{"id":14983,"date":"2025-02-12T21:15:49","date_gmt":"2025-02-12T19:15:49","guid":{"rendered":"https:\/\/comsys.kpi.ua\/?page_id=14983"},"modified":"2026-04-30T11:57:54","modified_gmt":"2026-04-30T09:57:54","slug":"proceedings-icsfti-2018-2","status":"publish","type":"page","link":"https:\/\/comsys.kpi.dev-team.space\/en\/proceedings-icsfti-2018-2\/","title":{"rendered":"PROCEEDINGS ICSFTI 2018"},"content":{"rendered":"<p><strong>PROCEEDINGS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sem\u00ebn Shyrochin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ps_10-14_semenshyrochyn.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Philosophy of Knowledge in the Scientific and Educational Activity of V.P. Shyrochin.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mykhailo Novotarskyi, Anna Hulko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ps_15-20_novotarskyimykhailo.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Generative Adversarial Networks and Their Applications.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dmytro Oboznyi, Kateryna Poshtatska, Artem Volokyta, Heorhii Lutskyi.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ps_21-25_obozniydmytro.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Student Email and Data Storage System Based on Cloud Technologies.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr Markovskyi, Oleksandr Serbin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_26-34_markovskyioleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Signature Algorithm Using Polynomial Arithmetic over Galois Fields.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Marich Volodymyr, Volokyta Artem.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_35-41_marychvolodymyr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Planning Verification of Volunteer Computing Results for Real-Time Tasks.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Inna Stetsenko, Dmytro Ohorodnikov.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_42-51_innastetsenko.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Modeling a Cyberattack Scenario Based on \u201cPetya\u201d and \u201cNotPetya\u201d Attacks.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tetyana Odyne\u0446\u044c, Kostiantyn Ostapchenko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_52-56_odynetstetiana.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Security Threats in Cloud Systems and Ways to Mitigate Them.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vladyslav Trotsenko, Kostiantyn Ostapchenko.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/sec_57-62_trotsenkovladyslav.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Security Measures in Internet of Things Systems.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Serhii Podtyopa.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_63-68_podtopaserhii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Errors in Web Authentication Systems.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Valerii Symonenko, Oleksandr Sliusar\u0435\u043d\u043a\u043e.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_69-72_valeryjsymonenko.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Computer Node Security System Based on Audit Mode.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vitalii Tyzun.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_73-76_tyzunvitalii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Security and Privacy Vulnerabilities in Popular JavaScript Libraries.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr Markovskyi, Shagin Abbasi, Viktoriia Maksymuk.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/sec_77-82_markovskyioleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Efficient Organization of Multilevel Hash Memory.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr P. Markovskyi, Emil Ruslanovych Iskakov, H.V. Harasymovych.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/sec_83-88_markovskyioleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Combinatorial Analysis of Boolean Functions and Special Classes for Cryptographic Information Security Systems.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Artem Volokyta, Artem Kaplunov, Heorhii Lutskyi.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<a href=\"\/wp-content\/uploads\/2025\/02\/sec_89-93_artemvolokyta.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method of evaluating the effectiveness of distributed computing system tools monitoring.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oksana Kuchmii, Viktor Korneichuk, Anna Doroshenko.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/sec_94-98_kuchmiyoksana.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Reliability of Power Supply in Computer Systems and Methods for Its Improvement.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anatolii Serhiienko, Safwan Hussein Kadir, Anastasiia Serhiienko.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/rt_99-103_anatolysergienko.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Finite Impulse Response Filters with Minimized Hardware Costs.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anatolii Serhiienko, Muhamed Jamal Hassan, Pavlo Serhiienko.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/rt_104-108_anatolysergienko.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Algorithm and Architecture of a Module for Square Root Computation in FPGA.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anatolii Serhiienko, Mustafa Recar Qasim.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/rt_109-113_anatolysergienko.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Hardware Modeling of Ultrasonic Wave Propagation in a Solid Body.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dmytro Demchuk, Valerii Symonenko.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/rt_114-118_demchukdmytro.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Development of an Automated Irrigation Forecasting System for Agricultural Crops Using Modular Devices.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nataliia Danilenko, Andrii Symonenko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_119-127_danilenkonataliia.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Model of an Underwater Viable System Based on ATMEGA328 Microcontroller of Arduino Uno Platform.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vladyslav Paniivan.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_128-133_paniivanvladyslav.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Construction of a Queueing System Model for Recommendation of Queue Selection.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Volodymyr Shymkovych, Yurii Berdnyk.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<a href=\"\/wp-content\/uploads\/2025\/02\/rt_134-140_volodymyrshymkovych.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Implementation and research of neural networks of direct propagation on FPGA.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Serhii Buhai, Yurii Hordiienko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_141-147_serhiibuhai.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Optimization of Fall Detection Algorithm Based on Accelerometer and Gyroscope.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Serhii Buhai, Yurii Hordiienko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_148-153_serhiibuhai.