Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Problems of Informatization and Management
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 2 No. 78 (2024)
Vol. 2 No. 78 (2024)
Published:
2024-07-01
Method for cryptographically strict identification with password reuse blocking
O.A. Verba, I.V. Daiko
4-13
PDF (Українська)
Using an object tracking algorithm by video image for the implementation of an autonomous target tracking function for UAV
I.A. Zhukov, Y.V. Lukash
14-17
PDF (Українська)
Challenges of data collection for monitoring technical characteristics and location of specialized airport vehicles
Y.Y. Karpov, O.V. Vovna
18-29
PDF (Українська)
Control of linear motors with gas lubrication of the coordinate measurement system
V.P. Kvasnikov, V.M. Ilchenko, K.V. Molchanova
30-34
PDF
Load balancing method in SDN networks using artificial intelligence
Y.O. Kulakov, D.V. Korenko
35-43
PDF (Українська)
Using a resource classifier in traffic forecasting models for SDN networks
Y.O. Kulakov, O.V. Korochkin, A.S. Omelyanskiy
44-51
PDF (Українська)
Soft-adaptation of reference algorithm for discrete control
V.S. Nozdrenkov, A.V. Pavlov, G.A. Oleksiienko, O.Y. Zhuravlov, Y.O. Zhuravlov
52-60
PDF (Українська)
Construction of the software of the information system for the formation of specialized thematic virtual communities
R.S. Pazderska, V.P. Kvasnikov
61-68
PDF (Українська)
Algorithm for calculating the power system voltage frequency using quadrature components
R.V. Petrosian
69-76
PDF (Українська)
One-directional mapping for cryptographic security of the quasi-regular language sentences to interact light aviation systems subjects
M.K. Pechurin, L.P. Kondratova, S.M. Pechurin
77-82
PDF
A model for identifying the source of pseudorandom number sequences based on a hybrid neural network
D.P. Proskurin, S.O. Gnatyuk, Ch. Okoro, T.O. Okhrimenko, T.V. Hryniuk
83-90
PDF (Українська)
Method of distributed modular exponentiation on IoT terminal microcontrollers with protected involvement of cloud computing
O.V. Rusanova, M.A. Haidukevych
91-103
PDF (Українська)
A method for prioritizing IT incidents at critical information infrastructure facilities of the state
V.M. Sydorenko, A.A. Polozhentsev, S.Y. Sydorenko, A.A. Skurativskyi
104-114
PDF (Українська)
Overfitting in machine learning
M.V. Struk, Yu.B. Modenov
115-119
PDF (Українська)
Priority management in IT service for airline employees
V.F. Suraiev, S.O. Kudrenko
120-123
PDF (Українська)
Internet network model with account of network location
S.S. Chumachenko, B.S. Chumachenko, M.M. Maloied, R.S. Odarchenko, Khavikova Y.I. Khavikova
124-134
PDF (Українська)
Developed By
Open Journal Systems
Language
English
Українська
Information
For Readers
For Authors
For Librarians
Make a Submission
Make a Submission
Keywords