http://csitic.nure.ua/issue/feed COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES 2021-05-30T14:53:24+03:00 Vitalii Martovytskyi info@csitic.com Open Journal Systems <p style="text-align: center;"><strong><span style="color: #000080; font-size: 12pt;">Welcome to the website</span></strong></p> <p style="text-align: center;"><span style="color: #000080;">of the International Scientific and Technical Conference </span></p> <p style="text-align: center;"><span style="color: #000080;"><strong><span style="font-size: 16pt;">COMPUTER AND INFORMATION</span></strong></span></p> <p style="text-align: center;"><span style="color: #000080;"><strong><span style="font-size: 16pt;"> SYSTEMS AND TECHNOLOGIES</span></strong></span></p> <p style="text-align: center;"><span style="color: #000000;"><strong><span style="font-size: 12pt;">Topics:</span></strong></span></p> <p style="text-align: justify;"><span style="color: #000000;">- Perspective and reliable systems;<br />- Integrated and distributed systems;<br />- Cybersecurity and safety;<br />- Systems and technologies based on NoC, SoC, SiP, FPGA;<br />- IT-infrastructure, IT-systems and services;<br />- Formal methods for development and verification;<br />- Verification, testing, diagnostics and testing of components and systems;<br />- Cooperation between universities and IT-industry;<br />- Databases (computer system for data registration and processing);<br />- Infocommunications.</span></p> <p style="text-align: center;"><span style="color: #000000;"><strong><span style="font-size: 12pt;">Main issues:</span></strong></span></p> <p style="text-align: justify;">- Development and operation of computer and informational systems;<br />- Reliability and safety technologies for computer and information systems;<br />- Flexible integrated systems and robotics;<br />- Design, implementation and operation of information systems and technologies<br />- Infocommunication networks and technologies.</p> http://csitic.nure.ua/article/view/231722 Methods for Automating Development Processes and Deployment of Microservice Applications 2021-05-17T08:31:58+03:00 Oleksandr Koshedran oleksandr.koshedran@nure.ua Vitaliy Tkachov vitalii.tkachov@nure.ua <p>The presented work is devoted to automation CI/CD<br>pipeline for deploying microservices. Main methodologies and<br>practices of software products development are considered:<br>Waterfall, Agile, Scrum, Kanban and DevOps as well as<br>detailed description of them. Developed and deployed a CI /<br>CD process to automate web application deployment using a<br>variety of software tools such as Kubernetes and Jenkins.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Koshedran, Vitaliy Tkachov http://csitic.nure.ua/article/view/231737 Methods of Construction of Overline Infrastructures in the Cloud Environment 2021-05-17T10:27:45+03:00 Yevhen Laptii yevhen.laptii@nure.ua Vitalii Tkachov vitalii.tkachov@nure.ua <p><em>The aim of the work is to develop a system for automatic deployment, configuration, and monitoring of web applications with the most popular cloud providers such as (Amazon, Google, Microsoft). The system interacts with a web application whose server part is written in python (flask). This server uses other tools such as Terraform, Ansible, Docker, Grafana, Influxdb, Telegraf, and others.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Yevhen Laptii, Vitalii Tkachov http://csitic.nure.ua/article/view/231817 Personalized Glucose Prediction Model for Patients With Type I Diabetes 2021-05-17T17:51:00+03:00 Ghenadie Usic ghenv@gmail.com <p>This paper represents an attempt to use machine learning techniques to personalize glucose predictions for patients with type I diabetes (T1D). The study aims at proposing a personalized model, capable to provide real-time blood glucose estimations, taking into consideration patient’s health preconditions. The proposed model represents a neural network based on the use of Self-Organized Maps (SOM).&nbsp; It was elaborated using data from 5 patients with T1D, collected with help of a specially created for these purposes support system and pre-trained using a clinical dataset. The study lasted for 3 months.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Ghenadie Usic http://csitic.nure.ua/article/view/231818 Model of Integration of Voice Assistants in the Construction of Web Applications 2021-05-17T18:01:13+03:00 Mykola Slisarenko mykola.slisarenko@nure.ua Oleksii Liashenko oleksii.liashenko@nure.ua <p>Today, voice assistants can radically change the interaction of computer users. For many users, the ability to read and print is impossible to access information. Voice assistants can fill the information gap for these users. Embedding these capabilities in today's consumer technology would be much more cost-effective than specially designed devices and many users would find it convenient to control these devices.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Mykola Slisarenko, Oleksii Liashenko http://csitic.nure.ua/article/view/231819 Review of Approaches to Diagnosis of Post-Traumatic Stress Disorders 2021-05-17T18:38:16+03:00 Nelia Miroshnichenko nelia.miroshnychenko@nure.ua Iryna Perova iryna.perova@nure.ua <p><em>Many doctors of various specialties throughout Ukraine meet internally displaced persons and combatants from the eastern regions of Ukraine among their patients. Given that such events are taking place on the territory of Ukraine for the first time in all the years of independence, they are unusual, atypical, such that they go beyond the ordinary. This, in turn, has a significant impact on the mental life of Ukrainians - both those in areas where the confrontation continues, and those who lead a peaceful life.