{"id":1100,"date":"2021-01-15T20:43:24","date_gmt":"2021-01-15T18:43:24","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1100"},"modified":"2021-03-23T12:19:10","modified_gmt":"2021-03-23T10:19:10","slug":"%d1%81%d0%be%d0%b1%d0%bb%d0%b8%d0%b2%d0%be%d1%81%d1%82%d1%96-%d1%96%d0%bd%d1%82%d0%b5%d0%bb%d0%b5%d0%ba%d1%82%d1%83%d0%b0%d0%bb%d1%96%d0%b7%d0%b0%d1%86%d1%96%d1%97-%d0%b2-%d1%80%d0%be%d0%b1%d0%be","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1100","title":{"rendered":"\u041e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0432 \u0440\u043e\u0431\u043e\u0442\u043e\u0442\u0435\u0445\u043d\u0456\u0446\u0456 \u0442\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457"},"content":{"rendered":"<p style=\"text-align: center;\">\u041e\u0421\u041e\u0411\u041b\u0418\u0412\u041e\u0421\u0422\u0406 \u0406\u041d\u0422\u0415\u041b\u0415\u041a\u0422\u0423\u0410\u041b\u0406\u0417\u0410\u0426\u0406\u0407 \u0412 \u0420\u041e\u0411\u041e\u0422\u041e\u0422\u0415\u0425\u041d\u0406\u0426\u0406 \u0422\u0410 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407<\/p>\n<p style=\"text-align: center;\">INTELLECTUALIZATION FEATURES IN ROBOTICS AND INFORMATION SECURITY SYSTEMS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/25-3.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 154-157. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0422.\u0411. \u041c\u0410\u0420\u0422\u0418\u041d\u042e\u041a, \u0410.\u0413. \u0411\u0423\u0414\u0410, \u0410.\u0412. \u041a\u041e\u0416\u0415\u041c\u2019\u042f\u041a\u041e, \u041b.\u041c. \u041a\u0423\u041f\u0415\u0420\u0428\u0422\u0415\u0419\u041d<br \/>\n\u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nT.B. MARTYNIUK, A.G. BUDA, A.V. KOZHEMIAKO, L.M. KUPERSHTEIN<br \/>\nVinnytsia National Technical University<br \/>\n<strong>DOI:<\/strong> https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-154-1587<br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 22. 01.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 14.02.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u041e\u0431\u043b\u0430\u0441\u0442\u044c \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0442\u0430 \u0437\u0430\u0441\u043e\u0431\u0456\u0432 \u0448\u0442\u0443\u0447\u043d\u043e\u0433\u043e \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443 \u0443 \u043d\u0430\u0448 \u0447\u0430\u0441 \u0454 \u043d\u0430\u0434\u0437\u0432\u0438\u0447\u0430\u0439\u043d\u043e \u0448\u0438\u0440\u043e\u043a\u043e\u044e. \u0426\u0435 \u0437\u0443\u043c\u043e\u0432\u043b\u044e\u0454 \u043f\u043e\u0442\u0440\u0435\u0431\u0443 \u0443 \u043c\u043e\u0434\u0435\u0440\u043d\u0456\u0437\u0430\u0446\u0456\u0457 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e-\u0430\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u0443 \u0434\u043b\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0443 \u0431\u0430\u0433\u0430\u0442\u044c\u043e\u0445 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u0438\u0445 \u0437\u0430\u0434\u0430\u0447\u0430\u0445 \u043d\u0435\u0439\u0440\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u044f\u043a \u0431\u0430\u0437\u043e\u0432\u043e\u0457 \u0441\u043a\u043b\u0430\u0434\u043e\u0432\u043e\u0457 \u0448\u0442\u0443\u0447\u043d\u043e\u0433\u043e \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443. \u0422\u0430\u043a, \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u043d\u0435\u0439\u0440\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043d\u0430\u0447\u043d\u043e \u043f\u0456\u0434\u0432\u0438\u0449\u0438\u0442\u0438 \u0440\u0456\u0432\u0435\u043d\u044c \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0443 \u0431\u0430\u0433\u0430\u0442\u044c\u043e\u0445 \u0441\u0444\u0435\u0440\u0430\u0445 \u043b\u044e\u0434\u0441\u044c\u043a\u043e\u0457 \u0436\u0438\u0442\u0442\u0454\u0434\u0456\u044f\u043b\u044c\u043d\u043e\u0441\u0442\u0456, \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e \u043f\u0440\u0438 \u043e\u0431\u2019\u0454\u0434\u043d\u0430\u043d\u043d\u0456 \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u0448\u0442\u0443\u0447\u043d\u043e\u0433\u043e \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443 \u0437 \u0435\u043a\u0441\u043f\u0435\u0440\u0442\u043d\u0438\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438. \u0423 \u0434\u0430\u043d\u0456\u0439 \u0440\u043e\u0431\u043e\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u0434\u0430\u044e\u0442\u044c\u0441\u044f \u0430\u0441\u043f\u0435\u043a\u0442\u0438 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u0432 \u0442\u0430\u043a\u0438\u0445 \u0433\u0430\u043b\u0443\u0437\u044f\u0445, \u044f\u043a \u0440\u043e\u0431\u043e\u0442\u043e\u0442\u0435\u0445\u043d\u0456\u043a\u0430 \u0442\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457. \u0423\u0432\u0430\u0433\u0430 \u043f\u0440\u0438\u0434\u0456\u043b\u0435\u043d\u0430 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044e \u0432 \u0446\u0438\u0445 \u0433\u0430\u043b\u0443\u0437\u044f\u0445 \u043d\u0435\u0439\u0440\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439, \u0430 \u0441\u0430\u043c\u0435 \u043d\u0435\u0439\u0440\u043e\u043c\u0435\u0440\u0435\u0436\u043d\u043e\u043c\u0443 \u043f\u0456\u0434\u0445\u043e\u0434\u0443 \u0434\u043e \u0440\u043e\u0437\u0432\u2019\u044f\u0437\u0430\u043d\u043d\u044f \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u0438\u0445 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u0438\u0445 \u0437\u0430\u0434\u0430\u0447. \u041d\u0430\u0432\u0435\u0434\u0435\u043d\u0456 \u043f\u0440\u0438\u043a\u043b\u0430\u0434\u0438 \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0435\u0439\u0440\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u0432 \u0440\u043e\u0431\u043e\u0442\u043e\u0442\u0435\u0445\u043d\u0456\u0446\u0456 \u0442\u0430 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0442\u0430 \u0440\u043e\u0437\u043f\u043e\u0434\u0456\u043b\u0435\u043d\u043d\u044f \u0434\u0430\u043d\u0438\u0445 \u0456 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432 \u0443 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0456 \u043c\u0435\u0440\u0435\u0436\u0430\u0445 \u043f\u0456\u0434\u0442\u0432\u0435\u0440\u0434\u0436\u0443\u044e\u0442\u044c \u043f\u043e\u0448\u0438\u0440\u0435\u043d\u0435 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u043d\u0435\u0439\u0440\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u0456 \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0443 \u0430\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0457 \u0440\u0435\u0430\u043b\u0456\u0437\u0430\u0446\u0456\u0457 \u043d\u0435\u0439\u0440\u043e\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440 \u043d\u0430 \u043d\u043e\u0432\u0456\u0442\u043d\u0456\u0439 \u0435\u043b\u0435\u043c\u0435\u043d\u0442\u043d\u0456\u0439 \u0431\u0430\u0437\u0456, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u043d\u0430 \u041f\u041b\u0406\u0421. \u041f\u0440\u0438 \u0446\u044c\u043e\u043c\u0443 \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u0443 \u0443\u0432\u0430\u0433\u0443 \u043f\u0440\u0438 \u043e\u0433\u043b\u044f\u0434\u0456 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0437\u0430\u0441\u0442\u043e\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0435\u0439\u0440\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u0432 \u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0445 \u043d\u0430\u0443\u043a\u043e\u0432\u043e-\u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0445 \u0433\u0430\u043b\u0443\u0437\u044f\u0445 \u043f\u0440\u0438\u0434\u0456\u043b\u0435\u043d\u043e \u0446\u0438\u043c \u043d\u0430\u043f\u0440\u044f\u043c\u043a\u0430\u043c \u0441\u0430\u043c\u0435 \u0443 \u043f\u0443\u0431\u043b\u0456\u043a\u0430\u0446\u0456\u044f\u0445 \u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0445 \u043d\u0430\u0443\u043a\u043e\u0432\u0446\u0456\u0432. \u0412\u0441\u0435 \u0446\u0435 \u0441\u0432\u0456\u0434\u0447\u0438\u0442\u044c \u043f\u0440\u043e \u0432\u0438\u0441\u043e\u043a\u0438\u0439 \u0440\u0456\u0432\u0435\u043d\u044c \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u044c \u0442\u0430 \u043e\u0442\u0440\u0438\u043c\u0430\u043d\u0456 \u0437\u043d\u0430\u0447\u043d\u0456 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0438 \u043d\u0430 \u0442\u0435\u0440\u0435\u043d\u0430\u0445 \u0423\u043a\u0440\u0430\u0457\u043d\u0438.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0448\u0442\u0443\u0447\u043d\u0438\u0439 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442, \u0440\u043e\u0431\u043e\u0442\u043e\u0442\u0435\u0445\u043d\u0456\u043a\u0430, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u041f\u041b\u0406\u0421.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>Today the application field of artificial intelligence methods is very wide. Therefore it is necessary to upgrade hardware and software for practical neural technology applications for many tasks as the basic element of artificial intelligence. The neural technology using can access to increase intellectualization range in many sphere of human life. Especially it is achieved in artificial intelligence capabilities union with expert systems. In this article the intellectualization aspects of robotics and information security are considered. Attention is paid to the neural technologies application in these areas that is neural network approach to applied tasks solving. The examples of neural technology applying in robotics and intelligence information security systems are presented. The main directions of neural network applying in robotics are the control systems and computer vision systems. In terms of information security systems, the main ones are the network attack detection, social network users (fake accounts) classification, authentication, neural cryptography. It is noted that the best hardware neural structure realizations are the programmable logic integrated circuits. The promising directions of neural networks using in robotics are solving dynamic tasks, namely motion control, and static tasks, namely data processing from sensors. Promising areas of neural networks using in information security are encryption and cryptanalysis, steganography and steganoanalysis, authentication, factorization. Particular attention in reviewing the effective use of neurotechnology in these scientific and technical fields is given to these areas in the publications of Ukrainian scientists. All this testifies to the high level of research and significant results obtained in Ukraine.<br \/>\n<strong>Keywords:<\/strong> artificial intelligence, robotics, information security, FPGA.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Dzhons M.T. Programmirovanie iskusstvennogo intellekta v prilozheniyah \/ M.T. Dzhons ; per. s angl.\u2013 M. : DMK Press, 2004.\u2013 312 s. \u2013 ISBN 5-94074-275-0.<\/li>\n<li>Osovskij S. Nejronnye seti dlya obrabotki informacii \/ S. Osovskij ; per. s polsk. I.D. Rudinskogo. \u2013 M. : Finansy i statistika, 2004. \u2013 344 s. \u2013 ISBN 5-279-02567-4.<\/li>\n<li>Bukov A.A. Tehnicheskie nervnye sistemy. Obuchaemye sistemy upravleniya so zreniem dlya promyshlennyh robotov \/ A.A. Bukov. \u2013 Lipeck : Izd-vo Lipeck.<\/li>\n<li>Vasiura A.S. Metody ta zasoby neiropodibnoi obrobky danykh dlia system keruvannia \/ A.S. Vasiura, T.B. Martyniuk, L.M. Kupershtein. \u2013 Vinnytsia : UNIVERSUM-Vinnytsia, 2008. \u2013 175 s. \u2013 ISBN 978-966-641-279-2.