Adaptive resource allocation method for data processing and security in cloud environment

I Petrovska, H Kuchuk - Advanced Information Systems, 2023 - ais.khpi.edu.ua
Subject of research: methods of resource allocation of the cloud environment. The purpose
of the research: to develop a method of resource allocation that will improve the security of …

CONSTRUCTION OF A MODEL OF STEGANOGRAPHIC EMBEDDING OF THE UAV IDENTIFIER INTO ADS-B DATA.

S Semenov, M Zhang, O Mozhaiev… - Eastern-European …, 2023 - search.ebscohost.com
Secure data exchange in the control system of unmanned aerial vehicles (UAVs) is an
important aspect for preventing unauthorized access and safety of aerial vehicles. Given the …

[PDF][PDF] Practical principles of integrating artificial intelligence into the technology of regional security predicting

O Shefer, O Laktionov, V Pents, A Hlushko… - Advanced Information …, 2024 - ais.khpi.edu.ua
Objective. The aim is to enhance the efficiency of diagnostics for determining the level of air
attack safety through the practical integration principles of artificial intelligence …

[PDF][PDF] Decomposition of integrated high-density IoT Data Flow

H Kuchuk, K Ye, N Dotsenko… - Advanced …, 2024 - repository.kpi.kharkov.ua
Topicality. The concept of fog computing made it possible to transfer part of the data
processing and storage tasks from the cloud to fog nodes to reduce latency. But in batch …

Ensuring the functional stability of the information system of the power plant on the basis of monitoring the parameters of the working condition of computer devices

O Barabash, O Svynchuk, I Salanda… - Advanced Information …, 2024 - ais.khpi.edu.ua
The functional stability of the information system of the power plant is ensured by a complex
of processes and mechanisms that are capable of maintaining the normal operation of the …

Complex method of determining the location of social network agents in the interests of information operations

S Herasymov, A Tkachov, S Bazarnyi - Advanced Information …, 2024 - ais.khpi.edu.ua
The researcher developed a method for determining the location of social network agents in
the interest of conducting an information operation based on a comprehensive approach to …

Modeling of the external magnetic field of electric machines

L Levchenko, N Ausheva, N Karaieva… - Advanced Information …, 2024 - ais.khpi.edu.ua
Powerful electric machines–such as electric generators, electric motors generate a magnetic
field of great tension. These fields negatively effect on personnel and can to violate the …

INTEGRATION OF IOT WITH CLOUD, FOG, AND EDGE COMPUTING: A REVIEW

H Kuchuk, E Malokhvii - Advanced Information Systems, 2024 - ais.khpi.edu.ua
Purpose of review. The paper provides an in-depth exploration of the integration of Internet
of Things (IoT) technologies with cloud, fog, and edge computing paradigms, examining the …

Sequential Series-Based Prediction Model in Adaptive Cloud Resource Allocation for Data Processing and Security

I Petrovska, H Kuchuk, N Kuchuk… - 2023 13th …, 2023 - ieeexplore.ieee.org
A developed adaptive forecasting model for cloud resource allocation is presented. It
employs principal component analysis on a sequence of virtual machine (VM) requests …

Applying edge computing in the execution IoT operative transactions

N Kuchuk, S Kashkevich, V Radchenko… - Advanced Information …, 2024 - ais.khpi.edu.ua
Topicality. IoT information processing is usually performed in a cloud environment. However,
this creates problems associated with delays in data transfer to the cloud. It is especially …