Svitlana Chupakhina

Orcid: 0000-0003-1274-0826

According to our database1, Svitlana Chupakhina authored at least 8 papers between 2021 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Lego Technology as a Means of Enhancing the Learning Activities of Junior High School Students in the Condtions of the New Ukrainian School.
Proceedings of the Learning in the Age of Digital and Green Transition, 2022

2021
Mathematical Models of Group Dynamics When Working in Teams of Developers of Training Distance Courses.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop. Proc. 3rd International Workshop (MoMLeT&DS 2021). Volume I: Main Conference, 2021

System Analysis and Example of Using SHA-512 Hash Functions to Protect Students' Personal Data on Educational Platforms.
Proceedings of the IEEE 16th International Conference on Computer Sciences and Information Technologies, 2021

Prospective Areas of Research in the Development of Post-Quantum Cryptography.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Machine Training for Intelligent Analysis of Text for the Identification of the Author.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Harmful Effects of Fake Social Media Accounts and Learning Platforms.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Activation of the Educational Process by Changing the Curriculum in Higher School.
Proceedings of the 5th International Conference on Computational Linguistics and Intelligent Systems (COLINS 2021). Volume I: Main Conference, 2021

Using hash functions to protect critical messages from changes in risky computing systems.
Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), 2021


  Loading...