Showing: 1 - 6 of 19 RESULTS
Information Technology and CybersecurityMethodology of satellite monitoring of deforestation based on Sentinel-2A/B data

Methodology of satellite monitoring of deforestation based on Sentinel-2A/B data

Methodology of satellite monitoring of deforestation based on Sentinel-2A/B data Dmytro Mozghovyi ORCID: https://orcid.org/0000-0003-1632-1565 Oles Honchar Dnipro National University Volodymyr Korchynskyi ORCID: https://orcid.org/0000-0001-6621-0631 Dniprovsk State Technical University Dmytro Svynarenko ORCID: https://orcid.org/0000-0003-3179-9129 University of Customs and Finance Purpose. The main goal of the research was the development and testing of the methodology of automated processing and analysis of multispectral satellite images of medium spatial resolution for the detection of deforestation. Design / Method / Approach. Experimental testing of the proposed methodology …

Information Technology and CybersecurityVectorization of calculations for code optimization in the Python programming language

Vectorization of calculations for code optimization in the Python programming language

Vectorization of calculations for code optimization in the Python programming language Oleksii Zemlianyi ORCID: https://orcid.org/0009-0001-6157-8725 Oles Honchar Dnipro National University Oleh Baibuz ORCID: https://orcid.org/0000-0001-7489-6952 Oles Honchar Dnipro National University Purpose. The purpose of this study is to explore vectorization as an engineering technique to improve the performance and readability of Python code, particularly in data processing tasks. We aim to demonstrate the benefits of vectorization through practical examples involving the handling of missing data. Design / Method / Approach. To …

Information Technology and CybersecurityCyber ​​security of critical infrastructure: challenges of innovation and threats of digital technologies

Cyber ​​security of critical infrastructure: challenges of innovation and threats of digital technologies

Cyber ​​security of critical infrastructure: challenges of innovation and threats of digital technologies Anna Andrukh ORCID: https://orcid.org/0009-0001-7175-8199 State University of Trade and Economics Yurii Yurchenko ORCID: https://orcid.org/0000-0002-8047-7647 State University of Trade and Economics Purpose. The article aims to explore the characteristics, development prospects, and potential threats associated with the cybersecurity of critical infrastructure. As critical systems become increasingly dependent on digital technologies and inter-connected networks, safeguarding these infrastructures from cyberattacks is par-amount. Design / Method / Approach. This research adopts …

Information Technology and CybersecurityApplication of data-level parallelism to improve the efficiency of numerical methods

Application of data-level parallelism to improve the efficiency of numerical methods

Application of data-level parallelism to improve the efficiency of numerical methods Oleg Zhulkovskyi ORCID: https://orcid.org/0000-0003-0910-1150 Dniprovsk State Technical University Inna Zhulkovska ORCID: https://orcid.org/0000-0002-6462-4299 University of Customs and Finance Hlib Vokhmianin ORCID: https://orcid.org/0000-0002-9582-5990 Dniprovsk State Technical University Illia Tykhonenko ORCID: https://orcid.org/0009-0006-4158-0971 University of Customs and Finance Purpose. The research is dedicated to examining the potential of data-level parallelism technology for optimizing the efficiency of computational algorithms used in solving systems of linear algebraic equations (SLAE). Design / Method / Approach. The …

Information Technology and CybersecurityInternet of Things (IoT) technologies: features, development prospects and potential threats

Internet of Things (IoT) technologies: features, development prospects and potential threats

Internet of Things (IoT) technologies: features, development prospects and potential threats Daria Margaza ORCID: https://orcid.org/0009-0007-3026-7709 State University of Trade and Economics Yurii Yurchenko ORCID: https://orcid.org/0000-0002-8047-7647 State University of Trade and Economics Purpose. The article aims to explore the characteristics, development prospects, and possible threats associated with Internet of Things (IoT) technologies. With IoT rapidly integrating into multiple industries, understanding both its advantages and risks is crucial for future advancements. Design / Method / Approach. This research adopts a conceptual approach, …

Information Technology and CybersecurityPrediction of Network Threats and Attacks by Mathematical Simulation

Prediction of Network Threats and Attacks by Mathematical Simulation

Prediction of Network Threats and Attacks by Mathematical Simulation Daniil Doroshenko ORCID: https://orcid.org/0009-0008-7767-0420 Oles Honchar Dnipro National University Purpose. The purpose of the article is a comprehensive study of modern methods of mathematical modeling of network threats and attacks, as well as studying their effectiveness. Design / Method / Approach. The research uses mathematical methods such as probability theory, game theory, graph models, and statistical approaches to build models that allow to reproduce the dynamics of threats in real networks. The methodology …