http://csitic.nure.ua/issue/feedCOMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES2021-05-30T14:53:24+03:00Vitalii Martovytskyiinfo@csitic.comOpen Journal Systems<p style="text-align: center;"><strong><span style="color: #000080; font-size: 12pt;">Welcome to the website</span></strong></p> <p style="text-align: center;"><span style="color: #000080;">of the International Scientific and Technical Conference </span></p> <p style="text-align: center;"><span style="color: #000080;"><strong><span style="font-size: 16pt;">COMPUTER AND INFORMATION</span></strong></span></p> <p style="text-align: center;"><span style="color: #000080;"><strong><span style="font-size: 16pt;"> SYSTEMS AND TECHNOLOGIES</span></strong></span></p> <p style="text-align: center;"><span style="color: #000000;"><strong><span style="font-size: 12pt;">Topics:</span></strong></span></p> <p style="text-align: justify;"><span style="color: #000000;">- Perspective and reliable systems;<br />- Integrated and distributed systems;<br />- Cybersecurity and safety;<br />- Systems and technologies based on NoC, SoC, SiP, FPGA;<br />- IT-infrastructure, IT-systems and services;<br />- Formal methods for development and verification;<br />- Verification, testing, diagnostics and testing of components and systems;<br />- Cooperation between universities and IT-industry;<br />- Databases (computer system for data registration and processing);<br />- Infocommunications.</span></p> <p style="text-align: center;"><span style="color: #000000;"><strong><span style="font-size: 12pt;">Main issues:</span></strong></span></p> <p style="text-align: justify;">- Development and operation of computer and informational systems;<br />- Reliability and safety technologies for computer and information systems;<br />- Flexible integrated systems and robotics;<br />- Design, implementation and operation of information systems and technologies<br />- Infocommunication networks and technologies.</p>http://csitic.nure.ua/article/view/231722Methods for Automating Development Processes and Deployment of Microservice Applications2021-05-17T08:31:58+03:00Oleksandr Koshedranoleksandr.koshedran@nure.uaVitaliy Tkachovvitalii.tkachov@nure.ua<p>The presented work is devoted to automation CI/CD<br>pipeline for deploying microservices. Main methodologies and<br>practices of software products development are considered:<br>Waterfall, Agile, Scrum, Kanban and DevOps as well as<br>detailed description of them. Developed and deployed a CI /<br>CD process to automate web application deployment using a<br>variety of software tools such as Kubernetes and Jenkins.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Koshedran, Vitaliy Tkachovhttp://csitic.nure.ua/article/view/231737Methods of Construction of Overline Infrastructures in the Cloud Environment2021-05-17T10:27:45+03:00Yevhen Laptiiyevhen.laptii@nure.uaVitalii Tkachovvitalii.tkachov@nure.ua<p><em>The aim of the work is to develop a system for automatic deployment, configuration, and monitoring of web applications with the most popular cloud providers such as (Amazon, Google, Microsoft). The system interacts with a web application whose server part is written in python (flask). This server uses other tools such as Terraform, Ansible, Docker, Grafana, Influxdb, Telegraf, and others.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Yevhen Laptii, Vitalii Tkachovhttp://csitic.nure.ua/article/view/231817Personalized Glucose Prediction Model for Patients With Type I Diabetes2021-05-17T17:51:00+03:00Ghenadie Usicghenv@gmail.com<p>This paper represents an attempt to use machine learning techniques to personalize glucose predictions for patients with type I diabetes (T1D). The study aims at proposing a personalized model, capable to provide real-time blood glucose estimations, taking into consideration patient’s health preconditions. The proposed model represents a neural network based on the use of Self-Organized Maps (SOM). It was elaborated using data from 5 patients with T1D, collected with help of a specially created for these purposes support system and pre-trained using a clinical dataset. The study lasted for 3 months.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Ghenadie Usichttp://csitic.nure.ua/article/view/231818Model of Integration of Voice Assistants in the Construction of Web Applications2021-05-17T18:01:13+03:00Mykola Slisarenkomykola.slisarenko@nure.uaOleksii Liashenkooleksii.liashenko@nure.ua<p>Today, voice assistants can radically change the interaction of computer users. For many users, the ability to read and print is impossible to access information. Voice assistants can fill the information gap for these users. Embedding these capabilities in today's consumer technology would be much more cost-effective than specially designed devices and many users would find it convenient to control these devices.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Mykola Slisarenko, Oleksii Liashenkohttp://csitic.nure.ua/article/view/231819Review of Approaches to Diagnosis of Post-Traumatic Stress Disorders2021-05-17T18:38:16+03:00Nelia Miroshnichenkonelia.miroshnychenko@nure.uaIryna Perovairyna.perova@nure.ua<p><em>Many doctors of various specialties throughout Ukraine meet internally displaced persons and combatants from the eastern regions of Ukraine among their patients. Given that such events are taking place on the territory of Ukraine for the first time in all the years of independence, they are unusual, atypical, such that they go beyond the ordinary. This, in turn, has a significant impact on the mental life of Ukrainians - both those in areas where the confrontation continues, and those who lead a peaceful life.