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький; Nelia Miroshnichenko, Iryna Perova http://csitic.nure.ua/article/view/231821 Security system development for “Smart House” 2021-05-17T18:49:03+03:00 Yuliia Ivanenko yuliia.nazarenko@nure.ua Anastasiia Hliuza anastasiia.hliuza@nure.ua Denys Honcharenko denys.honcharenko@nure.ua Oleksii Liashenko oleksii.liashenko@nure.ua <p>The best minds of humanity are constantly developing new technologies to improve human life and provide comfort. Comfort has always been one of the engines of progress, forcing human thought to invent more and more new devices to make their lives easier. One such invention was “Smart House” system.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький; Yuliia Ivanenko , Anastasiia Hliuza, Denys Honcharenko , Oleksii Liashenko http://csitic.nure.ua/article/view/231823 Research on CNN (Convolutional Neural Network)-based Forecasting Method 2021-05-17T18:57:34+03:00 Yuliia Andrusenko yuliia.andrusenko@nure.ua <p>The article deals with the problem of predicting the COVID-19 spreading in Ukraine. This task becomes more relevant each day. From all the modern models of CNN-based time series forecasting, the InceptionTime model was chosen. Its advantages are high accuracy and scalability. The research is implemented using the Python high-level programming language. The results are presented as the mean absolute error for each region. The InceptionTime model has proved its high accuracy for this task.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Yuliia Andrusenko http://csitic.nure.ua/article/view/231827 Hybrid Scheme of Using Lightweight Cryptographic Algorithms for IoT Security 2021-05-17T19:11:29+03:00 Oleksii Liashenko oleksii.liashenko@nure.ua Oleh Zhurylo oleh.zhurylo@nure.ua Kateryna Komarets Kateryna.Komarets@nure.ua Serhii Liashenko Serhii.Liashenko@a.com <p>------------------</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksii Liashenko, Oleh Zhurylo, Kateryna Komarets, Serhii Liashenko http://csitic.nure.ua/article/view/231828 Analyze and use neural networks for intrusion detection 2021-05-17T19:20:13+03:00 Oleksii Liashenko oleksii.liashenko@nure.ua Denys Holtsev Denys.Holtsev@nure.ua Vladyslav Diachenko Vladyslav.Diachenko@nure.ua Serhii Liashenko Serhii.Liashenko@a.com <p>---------------------------------------------</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksii Liashenko, Denys Holtsev, Vladyslav Diachenko, Serhii Liashenko http://csitic.nure.ua/article/view/231830 Territory Modeling With Computer Graphics, Rendering and Geographic Information Systems 2021-05-17T19:29:54+03:00 Dmytro Karnaukhov dmytro.karnaukhov@nure.ua Nataliia Yeromina nataliia.yeromina@nure.ua <p>The main goal of this thesis is to analyze existing technologies for three-dimensional modeling of architectural objects, including a comprehensive analysis of the adjacent territory. Visualization of the object and the corresponding relief, complemented by powerful analytical capabilities. It is carried out with the proposed effective set of tools in the environment of a geographic information system. The considered proposals for the use of three-dimensional modeling programs in geographic information systems will significantly simplify and improve interactions with them, as well as expand their areas of application.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Dmytro Karnaukhov, Nataliia Yeromina http://csitic.nure.ua/article/view/231832 Functionality and Usage of ACeSYRI Portal 2021-05-17T19:38:33+03:00 Vitaly Levashenko vitaly.levashenko@fri.uniza.sk Martin Lukac martin.lukac@nu.edu.kz <p>Created Advanced Centre for PhD students and young researchers in informatics (ACeSYRI) is provide an innovative infrastructure for international cooperation among students, researchers, and teaching staff of Partner Countries and EU universities. ACeSYRI portal is one of the essential parts of this Centre. This portal connects representatives of three target groups: (a) young researchers (Master and PhD students) from Partner Countries; (b) their scientific supervisors from national Universities; and (c) potential co-advisors of PhD thesis from foreign universities. The goal, functionality, and usage of the ACeSYRI portal are presented at the paper.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Vitaly Levashenko, Martin Lukac http://csitic.nure.ua/article/view/231833 Predicting Traffic Anomalies in Container Virtualization 2021-05-17T19:48:41+03:00 Nina Kuchuk nina_kuchuk@ukr.net Andriy Kovalenko andriy.kovalenko@nure.ua Vitalii Tkachov vitalii.tkachov@nure.ua Dmytro Rosinskiy dmytro.rosinskyi@nure.ua Heorhii Kuchuk kuchuk56@ukr.net <p>Container solutions have a number of advantages over traditional ones. However, as the number of containers grows, the management complexity factor grows exponentially. In this case, the occurrence of traffic anomalies leads to deviations from the required QoS parameters. A method for predicting traffic anomalies in container virtualization has been developed. The method takes into account the peculiarities of traffic generated by a pool of containers under the control of a special system that ensures its routing and balancing in the environment of a computer system. Therefore, to predict traffic anomalies during container virtualization, it is necessary to analyze changes in the Hurst parameter.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Nina Kuchuk , Andriy Kovalenko , Vitalii Tkachov , Dmytro Rosinskiy , Heorhii Kuchuk http://csitic.nure.ua/article/view/232774 Adaptive Visual Mobile Robot Control 2021-05-28T11:30:03+03:00 Artem Bronnikov artem.bronnikov@nure.ua <p>The work is devoted to modern Industry 4.0 approaches, such as mobile robot visual control on manufacturing plant. The main idea is a solution of the actual problem a flexible integrated robotic system control using an adaptive visual control system. The research methods are based on the usage of the research results analysis of modern theoretical and applied developments of native and foreign scientists in the field of adaptive visual control models and methods. Information and software support for the control system for a mobile transport robot has been developed, practically realizes the analysis of the working space using a computer / technical vision system and provides the selection of the main objects of the workspace, the identification of work and individual objects of space, obtaining their spatial coordinates, which improves the quality and speed of functioning flexible integrated robotic system.