP tools for the Ukrainian language. There was no research done on the vectors by using Word2vec technique to create Ukrainian corpus, obtained from Wikipedia dump as the main source. The collection contains more than two hundred and sixty one million words. The dictionary of words (unique words) obtained from the corpus is more than seven hundred and nine thousand. The research using machine technology Word2vec is of great practical importance to computerise many areas of linguistic analysis. The open-source Python programming language was used to obtain word vectors with Word2vec techniques and to calculate the cosine proximity of the vectors. In order to do machine learning with Word2vec techniques on Python, a resource containing open source licensed software libraries called "Gensim" was used. Calculations regarding the cosine affinities of the obtained vectors were made using "Gensim" libraries. The research examining the clustering of the word vectors obtained from the Ukrainian corpus was made considering the two sub-branches of linguistics, semantics and morphology (language morphology). Firstly, it was investigated how accurately the vectors are obtained from the Ukrainian corpus and how the words represent the cluster they belong to. Secondly, it was investigated how word vectors are clustered and associated respectively to the morphological features of the suffixes of the Ukrainian language.
Текст - 0 байт
Текст
Найти похожие
13.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Satokhina, Natalia, Razmetaeva, Yulia
Заглавие : “The loss of experience” in digital age: Legal implications
Место публикации : Phenomenology and Mind. - 2021. - No. 20. - P.128-136
УДК : 340.12
Ключевые слова (''Своб.индексиров.''): digital technologies--experience of law--phenomenological hermeneutics--social media--the loss of experience--цифрові технології--юридичний досвід--феноменологічна герменевтика--соціальні засоби комунікації--соціальна комунікація--втрата досвіду--цифровые технологии--феноменологическая герменевтика--социальная коммуникация--утрата опыта
Аннотация: Exploring the history of our experience, Hannah Arendt reveals not only a radical transformation of its structure, but also the loss of experience as such and its replacement with technology. In order to identify the place of law in this process, we are trying to clarify the legal aspect of experience in terms of phenomenological hermeneutics and to trace its transformation in the digital age. The experience of law is thought of as one of the aspects of our mode of being-in-the-world, which is based on openness to the world and consists in the mutual recognition of people in their dignity. Digital technologies, in turn, contribute to replacing fundamental openness with illusory freedom in cyberspace. The latter, unlike the public realm as a realm of action of many, and in this sense legal realm, is based primarily on productive activities of one and no longer requires law.
Текст - 0 байт
Текст
Найти похожие
14.

Вид документа : Статья из журнала
Шифр издания : 342.84/R50
Автор(ы) : Reznik, Oleg, Slinko, Tetiana, Kravchuk, Mariana, Serohin, Vitalii, Strelianyi, Volodymyr
Заглавие : Use of Information and Communication Technologies in the Election Process: Ukrainian Realities and Foreign Experience
Место публикации : Journal of Legal, Ethical and Regulatory Issues. - 2021. - Vol. 24, Iss. 1. - P.1-7
УДК : 342.84
Ключевые слова (''Своб.индексиров.''): виборчий процес--інформаційно-комунікаційні технології--избирательный процесс--информационно-коммуникационные технологии (инфокоммуникационные технологии) (икт)--електронне голосування--электронное голосование--information and communication technologies--electronic voting--election process
Аннотация: The features of the use of information and communication technologies in the election process have been examined in the article. In particular, the essence and features of electronic voting as a promising direction of modern information and communication technologies are determined. The foreign experience of using information and communication technologies is studied, namely, the normative-legal and organizational components of application of electronic voting and electronic counting of votes are determined. Based on the results of studying the experience of introducing e-voting on the example of the USA, Estonia, Switzerland, Germany, and Ireland, it has been concluded that it had not only positive consequences but also a negative result. Among the countries considered, in which electronic voting is currently used in elections, it has been found that Estonia has achieved the greatest success in this area, and which not only has a secure and reliable e-voting system but also a nationally mandated body, the National Electoral Committee, to manage the online voting system to ensure trust in the system. It has been found that in Ukraine the use of electronic voting in the election process is only at the stage of active discussion, experience in the use of this latest technology in the country is still lacking, and therefore its introduction remains an urgent need.
