PROCEEDINGS
Philosophy of Knowledge in the Scientific and Educational Activity of V.P. Shyrochin.
Generative Adversarial Networks and Their Applications.
Student Email and Data Storage System Based on Cloud Technologies.
Digital Signature Algorithm Using Polynomial Arithmetic over Galois Fields.
Method for Planning Verification of Volunteer Computing Results for Real-Time Tasks.
Modeling a Cyberattack Scenario Based on “Petya” and “NotPetya” Attacks.
Security Threats in Cloud Systems and Ways to Mitigate Them.
Security Measures in Internet of Things Systems.
Errors in Web Authentication Systems.
Computer Node Security System Based on Audit Mode.
Security and Privacy Vulnerabilities in Popular JavaScript Libraries.
Efficient Organization of Multilevel Hash Memory.
Method of evaluating the effectiveness of distributed computing system tools monitoring.
Reliability of Power Supply in Computer Systems and Methods for Its Improvement.
Finite Impulse Response Filters with Minimized Hardware Costs.
Algorithm and Architecture of a Module for Square Root Computation in FPGA.
Hardware Modeling of Ultrasonic Wave Propagation in a Solid Body.
Model of an Underwater Viable System Based on ATMEGA328 Microcontroller of Arduino Uno Platform.
Construction of a Queueing System Model for Recommendation of Queue Selection.
Implementation and research of neural networks of direct propagation on FPGA.
Optimization of Fall Detection Algorithm Based on Accelerometer and Gyroscope.
Method of Integrating Distributed Computing Based on Wearable Electronics.
Data Transmission from Sensors to a User’s Mobile Phone in the Context of the Internet of Things.
Secure Computation of Modular Exponentiation Using Additive Masking.
Review of Modern Technologies for Designing Digital Devices Based on Microprocessor Systems.
Experience of Deploying a Robotic Welding Complex.
Analysis of Addition Operation Efficiency in Non-Autonomous Mode.
Influence of Perceptual Blur on the Speed and Accuracy of Convolutional Neural Network Recognition.
Method for Real-Time Human Detection in Conditions of Degraded Visibility.
Speech Recognition Using Deep Learning Technologies.
Visual Data Processing Using Computer Vision Technology.
Real-Time Visual Multi-Tracking System.
Method for Optimized Search of Similar Binary Strings in a Given Set.
Method for Measuring Video Similarity.
Method for Processing Missing Data in Expert Survey Results.
Application of Artificial Neural Networks for Modeling AC Electrical Circuits.
Integration model for knowledge representation for semantic web.
Text Localization in Images Using Convolutional Neural Networks.
Diagnostics of Vehicle Technical Condition Using Neural Networks.
Modeling and Recognition of Hand Skeleton Gestures.
Use of Character Recognition Methods for Verification of Personal Signature Authenticity.
Methods for Integrating Augmented Reality Elements with an Image Recognition System
Elements of an Intelligent Software System for Supporting the Educational Process.
Cloud Application Selection Based on Analysis of Google, Amazon, and Apple Solutions.
Particle Swarm Optimization Algorithm for Finding the Shortest Path in a Telecommunications Network.
Method for Organizing Multipath Routing Using Partially Overlapping Paths.
User Interface Construction Model Using Microservice Architecture.
Modification of Energy-Efficient Traffic Management Algorithm in Hybrid Backbone SDN/IP Networks.
Quality Issues of Mobile Applications Based on Testing.
Application of Fine-Grained Parallelism to Improve Efficiency of Parallel and Distributed Computing.
Method for Monitoring Computational Resources in Software-Defined Networks.
Use of In-Memory Data Grid DBMS Architecture.
Method for Strong Authentication of Remote Users Based on Galois Field Algebra.
Parallel Computation Method of Modular Exponentiation Using Precomputation.