Search Results - "2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)"

Refine Results
  1. 1

    Method of Increasing the Capacity of Information Threat Detection Filters in Modern Information and Communication Systems by Belikova, Tatyana, Lekakh, Albert, Dovbenko, Oleksii, Dodukh, Oleksandr

    “…The paper deals with the issues related to the processing of information resources to identify the hidden effects of information impact on the…”
    Get full text
    Conference Proceeding
  2. 2

    The Method of Adaptive Counteraction to Viral Attacks, Taking Into Account Their Masking in Infocommunication Systems by Gurzhiy, Pavlo, Gorodetsky, Bogdan, Yudin, Oleksandr, Ryabukha, Yuriy

    “…This paper deals with issues related to the use of digital steganography methods, encryption methods for masking viral attacks. The main problem is that it is…”
    Get full text
    Conference Proceeding
  3. 3

    Development Second and Third Phase of the Selective Frame Processing Method by Barannik, Vladimir, Barannik, Valeriy, Havrylov, Dmytro, Sorokun, Anton

    “…In work the solution of a operational and confidential data transmission problem with the necessary quality level of decoding in the conditions of continuous…”
    Get full text
    Conference Proceeding
  4. 4

    Information Encryption Based on the Synthesis of a Neural Network and AES Algorithm by Lytvyn, Vasyl, Peleshchak, Ivan, Peleshchak, Roman, Vysotska, Victoria

    “…This paper proposes a system of information encryption based on the synthesis of a neural network and AES(Advanced Encryption Standard(Rijndael)) algorithm…”
    Get full text
    Conference Proceeding
  5. 5

    Models of the Dialogue "Human - Computer" for Ergonomic Support of E-Learning by Lavrov, Evgeniy, Barchenok, Nataliia, Lavrova, Olga, Savina, Nataliia

    “…The article deals with the processes of humancomputer interaction in e-learning. It demonstrates the necessity of taking into account the human factor in the…”
    Get full text
    Conference Proceeding
  6. 6

    Bandwidth Assessment of Cooperative Surveillance Systems by Obod, Ivan, Svyd, Iryna, Maltsev, Oleksandr, Maistrenko, Galyna, Zubkov, Oleh, Zavolodko, Ganna

    “…Cooperative surveillance systems (CSS), which are formed by secondary surveillance radar (SSR), Multilateration systems (MLAT) and Automatic dependent…”
    Get full text
    Conference Proceeding
  7. 7

    The Process of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine by Slipachuk, Lada, Toliupa, Serhii, Nakonechnyi, Volodymyr

    “…The process model of the Critical Infrastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in…”
    Get full text
    Conference Proceeding
  8. 8

    Method of Increasing the Identification Friend or Foe Systems Information Security by Svyd, Iryna, Obod, Ivan, Maltsev, Oleksandr, Strelnytskyi, Oleksii, Zubkov, Oleh, Zavolodko, Ganna

    “…This article proposes a method of improving information security Identification Friend or Foe (IFF) systems. In this method, a successive transition is made…”
    Get full text
    Conference Proceeding
  9. 9

    SDN/Cloud Solutions for Intent-Based Networking by Beshley, Mykola, Pryslupskyi, Andrii, Panchenko, Oleksiy, Beshley, Halyna

    “…The approach of SDN and NFV integration in cloud environment for Intent-Based Networking has been proposed. The method to provide the required QoS level is…”
    Get full text
    Conference Proceeding
  10. 10

    Evaluation of Effectiveness of Masking Methods of Aerial Photographs by Barannik, Vladimir, Barannik, Dmitry, Fustii, Vadym, Parkhomenko, Maksym

    “…Discusses comparative evaluation of the most common methods of masking. Demonstrates the use of previously sound measures quantify the quality of detection and…”
    Get full text
    Conference Proceeding
  11. 11

    Blockchain-Based Intelligent Network Management for 5G and Beyond by Maksymyuk, Taras, Gazda, Juraj, Han, Longzhe, Jo, Minho

    “…The concept of spectrum and infrastructure sharing appeared to solve the problem by allowing operators to cooperate between each other. However, the current…”
    Get full text
    Conference Proceeding
  12. 12

    System Analysis of Caching Requests on Network Computing Nodes by Pasyeka, Mykola, Sheketa, Vasyl, Pasieka, Nadiia, Chupakhina, Svitlana, Dronyuk, Ivanna

    “…A systematic study of technologies and concepts used for the design and construction of distributed fail-safe web systems has been conducted. The general…”
    Get full text
    Conference Proceeding
  13. 13

    Security and Regulatory Aspects of the Critical Infrastructure Objects Functioning and Cyberpower Level Assesment by Toliupa, Serhii, Parkhomenko, Ivan, Shvedova, Hanna

    “…The questions of conceptual and regulatory bases of critical infrastructure's information security are considered, and the critical infrastructure objects…”
    Get full text
    Conference Proceeding
  14. 14

    The Method of Single Errors Correction in the Residue Class by Krasnobayev, Victor, Kuznetsov, Alexandr, Lokotkova, Irina, Dyachenko, Andrey

    “…In this paper the correcting capabilities of arithmetic codes are investigated with the use of transformations in the residue class. The new method of single…”
    Get full text
    Conference Proceeding
  15. 15

    The Method of Using Production Rules in Neural Network Recognition of Emotions by Facial Geometry by Toliupa, Serhiy, Tereikovskiy, Ihor, Dychka, Ivan, Tereikovska, Liudmyla, Trush, Alexander

    “…The article is devoted to the improvement of neural network means of recognition of emotions on human geometry, which are defined for use in information…”
    Get full text
    Conference Proceeding
  16. 16

    Neuro-Fuzzy Controller for Handover Operation in 5G Heterogeneous Networks by Semenova, Olena, Semenov, Andriy, Voitsekhovska, Olha

    “…The paper suggests to apply a neuro-fuzzy controller in 5G heterogeneous networks in order to improve the handover process. The architecture of the controller…”
    Get full text
    Conference Proceeding
  17. 17

    Predicting Self-Similar Traffic using Cubic B-Splines by Strelkovskaya, Irina, Solovskaya, Irina, Makoganiuk, Anastasiya

    “…The problem of predicting the characteristics of self-similar traffic based on the extrapolation method using cubic B-splines is considered. The obtained…”
    Get full text
    Conference Proceeding
  18. 18

    Configurable Control Node for Wireless Sensor Network by Krainyk, Yaroslav, Davydenko, Yevhen, Tomas, Valentyn

    “…In the presented paper, model of the Internet-of-Things node for Home Area Network (HAN) in Smart Grid (SG) is proposed. The node is supposed to be a universal…”
    Get full text
    Conference Proceeding
  19. 19

    Fusion of Airspace Surveillance Systems Data by Svyd, Iryna, Obod, Ivan, Maltsev, Oleksandr, Maistrenko, Galyna, Zavolodko, Ganna, Pavlova, Daria

    “…This document proposed and explored a fusion data model of primary radar systems and Identification Friend or Foe (IFF) systems of an airspace control system,…”
    Get full text
    Conference Proceeding
  20. 20

    Formation of Pseudorandom Sequences with Special Correlation Properties by Kuznetsov, Alexandr, Smirnov, Oleksii, Kovalchuk, Diana, Averchev, Alexander, Pastukhov, Mykola, Kuznetsova, Kateryna

    “…In this paper, the analysis and comparative studies of methods of synthesis of discrete signals with special correlation properties are carried out…”
    Get full text
    Conference Proceeding