| 1. Cryptosystems secure in certain models of computation [In Ukrainian] | |
| V.K. Zadiraka, A.M. Kudin, I.A. Kudin, I.V. Shvidchenko | 3–16 |
| 2. Algorithms for solving linear constraints in the set (0, 1) [In Ukrainian] | |
| S.L. Kryvyi, O.V. Chugaenko, S.M. Krasnitskiy | 17–28 |
|
3. Neuro-symbolic twins of systems and their use in solving cybersecurity problems [In Ukrainian] |
|
| O.O. Letychevskyi | 29–36 |
| 4. Elements of the probability theory of fuzzy events with engineering applications [In Ukrainian] | |
| O.I. Provotar, O.O. Suprun | 37–44 |
| 5. The construction of efficient algorithms for addressing certain computational geometry problems using Reeb graphs [In Ukrainian] | |
| V. Tereshchenko, A. Prishlyak, M. Osiponok | 45–56 |
| 6. On balanced zero-neighborhood labelings of generalized Petersen graphs [In Ukrainian] | |
| M. Semeniuta | 57–66 |
| 7. Mathematical modeling of instability in ecological and economic systems [In Ukrainian] | |
| K.L. Atoyev, P.S. Knopov | 67–77 |
|
8. Approximate optimal control for a nonlinear hyperbolic inclusion with perturbed non-autonomous coefficients [In Ukrainian] |
|
| O.A. Kapustian, N.V. Kasimova | 78–89 |
|
9. An approach to constructing a pareto-efficient set with consideration
of errors in indicators used to compare alternatives [In Ukrainian] |
|
| M.М. Potomkin, О.М. Semenenko, Y.O. Kliat, A.А. Sedliar | 90–97 |
| 10. On ergodic property of the solution to a Lėvy-driven SDE [In Ukrainian] | |
| V. Knopova, Y. Mokanu | 98–109 |
|
11. Research of mass service systems with multiple requests and the mode of strict planning by the method of statistical modeling [In Ukrainian] |
|
| O.V. Koba | 110–118 |
|
12. Multi-criterion analysis of investment appeal of rural areas of Ukraine using GIS and artificial intelligence [In Ukrainian] |
|
| S.Yu. Drozd, N.M. Kussul | 119–134 |
|
13. Principal component analysis as a tool of network traffic analysis for detection of DDoS attacks [In Ukrainian] |
|
| A. Kachynsky, M. Stremetska | 135–145 |
| 14. Asymptotic properties of a certain system of orthogonal polynomials [In Ukrainian] | |
| D.V. Shapovalov, A.M. Shutovskyi | 146–156 |
|
15. Information system vulnerability assessment using Hamming neural network [In Ukrainian] |
|
| A.O. Azarova, Iu.V. Krak, O.G. Murashchenko, L.O. Nikiforova, O.V. Ruzakova |
157–169 |
|
16. Cybernetic modeling of intestinal glucose absorption into human blood under normal conditions [In Ukrainian] |
|
| Y. Sokol, S. Lapta, O. Soloviova | 170–180 |
|
17. Method for automated design of neural network controllers based on FPGAs [In Ukrainian] |
|
| V.M. Shymkovych, A.Yu. Doroshenko, P.I. Kravets, O.A. Yatsenko |
181–198 |
| 18. A RAG-ASAG hybrid model for formative assessment in informatics education at university | |
| A.E. Aliyeva | 199–206 |