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Artem Bronnikov http://csitic.nure.ua/article/view/232778 Production Workspace Obstacle Avoidance Mobile Robot Trajectory Modeling 2021-05-28T11:40:11+03:00 Igor Nevludov igor.nevliudov@nure.ua Sergiy Novoselov sergiy.novoselov@nure.ua Oksana Sychova oksana.sychova@nure.ua Serhii Tesliuk serhii.tesliuk@nure.ua <p>The paper describes a method for determining the trajectory of a mobile robot inside a production workspace among obstacles. To determine the path of movement, a navigation system is used, which determines the robot's own coordinates, plans the trajectory at the current time and controls its movement. A software tool for modeling the behavior of a mobile robot taking into account the properties of its mechatronic platform is proposed. The model of the adaptive control system of the mobile platform is described. The block diagram of the program for modeling the method of finding the optimal way to move a mobile platform among uncertain obstacles is considered. The simulation results are given.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Igor Nevludov, Sergiy Novoselov, Oksana Sychova, Serhii Tesliuk http://csitic.nure.ua/article/view/232783 Research on the Properties of Complex Signal Ensembles Obtained by Frequency Segments Permutation 2021-05-28T11:50:24+03:00 Volodymyr Lysechko volodymyr.lysechko@gmail.com Oleksandr Zhuchenko volodymyr.lysechko@gmail.com Iryna Kovtun volodymyr.lysechko@gmail.com Serhii Indyk volodymyr.lysechko@gmail.com <p><em>For cognitive telecommunication systems, the problem of reducing the level of multiple access interference (intrasystem interference), which occur during the simultaneous operation of different subscribers of one system in a common frequency band, is relevant. To this end, the formation methods of large ensembles of complex signals obtained by permutation of the frequency segments of the output sequences with a low level of interaction in the time domain, have been developed [1]. The cross-correlation level of the received signals shows the degree of signal interaction in the time domain and, thus, makes it possible to assess the level of multiple access problems in the cognitive telecommunication system. An important task is to determine the maximum emission level of the cross-correlation functions of the resulting complex signal ensembles depending on the filtering bands and, accordingly, their impact on the volume of the ensembles. Also, the dependence of multiple access interference level on the number and duration of pulses in the output sequences, which are used to form complex signal ensembles based on the frequency segments permutations, was interesting. The solution of these problems will make it possible to simplify the procedure for determining the width of the filter bands for the formation of complex signal ensembles by permutation of frequency segments.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Volodymyr Lysechko, Oleksandr Zhuchenko, Iryna Kovtun, Serhii Indyk http://csitic.nure.ua/article/view/232786 Double-Circuit Organization of a Distributed Computer System for the Effective Control of ITS Functioning 2021-05-28T12:16:29+03:00 Vadym Mukhin v_mukhin@i.ua Yaroslav Kornaga v_mukhin@i.ua Valery Zavgorodnii zavgorodnii@i.ua Maksym Basaliy v_mukhin@i.ua Oleg Mukhin v_mukhin@i.ua <p>The ensuring of the continuous control and software updates in the control nodes of a distributed data processing system requires the development of a network structure in such a way that a group of control nodes supports the functioning of its subnetwork and, if necessary, may transfer the data processing to the another group of control nodes. This structure consists of two circuits: a control node circuit and a data circuit.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Vadym Mukhin, Yaroslav Kornaga, Valery Zavgorodnii, Maksym Basaliy, Oleg Mukhin http://csitic.nure.ua/article/view/232798 Determining the factors affecting the stability of enterprise functioning 2021-05-28T12:23:52+03:00 Kirill Khrustalev kirill.khrustalev@nure.ua Igor Ruban ihor.ruban@nure.ua Sofiia Khrustalova sofiia.khrustalova@nure.ua Artur Melezhyk artur.melezhyk@nure.ua <p>The paper analysis and highlights are the main factors of internal and external environment that affects the stable functioning of the enterprise. The factor “energetics”, which is necessary to take into account while elaborating of intellectual system of evaluation of the condition of stable functioning of enterprise was grounded<em>.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Kirill Khrustalev, Igor Ruban, Sofiia Khrustalova, Artur Melezhyk http://csitic.nure.ua/article/view/232804 Intelligent Tools for Service Robotic System 2021-05-28T12:35:10+03:00 Oleksandr Tsymbal oleksandr.tsymbal@nure.ua <p>There is provided an analysis of flexible integrated systems of development for industrial application. Report shows an increasing importance of intelligent components for service robotic units, making supplement operations in production workspaces. There are considered the basic requirements for intelligent decision-making support systems, which can be introduced to production systems to solve the service tasks of different levels.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Tsymbal http://csitic.nure.ua/article/view/232809 Implementation of a Software Application for Researching the Face Recognition Algorithm 2021-05-28T12:44:30+03:00 Oleksandr Mordyk oleksandr.mordyk@nure.ua Olekdandr Tsymbal oleksandr.tsymbal@nure.ua <p>Deep learning has recently attracted more and more interest in face recognition. Face recognition is a computer vision problem. There may be slight differences in the faces of humans but overall, it is safe to say that there are certain features that are associated with all the human faces.