Deep learning based massive MIMO beamforming for 5G mobile network
T Maksymyuk, J Gazda, O Yaremko… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
The rapid increasing of the data volume in mobile networks forces operators to look into
different options for capacity improvement. Thus, modern 5G networks became more …
different options for capacity improvement. Thus, modern 5G networks became more …
[PDF][PDF] Heterogeneous Data with Agreed Content Aggregation System Development.
A web-based service for the automation of contextual advertising management in Google
AdWords system are developed. An analysis of the Internet advertising market, the vector of …
AdWords system are developed. An analysis of the Internet advertising market, the vector of …
Self-adaptive system for the corporate area network resilience in the presence of botnet cyberattacks
S Lysenko, O Savenko, K Bobrovnikova… - … Conference, CN 2018 …, 2018 - Springer
The paper presents a self-adaptive system for the corporate area networks' resilience in the
presence of botnets' cyberattacks. The resilience is ensured by the adaptive reconfiguration …
presence of botnets' cyberattacks. The resilience is ensured by the adaptive reconfiguration …
Development of solar panels detector
V Golovko, A Kroshchanka… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
The paper describes the method of detection of roof-installed solar photovoltaic panels in
low-quality satellite photos. It is important to receive the geospatial data (such as country, zip …
low-quality satellite photos. It is important to receive the geospatial data (such as country, zip …
Compression of network traffic parameters for detecting cyber attacks based on deep learning
The approach to compress network traffic parameters in systems for detecting attacks on
telecommunication networks using the neural network and nonlinear principal components …
telecommunication networks using the neural network and nonlinear principal components …
[PDF][PDF] An Intelligent System of the Content Relevance at the Ex-ample of Films According to User Needs
In the work the methods of forming recommendations to user are analyzed, an overview of
existing recommender systems is implemented. The object of research is the process of …
existing recommender systems is implemented. The object of research is the process of …
Malware Detection By Distributed Systems with Partial Centralization
B Savenko, A Kashtalian, S Lysenko… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
The paper proposes approach to use new tools for malware detection in corporate networks,
which are distributed systems with partial centralization. To make decision about malware …
which are distributed systems with partial centralization. To make decision about malware …
Development of the quantitative method for automated text content authorship attribution based on the statistical analysis of N-grams distribution
V Lytvyn, V Vysotska, I Budz, Y Pelekh… - … -European Journal of …, 2019 - neliti.com
The peculiarities of the application of linguo-statistics technologies for the identification of
the style of the author of text content of scientific and technical profile are considered …
the style of the author of text content of scientific and technical profile are considered …
High performance adaptive system for cyber attacks detection
To increase the security of intrusion detection system, generalized structure of highly
performance adaptive system for cyber attacks detection was developed. To improve its …
performance adaptive system for cyber attacks detection was developed. To improve its …
[PDF][PDF] The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
G Markowsky, O Savenko, S Lysenko… - ICTERI …, 2018 - ceur-ws.org
The paper presents an approach for the metamorphic viruses detection based on its
obfuscation features analysis. The obfuscation features were obtained on the basis of the …
obfuscation features analysis. The obfuscation features were obtained on the basis of the …