[PDF][PDF] Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements.
The introduction of artificial intelligence technologies in the education process has become
an urgent need at the current pace of development of society. The integration of various …
an urgent need at the current pace of development of society. The integration of various …
Computer model of radio frequency power amplifier
O Pliushch, Y Kravchenko… - 2021 IEEE 3rd …, 2021 - ieeexplore.ieee.org
Processes in output circuits of radiofrequency power amplifiers are considered. It is shown
that traditional analytical methods of their performance analysis are complex and time …
that traditional analytical methods of their performance analysis are complex and time …
[PDF][PDF] Mathematical Support of the Task of Determining the Strategic Directions of Development and Priorities of the Organization.
The situation of realization a strategic session in a medium or large system organization is
considered. Up to 20 top managers-experts take part in the strategic session. In order to …
considered. Up to 20 top managers-experts take part in the strategic session. In order to …
Monitoring of the condition of agricultural crops based on the use of clustering methods
H Hnatiienko, V Domrachev, V Saiko - 15th International Conference …, 2021 - earthdoc.org
The rapid change of weather, change of climate and activity of wreckers, today negatively
influence on the modern state of agricultural production. Efficiency of application of classic …
influence on the modern state of agricultural production. Efficiency of application of classic …
Model of the sensor network based on unmanned aerial vehicle
O Trush, I Kravchenko, M Trush… - 2021 IEEE 3rd …, 2021 - ieeexplore.ieee.org
This article identifies, reviews and investigates mathematical model for a new type of
communication networks-flying sensor networks, which due to the widespread use of WTN …
communication networks-flying sensor networks, which due to the widespread use of WTN …
[PDF][PDF] Mathematical models and methods for decision coordination in critical infrastructure operations
This paper considers the problems associated with ensuring the functioning of the critical
infrastructure network. It is proposed to consider a poorly formalized system of ensuring the …
infrastructure network. It is proposed to consider a poorly formalized system of ensuring the …
The concept of analysis the functional sustainability of the organizational system
О Гнатієнко, О Кучанський - Управління розвитком складних …, 2023 - mdcs.knuba.edu.ua
The support system concept is described as a solution for ensuring the functional stability of
the organizational system and approaching the mathematical model of functional stability …
the organizational system and approaching the mathematical model of functional stability …
Methodology for Determining Long-Term State Development Scenarios
V Bychenkov, O Levchuk, Y Kirpichnikov… - 2021 IEEE 3rd …, 2021 - ieeexplore.ieee.org
The method of scenario forecasting of state development in the long term has been
improved. The improved method solves the following tasks: determining the degree of …
improved. The improved method solves the following tasks: determining the degree of …
[PDF][PDF] Quantitative Assessment of the Criticality Level of Organizational System Elements.
H Hnatiienko, T Babenko - ITS, 2022 - ceur-ws.org
This paper discusses various aspects of determining quantitative indicators of the criticality
level for elements of a complex organizational system. The concept of the criticality level of …
level for elements of a complex organizational system. The concept of the criticality level of …
[PDF][PDF] Methodological Approach to Assessing Information Security of Critical Infrastructure Objects.
Y Samokhvalov, M Brailovskyi, B Zhuravel - IT&I, 2023 - ceur-ws.org
Currently, the most common approaches to assessing information security are verification
and risk based. However, information security metrics in these approaches are not …
and risk based. However, information security metrics in these approaches are not …