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Mordyk, Olekdandr Tsymbal http://csitic.nure.ua/article/view/232889 Method of Annotating a Collection of Text Documents 2021-05-30T04:39:50+03:00 Olesia Barkovska d_ec@nure.ua Vitalii Vodolazkyi d_ec@nure.ua <p>The work is devoted to the analysis of methods for annotating text documents, the relevance of which is due to the fact that when familiarizing with the information object presented in text form, reading the annotation by the reader is very much in demand, since it can reduce the time for selecting the necessary sources by several times. The paper considers the method of automatic annotation SumBasic, based on the probabilistic approach. An approach to data decomposition in each of the separate modules that ensure the operation of the method is proposed.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Olesia Barkovska, Vitalii Vodolazkyi http://csitic.nure.ua/article/view/232890 A Study of the Influence of Computing Systems on The Text Vectorization Speed 2021-05-30T04:58:48+03:00 Olesia Barkovska d_ec@nure.ua Vladyslav Kholiev d_ec@nure.ua <p>The paper considers a relevant problem of accelerating the speed of text processing. The relevance of the development and modernization of electronic library systems results from the growing need for remote access to information objects. The purpose of the study is to reduce the execution time of one of the text processing methods at the stage of information accumulation, namely, vectorization. The results show that it is possible to achieve a greater acceleration of vectorization of small texts (874 words) on multiprocessor computing systems. Systems with massive parallelism produce good results (speedup up to 4.5 times) for large texts (8348 words).</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Olesia Barkovska, Vladyslav Kholiev http://csitic.nure.ua/article/view/232891 Using OpenMP Directives to Accelerate OCR with Tesseract OCR 2021-05-30T05:07:37+03:00 Olesia Barkovska d_ec@nure.ua Ihor Ryzhov d_ec@nure.ua <p>This &nbsp;paper is devoted the methods of speed-up optical character recognition which is used for transformation of the scanned image to the edited text format. The example of application of these methods are the systems of the automated search of fragment of text in the catalogues of electronic libraries, where as an entrance format both the entered text and vocal query or scanned fragment of the text document can be used. The paper shows that the quality of the original image, as well as the applied image preprocessing algorithms, has the greatest influence on the quality of text recognition. Today the task of text recognition is implemented in many libraries.&nbsp; An example is the Tesseract OCR, considered in the work. It is shown that the joint use of the standard parallel programming library OpenMP, which is built into all modern C and C ++ compilers, reduces the time of processing up to 33% compared to the sequential implementation.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Olesia Barkovska, Ihor Ryzhov http://csitic.nure.ua/article/view/232892 Accelerated Localization of the Iris as an Element of the Biometric System 2021-05-30T05:13:17+03:00 Olesia Barkovska d_ec@nure.ua Yevhenii Bas d_ec@nure.ua <p>This work is devoted to the topic of localization and recognition of the unique and complex pattern of the iris, which is one of the elements of the biometric identification system along with such characteristics as fingerprints, palm prints, gestures, and facial features. The paper examines the performance of the algorithm for the localization and separation of the iris on the central and graphic processors using CUDA technology.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Olesia Barkovska, Yevhenii Bas http://csitic.nure.ua/article/view/232893 Preliminary assessment on Choosing a Cloud Platform 2021-05-30T05:20:08+03:00 Vladimir Sayenko vladimir.sayenko@nure.ua <p>The fast progress of information technology has led to significant changes in the functionality of cloud platforms. First of all, this affected the development of cloud services. The quantity of cloud platform grows. Cloud platforms are becoming more and more different from each other. The choice of a specific platform for complex information systems&nbsp; is an actual task. An advanced method on the choice of a cloud platform for designing information system is proposed. The method is based on the development of existing approaches, taking into account the changes in the functionality of the platforms.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Vladimir Sayenko http://csitic.nure.ua/article/view/232894 Concept and Method for Development of Corporate Information System 2021-05-30T05:31:22+03:00 Viktor Borysenko viktor.borysenko@nure.ua Tatjana Borysenko tetiana.borysenko@nure.ua <p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">The report covers modern method for development of Corporate Information System (CIS). The main system-technical effect of the introduction of CIS lies in the transition from a localized, poorly synchronized, heterogeneous set of autonomous systems to a single, integrated, system architecture, which is built on the basis of a universal set of modern service tools</span></span></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Viktor Borysenko, Tatjana Borysenko http://csitic.nure.ua/article/view/232895 The Air Humidity Accuracy Improving by Separating the Humidifier Functions 2021-05-30T05:43:42+03:00 Dariia Varchenko dariia.varchenko@nure.ua Alina Komashchuk alina.komashchuk@nure.ua <p>The article proposes a new approach to increasing the air humidity indicators measuring accuracy. The "smart" air humidification system implementation based on built-in systems with all the advantages and disadvantages is proposed and considered. The basis of the embedded system is a microcontroller with Wi-Fi function. The server or mobile application implementation as a graphical user interface (GUI) for monitoring the operation of the system as a whole is considered.