Impact of Stemming on Efficiency of Messages Likelihood Definition in Telegram Newsfeeds
O Barkovska, P Rusnak, V Tkachov… - 2022 IEEE 3rd KhPI …, 2022 - ieeexplore.ieee.org
The work is dedicated to the development of the system to define the credibility of text
messages posted in Telegram newsfeeds. The topicality of the work is stipulated by the …
messages posted in Telegram newsfeeds. The topicality of the work is stipulated by the …
[PDF][PDF] Computer Linguistic Systems Design and Development Features for Ukrainian Language Content Processing.
V Vysotska - COLINS (3), 2024 - ceur-ws.org
The paper describes the developed IT (information technology) processing of Ukrainian-
language text content, unlike the existing ones, which supports the modularity principle of …
language text content, unlike the existing ones, which supports the modularity principle of …
[PDF][PDF] Modern State and Prospects of Information Technologies Development for Natural Language Content Processing.
V Vysotska - COLINS (2), 2024 - ceur-ws.org
The study aims to develop a new method of building computer linguistic systems (CLS) for
processing Ukrainian-language text content for solving various NLP problems based on the …
processing Ukrainian-language text content for solving various NLP problems based on the …
Identifying Accent and Origin of English Language Users by Voice and Text Analysis, NLP and Machine Learning Technology
V Vysotska, O Nagachevska, N Mozol… - 2024 IEEE 17th …, 2024 - ieeexplore.ieee.org
Identifying accents and regional origins in English language users through voice and text
analysis has profound implications for linguistics, forensic science, and user experience …
analysis has profound implications for linguistics, forensic science, and user experience …
Fast Two-Factor Authentication Method in Systems With a Centralized User's Database
work proposes a two-factor authentication method by integrating the second factor into the
authentication service in system with a centralized user's database. This approach made it …
authentication service in system with a centralized user's database. This approach made it …
[PDF][PDF] User authentication method information and telecommunication systems based on cascading multimodal biometric identification
V Trysnyuka, O Lebida, K Smetaninb… - CEUR Workshop …, 2021 - ceur-ws.org
Efficiency of information and telecommunication systems significantly depends on the strong
control over the provision of authorized access to them. However, the constant improvement …
control over the provision of authorized access to them. However, the constant improvement …
Розробка пристрою моделювання захищеного каналу зв'язку стандарту GSM
В Триснюк, К Сметанін… - Scientific Collection « …, 2023 - archive.interconf.center
Ця розробка націлена на створення пристрою моделювання каналу зв'язку для
стандарту мобільного зв'язку GSM. Проект передбачає дослідження та реалізацію …
стандарту мобільного зв'язку GSM. Проект передбачає дослідження та реалізацію …