<\/li>\n<li>Gavrilov A.V. Arhitektura gibridnoj intellektualnoj sistemy upravleniya mobilnogo robota \/ A.V. Gavrilov, V.V. Gubarev, K.H. Dzho, H.H. Li \/\/ Vestnik Novosibirskogo GTU. \u2013 2004. \u2013 \u2116 2. \u2013 S. 3\u201313.<\/li>\n<li>Fedchuk D.O. Analiz vlastyvostei intelektualnykh komponentiv ta perspektyv yikh vykorystannia v systemakh keruvannia mobilnymy robotamy \/ D.O. Fedchuk, S.O. Andrieiev, Ye.A. Kaznacheiev \/\/ Intelektualni tekhnolohii v systemnomu prohramuvanni : II Vseukr. nauk.-prakt. konf. molodykh vchenykh ta studentiv, 18-19 kvitnia 2013 r. : zb. nauk. prats. \u2013 Khmelnytskyi : Triada-M, 2013. \u2013 S. 76-77.\u2013 ISBN 978-966-59805-9-7<\/li>\n<li>Kadomskij K.K. Konceptualnaya model sistemy upravleniya mobilnym robotom \/ K.K. Kadomskyi, A.A. Karhyn \/\/ Informatsiini tekhnolohii ta kompiuterna inzheneriia : mizhnar. nauk.-prakt. konf., 19-21 travnia 2010 r. : tezy dop. \u2013 Vinnytsia : VNTU, 2010. \u2013 S. 337-338. \u2013 ISBN 978-966-641-356-0.<\/li>\n<li>Darincev O.V. Intellektualnoe planirovanie traektorij dlya gruppy robotov na baze rekurrentnoj nejronnoj seti \/ O.V. Darincev, A.B. Migranov, B.S. Yudincev \/\/ Iskusstvennyj intellekt. Intellektualnye sistemy (II-2010) : mezhdunar. nauch.-tehn. konf., 20\u201324 sentyabrya 2010 g. : materialy. T. 2. \u2013 Doneck : IPII &#8220;Nauka i osvita&#8221;, 2010. \u2013 S. 223\u2013227. \u2013 ISBN 978-966-7829-45-2.<\/li>\n<li>Pruks V.E. Sistema upravleniya mobilnogo robota na osnove tehnicheskoj nervnoj sistemy so zreniem \/ V.E. Pruks, A.E. Pruks \/\/ Obchysliuvalnyi intelekt (rezultaty, problemy, perspektyvy) : I Mizhnar. nauk.-tekhn. konf., 10-13 travnia 2011 r. : materialy. \u2013 Cherkasy : Maklaut, 2011. \u2013 S. 229. \u2013 ISBN 978-966-2200-11-9.<\/li>\n<li>Averyan E.D. Associativnaya nejronnaya set SMAS. Ch. 1. Struktura, obyom pamyati, obuchenie i bazisnye funkcii \/ E.D. Averyan \/\/ Informacionnye tehnologii. \u2013 1997. \u2013 \u2116 5. \u2013 S. 6\u201314.<\/li>\n<li>Averyan E.D. Associativnaya nejronnaya set SMAS. Ch. 2. Processy obucheniya, uskorennoe obuchenie, vliyanie pomeh, ustranenie vliyaniya pomeh v dvuhslojnoj seti \/ E.D. Averyan \/\/ Informacionnye tehnologii. \u2013 1997. \u2013 \u2116 6. \u2013 S. 17\u201325.<\/li>\n<li>Martyniuk T.B. Adaptyvnyi sumator dlia system keruvannia robotom \/ T.B. Martyniuk, A.V. Kozhemiako, N.V. Fofanova, O.M. Nakonechnyi \/\/ Optyko-elektronni informatsiino-enerhetychni tekhnolohii. \u2013 2005. \u2013 \u2116 2(10). \u2013 S. 96\u2013101. \u2013 ISSN 1681-7983.<\/li>\n<li>Martyniuk T., Kozhemiako A., Buda A., Kupershtein L. The model of multifunctional neural element of intelligent systems. Education-Technology-Computer Science, Main Problems of informatics and information education, Scientific Annual. Rzeszow. 2013. 4, part 2, pp. 366\u2013371.<\/li>\n<li>Komar M.P. Informatsiina model protsessu vyiavlennia kompiuternykh atak na osnovi neiromerezhevykh klasyfikatoriv \/ M.P. Komar \/\/ Obchysliuvalnyi intelekt (rezultaty, problemy, perspektyvy) : I Mizhnar. nauk.-tekhn. konf., 10-13 travnia 2011 r. : materialy. \u2013 Cherkasy : Maklaut, 2011. \u2013 S. 179-180. \u2013 ISBN 978-966-2200-11-9.<\/li>\n<li>Hylhurt S.Ia. Prohrammno-apparatnaia zashchyta dann\u044bkh v raspredel\u0451nn\u044bkh yntellektualn\u044bkh systemakh \/ S.Ia. Hylhurt, A.K. Hyranova \/\/ Iskusstvennyj intellekt. \u2013 2010. \u2013 \u2116 3. \u2013 S. 706-711. \u2013 ISSN 1561-5359.<\/li>\n<li>Gilgurt S.Ya. Apparatnoe raspoznavanie strok v intellektualnyh sistemah zashity informacii \/ S.Ya. Gilgurt \/\/ Iskusstvennyj intellekt. Intellektualnye sistemy (II-2010) : mezhdunar. nauch.