Текст - 0 байт
Текст, Работа с электронной копией документа возможна только в читальном зале библиотеки

Найти похожие
15.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Razmetaeva, Yulia
Заглавие : The right to Be forgotten in the European perspective
Место публикации : Baltic journal of european studies. - 2020. - Vol. 10, Iss. 1. - P.58-76
УДК : 341.231.14
ББК : Х911.3
Ключевые слова (''Своб.индексиров.''): balancing rights--балансирование прав--балансування прав--digital age--цифровой век--цифрове столітті--european data protection law--европейский закон о защите данных--європейський закон про захист даних--gdpr (general data protection resolution)--общая резолюция защиты данных--загальна резолюція захисту даних--human rights--права человека--права людини--information technologies--информационные технологии--інформаційні технології--proportionality--пропорциональность--пропорційність--right to be forgotten--право быть забытым--право бути забутим
Аннотация: The article focuses on the right to be forgotten, which is at the center of changes in the concept of human rights in the digital age. The origins of the right to be forgotten in European legal doctrine and judicial practice, as well as its relationship with autonomy and identity, are analyzed. The article also examines the significance of the new understanding of "time" and "data" for the adoption of this right, considering the influence of two key cases of the Court of Justice of the European union, such as Google v. Spain [2014] and Google v. CNIL [2019] on the concept of the right to be forgotten. The place of this right, its connection with privacy and European data protection law is debated. The article focuses on jurisdictional issues, paying particular attention to both the right to be forgotten and the understanding of the relationship between privacy and freedom of expression in the European union and the united States, and possible jurisdictional disputes around the world. The article also addresses the issue of balancing rights and legitimate interests, as well as the proportionality for applying the right to be forgotten, both in the European and global contexts.
Текст - 0 байт
Текст,
Текст - 0 байт
Текст
Найти похожие
16.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Razmetaeva, Yulia, Razmetaev, Sergiy
Заглавие : Justice in the digital age: technological solutions, hidden threats and enticing opportunities
Место публикации : Access to Justice in Eastern Europe. - 2021. - Vol. 4, Iss. 2. - P.104-117. - У WoS не зазначено: Vol. 4.
УДК : 340.1:004
Ключевые слова (''Своб.индексиров.''): algorithmic justice--digital age--discrimination--hidden threats--human rights--justice--rule of law--права людини--верховенство права--цифрові технології--цифровізація права--цифрова епоха--права человека--цифровые технологии--цифровая эпоха--цифровизация права
Аннотация: This article focuses on and weighs the main benefits and risks of introducing and deploying technological instruments for justice, as well as their potential effect on fairness. The replacement with and complementary use of technological solutions in light of their application in the judicial system in the digital age are considered. The explicit and implicit risks that arise from the introduction and deployment of technology instruments are analysed. Taking an axiological approach that assumes the a priori value of human rights, justice, and the rule of law, we evaluate the main dangers that the use of technological solutions in the justice system entails. With the help of formal legal and comparative legal methods, as well as the analysis of scientific literature and contextual analysis of open sources on the capabilities of artificial intelligence and the bias of algorithms, the article fills in the gaps regarding the potential of technology to improve access to justice and the use of algorithms in decision-making. It is noted that some technological solutions, as well as the usual behaviour of all actors in the digital era, change the nature of interactions, including those in the justice system. The question of the possibility of algorithmic justice is considered from the standpoint of fairness and non-discrimination. The article shows how the use of algorithms can improve procedural fairness but emphasises a careful and balanced approach to other elements of fairness.
Текст - 0 байт
Текст
Найти похожие
17.

