штучний інтелект

Deepfakes: Definition of the Concept and Criteria for Distinguishing Between Harmful and Harmless Deepfakes

Abstract. This article addresses the issue of combating deepfakes, which has recently gained significant
relevance. With the emergence of publicly available artificial intelligence tools capable of generating highly
convincing images, video clips and other types of content, as well as a favorable digital landscape for their
dissemination, deepfake technology has become increasingly prevalent. Given the risks of deepfakes,
reasonable expectations are placed on the law designed to protect our fundamental values, which are often

Intellectual Re-Engineering Technologies in Digital Transformation of Public Services

Digital transformation of public services in the context of modern information systems and technologies is a relevant area of research, which is due to the growing demands of society for the quality and speed of public services. In the digital economy, artificial intelligence, machine learning and big data processing technologies play an important role, which can significantly increase the efficiency of public administration.

Methods for Assessing the Security of Virtual Networks and Information Security Maturity Models

The article presents a comprehensive analysis of methods for assessing the security of virtual networks and their relationship with information security maturity models. Key technical approaches are considered-vulnerability analysis, penetration testing, threat modeling, and quantitative risk assessment- taking into account the specifics of multi-cloud and dynamic environments.

Security as Code Using Agentic AI: Efficiency in Ensuring Software Development Lifecycle Security

This paper presents a framework for automating software development security using a Security as Code approach enhanced with a multi-agent artificial intelligence system. The research addresses the limitations of traditional DevSecOps practices by deploying specialized AI agents to perform static code analysis, generate and enforce security policies, and monitor system behavior. The architecture integrates security throughout the CI/CD pipeline and runtime, enabling autonomous decision-making, adaptability to threats, and reduced developer overhead.

Application of Pseudorandom Number Generators in Machine Learning

This paper presents a comprehensive study of methods for detecting and localizing electronic warfare (EW) sources under complex conditions, which include the influence of intensive intentional jamming, multipath signal propagation, time-varying emission parameters, and dynamic movement of the sources. The relevance of the research is driven by the growing role of EW means in modern armed conflicts and the need to ensure timely detection and neutralization of such threats.

FROM CHARISMATIC TO ALGORITHMIC LEADERSHIP: THE EVOLUTION OF MANAGERIAL PARADIGMS IN THE AGE OF ARTIFICIAL INTELLIGENCE

Purpose. The purpose of the study is to scientifically substantiate the transformation of leadership models under the influence of artificial intelligence and to outline the prospects for transitioning from charismatic to algorithmic management within the digital economy. The research seeks to demonstrate how algorithmization affects leadership styles, reshapes managerial decision-making, and redefines the role of leaders in different organizational contexts.

Scientific and Methodological Foundations for Designing and Improving Interactive Electronic Scientific Publications to Optimize Communication Processes and Knowledge Acquisition

This article is devoted to a comprehensive study of scientific and methodological foundations for designing and improving interactive electronic scientific publications as an innovative tool for optimizing scientific communication processes and knowledge acquisition. The evolutionary path of scientific publishing from traditional printed formats to modern multimedia interactive platforms is analyzed, revealing key trends in the digital transformation of the academic environment.

Comparative Analysis of Solidity Smart Contract Generation Using Large Language Models Based on Formal Algebraic Specifications

This article presents a comparative analysis of automatic Solidity smart contract generation using large language models (LLMs) based on two approaches: natural language textual descriptions and formal algebraic specifications. The study analyzes smart contracts generated by LLMs (ChatGPT-4, Claude 3.7 Sonnet, DeepSeek-V3) as well as by the AI-based tool GitHub Copilot, evaluating their syntactic correctness, compliance with initial requirements, and security.

Review of: Bartneck, C., Lütge, C., Wagner, A., Welsh, S. (2021). An Introduction to Ethics in Robotics and AI. Cham: Springer Nature Switzerland AG. ISBN 978-3-030-51109-8, 124 p.

The book "An Introduction to Ethics in Robotics and AI" is a work in the study of ethical issues in the field of artificial intelligence. It is an introduction to the key moral and ethical issues that arise in connection with the development of technology. The book covers not only the basic concepts of ethics and artificial intelligence but also applies them to various thought experiments. The authors provide an excellent basis for further study of the topic, leaving a variety of secondary sources.

Application of Artificial Intelligence Methods for Spatial Analysis of Agricultural Land Use in the Qgis Geoinformation System

The integration of artificial intelligence algorithms in agriculture has been studied to support efficient and sustainable agricultural production through the use of machine learning technologies, automated data collection, and analysis of large volumes of geospatial data to improve land resource management using geographic information systems. The article analyzes the prospects of applying artificial intelligence (AI) methods in the QGIS geographic information system for spatial analysis of agricultural land use.