artificial intelligence

DEEPER WASM INTEGRATION WITH AI/ML: FACILITATING HIGH- PERFORMANCE ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING MODELS IN MICRO-FRONTEND APPLICATIONS

WebAssembly (WASM) has emerged as a compelling and transformative solution for executing high- performance Artificial Intelligence (AI) and Machine Learning (ML) models directly within frontend web applications. Traditionally, AI/ML model deployment has been dominated by backend servers due to significant computational demands, coupled with the performance limitations of JavaScript and the overhead of client-server communication.

INTEGRATION OF MODERN ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN THE PROCESSES OF CONTINUOUS INTEGRATION AND DEPLOYMENT OF SOFTWARE

This article discusses modern approaches to organizing continuous integration (CI) and continuous delivery (CD) processes in software development using artificial intelligence (AI) technologies. The historical development of CI/CD is analyzed, along with their role in ensuring high-quality software, the main advantages and disadvantages of traditional approaches, and the prospects for integrating AI technologies to automate and optimize these processes.

Comparative analysis of the use of instructions for language models and automated metrics for assessing the quality of images generated by GAN models

This study explores the potential applications of language AI models in combination with Generative Adversarial Networks (GANs) for generating images based on textual descriptions derived from literary works.  The effectiveness of various prompt types used to create abstractions was analyzed, and a comparative evaluation of the performance of leading contemporary image generation models – MidJourney, DALL-E, and Stable Diffusion – was conducted.  The results indicate that, while language models are capable of producing meaningful abstractions that partially reflect the

Existential Rights, Freedoms and Human Existence as Legal Categories

The article is devoted to the rethinking and conceptualization of a number of concepts: “essential human rights”, ‘human freedom and liberties’, ‘human existence’ as key categories in the context of rapid civilizational transformations. By distinguishing and studying the interrelationship of these concepts, the article aims at substantiating their role as the backbone elements of legal doctrine. The author analyzes the ontological foundations of existential rights, emphasizing their inalienability which stems from the very nature of human existence.

Electoral Rights in Modern Digital Transformation Processes: Counteraction to Manipulation, Disinformation and Protection of Private Information

The article is devoted to a comprehensive analysis of the manifestation of electoral rights and their modification through digital transformation processes through the analysis of the problems of legal regulation of such aspects as disinformation, manipulation, personal information about the voter. Considerable attention is paid to the role of artificial intelligence in the electoral process, its positive and destructive capabilities are identified.

The Problem of Legal Security in the Information Space in the Context of the Expansion of the Use of Artificial Intelligence at the Modern Stage

The article examines the problem of organizing legal security in the information sphere. Based on the provisions of Article 17 of the Constitution of Ukraine and the Information Security Strategy, one of the most important functions of the Ukrainian state at the present stage is to ensure information security. The problem of legal security in Ukraine acquires particular relevance and importance today, during the full-scale invasion of the Russian aggressor, when his insidious aggressive actions are implemented on all fronts, including in the information space.

ACTION-MASKED REINFORCEMENT LEARNING TECHNOLOGY FOR ORDER SCHEDULING

The problem of high-performance and efficient order scheduling is a common combinatorial optimization problem in various industrial contexts. Creation of a model capable of generating schedules balanced in terms of quality and computational time poses a significant challenge due to the large action space. This study proposes a high-performant environment and a reinforcement learning model for allocating orders to resources using a mechanism of invalid action masking.

Subjective Human Rights in the Digital Age

In today’s world, where technology is developing at an incredible speed, automated information collection systems have become an integral part of our lives. They affect various aspects of society, including subjective human rights. This impact can be viewed from several perspectives. First of all, it is the significant advantages of automated systems. Such information collection systems significantly increase efficiency and accuracy in many areas. They allow for the rapid processing of large amounts of data, which facilitates informed decision-making.

Artificial intelligence in penetration testing: leveraging AI for advanced vulnerability detection and exploitation

The article examines the ways artificial intelligence is influencing the penetration testing procedure. As technology advances and cyber threats grow more com- mon, conventional testing methods are insufficient. Artificial intelligence aids in automating processes like vulnerability detection and real-world attack simulation, leading to quicker, more precise results with reduced dependence on human input. Machine learning is a game-changer in identifying hidden security flaws by analyzing past attacks and abnormal patterns.

Predicting cyberspace intrusions using machine learning algoritms

The article presents possible strategies and approaches to address the growing cybersecurity threat landscape, new trends and innovations, such as artificial intelligence and machine learning for cyber threat detection and automation. The paper presents well-known machine learning classifiers for data classification. The dataset has been taken from a report by the Center for Strategic and International Studies. The presented model accuracy assessment study has been significant variation among algorithms based on different network intrusion detection systems.