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицький; Nelia Miroshnichenko, Iryna Perovahttp://csitic.nure.ua/article/view/231821Security system development for “Smart House”2021-05-17T18:49:03+03:00Yuliia Ivanenko yuliia.nazarenko@nure.uaAnastasiia Hliuzaanastasiia.hliuza@nure.uaDenys Honcharenko denys.honcharenko@nure.uaOleksii Liashenkooleksii.liashenko@nure.ua<p>The best minds of humanity are constantly developing new technologies to improve human life and provide comfort. Comfort has always been one of the engines of progress, forcing human thought to invent more and more new devices to make their lives easier. One such invention was “Smart House” system.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицький; Yuliia Ivanenko , Anastasiia Hliuza, Denys Honcharenko , Oleksii Liashenkohttp://csitic.nure.ua/article/view/231823Research on CNN (Convolutional Neural Network)-based Forecasting Method2021-05-17T18:57:34+03:00Yuliia Andrusenkoyuliia.andrusenko@nure.ua<p>The article deals with the problem of predicting the COVID-19 spreading in Ukraine. This task becomes more relevant each day. From all the modern models of CNN-based time series forecasting, the InceptionTime model was chosen. Its advantages are high accuracy and scalability. The research is implemented using the Python high-level programming language. The results are presented as the mean absolute error for each region. The InceptionTime model has proved its high accuracy for this task.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Yuliia Andrusenkohttp://csitic.nure.ua/article/view/231827Hybrid Scheme of Using Lightweight Cryptographic Algorithms for IoT Security2021-05-17T19:11:29+03:00Oleksii Liashenkooleksii.liashenko@nure.uaOleh Zhurylooleh.zhurylo@nure.uaKateryna KomaretsKateryna.Komarets@nure.uaSerhii LiashenkoSerhii.Liashenko@a.com<p>------------------</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksii Liashenko, Oleh Zhurylo, Kateryna Komarets, Serhii Liashenkohttp://csitic.nure.ua/article/view/231828Analyze and use neural networks for intrusion detection2021-05-17T19:20:13+03:00Oleksii Liashenkooleksii.liashenko@nure.uaDenys HoltsevDenys.Holtsev@nure.uaVladyslav DiachenkoVladyslav.Diachenko@nure.uaSerhii LiashenkoSerhii.Liashenko@a.com<p>---------------------------------------------</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksii Liashenko, Denys Holtsev, Vladyslav Diachenko, Serhii Liashenkohttp://csitic.nure.ua/article/view/231830Territory Modeling With Computer Graphics, Rendering and Geographic Information Systems2021-05-17T19:29:54+03:00Dmytro Karnaukhovdmytro.karnaukhov@nure.uaNataliia Yerominanataliia.yeromina@nure.ua<p>The main goal of this thesis is to analyze existing technologies for three-dimensional modeling of architectural objects, including a comprehensive analysis of the adjacent territory. Visualization of the object and the corresponding relief, complemented by powerful analytical capabilities. It is carried out with the proposed effective set of tools in the environment of a geographic information system. The considered proposals for the use of three-dimensional modeling programs in geographic information systems will significantly simplify and improve interactions with them, as well as expand their areas of application.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Dmytro Karnaukhov, Nataliia Yerominahttp://csitic.nure.ua/article/view/231832Functionality and Usage of ACeSYRI Portal 2021-05-17T19:38:33+03:00Vitaly Levashenkovitaly.levashenko@fri.uniza.skMartin Lukacmartin.lukac@nu.edu.kz<p>Created Advanced Centre for PhD students and young researchers in informatics (ACeSYRI) is provide an innovative infrastructure for international cooperation among students, researchers, and teaching staff of Partner Countries and EU universities. ACeSYRI portal is one of the essential parts of this Centre. This portal connects representatives of three target groups: (a) young researchers (Master and PhD students) from Partner Countries; (b) their scientific supervisors from national Universities; and (c) potential co-advisors of PhD thesis from foreign universities. The goal, functionality, and usage of the ACeSYRI portal are presented at the paper.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Vitaly Levashenko, Martin Lukachttp://csitic.nure.ua/article/view/231833Predicting Traffic Anomalies in Container Virtualization2021-05-17T19:48:41+03:00Nina Kuchuk nina_kuchuk@ukr.netAndriy Kovalenko andriy.kovalenko@nure.uaVitalii Tkachov vitalii.tkachov@nure.uaDmytro Rosinskiy dmytro.rosinskyi@nure.uaHeorhii Kuchuk kuchuk56@ukr.net<p>Container solutions have a number of advantages over traditional ones. However, as the number of containers grows, the management complexity factor grows exponentially. In this case, the occurrence of traffic anomalies leads to deviations from the required QoS parameters. A method for predicting traffic anomalies in container virtualization has been developed. The method takes into account the peculiarities of traffic generated by a pool of containers under the control of a special system that ensures its routing and balancing in the environment of a computer system. Therefore, to predict traffic anomalies during container virtualization, it is necessary to analyze changes in the Hurst parameter.