Search

Your search keyword '"Vyacheslav Kharchenko"' showing total 227 results

Search Constraints

Start Over You searched for: Author "Vyacheslav Kharchenko" Remove constraint Author: "Vyacheslav Kharchenko"
227 results on '"Vyacheslav Kharchenko"'

Search Results

1. Using AI tools in requirements engineering: analysis of capabilities and chatbot for validation

2. Вибір стратегій розгортання і забезпечення надійності рою БпЛА для підтримки комунікацій в умовах руйнувань

4. Multi-fragmental and multi-phase availability models of the safety-critical I&C systems with two-cascade redundancy

5. Deployment of a UAV swarm-based LiFi network in the obstacle-ridden environment: algorithms of finding the path for UAV placement

6. Using the FMEDA/FIT verification method to assess the cybersecurity of a programable logic controller: a new interpretation of the SIS principle

7. A Unified Approach to the Development of Technology-Based Software Quality Models on the Example of Blockchain Systems

8. Stochastic forecasting of variable small data as a basis for analyzing an early stage of a cyber epidemic

9. Risk-based cybersecurity assessment of augmented reality applications using IMECA analysis

10. Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique

11. Model and Method for Providing Resilience to Resource-Constrained AI-System

12. Methods and Software Tools for Reliable Operation of Flying LiFi Networks in Destruction Conditions

13. Hardware-Based Implementation of Algorithms for Data Replacement in Cache Memory of Processor Cores

14. Метод семантичної кластеризації з використанням інтеграції вдосконаленого алгоритму LDA й алгоритму BERT

15. Resilience-aware MLOps for AI-based medical diagnostic system

16. To 70 anniversary selebration of Professor S. I. Dotsenko

17. Robotic-biological systems for detection and identification of explosive ordnance: concept, general structure, and models

18. Candlestick Pattern Recognition in Cryptocurrency Price Time-Series Data Using Rule-Based Data Analysis Methods

19. Technologies for implementing of artificial intelligence as a service based on hardware accelerators

20. UAV Fleet as a Dependable Service for Smart Cities: Model-Based Assessment and Application

21. Basic model of non-functional characteristics for assessment of artificial intelligence quality

22. Heuristic self-organization of knowledge representation and development: analysis in the context of explainable artificial intelligence

23. Application of dynamic programming approach to computation of atomic functions

24. АНАЛІЗ МЕТОДІВ І РОЗРОБЛЕННЯ КОНЦЕПЦІЇ ГАРАНТОВАНОГО ВИЯВЛЕННЯ ТА РОЗПІЗНАВАННЯ ВИБУХОНЕБЕЗПЕЧНИХ ПРЕДМЕТІВ

25. Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection

26. Homo Digitus: Its Dependable and Resilient Smart Ecosystem

27. Flying Sensor and Edge Network-Based Advanced Air Mobility Systems: Reliability Analysis and Applications for Urban Monitoring

28. PRACTICAL ASPECTS OF OPERATING AND ANALYTICAL RELIABILITY ASSESSMENT OF FPGA-BASED I&C SYSTEMS

29. Resilience and Resilient Systems of Artificial Intelligence: Taxonomy, Models and Methods

30. Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis

31. Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks

32. Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems

33. UAV and IoT-Based Systems for the Monitoring of Industrial Facilities Using Digital Twins: Methodology, Reliability Models, and Application

34. IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency

35. Towards Trustworthy Safety Assessment by Providing Expert and Tool-Based XMECA Techniques

36. Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application

37. Digital Image Representation by Atomic Functions: The Compression and Protection of Data for Edge Computing in IoT Systems

38. ОЦІНЮВАННЯ БЕЗВІДМОВНОСТІ РЕЗЕРВОВАНИХ СТРУКТУР «2-з-3» і «1-з-2» З УРАХУВАННЯМ ЗАСОБІВ ОБРОБЛЕННЯ ІНФОРМАЦІЇ ТА КОМУНІКАЦІЙ

39. Invariant-Based Safety Assessment of FPGA Projects: Conception and Technique

40. МЕТОДИ ВИЯВЛЕННЯ БОТ-МЕРЕЖ В КОМП’ЮТЕРНИХ СИСТЕМАХ

41. USE OF A METHOD OF PASCAL OF CALCULATION OF CHECKSUMS IN NOISEPROOF CODING

42. Геп-аналіз оцінювання кібербезпеки за допомогою кейсів запевнення: техніка та приклад використання

43. Throughput Estimation with Regard to Airtime Consumption Unfairness in Mixed Data Rate Wi-Fi Networks

46. Metric-based method of software requirements correctness improvement

Catalog

Books, media, physical & digital resources