Перегляд Статті з наукових журналів та збірок за назвою
Зараз показуються 35-54 з 831
-
Information-extreme machine learning of a cyber attack detection system
(ХАІ, 2022)This study increases the functional efficiency of machine learning of a cyber attack detection system. An information-extreme machine learning method for a cyber attack detection system with the optimization of control ... -
Instability analysis of delays contributing to web service response time
(ХАІ, 2010)This paper reports our practical experience of benchmarking a complex System Biology Web Service, and investigates the instability of its behaviour and the delays induced by the communication medium. -
Intrusion tolerance of Web-systems: IMEA-Analysis and multiversion architecture
(ХАІ, 2006)The kinds of network attacks are considered, their classification is carried out and the IMEA-table (Intrusion Modes and Effect Analysis) is designed. The multiversion variant of Web-system architecture tolerated to ... -
Investigation of the effect of object size on accuracy of human localisation in images acquired from unmanned aerial vehicles
(KhAI, 2024)The use of unmanned aerial vehicles is gaining wide popularity in various areas of research and information acquisition. More and more often, unmanned aerial vehicles are used to obtain various types of images of the Earth’s ... -
JPEG сжатие изображений с применением рекурсивного группового кодирования
(ХАІ, 2015)Рассмотрена задача альтернативного кодирования квантованных коэффициентов дискретного косинусного преобразования (ДКП) в стандарте JPEG. Проведен сравнительный анализ эффективности JPEG и предлагаемой модификации при сжатии ... -
Low SNR treshold in rapid estimators of complex sinusoidals
(ХАІ, 2016)A task of estimation of complex sinusoid frequency is considered. A particular but practically important case of low signal-to-noise ratio (SNR) is studied. The low SNR threshold, commonly overlooked in development of ... -
Making Web-services fault-tolerant: methods and technics
(ХАІ, 2007)With emergent growing use of Internet, Web services become increasingly popular and their growth rate surpasses even the most optimistic predictions. Services are self-descriptive, self-contained, platform-independent and ... -
Mathematical description of imaging processes in ultra-wideband active aperture synthesis systems using stochastic sounding signals
(ХАІ, 2021)Mathematical models of the fields of stochastic ultra-wideband signals that are necessary for solving problems of aperture synthesis of images using active radar methods are presented. The expediency of using V-transformations ... -
Medical information systems: analysis of development and application experience
(ХАІ, 2008)Public Health is one of the main areas, where information technologies are intensively employed. Here we have reviewed and analyzed a number of foreign and native medical information systems (MIS), experience of ... -
Method of creation of FPGA based implementation of artificial intelligence as a service
(ХАІ, 2023)The subject of study in this article is the technologies of Field Programmable Gate Array (FPGA), methods, and tools for prototyping of hardware accelerators of Artificial Intelligence (AI) and providing it as a service. ... -
Method of creation of power sources for home appliances under constraints of limited resources
(ХАІ, 2023)The subject of study in this article is the voltage ranges, methods, and tools for prototyping independent sources of power supply and artificial lighting for home appliances with reuse of only widespread components. The ... -
Method of QOS evaluation of FPGA as a service
(ХАІ, 2022)The subject of study in this article is the evaluation of the performance issues of cloud services implemented using FPGA technology. The goal is to improve the performance of cloud services built on top of multiple FPGA ... -
Method of realization of arithmetic operations on the basis of the use of modulyarnoy number system
(ХАІ, 2009)In this article we consider two arithmetic operation realizations in modular arithmetics, based on the ring shift principle. The method of binary position and remainder encoding has proved to be very efficient comparing ... -
Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks
(ХАІ, 2021)The subject matter of the article is methods and technologies of ensuring the cybersecurity of industrial and web-oriented systems and networks, training of cybersecurity specialists during the acquisition of professional ... -
Methods for improving quality of software products
(ХАІ, 2007)This paper studies the principles of improving the quality of software, which were first suggested by David L. Parnas. The paper contains a description of the key methods for creating software architecture. The methods ... -
Metric-based analysis of markov models for computer system availability assessment
(ХАІ, 2013)Markov and semi-Markov models are widely used to analyse the reliability of complex computer-based systems. Dealing with the different model features is a serious problem, which leads to computational difficulties and ... -
Modeling of information interconnection in a computer control system of moving objects
(ХАІ, 2021)The subject of research is a pool of widgets, which provides a user interface in a computer control system for moving objects. The object of research is the process of information exchange between the components of a ... -
Multi version service oriented architechtures dependability analisys
(ХАІ, 2010)This article is targeted on investigating the web-services dependability problem and, in particular, the reasonableness of multi version architecture usage to solve it and guarantee the customer he is safe while using the ... -
Multi-valued decision diagram in importance analysis
(ХАІ, 2012)New algorithms for calculation of the importance measures based on the methods of Logical Differential Calculus and Binary (Multi-Valued) Diagram are proposed taking into account features of MSSs. Benchmarking algorithms ... -
Neural network based image classifier resilient to destructive perturbation influences – architecture and training method
(ХАІ, 2022)The current article develops a model and method of training a classifier that exhibits characteristics of resilience to adversarial attacks, fault injection, and concept drift. The proposed model has a hierarchical structure ...