Вид документа : Статья из сборника (однотомник)
Шифр издания :
Автор(ы) : Pukala, Ryszard, Hlibko, Serhii, Vnukova, Nataliya, Korvat, Olena
Заглавие : Power BI in ICT for Monitoring of Insurance Activity Based on Indicators of Insurance Portfolios
Место публикации : 2020 IEEE International Conference on Problems of Infocommunications Science and Technology: PIC S and T 2020 - Proceedings, Kharkiv, 6 October 2020 - 9 October 2020. - 2021. - Ст.№ 9467993. - P.393-401
УДК : 347.764:004
Ключевые слова (''Своб.индексиров.''): analytical panel--information and communication technologies--insurance--insurance activity--insurance contract--insurance portfolio--insurance statistics--line of business--microsoft power bi--monitoring--operational business intelligence--vuca-world--аналітична панель--інформаційно-комунікаційні технології--страхування--страхова діяльність--договір страхування--страховий портфель--страхова статистика--оперативна бізнес-аналітика--аналитическая панель--информационно-коммуникационные технологии (инфокоммуникационные технологии) (икт)--страхование--страховая деятельность--договор страхования--страховой портфель--страховая статистика--оперативная бизнес-аналитика
Аннотация: The article proves the relevance of operational business intelligence in insurance in terms of VUCA-world. For this purpose, the use of Microsoft Power BI software as a method of information and communication technologies, its purpose and benefits for business monitoring are considered. Among the advantages of using Microsoft Power BI is the analysis of existing insurance contracts and current indicators of insurance portfolios. The research substantiates the feasibility of operational analysis of insurance activities based on the calculation of indicators of insurance portfolios that form insurance statistics, which provides results in real-time. This approach eliminates the shortcomings of common means of retrospective operational analysis based on financial statements. Within the research, the insurance portfolio is defined as a set of insurance contracts for a separate line of business of the insurer on a certain date. It is emphasized that for each date of insurance activity the insurance portfolio is a unique set of contracts. A positive factor in the article is the possibility of timely response of managers to fluctuations in the profitability and technical risk of insurance portfolio. The application of the studied elements made it possible to propose a method of monitoring insurance activities based on the calculation of indicators of insurance portfolios and their visualization on analytical panels (dashboards).
Анотація - 0 байт
Анотація
Найти похожие
18.

Вид документа : Статья из журнала
Шифр издания : Х623.92/P97
Автор(ы) : Pukala R., Hlibko, Serhii, Vnukova N., Davidenko D.
Заглавие : Usage of E-Тechnologies to enhance infocommunication in financing innovation
Место публикации : IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019 - Proceedings. - 2019. - p.157-160
ББК : Х623.92
Ключевые слова (''Своб.индексиров.''): bank resources--choice--communication--e-technology--financibg method--state loans--training--банковские ресурсы--выбор--связь--финансовый метод--государственные кредиты--подготовка--электронные технологии--банківські ресурси--зв'язок--фінансовий метод--державні кредити--підготовка--електронні технології
Аннотация: The article deals with the actual issues of choosing the best way to finance innovation in the application of e-technology for improving the level of communication in the provision of educational services. The criteria of this choice are proposed and an expert evaluation is carried out. The results of the study were obtained in the Decision Making Helper © software. Priority of extrabudgetary funds in financing innovations and their influence on the general development of the investment project has been established. Examples of the application of this e-technology for determining the priority direction of development in different fields are given, which allowed to form the author's methodology of work with the program in order to acquire the competencies of users (including students in the process of learning).
Анотація - 0 байт
Анотація
Найти похожие
19.

