Search for visual objects by request in the form of a cluster representation for the structural image description

V Gorokhovatskyi, I Tvoroshenko… - Advances in Electrical …, 2023 - advances.vsb.cz
The key task of computer vision is the recognition of visual objects in the analysed image.
This paper proposes a method of searching for objects in an image, based on the …

Machine learning and decision support system on credit scoring

G Teles, JJPC Rodrigues, K Saleem, S Kozlov… - Neural Computing and …, 2020 - Springer
Among the numerous alternatives used in the world of risk balance, it highlights the
provision of guarantees in the formalization of credit agreements. The objective of this paper …

Code-based public-key cryptosystems for the post-quantum period

A Kuznetsov, I Svatovskij, N Kiyan… - 2017 4th International …, 2017 - ieeexplore.ieee.org
Code-Based Public-Key Cryptosystems were been considered in this work. In addition, the
current state, the existing contradictions and prospects of practical use for the post-quantum …

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

SS Chaeikar, M Alizadeh, MH Tadayon… - … Journal of Intelligent …, 2022 - Wiley Online Library
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …

Algorithms of data processing in the residual classes system

A Yanko, S Koshman… - 2017 4th International …, 2017 - ieeexplore.ieee.org
The coding of remainders number which submitted the appropriate modules of residual
classes system (RCS), made with data from complete system of the smallest non-negative …

[PDF][PDF] Method of Data Control in the Residue Classes.

V Krasnobayev, A Kuznetsov, A Kononchenko… - CMIS, 2019 - ceur-ws.org
Methods of data control in the residue classes are considered in the article. The main
advantage of non-positional notation in the residue classes lays in the possibility of an …

[PDF][PDF] Methods for Comparing Numbers in Non-Positional Notation of Residual Classes.

V Krasnobayev, A Kuznetsov, M Zub, K Kuznetsova - CMIS, 2019 - ceur-ws.org
Methods for optimizing computations in computer systems and components that are based
on the use of arithmetic transformations in the system of residual classes are considered …

Adaptive learning for single-output complex systems via data augmentation and data type identification

L Chang, H Liu, L Zhang, X Xu, J Jiang - Applied Soft Computing, 2023 - Elsevier
An adaptive learning approach is proposed for single-output complex systems (SOCS) with
two features: data augmentation (A) and data type identification (T). Data augmentation is …

Calculation of expense for local computer networks

S Kavun, A Zamula, I Mikheev - 2017 4th International …, 2017 - ieeexplore.ieee.org
Different concepts of local computer network technological scheme and its economic
justification with some appropriate calculations have been shown in this article. In our article …

Intelligent management of the enterprise personnel security system

V Panchenko, A Zamula, S Kavun… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
The analysis of the categorical apparatus in the field of enterprise personnel security was
carried out, which allowed to statistically substantiate the urgency and necessity of …