Search Results - "Akhmetov, Berik"
-
1
Determination of Input Parameters of the Neural Network Model, Intended for Phoneme Recognition of a Voice Signal in the Systems of Distance Learning
Published in International Journal of Electronics and Telecommunications (01-01-2018)“…The article is devoted to the problem of voice signals recognition means introduction in the system of distance learning. The results of the conducted research…”
Get full text
Journal Article -
2
Automation of Information Security Risk Assessment
Published in International Journal of Electronics and Telecommunications (01-01-2022)“…An information security audit method (ISA) for a distributed computer network (DCN) of an informatization object (OBI) has been developed. Proposed method is…”
Get full text
Journal Article -
3
Modeling of the Decision-making Procedure for Financing of Cyber Security Means of Cloud Services by the Medium of a Bilinear Multistep Quality Game with Several Terminal Surfaces
Published in International Journal of Electronics and Telecommunications (01-01-2018)“…The model is developed for the intellectualized decision-making support system on financing of cyber security means of transport cloud-based computing…”
Get full text
Journal Article -
4
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2021)“…Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for…”
Get full text
Journal Article -
5
PROCEDURES FOR INVESTMENT IN CYBER SECURITY, TAKING INTO ACCOUNT MULTIFACTORITY AND FUZZY STATEMENT
Published in Kìberbezpeka. osvìta, nauka, tehnìka (2021)“…It is shown that the application of multi-step quality games theory allows financing of various information technologies considering various factors. In…”
Get full text
Journal Article -
6
Automation of Information Security Risk Assessment
Published in International Journal of Electronics and Telecommunications (27-04-2022)Get full text
Journal Article -
7
ОПТИМІЗАЦІЇ РЕЗЕРВУ ОБЛАДНАННЯ ДЛЯ ІНТЕЛЕКТУАЛЬНИХ АВТОМАТИЗОВАНИХ СИСТЕМ
Published in Kìberbezpeka. osvìta, nauka, tehnìka (01-12-2021)“…Запропоновано алгоритми для нейромережевого аналізатора, задіяного у системі підтримки прийняття рішень (СППР) у ході вибору складу резервного обладнання (СРО)…”
Get full text
Journal Article -
8
ПРОЦЕДУРА ІНВЕСТУВАННЯ В КІБЕРБЕЗПЕКУ З УРАХУВАННЯМ БАГАТОФАКТОРНОСТІ І В НЕЧІТКІЙ ПОСТАНОВЦІ
Published in Kìberbezpeka. osvìta, nauka, tehnìka (01-03-2021)“…Показано, що застосування теорії багатокрокових ігор якості дозволяє здійснювати фінансування різних інформаційних технологій з урахуванням усіляких чинників…”
Get full text
Journal Article -
9
Entropy estimation of the position of the barrier dimension: Applicability nearsighted and farsighted iterative algorithms for processing high-dimensional data
Published in 2015 15th International Conference on Control, Automation and Systems (ICCAS) (01-10-2015)“…It is shown that large neural networks allow solving tasks that cannot classical quadratic forms in linear algebra. Thus the assessment of output entropy of…”
Get full text
Conference Proceeding -
10
Developing and customizing university business intelligence cloud
Published in 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (01-12-2012)“…Increasing competition in the market of educational services among the universities make the quality of education the main factor of competitiveness. Limited…”
Get full text
Conference Proceeding