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Dariia Varchenko, Alina Komashchuk http://csitic.nure.ua/article/view/232896 The Usage of The Technology of Constructing “AS-IS” Models of Initial Maturity Levels of Process Management 2021-05-30T05:51:42+03:00 Ievgen Bogatov bogatovevgeniy@gmail.com Serhii Chalyi serhii.chalyi@nure.ua <p>Research of enterprise maturity levels has shown that enterprises above the second maturity level have well-structured and documented processes. At the same time, systems of maturity level below the second don’t operate processes at all. Instead, such systems have workflows as an analogy of processes. Building of “as-is” model with Process Mining technology is complicated for such kind of systems due to the inconsistency of log structures of the management systems to requirements defined by the mining technology. To resolve the constraints the technology of construction of graph models of business processes of zero and first maturity levels of process management on the basis of the analysis of event logs is offered. The technology involves structuring the event log, building graph models of workflows of the system, forming business process logs by combining routes, and building graph models of workflows "as is" by means of intellectual analysis of processes.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Ievgen Bogatov, Serhii Chalyi http://csitic.nure.ua/article/view/232899 The Construction of Explanations in Intelligent Systems on the Basis of Interactive Clarification of the Decision’s Reasons 2021-05-30T06:13:25+03:00 Volodymyr Leshchynskyi volodymyr.leshchynskyi@nure.ua Irina Leshchynska iryna.leshchynska@nure.ua <p>The problem of interactive formation of explanations in intelligent information systems, as a problem of interactive interpretation and substantiation of stages of decision-making is considered. A combined approach to constructing an explanation is proposed, which combines the interpretation of the process of the intelligent system and the explanation of the obtained result. The approach implements the process of interactive clarification of the reasons for the decision as a basis for explanation.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький; Volodymyr Leshchynskyi, Irina Leshchynska http://csitic.nure.ua/article/view/232900 VNF Placement and Connectivity 2021-05-30T06:29:21+03:00 Vladlen Filippov vladlen.filippov@nure.ua Ilya Voloshin Ilya.voloshin@nure.ua Stanislav Partyka stanislav.partyka@nure.ua Oksana Baranova oksana.baranova@nure.ua <p>The Software Defined Wireless Networks is actively using NFV (network virtualization technology), which allows you to virtualize the machine network components using software.&nbsp; Launched on NFV nodes (special virtual machines Support NFV Technology) Network Software Components are called Virtualized&nbsp; Network Functions(VNF).&nbsp; To provide services to the user, a multiple VNF can be combined into one SFC chain.&nbsp; But when using the service, the user can move, which negatively affects the service.&nbsp; However, VNF can be moved to the nearest NFV node.&nbsp; In this article, we will consider several methods of dynamic VNF placement.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Vladlen Filippov, Ilya Voloshin, Stanislav Partyka, Oksana Baranova http://csitic.nure.ua/article/view/232901 End-to-End Delay Model of the Main Types Satellites for VoIP-telephony over Satellite Links 2021-05-30T06:37:12+03:00 Bilash Dmytro dmytro.bilash@nure.ua Bondarenko Maksym bondarenko@ieee.org Sergiy Lukashov Serhii.Liashenko@a.com <p>Over the past few decades, the Internet has become the world's information superhighway, leading to the development of new applications and services. Among them, Voice over IP (VoIP) is one of the most promising industries. Voice over Internet Protocol (VoIP or IP) telephony is a new way of communication.&nbsp; This technology allows users to make calls over a network using Internet protocols. This paper will describe VoIP-telephony, to demonstrate the ability of people to communicate through the Internet, which works via satellite links. The research in this paper demonstrates the basic formula of the latency model when using any type of satellite network such as LEO, GEO, and MEO systems for IP-telephony. In addition, this work provides methods for reducing the latency.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Bilash Dmytro, Bondarenko Maksym http://csitic.nure.ua/article/view/232902 QoS Routing Model over Disjoint Paths with Guaranteed Bandwidth in Software-Defined Networks 2021-05-30T06:46:18+03:00 Oleksandr Lemeshko oleksandr.lemeshko.ua@ieee.org Oleksandra Yeremenko oleksandra.yeremenko.ua@ieee.org Maryna Yevdokymenko maryna.yevdokymenko@ieee.org Batoul Sleiman sleimanbatoul@hotmail.com <p>A mathematical model for calculating disjoint paths that provide guaranteed bandwidth in the data plane of software-defined telecommunication networks is proposed. The advantage of the solution is the formulation of the routing problem in the optimization form using bilinear conditions to ensure guaranteed bandwidth over the set of calculated paths (multipath). At the same time, the choice of the optimality criterion is determined by the requirements for the level of network security and/or Quality of Service.