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method of Integrating Distributed Computing Based on Wearable Electronics.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mykyta Kyrychek, Volokyta Artem.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/rt_154-158_kyrychekmykyta.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Improving the Transition into a Meditative State Using a Mobile Application with LED Light Control Elements.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yaroslav Kornaha, Alona Vitiuk.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_159-164_yaroslavkornaga.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Assessment of Stable Grasp Quality Based on 3D Reconstruction of a Target Object from Monocular Camera Images.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksii Hranuk, Yurii Hordiienko.<\/li>\n<\/ul>\n\n\n\n<p>\u00a0<a href=\"\/wp-content\/uploads\/2025\/02\/rt_165-170_oleksiihraniuk.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Data Transmission from Sensors to a User\u2019s Mobile Phone in the Context of the Internet of Things.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr P. Markovskyi, Van Huai, Halyna Harasymovych.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_171-176_markovskyioleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Secure Computation of Modular Exponentiation Using Additive Masking.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Halyna Harasymovych, Volodymyr Kuts.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_177-183_kutsvolodymyr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Protecting Modular Exponentiation Operands from Reconstruction via Power Consumption Analysis.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mykola Serpuchenko, Iryna Klymenko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_184-193_serpuchenkomykola.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Review of Modern Technologies for Designing Digital Devices Based on Microprocessor Systems.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pavlo Solianikov.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_194-200_solyanikovpavlo.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Experience of Deploying a Robotic Welding Complex.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>V. I. Zhabin, A. H. Tokar.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/rt_201-208_valeriizhabin.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Analysis of Addition Operation Efficiency in Non-Autonomous Mode.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yurii Tymoshyn, Serhii Orlenko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_209-214_timoshinyuri.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Influence of Perceptual Blur on the Speed and Accuracy of Convolutional Neural Network Recognition.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pavlo Pylypenko, Oleksandr Panteleiev, Volodymyr Oliinyk.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_215-219_pylypenkopavlo.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Real-Time Human Detection in Conditions of Degraded Visibility.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dmytro Smishnyi, Oleksii Aleshchenko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_220-224_dmytrosmishnyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Speech Recognition Using Deep Learning Technologies.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Denys Smishnyi, Oleksii Aleshchenko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_225-229_dmytrosmishnyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Visual Data Processing Using Computer Vision Technology.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr Panteleiev, Pavlo Pylypenko, Volodymyr Oliinyk.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_230-234_pantelieievoleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Real-Time Visual Multi-Tracking System.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bohdan Buhai, Yurii Hordiienko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_235-238_buhaibohdan.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Optimized Search of Similar Binary Strings in a Given Set.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Bohdan Buhai, Yurii Hordiienko.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_239-245_buhaibohdan.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Measuring Video Similarity.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A. O. Boldak, D. V. Lysenko, M. Ye. Khanin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_246-250_boldakandriy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Processing Missing Data in Expert Survey Results.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Andrii Lohvynchuk, Oleksii Aleshchenko, Oleksandr Zaliotnov.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_251-255_lohvynchukandrii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Application of Artificial Neural Networks for Modeling AC Electrical Circuits.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Danylo Sergeiev.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_256-260_danylosergeiev.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Integration model for knowledge representation for semantic web.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yaroslav Kornaha, Mykola Shymanskyi, Andrii Barabash.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_261-264_yaroslavkornaga.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Text Localization in Images Using Convolutional Neural Networks.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yaroslav Kornaha, Yurii Tilniak.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_265-269_yaroslavkornaga.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Diagnostics of Vehicle Technical Condition Using Neural Networks.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vadym Mukhin, Yaroslav Kornaha, Andrii Liubivyi.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_270-275_vadimmukhin.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Modeling and Recognition of Hand Skeleton Gestures.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yaroslav Podzirei, Pavlo Rehida (Clustering).<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_276-280_yaroslavpodzirei.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Dimensionality Reduction of Object Features in Machine Learning and Data Visualization (t-SNE Method).<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vadym Shchur, Viktor Steshin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_281-285_vadymshchur.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Use of Character Recognition Methods for Verification of Personal Signature Authenticity.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksii Kolomiiets.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_286-290_kolomiietsoleh.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Methods for Integrating Augmented Reality Elements with an Image Recognition System<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Viktor Poriiev.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/ai_291-298_porev.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Elements of an Intelligent Software System for Supporting the Educational Process.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Andrii Yarych.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_299-303_yarychandriy.