-tehn. konf., 20-24 sentyabrya 2010 g. : materialy. T. 2. \u2013 Doneck : IPII &#8220;Nauka i osvita&#8221;, 2010. \u2013 S. 271\u2013274. \u2013 ISBN 978-966-7829-45-2.<\/li>\n<li>Skatkov A.V. Terminalnoe raspredelenie resursov v kriticheskih informacionnyh sistemah pri ispolzovanii nejrosetevyh tehnologij \/ A.V. Skatkov, D.Yu. Voronin \/\/ Obchysliuvalnyi intelekt (rezultaty, problemy, perspektyvy) : I Mizhnar. nauk.-tekhn. konf., 10-13 travnia 2011 r. : materialy. \u2013 Cherkasy : Maklaut, 2011. \u2013 S. 242-243. \u2013 ISBN 978-966-2200-11-9.<\/li>\n<li>Nochevnov D.P. Mnogoznachnaya klassifikaciya polzovatelej Socialnogo Web po interesam \/ D.P. Nochevnov \/ D.P. Nochevnov \/\/ Obchysliuvalnyi intelekt (rezultaty, problemy, perspektyvy) : I Mizhnar. nauk.-tekhn. konf., 10-13 travnia 2011 r. : materialy. \u2013 Cherkasy : Maklaut, 2011. \u2013 S. 353-354. \u2013 ISBN 978-966-2200-11-9.<\/li>\n<li>Kupershtein L.M., Martyniuk T.B., Voitovych O P., Kulchytskyi B.V., Kozhemiako A. V., Sawicki D., Kalimoldayev M.. DDoS-attack detection using artificial neural networks in Matlab. Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments, 2019. Vol. 11176, p. 1117.<\/li>\n<li>Luzhetskyi V. A. Osnovy informatsiinoi bezpeky : navchalnyi posibnyk [rekomendovanyi MON] \/ A. Luzhetskyi, O.P. Voitovych, V.D. Kozhukhivskyi. \u2013 Vinnytsia : VNTU, 2013. \u2013 246 s.<\/li>\n<li>Chervyakov N. I. Primenenie iskusstvennyh nejronnyh setej i sistemy ostatochnyh klassov v kriptografii \/ I.N. Chervyakov, A.A. Evdokimov, A.I. Galushkin, I.N. Lavriennko, A.V. Lavriennko. \u2013 M. : Fizmatlit, 2012. \u2013 279 s. \u2013 ISBN 978-5-9221-1386-1.<\/li>\n<li>Kupershtein L.M. Analiz tendentsii rozvytku neirokryptohrafii \/ L.M. Kupershtein, A.Ie. Tatarchuk \/\/ XLVIII nauk.-tekhn. konf. pidrozdiliv VNTU, 13-15 bereznia 2019 r. : materialy. \u2013 Vinnytsia : VNTU, 2019.<\/li>\n<li>Kupershtein L.M. Doslidzhennia mozhlyvosti vykorystannia neironnykh merezh dlia stehoanalizu zobrazhen \/ L.M. Kupershtein, A.H. Buda, V.V. Lukichov, B.S. Krymeniuk \/\/ Optoelektronni informatsiini tekhnolohii \u00abFotonika ODS &#8211; 2018\u00bb : VIII Mizhnar. nauk.-tekhn. konf., 2-4 zhovtnia 2018 r. : materialy. \u2013 Vinnytsia : VNTU, 2018. \u2013 S. 61.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u041e\u0421\u041e\u0411\u041b\u0418\u0412\u041e\u0421\u0422\u0406 \u0406\u041d\u0422\u0415\u041b\u0415\u041a\u0422\u0423\u0410\u041b\u0406\u0417\u0410\u0426\u0406\u0407 \u0412 \u0420\u041e\u0411\u041e\u0422\u041e\u0422\u0415\u0425\u041d\u0406\u0426\u0406 \u0422\u0410 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407 INTELLECTUALIZATION FEATURES IN ROBOTICS AND INFORMATION SECURITY SYSTEMS \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 154-157. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281) \u0410\u0432\u0442\u043e\u0440\u0438: \u0422.\u0411. \u041c\u0410\u0420\u0422\u0418\u041d\u042e\u041a, \u0410.\u0413. \u0411\u0423\u0414\u0410, \u0410.\u0412. \u041a\u041e\u0416\u0415\u041c\u2019\u042f\u041a\u041e, \u041b.\u041c. \u041a\u0423\u041f\u0415\u0420\u0428\u0422\u0415\u0419\u041d \u0412\u0456\u043d\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 T.B. MARTYNIUK, A.G. BUDA, A.V. KOZHEMIAKO, L.M. KUPERSHTEIN Vinnytsia National Technical University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-154-1587 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 22. 01.2020 \u0440. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[13],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1100"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1100"}],"version-history":[{"count":4,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1100\/revisions"}],"predecessor-version":[{"id":5120,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1100\/revisions\/5120"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}