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Batoul Sleiman http://csitic.nure.ua/article/view/232903 Securing the Internet of Things via VPN technology 2021-05-30T06:53:05+03:00 Mykhailo Hunko hunko@ieee.org Igor Ruban ihor.ruban@nure.ua Kateryna Hvozdetska kateryna.hvozdetska@ieee.org <p>The speed at which the Internet of Things is evolving these days looks promising for the smart environment of the future. Along with the popularity of smart devices, concerns about the security of IoT devices are also growing because they are inherently resource-constrained, heterogeneous and they suffer from a lack of standard security controls or protocols. In particular, because of their inability to support today's secure network protocols and security mechanisms, standard security solutions are not suitable for dynamic Internet of Things environments that require large and smart infrastructure deployments. Current Internet of Things environments use predominantly cloud-based approaches so that data can be exchanged in unlimited quantities, leading to additional security and privacy risks. While standard security protocols such as virtual private networks have recently been implemented for certain Internet of Things environments, the implementation models presented have few variations and are virtually unscalable for any dynamically scalable Internet of Things deployment.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький; Mykhailo Hunko, Igor Ruban, Kateryna Hvozdetska http://csitic.nure.ua/article/view/232904 Analysis and Selection Performance Indicators Multiservice Communication Networks Based on the Concept NGN and FN 2021-05-30T07:01:30+03:00 Ibrahimov Bayram Ganimat i.bayram@mail.ru Hashimov Elshan Qiyas hasimovel@gmail.com <p>The performance indicators of multiservice commu-nication networks, built in accordance with the con-cept NGN (Next Generation Network) and FN (Fu-ture Network) based on promising telecommunica-tion and information technologies, have been ana-lyzed. The issues of efficiency transmission useful and service traffic by a multifunctional hardware-software complex in the links multiservice commu-nication networks are considered and their struc-tural and functional diagram is proposed. The prob-lems choosing the necessary performance indica-tors hardware and software systems and terminal facilities are considered, taking into account the probabilistic-temporal and speed characteristics multiservice communication networks based on the concept NGN and FN. Analytical expressions are obtained that make it possible to assess the complex performance indicators network link in the provi-sion multimedia services and when establishing a connection.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький; Ibrahimov Bayram Ganimat, Hashimov Elshan Qiyas http://csitic.nure.ua/article/view/231856 Analysis of the Current State of Self-healing Systems 2021-05-18T07:45:57+03:00 Igor Ruban ihor.ruban@nure.ua Valentyn Lebediev valentyn.lebediev@nure.ua <p>Recently, growing interest in the class of so-called self-healing systems. As you know, if the maintenance of the IT infrastructure of the enterprise is associated with the maintenance of only a few servers and a pair of switches, then usually everything works well and with manual control. However, when the number of servers grows and begins to be calculated by tens, some of them have to be temporarily suspended for periods of downtime, the service becomes a complex process. The search for acceptable solutions forced the market to "remember" the technology of autonomous computing (autonomic computing). The process of introduction of tools of autonomics calculations into IT system, realizing the mechanism of self-regulation with a possibility of self-restoration of the initial condition existing before the beginning of disturbances is considered.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Igor Ruban, Valentyn Lebediev http://csitic.nure.ua/article/view/231858 Features of the Estimation of the Compromising Emanations Level of a Modern Electronic Computer Videotract 2021-05-18T08:02:33+03:00 Viktoriia Perepadia vita.perepadya@gmail.com Volodymyr Zabolotnyj volodymyr.zabolotnyi@nure.ua <p>The paper shows the features of the estimation of the compromising emanations level of a modern electronic computer videotract. Particular attention is paid to describing the differences between analog and digital data transfer interface, as well as the structural characteristics of the respective signals. It is proved that there are no differences in the context of digital signal reception due to compromising emanations of the modern computer videotract by the optimal receiver of a technical intelligence device, which allows the application of appropriate techniques designed to receive an analog signal.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Viktoriia Perepadia, Volodymyr Zabolotnyj http://csitic.nure.ua/article/view/231860 Enterprise Security Operations Center 2021-05-18T08:36:06+03:00 Oleksandr Sievierinov oleksandr.sievierinov@nure.ua Marharyta Ovcharenko marharyta.ovcharenko@nure.ua Andrii Vlasov andrii.vlasov@nure.ua <p>This article examines the main components of enterprise security operations centers. The main particular models of enterprise security operations centers are considered - classic, MDR and mixed. Also considered and characterized the main levels of SOC implementation in the enterprise.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Sievierinov, Marharyta Ovcharenko, Andrii Vlasov http://csitic.nure.ua/article/view/231864 Securing Bearer token in OAuth2.0 2021-05-18T11:00:22+03:00 Oleksii Sievierinov oleksandr.sievierinov@nure.ua Oleh Kholosha oleh.kholosha@nure.ua <p>This article provides information about the bearer token in Oauth2.0. Considered the threats to which the bearer token is exposed in Oauth, suggested recommendations for the safe use of this type of token.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksii Sievierinov, Oleh Kholosha http://csitic.nure.ua/article/view/232170 Security of Web Applications Using AWS Cloud Provider 2021-05-21T06:29:27+03:00 Vladyslav Lysakov vladyslav.lysakov@nure.ua Oleksandr Sievierinov oleksandr.sievierinov@nure.ua Igor Taran igor.taran@nure.ua <p><em>The services of the AWS cloud provider on information security are analyzed. The paper deals with a method of authentication of web application users using the AWS Cognito service. There is described the process of verifying access to a web resource.