Вид документа : Статья из журнала
Шифр издания :
Автор(ы) : Pospelov, Boris, Andronov, Vladimir, Rybka, Evgenіy, Krainiukov, Olekcii, Maksymenko, Nadiya, Biryukov, Igor, Zhuravskij, Maxim, Bezuhla, Yuliia, Morozov, Ihor, Yevtushenko, Ihor
Заглавие : Devising a self-adjusting zero-order Brown’s model for predicting irreversible processes and phenomena
Место публикации : Eastern-European Journal of Enterprise Technologies. - 2021. - Vol. 5, No. 10 (113). - P.40-47
УДК : 621.03.9
Ключевые слова (''Своб.индексиров.''): air environment--current measure of recurrence--fire forecasting--ignition--self-adjusting brown’s model--повітряне середовище--поточна міра рецидиву--прогнозування пожежі--займання--модель брауна--воздушная среда --текущая мера повторяемости--прогнозирование пожаров--возгорание--модель брауна
Аннотация: A self-adjusting zero-order Brown’s model has been devised. This model makes it possible to predict with high accuracy not only fires in the premises but also irreversible processes and phenomena of a random and chaotic nature under actual conditions. The essence of the self-adjusting model is that, based on Kalman’s approach, it is proposed to set the smoothing parameter for each time moment. Such a parameter is determined depending on the resulting current forecast error, taking into consideration the real and unknown dynamics of the studied series and noise. That does not require the selection of the smoothing parameter characteristic of known models. In addition, the proposed Brown’s model, unlike the known modifications, does not require setting a dynamics model of the level of the examined time series. The self-adjusting model provides negli gible errors and efficiency of the forecast. The operability of the devised model was checked using an example of the experimental time series for the current measure of the recurrence of the increments of the state of the air medium in the laboratory chamber during alcohol combustion. As quantitative indicators of the quality of the forecast error, the current values for the square and absolute values were considered. It has been established that the current square of the forecast error is more than six orders of magnitude smaller compared to the case of a fixed smooth-ing parameter from a beyond-the-limit set. However, the current square of the forecast error for abrupt changes in the dynamics of the series level is half that of the fixed parameter of the beyond-the-limit set. It is noted that the results confirm the feasibility of the proposed self-adjusting Brown’s model.
Текст - 0 байт
Текст
Найти похожие
20.

Вид документа : Статья из журнала
Шифр издания : PubMed ID33611297/L49
Автор(ы) : Ponomarenko, Oksana M., Ponomarenko, Yuriy A., Ponomarenko, Kateryna Yu.
Заглавие : Legal regulation of surrogacy at the international and national levels: optimization of permissions, prohibitions and liability
Место публикации : Wiadomosci lekarskie. - 2020. - Vol. 73, Iss. 12, cz. 2. - P.2877-2881
УДК : 614.2
Ключевые слова (''Своб.индексиров.''): assisted reproductive technologies--вспомогательные репродуктивные технологии--допоміжні репродуктивні технології--contractual regulation of family relations--договорное регулирование семейных отношений--договірне регулювання сімейних відносин--cross-border criminal liability--трансграничная уголовная ответственность--транскордонна кримінальна відповідальність--surrogacy--суррогатное материнство--сурогатне материнство--the origin of the child--происхождение ребенка--походження дитини
Аннотация: OBJECTIVE: The aim: To identify the issues that arise in states that consolidate different approaches to the use of surrogacy technologies and formulate the main trends towards unification of legislation in this area. PATIENTS AND METHODS: Materials and methods: The study used a complex of general scientific and special methods of cognition, in particular, dialectical, generalizing, comparative legal and others. The research is based on the national and international legislation of different countries, the jurisprudence of national courts and the practice of the ECHR, doctrinal research by scientists from different countries. CONCLUSION: Conclusions: The development of an international legal document which aim is to protect the rights of children born with the use of surrogacy technology is substantiated on the basis of the main principle enshrined in paragraph 1 of Art. 3 of the Convention on the Rights of the Child - the principle of the best interests of the child.
Текст - 0 байт
Текст
Найти похожие
 1-20    21-40   41-46 
 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Пушкінська, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава