Підписатись
Pavlo Rehida
Pavlo Rehida
Khmelnytsky National University
Підтверджена електронна адреса в khmnu.edu.ua
Назва
Посилання
Посилання
Рік
Method for efficiency increasing of distributed classification of the images based on the proactive parallel computing approach
V Mukhin, A Volokyta, Y Heriatovych, P Rehida
Advances in Electrical and Computer Engineering 18 (2), 117-122, 2018
232018
Routing method based on the excess code for fault tolerant clusters with InfiniBand
G Olexandr, P Rehida, A Volokyta, H Loutskii, VD Thinh
Advances in Computer Science for Engineering and Education II, 335-345, 2020
162020
Increasing the fault tolerance of distributed systems for the Hyper de Bruijn topology with excess code
H Loutskii, A Volokyta, P Rehida, O Honcharenko, B Ivanishchev, ...
2019 IEEE International Conference on Advanced Trends in Information Theory …, 2019
132019
Using excess code to design fault-tolerant topologies
H Loutskii, A Volokyta, P Rehida, O Gonchareno
Технічні науки та технології, 134-144, 2019
122019
Method for synthesis scalable fault-tolerant multi-level topological organizations based on excess code
H Loutskii, A Volokyta, P Rehida, O Honcharenko, VD Thinh
Advances in Computer Science for Engineering and Education III 3, 350-362, 2021
52021
Topology synthesis method based on excess de bruijn and dragonfly
H Loutskii, A Volokyta, P Rehida, A Kaplunov, B Ivanishchev, ...
Advances in Computer Science for Engineering and Education IV, 315-325, 2021
42021
Thematic texts generation issues based on recurrent neural networks and word2vec
V Fomenko, H Loutskii, P Rehida, A Volokyta
Технічні науки та технології, 110-115, 2017
32017
Development of real time method of detecting attacks based on artificial intelligence
H Loutskii, A Volokyta, O Yakushev, P Rehida, VD Thinh
Технологический аудит и резервы производства 3 (1 (29)), 40-46, 2016
32016
Request balancing method for increasing their processing efficiency with information replication in a distributed data storage system
І Бояршин, А Дорошенко, П Регіда
Технічні науки та технології, 75-82, 2021
22021
The programming language for embedded real-time devices with reducing errors and without reducing the performance of programs
O Shmalko, P Rehida, A Volokyta, H Loutskii, VD Thinh
National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic …, 2018
22018
Extended DragonDeBrujin topology synthesis method
A Volokyta, H Loutskii, P Rehida, A Kaplunov, B Ivanishchev, ...
International Journal of Computer Network and Information Security 12 (6), 23, 2022
12022
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques
P Rehida, G Markowsky, A Sachenko, O Savenko
2023 13th International Conference on Dependable Systems, Services and …, 2023
2023
Malware Detection Tool Based on Emulator State Analysis
P Rehida, O Savenko, A Kashtalian, A Sachenko
2023 IEEE 12th International Conference on Intelligent Data Acquisition and …, 2023
2023
Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis.
A Nicheporuk, S Tabenskyi, P Rehida, O Savenko, A Nicheporuk
IntelITSIS, 421-431, 2022
2022
REVIEW OF METODS OF ENVIRONMENT GENERATION IN COMPUTER GAMES
O Sukhobrus, P Rehida
The International Conference on Security, Fault Tolerance, Intelligence, 78-81, 2020
2020
ANALYSIS OF DATA BALANCING PROBLEMS IN DISTRIBUTED DATA STORAGES
B Ivanishchev, P Rehida, A Kaplunov, O Honcharenko
The International Conference on Security, Fault Tolerance, Intelligence, 75-77, 2020
2020
SECURITY ISSUES IN COLLECTIVE COMPUTING
P Rehida, A Kaplunov, B Ivanishchev, O Honcharenko
The International Conference on Security, Fault Tolerance, Intelligence, 70-74, 2020
2020
AUTOMATION OF THE PROCESSING OF CERTIFICATES OF ENTRANTS THROUGH COMPUTER VISION
VY Bandurin, P Rehida, V Steshyn, A Boldak, A Volokyta
The International Conference on Security, Fault Tolerance, Intelligence, 139-143, 2019
2019
APPLICATIONS OF SEQUENCE-TO-SEQUENCE AUTOENCODER NETWORKS IN REQUEST ANOMALY DETECTION
I Aksyonenko, P Rehida
The International Conference on Security, Fault Tolerance, Intelligence, 66-71, 2019
2019
Розробка способу виявлення атак в реальному часі на основі обчислювального інтелекту
ГМ Луцький, АМ Волокита, ОЮ Якушев, ПГ Регіда, ВД Тхінь
Technology Audit & Production Reserves 3, 2016
2016
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20