Lesia Dubchak

Lesia Dubchak
West Ukrainian National university · Computer engeneering

PhD

About

24
Publications
3,380
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
45
Citations
Introduction
Lesia Dubchak currently works at the Department of Computer Engineering, Ternopil National Economic University. Lesia does research in Engineering Education, Computer Engineering and Information Science. Their current project is 'Hybrid Intelligent information technology diagnosing of precancerous breast cancer based on image analysis'.
Additional affiliations
October 2004 - December 2020
West Ukrainian National University
Position
  • docent

Publications

Publications (24)
Chapter
The paper analyzes methods of data clustering. Cytological images of breast cancer were investigated, and nuclei feature of cytological images were calculated. The paper presents all the stages of computer vision, which are necessary to obtain quantitative characteristics of micro-objects and their clustering. Emphasis is placed on the stages of im...
Article
Full-text available
In this paper, the authors investigate data reduction techniques using cytological image data for the purpose of further classification applying modern approaches. Cytological images are widely used in diagnosing cancerous and precancerous conditions of the breast. Classification of the whole image is a rather time consuming process, so the authors...
Thesis
Full-text available
In the article, the authors investigated modern automated microscopy systems used in oncology and analyzed recent methods of image processing at different levels of computer vision. The researchers described a class of biomed-ical images, such as cytological images of breast precancerous conditions. Literature review has shown that the actual probl...
Conference Paper
In this research study, the authors developed an adaptive method and algorithm for image pre-processing and models of convolutional neural networks for cytological and histological image classification. The computer experiments were conducted on the basis of central and graphics processors using CUDA technology. Histological and cytological images...
Article
Full-text available
В даній статті розглянуто сучасний стан систем автоматизованої мікроскопії та їх застосування в телемедицині. Аналіз показує, що розробка політики безпеки таких САМ є актуальною задачею. Крім того, виділено основні користувачі системи автоматизованої мікроскопії та здійснено розподіл їх прав доступу до інформації. На основі проведених досліджень сп...
Article
Full-text available
В даній статті розглянуто історію розвитку та сучасний стан телемедицини в Україні та світі. Аналіз показує, що телемедицина в Україні розвинена на даний час досить слабо в порівнянні зі світовими аналогами, тому розробка таких систем передачі та опрацювання медичної інформації є актуальною задачею. Крім того, виділено основні проблеми, які виникаю...
Chapter
This paper presents access distribution at computer system transmission of client-server data type. In order to enhance information protection fuzzy logic is applied to select the data encryption method. A server block diagram of such computer system has been developed based on the proposed fuzzy distribution of system access.
Conference Paper
The purpose of the paper is to define the requirements to information security system in telemedicine and its realization in automated microscopy system. The researchers designed adaptive graphical interfaces for different types of users and developed a complex of measures that ensures reliability of the system against external attacks and confiden...
Conference Paper
Breast cancer is the most common cancer among women. Cytological images are used to diagnose the breast cancer. In this thesis the fuzzy system of diagnosing of precancerous and cancerous conditions of the breast is proposed. This system is based on the expert evaluation of cytological images and can be used in medical practice.
Research
Full-text available
Вісник Хмельницького національного університету. Серія: Технічні науки. – 2015. - №3 (225). – С.160-164
Research
Full-text available
Системи обробки інформації. – 2015. - № 8 (133). – С.97 – 101
Article
Continuous growth of volumes of information resources causes strict requirements to crypto protection on the processing speed of entrance data by the computer system. It is natural that for the solution of this task it is necessary to use hardware realization of known algorithms of cryptographic information protection. The method of the information...
Conference Paper
This paper proposes a method for fuzzy data processing based on Mamdani's fuzzy inference method. The implementation of this method is divided into phases of training and exploitation, which reduces the number of operations during fuzzy data processing and improves its performance. The analysis of the time complexity of the proposed method shows th...
Article
Full-text available
У даній статті розглянуто метод захисту інформації, що передається в телемедичних мережах, шляхом вибору алгоритму шифрування даних на основі нечіткої логіки. Побудована нечітка система дозволяє здійснювати адекватний захист даних в реальному часі, враховуючи поточний стан самої комп’ютерної системи.

Network

Cited By

Projects

Projects (2)
Archived project
Voice over IP (VoIP) is one of the most commonly used technologies. Due to the low cost of using VoIP, unlike traditional PSTN networks, it is rapidly growing and widely distributed in both personal and commercial areas. Since the VoIP uses the same routes like common Internet traffic, a risk arises regarding a safety of that service. In this paper a method for protecting the system of Voice over Internet Protocol from unauthorized access and calls to paid services is proposed. The method includes the two parts. A first part contains the 11 steps based on detecting the attacker to observe the log. file on the Asterisk server and File2ban using. Since a large number of IP addresses can be accumulated, the second part of the method is based on applying the fuzzy logic for improving its effectiveness. The case study is described, and its outcomes confirmed the correctness of the used fuzzy subsystem, as well as the correctness of the proposed method in whole.