Search Results - "Suprun, Oleh"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Information Transmission Protection Using Linguistic Steganography With Arithmetic Encoding And Decoding Approach by Ivasenko, Maksym, Suprun, Olha, Suprun, Oleh

    “…Security of Internet of Things and Internet space in general is one of the main areas of research in the field of information technology today and…”
    Get full text
    Conference Proceeding
  2. 2

    IoT application testing features based on the modelling network by Popereshnyak, Svitlana, Suprun, Olha, Suprun, Oleh, Wieckowski, Tadeusz

    “…In the article the features of testing devices and IoT applications are investigated. To make the problem clearer, the basic aspects of IoT applications…”
    Get full text
    Conference Proceeding
  3. 3

    Forecasting and Analysis of Online Orders Rejections Using Data Mining Algorithms and Penalty Function by Suprun, Oleh, Klimenkova, Nina, Melnyk, Maksym, Lavriy, Sonya

    “…The direction of products and food delivery from online stores and similar transportation services have become especially relevant in recent years in…”
    Get full text
    Conference Proceeding
  4. 4

    Effectiveness Evaluation of the Method for Invariant-Spatial Coding of Visual Data of Different Classes by Kurin, Kseniya, Yudin, Oleksandr, Suprun, Olha, Suprun, Oleh, Bakalynskyi, Olexandr, Ponomarenko, Oleksandr

    “…The research is devoted to the assessment of the effectiveness of the implementation of the image compression technology based on the invariant spatial coding…”
    Get full text
    Conference Proceeding
  5. 5

    Visual Data Coding Algorithms for the Problem of Steganographic Information Protection by Kurin, Kseniya, Yudin, Oleksandr, Suprun, Olha, Suprun, Oleh, Provotar, Oleksandr, Yudin, Oleksii

    “…Wide spread of digital image in every aspect of human life made them not only a part of entertainment or communication ingredient, but also an important…”
    Get full text
    Conference Proceeding
  6. 6

    Video Data Compression Coder Based on the Method of Structural Digital Image Representation by Kurin, Kseniya, Yudin, Oleksandr, Suprun, Oleh, Provotar, Oleksandr, Kotetunov, Victor, Barannik, Dmitry

    “…The usage of digital images in every aspect of computer and telephone application requires new means of pictures storage, compression and restoration. Such a…”
    Get full text
    Conference Proceeding
  7. 7
  8. 8

    Research of Features and Possibilities of Modern Real Time Video Services by Suprun, Olha, Sorokun, Anton, Suprun, Oleh, Matviichuk, Viktor, Voskoboinikov, Serhii, Babenko, Yurii

    “…Modern trends in telecommunications are aimed at the applying of science-intensive technologies to the various classes of video information services. Such…”
    Get full text
    Conference Proceeding
  9. 9

    Intrusion detection method based on the sensory traps system by Popereshnyak, Svitlana, Suprun, Olha, Suprun, Oleh, Wieckowski, Tadeusz

    “…In this paper, intrusion detection system based on touch traps is presented. Aim of the work - investigate and design a software product for monitoring…”
    Get full text
    Conference Proceeding
  10. 10

    Personal Documents Identification System Development Using Neural Network by Popereshnyak, Svitlana, Suprun, Olha, Suprun, Oleh, Wieckowski, Tadeusz

    “…The problem of analyzing and classification of digital images, that contain the documents, is very common for finance and economic spheres, for example, for…”
    Get full text
    Conference Proceeding
  11. 11

    Evolutionary techniques for complex objects clustering by Snytyuk, V. Y., Suprun, O. O.

    “…The article presents the evolution technologies for clustering objects, specified by their characteristics values. The genetic algorithms and evolution…”
    Get full text
    Conference Proceeding
  12. 12

    The new method of secure data transmission on the indirect steganography basis by Bekirov, Ali, Barannik, Dmitry, Frolov, Oleg, Suprun, Oleh

    “…In this article an approach for realization of steganographic embedding by using functional transformation for adaptive positional number is considered…”
    Get full text
    Conference Proceeding