1. To the 95th anniversary of the birth of the Volodymyr Serhiyovych Mykhalevych [In Ukrainian] |
|
V.M. Kuzmenko | 3–8 |
2. Global Trends in artificial intelligence: Challenges, opportunities, and prospects [In Ukrainian] |
|
M.Z. Zgurovsky | 9–31 |
3. Elements of the general theory of optimal algorithms [In Ukrainian] | |
V.K. Zadiraka, I.V. Shvidchenko | 32–45 |
4. Application of the general theory of optimal algorithms in cryptography, steganography, and blockchain technology [In Ukrainian] |
|
A.M. Kudin, I.A. Kudin, V.Z. Chikhladze | 46–57 |
5. Chebyshev approximation of multivariable functions by a nonlinear function of a rational expression [In Ukrainian] | |
P.S. Malachivskyy, L.S. Melnychok | 58–69 |
7. Solving matrix polynomial equations [In Ukrainian] | |
M. Nedashkovskyy | 77–93 |
8. The scientific heritage of academician Shor [In Ukrainian] | |
P.I. Stetsyuk | 94–103 |
9. The operator extrapolation method for variational inequalities and its application [In Ukrainian] | |
V.V. Semenov | 104–117 |
10. Methods, algorithms, and tools for remote long-term monitoring of the safety of people and their property [In Ukrainian] | |
B.M. Shevchuk | 118–133 |
11. Simulating a simplified version of a splitting attack on the blockchain based on the Proof-of-Stake consensus protocol [In Ukrainian] | |
L.V. Kovalchuk, M.Yu. Kuznetsov, A.A. Shumska | 134–145 |
12. National and international post-quantum standards for asymmetric transformations [In Ukrainian] | |
I.D. Gorbenko, S.O. Kandii | 146–159 |
13. Modern quantum technologies of cryptographic information protection [In Ukrainian] |
|
Ye. Vasiliu | 160–175 |
14. High-performance computing in the residual class system [In Ukrainian] | |
Y. Nikolaychuk, I. Pitukh | 176–189 |
15. Application of machine learning methods to certain problems of digital signal processing in telecommunication tasks [In Ukrainian] | |
V.Yu. Semenov, E.V. Semenova | 190–198 |