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Vladyslav Lysakov, Oleksandr Sievierinov, Igor Taran http://csitic.nure.ua/article/view/232174 The Overview of Decentralized Systems Scaling Methods 2021-05-21T06:49:41+03:00 Oleksandr Marukhnenko oleksandr.marukhnenko@nure.ua Gennady Khalimov hennadii.khalimov@nure.ua <p><em>Decentralized systems and protocols are becoming more popular every year. The main limitations of public permissionless blockchains are low bandwidth and high fees. There are various ways to reduce the load on the network to address these drawbacks, the majority of them were developed for Ethereum but stay valid for many other chains. The paper considers the following options for scaling decentralized systems: consensus modification and sharding that are embedded in the core of a blockchain, second layer solutions and sidechains that can be built on top of a network.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Marukhnenko, Gennady Khalimov http://csitic.nure.ua/article/view/232176 Hard Problems for Non-abelian Group Cryptography 2021-05-21T06:59:32+03:00 Yevgen Kotukh yevgenkotukh@gmail.com Gennady Khalimov hennadii.khalimov@nure.ua <p>The security of the DH key exchange protocol and many other public&nbsp; key cryptosystems such as RSA,&nbsp;&nbsp;&nbsp; ElGamal and ECC is based on the assumption that complex mathematical problems such as factorization (FP), discrete logarithm over finite fields (DLP), or elliptical curves (ECDLP) are intractable. The implementation of Shor and Grover's algorithms reduces the security of cryptosystems based on the intractability of these problems.<strong>&nbsp; </strong></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Yevgen Kotukh, Gennady Khalimov http://csitic.nure.ua/article/view/232178 Software and Hardware Simulator of Company Security Audit 2021-05-21T07:13:29+03:00 Illia Fedorov illia.fedorov@nure.ua Gennady Khalimov hennadii.khalimov@nure.ua <p>To ensure the tasks of training professionals in the field of cybersecurity, a software and hardware complex has been created that provides training in various methods of protecting information and countering attacks. The possibilities of the complex are considered, as well as the experiments that were carried out during its development.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Illia Fedorov, Gennady Khalimov http://csitic.nure.ua/article/view/232181 Improvement of the Task Scheduler Model Taking Into Account the Heterogeneity of the Entities 2021-05-21T07:39:32+03:00 Serhii Semenov serhii.semenov@khpi.edu.ua Maksym Bartosh maksym.bartosh@khpi.edu.ua Viacheslav Davydov viacheslav.davydov@khpi.edu.ua Oleksii Turuta oleksii.turuta@nure.ua <p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">In the modern world, the need and requirements for the efficiency of using net-work computing resources that perform key functions of automating data pro-cessing and storage are significantly increasing. These factors require improvements to existing task schedulers to handle them.The purpose of the work presented in this article is to study existing models of task scheduling and improve models of task scheduling, taking into account the heterogeneity of entities, which will reduce time costs and increase the efficiency of using existing resources of computer systems.In this paper, the methods of GERT-network modeling are used to study the scheme of the scheduler of data dissemination tasks in real time by mathematical formalization of the scheduling process of data dissemination tasks.As a result, a model was developed for the planning of data dissemination tasks, which made it possible to reduce time costs and increase the efficiency of using existing resources of computer systems.</span></span></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Serhii Semenov, Maksym Bartosh, Viacheslav Davydov, Oleksii Turuta http://csitic.nure.ua/article/view/232185 Measuring Vulnerability in Threat Modeling With Risk Matrix 2021-05-21T07:59:08+03:00 Andrii Hapon gapon.andrei@gmail.com Volodimir Fedorchenko volodymyr.fedorchenko@nure.ua <p>Threat modeling is one of the most important parts when it comes to security in development of programing product. The main challenges for that are time and prioritization of the scope of work. Risk matrix is effective tool for making clear what should be done first and which consequences can be. There are few levels of consequences which are ranged by the influence on business. With help of vulnerability assessment threats can be measured by impact on confidentiality, integrity, and availability. The Common Vulnerability Scoring System is appropriate tool for catching the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Andrii Hapon, Volodimir Fedorchenko http://csitic.nure.ua/article/view/232201 Model for Providing the Second Factor of Authentication Into Authentication Services with Centralized Account Databases 2021-05-21T11:05:45+03:00 Bohdan Rezanov Bohdan.Rezanov@khpi.edu.ua Anna Semenova Anna.Semenova@khpi.edu.ua Inna Petrovska Inna.Petrovska@khpi.edu.ua Tetiana Fesenko Tetiana.Fesenko@nure.ua <p>The study developed a&nbsp; model for providing the second factor of authentication into authentication services with centralized account databases.This paper focuses on developing a model for providing the second factor of authentication into authentication services with centralized account databases.The paper describes the modeling methods, the modeling method based on PERT networks is described in detail. Is described the model of the process of integration of the second factor in authentication services with centralized account databases on the basis of mathematical formalization technology based on PERT, the sequence diagram of modules interaction at change password in the external target system (authentication service with centralized account database), PERT diagram representing time spent for the execution of each module on a certain stage.</p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Bohdan Rezanov, Anna Semenova, Inna Petrovska, Tetiana Fesenko http://csitic.nure.ua/article/view/232202 Analysis of Variations in Biometric Authentication Methods in Mobile Devices 2021-05-21T11:15:32+03:00 Oleksandr Sievierinov oleksandr.sievierinov@nure.ua Lesia Bilan lesia.bilan@nure.ua <p><em>The analysis of variability of biometric authentication methods was carried out, the classification of biometric methods was examined. To ensure the required level of protection, it is recommended to use rich-factor authentication.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Oleksandr Sievierinov, Lesia Bilan http://csitic.nure.ua/article/view/232204 Ways of protecting the CMS WordPress-based sites 2021-05-21T11:24:25+03:00 Maksym Akshentsev maksym.akshentsev@nure.ua Gennady Khalimov hennadii.khalimov@nure.ua <p><em>WordPress is the most popular software for websites or blogs as millions of users use it today. It allows customizing the site to one’s own tastes and needs without spending money and regardless of the technical skills of the user. Yet, incorrect configuration and/or usage of untested external software (e.g. plugins and graphical environments) may lead the site to compromisation. The paper has reviewing of ways to increase the security of a WordPress-based web resource as its goal.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький http://csitic.nure.ua/article/view/232206 Evaluation and Decision-Making System as Vulnerability Management Process in Information and Telecommunication Systems 2021-05-21T11:36:11+03:00 Vadym Poddubnyi vadym.poddubnyi@nure.ua Roman Gvozdov roman.hvozdov@nure.ua Oleksandr Sievierinov oleksandr.sievierinov@nure.ua Vitalii Martovytskyi vitalii.martovytskyi@nure.ua <p><em>This article proposes a system for risk assessment and management of software vulnerabilities. Such a system should function as part of the security policy of information security management systems.</em></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Віталій Олександрович Мартовицький; Vadym Poddubnyi , Roman Gvozdov, Oleksandr Sievierinov, Vitalii Martovytskyi http://csitic.nure.ua/article/view/232208 Development of Computer State Identification Method Based on Boosting Ensemble 2021-05-21T11:44:38+03:00 Viktor Chelak victor.chelak@gmail.com Svitlana Gavrylenko gavrilenko08@gmail.com <p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">This work is about developing a modification of boosting method by using a special preprocessing procedure to improve the accuracy of computer system state identification. The aim of the research is to develop method for detection computer threats, malware, etc.</span></span> <span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">Experimental research have confirmed the effectiveness of the proposed method, which makes it possible to recommend it for practical use in order to improve the accuracy of identifying the state of the computer system. Prospects for further research may be to develop an ensemble of fuzzy decision trees based on the proposed method, optimizing their software implementation.</span></span></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Viktor Cheak, Svitlana Gavrylenko http://csitic.nure.ua/article/view/232209 Research of the Quality of Functioning Multiservice Communication Networks When Establishing a Multimedia Session 2021-05-21T11:52:34+03:00 Bayram Ganimat Ibrаhimov bayram@mail.ru Arif Hasan Hasanov arifhasan2828@yandex.ru <p class="Abstract" style="line-height: 92%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 92%; font-weight: normal;">Considering the nature of a network traffic systems and the signaling protocols NGN/IMS, the mathematical model of multimedia service considering joint service of the official and useful traffic when rendering multimedia services is offered. </span></span></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Bayram Ganimat Ibrаhimov, Arif Hasan Hasanov http://csitic.nure.ua/article/view/232210 Research and Analysis of the Effectiveness Multiservice Communication Networks NGN/IMS 2021-05-21T11:58:33+03:00 Bayram Ganimat Ibrаhimov bayram@mail.ru Aziz Mashalla Talibov aziztalibov@mail.ru <p class="Abstract" style="line-height: 95%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 95%; font-weight: normal;">The subject of the study is multiservice communication network using the concept NGN (Next Generation Network) based on the open network architecture IMS (Internet Protocol Multimedia Subsystem), supporting a wide range of services. The purpose of the article is to analyze the existing technical capabilities of the IMS multimedia messaging subsystem and perspective solutions for the functioning of the NGN/IMS network efficiency in providing multimedia services.</span></span></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Bayram Ganimat Ibrаhimov, Aziz Mashalla Talibov http://csitic.nure.ua/article/view/232212 The Role of Modern Technology-Based Systems in the Organization of Interaction in the Army 2021-05-21T12:04:24+03:00 Katekhliyev Vusal Muhammad katexlivusal1987@gmail.com <p class="Abstract" style="line-height: 95%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 95%; font-weight: normal;">Timely and secure processing, transmission, reception and analysis of information is the highest priority when organizing the interaction of different types of troops. To address these issues, surveillance, intelligence and combat management tools, computer-based electronic data analysis systems are widely used.</span></span></p> 2021-05-30T00:00:00+03:00 Copyright (c) 2021 Katekhliyev Vusal Muhammad