Articles by keywords "Metric"

Identification of a person in uniform based on video stream data using the YOLO convolutional neural network

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 5
  • 275
  • Pages: 176-186

VOICE IDENTIFICATION METHOD BASED ON MACHINE LEARNING

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 510
  • Pages: 143-154

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 3
  • 519
  • Pages: 68-79

Development of a metric model of information events in the information security management system of economic activities

Critical information infrastructure security
  • Year: 2021
  • Issue: 3
  • 0
  • 666
  • Pages: 96-107

DIGITALIZATION AND IDENTIFICATION OF ECG SIGNALS USING WAVELET TECHNOLOGIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 535
  • Pages: 82-97

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 898
  • Pages: 117-130

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 6
  • 799
  • Pages: 44-56

Application of machine learning methods in the problem of searching area of interest for biometric identification based on the pattern of palm veins

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 730
  • Pages: 128-138

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 6
  • 900
  • Pages: 34-47

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 14
  • 897
  • Pages: 9-20

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 24
  • 964
  • Pages: 20-29