Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Artem Volokyta"'
Autor:
Artem Volokyta
Publikováno v:
Technical Sciences and Technologies. :130-139
Publikováno v:
TECHNICAL SCIENCES AND TECHNOLOGIES. :83-91
The article discusses a data augmentation method based on generative adversarial networks to improve the accuracy of image classification by convolutional neural networks. A comparative analysis of the proposed method with classical image augmentatio
Publikováno v:
Технічні науки та технології; № 1(15) (2019): Технічні науки та технології; 134-144
Technical sciences and technology; No. 1(15) (2019): Technical sciences and technologies; 134-144
Технические науки и технологии; № 1(15) (2019): Технические науки и технологии; 134-144
Technical sciences and technology; No. 1(15) (2019): Technical sciences and technologies; 134-144
Технические науки и технологии; № 1(15) (2019): Технические науки и технологии; 134-144
Urgency of the research. The task of increasing fault tolerance is one of the key tasks in constructing a computing system and in modernizing an already existing one. Particular attention is paid to it when building multicomputer systems or clusters.
Autor:
Bohdan Ivanishchev, Pavlo Rehida, Oleksandr Honcharenko, Artem Kaplunov, Artem Volokyta, Heorhii Loutskii, Dmytro Korenko
Publikováno v:
Advances in Computer Science for Engineering and Education IV ISBN: 9783030804718
Scaling high performance computer systems needs increasing the fault tolerance at the design stage of a topology. There are several approaches of designing simple fast routing with fault tolerance. One of effective approach is to ensure fault toleran
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e022d789c385bf956d98383b7fba8930
https://doi.org/10.1007/978-3-030-80472-5_27
https://doi.org/10.1007/978-3-030-80472-5_27
Autor:
Artem Kaplunov, Oleksandr Honcharenko, Bohdan Ivanishchev, Heorhii Loutskii, Pavlo Rehida, Artem Volokyta
Publikováno v:
2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).
Topology characteristics of multicomputer systems and clusters determine the complexity of the routing algorithm and the time of data exchange. Providing a minimum degree and diameter (minimum cost) and maximum fault tolerance is also desirable. Cart
Publikováno v:
Advances in Electrical and Computer Engineering, Vol 18, Iss 2, Pp 117-122 (2018)
In this paper we propose a new clustering method based on alpha-procedure that differs with proactive computing of graphs and other possible factors superposition of classification. This approach does not increase the calculation time but obtains a p
Publikováno v:
TECHNICAL SCIENCES AND TECHNOLOG IES. :110-115
Urgency of the research. The problem of natural language generation is becoming more actual in recent days due to the growing demand for automated generation of object descriptions, article excerpts, news summaries, passages in microblogging services
Publikováno v:
Advances in Computer Science for Engineering and Education II ISBN: 9783030166205
The main problem of modern computing systems is a low bandwidth of message switching channels. The reason for this is rapid growth of processor element’s bandwidth relatively to link’s bandwidth. Therefore, a lot of attention is now being given t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d4b02f2796f3b8dc7d745af551304908
https://doi.org/10.1007/978-3-030-16621-2_31
https://doi.org/10.1007/978-3-030-16621-2_31
Publikováno v:
Information and Telecommunication Sciences; № 2 (2018); 44-53
Information and telecommunication sciences : international research journal, 2018, Vol. 9, N. 2(17)
Information and telecommunication sciences : international research journal, 2018, Vol. 9, N. 2(17)
Проблематика. Для программирования встроенных систем чаще всего используются языки С или С ++. К основным недостаткам относят: отсутстви
Publikováno v:
Tehnologìčnij Audit ta Rezervi Virobnictva, Vol 3, Iss 1(29), Pp 40-46 (2016)
The object of the study is security monitoring system of distributed computing system. There is a problem detecting intrusions into computing systems, namely the lack of an effective way of monitoring that will detect distributed attacks for the anom