Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
About
About the Journal
Submissions
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 2 No. 78 (2024)
Vol. 2 No. 78 (2024)
Published:
2024-07-01
Method for cryptographically strict identification with password reuse blocking
O.A. Verba, I.V. Daiko
4-13
PDF (Українська)
Using an object tracking algorithm by video image for the implementation of an autonomous target tracking function for UAV
I.A. Zhukov, Y.V. Lukash
14-17
PDF (Українська)
Challenges of data collection for monitoring technical characteristics and location of specialized airport vehicles
Y.Y. Karpov, O.V. Vovna
18-29
PDF (Українська)
Control of linear motors with gas lubrication of the coordinate measurement system
V.P. Kvasnikov, V.M. Ilchenko, K.V. Molchanova
30-34
PDF
Load balancing method in SDN networks using artificial intelligence
Y.O. Kulakov, D.V. Korenko
35-43
PDF (Українська)
Using a resource classifier in traffic forecasting models for SDN networks
Y.O. Kulakov, O.V. Korochkin, A.S. Omelyanskiy
44-51
PDF (Українська)
Soft-adaptation of reference algorithm for discrete control
V.S. Nozdrenkov, A.V. Pavlov, G.A. Oleksiienko, O.Y. Zhuravlov, Y.O. Zhuravlov
52-60
PDF (Українська)
Construction of the software of the information system for the formation of specialized thematic virtual communities
R.S. Pazderska, V.P. Kvasnikov
61-68
PDF (Українська)
Algorithm for calculating the power system voltage frequency using quadrature components
R.V. Petrosian
69-76
PDF (Українська)
One-directional mapping for cryptographic security of the quasi-regular language sentences to interact light aviation systems subjects
M.K. Pechurin, L.P. Kondratova, S.M. Pechurin
77-82
PDF
A model for identifying the source of pseudorandom number sequences based on a hybrid neural network
D.P. Proskurin, S.O. Gnatyuk, Ch. Okoro, T.O. Okhrimenko, T.V. Hryniuk
83-90
PDF (Українська)
Method of distributed modular exponentiation on IoT terminal microcontrollers with protected involvement of cloud computing
O.V. Rusanova, M.A. Haidukevych
91-103
PDF (Українська)
A method for prioritizing IT incidents at critical information infrastructure facilities of the state
V.M. Sydorenko, A.A. Polozhentsev, S.Y. Sydorenko, A.A. Skurativskyi
104-114
PDF (Українська)
Overfitting in machine learning
M.V. Struk, Yu.B. Modenov
115-119
PDF (Українська)
Priority management in IT service for airline employees
V.F. Suraiev, S.O. Kudrenko
120-123
PDF (Українська)
Internet network model with account of network location
S.S. Chumachenko, B.S. Chumachenko, M.M. Maloied, R.S. Odarchenko, Khavikova Y.I. Khavikova
124-134
PDF (Українська)
Developed By
Open Journal Systems
Language
English
Українська
Information
For Readers
For Authors
For Librarians