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Application Selection Based on Analysis of Google, Amazon, and Apple Solutions.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Maksym Bondarchuk, Yurii Zorin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_304-309_zorinyury.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Particle Swarm Optimization Algorithm for Finding the Shortest Path in a Telecommunications Network.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr Kaliuzhnyi, Yurii Kulakov, Mykhailo Dibrova.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_310-314_kaliuzhnyioleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Organizing Multipath Routing Using Partially Overlapping Paths.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Andrii Buhai, Volodymyr Oliinyk<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_315-318_bugaiandrii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">User Interface Construction Model Using Microservice Architecture.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yurii Kulakov, Yevhenii Shudrenko, Yurii Barynin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_319-325_kulakovyurii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Modification of Energy-Efficient Traffic Management Algorithm in Hybrid Backbone SDN\/IP Networks.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yurii Vynohradov, Mykola Baydykov.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_326-329_vinogradovyurii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Quality Issues of Mobile Applications Based on Testing.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Valerii Demchyk, Oleksandr Korochkin.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_330-336_demchykvalerii.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Application of Fine-Grained Parallelism to Improve Efficiency of Parallel and Distributed Computing.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Yurii Kulakov, Yevhenii Lopushen, Ruslana Berest.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_337-341_jurijkulakov.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Monitoring Computational Resources in Software-Defined Networks.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr Ripnevskyi.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_342-346_ripnevskyjoleksandr.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Use of In-Memory Data Grid DBMS Architecture.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr Markovskyi, Viktoriia Maksymuk.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_347-354_oleksandrmarkovskyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Strong Authentication of Remote Users Based on Galois Field Algebra.<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Oleksandr P. Markovskyi, Anastasiia Bilashevska.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_355-364_oleksandrmarkovskyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Method for Correcting Multiple Errors in Digital Data Transmission Channels with Spectral Modulation.<\/a>\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Liudmyla Mishchenko, Yurii Vynohradov.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_365-371_mishchenkoliudmyla.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Parallel Computation Method of Modular Exponentiation Using Precomputation.<\/a>\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Olena Zhdanova, Alla Kogan, Yurii Kulakov, Maia Sperkach.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/gn_372-377_elenazhdanova.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Graph Partitioning into Subgraphs.<\/a>\u00a0<br><\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"33\" height=\"34\" src=\"https:\/\/comsys.kpi.ua\/wp-content\/uploads\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-12992\" style=\"width:25px;height:auto\" srcset=\"https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image.png 33w, https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image-12x12.png 12w\" sizes=\"(max-width: 33px) 100vw, 33px\" \/><\/figure>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/icsfti2018-3.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ICSFTI2018<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"33\" height=\"34\" src=\"https:\/\/comsys.kpi.ua\/wp-content\/uploads\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-12992\" style=\"width:25px;height:auto\" srcset=\"https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image.png 33w, https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image-12x12.png 12w\" sizes=\"(max-width: 33px) 100vw, 33px\" \/><\/figure>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/posvidchennya-pro-reyestraciyu-konferenciyi.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Certificate of Conference Registration<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-3 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"33\" height=\"34\" src=\"https:\/\/comsys.kpi.ua\/wp-content\/uploads\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-12992\" style=\"width:25px;height:auto\" srcset=\"https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image.png 33w, https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image-12x12.png 12w\" sizes=\"(max-width: 33px) 100vw, 33px\" \/><\/figure>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/priklad-dopovidi-na-konferenciyu.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Example of a conference report<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"33\" height=\"34\" src=\"https:\/\/comsys.kpi.ua\/wp-content\/uploads\/2025\/02\/image.png\" alt=\"\" class=\"wp-image-12992\" style=\"width:25px;height:auto\" srcset=\"https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image.png 33w, https:\/\/comsys.kpi.dev-team.space\/wp-content\/uploads\/2025\/02\/image-12x12.png 12w\" sizes=\"(max-width: 33px) 100vw, 33px\" \/><\/figure>\n\n\n\n<p><a href=\"\/wp-content\/uploads\/2025\/02\/programa-konferenciyi-icsfti2018.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ICSFTI2018 Conference Program<\/a><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>PROCEEDINGS Philosophy of Knowledge in the Scientific and Educational Activity of V.P. Shyrochin. Generative Adversarial Networks and Their Applications. Student Email and Data Storage System Based on Cloud Technologies. Digital Signature Algorithm Using Polynomial Arithmetic over Galois Fields. Method for Planning Verification of Volunteer Computing Results for Real-Time Tasks. Modeling a Cyberattack Scenario Based on&#8230;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-14983","page","type-page","status-publish","hentry","page--item"],"acf":[],"_links":{"self":[{"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/pages\/14983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/comments?post=14983"}],"version-history":[{"count":2,"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/pages\/14983\/revisions"}],"predecessor-version":[{"id":17520,"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/pages\/14983\/revisions\/17520"}],"wp:attachment":[{"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/media?parent=14983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/categories?post=14983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/comsys.kpi.dev-team.space\/en\/wp-json\/wp\/v2\/tags?post=14983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}