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Nina Kuchuk , Andriy Kovalenko , Vitalii Tkachov , Dmytro Rosinskiy , Heorhii Kuchuk http://csitic.nure.ua/article/view/232774Adaptive Visual Mobile Robot Control2021-05-28T11:30:03+03:00Artem Bronnikovartem.bronnikov@nure.ua<p>The work is devoted to modern Industry 4.0 approaches, such as mobile robot visual control on manufacturing plant. The main idea is a solution of the actual problem a flexible integrated robotic system control using an adaptive visual control system. The research methods are based on the usage of the research results analysis of modern theoretical and applied developments of native and foreign scientists in the field of adaptive visual control models and methods. Information and software support for the control system for a mobile transport robot has been developed, practically realizes the analysis of the working space using a computer / technical vision system and provides the selection of the main objects of the workspace, the identification of work and individual objects of space, obtaining their spatial coordinates, which improves the quality and speed of functioning flexible integrated robotic system.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Artem Bronnikovhttp://csitic.nure.ua/article/view/232778Production Workspace Obstacle Avoidance Mobile Robot Trajectory Modeling2021-05-28T11:40:11+03:00Igor Nevludovigor.nevliudov@nure.uaSergiy Novoselovsergiy.novoselov@nure.uaOksana Sychovaoksana.sychova@nure.uaSerhii Tesliukserhii.tesliuk@nure.ua<p>The paper describes a method for determining the trajectory of a mobile robot inside a production workspace among obstacles. To determine the path of movement, a navigation system is used, which determines the robot's own coordinates, plans the trajectory at the current time and controls its movement. A software tool for modeling the behavior of a mobile robot taking into account the properties of its mechatronic platform is proposed. The model of the adaptive control system of the mobile platform is described. The block diagram of the program for modeling the method of finding the optimal way to move a mobile platform among uncertain obstacles is considered. The simulation results are given.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Igor Nevludov, Sergiy Novoselov, Oksana Sychova, Serhii Tesliukhttp://csitic.nure.ua/article/view/232783Research on the Properties of Complex Signal Ensembles Obtained by Frequency Segments Permutation 2021-05-28T11:50:24+03:00Volodymyr Lysechkovolodymyr.lysechko@gmail.comOleksandr Zhuchenkovolodymyr.lysechko@gmail.comIryna Kovtunvolodymyr.lysechko@gmail.comSerhii Indykvolodymyr.lysechko@gmail.com<p><em>For cognitive telecommunication systems, the problem of reducing the level of multiple access interference (intrasystem interference), which occur during the simultaneous operation of different subscribers of one system in a common frequency band, is relevant. To this end, the formation methods of large ensembles of complex signals obtained by permutation of the frequency segments of the output sequences with a low level of interaction in the time domain, have been developed [1]. The cross-correlation level of the received signals shows the degree of signal interaction in the time domain and, thus, makes it possible to assess the level of multiple access problems in the cognitive telecommunication system. An important task is to determine the maximum emission level of the cross-correlation functions of the resulting complex signal ensembles depending on the filtering bands and, accordingly, their impact on the volume of the ensembles. Also, the dependence of multiple access interference level on the number and duration of pulses in the output sequences, which are used to form complex signal ensembles based on the frequency segments permutations, was interesting. The solution of these problems will make it possible to simplify the procedure for determining the width of the filter bands for the formation of complex signal ensembles by permutation of frequency segments.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Volodymyr Lysechko, Oleksandr Zhuchenko, Iryna Kovtun, Serhii Indykhttp://csitic.nure.ua/article/view/232786Double-Circuit Organization of a Distributed Computer System for the Effective Control of ITS Functioning2021-05-28T12:16:29+03:00Vadym Mukhinv_mukhin@i.uaYaroslav Kornagav_mukhin@i.uaValery Zavgorodniizavgorodnii@i.uaMaksym Basaliyv_mukhin@i.uaOleg Mukhinv_mukhin@i.ua<p>The ensuring of the continuous control and software updates in the control nodes of a distributed data processing system requires the development of a network structure in such a way that a group of control nodes supports the functioning of its subnetwork and, if necessary, may transfer the data processing to the another group of control nodes. This structure consists of two circuits: a control node circuit and a data circuit.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Vadym Mukhin, Yaroslav Kornaga, Valery Zavgorodnii, Maksym Basaliy, Oleg Mukhinhttp://csitic.nure.ua/article/view/232798Determining the factors affecting the stability of enterprise functioning2021-05-28T12:23:52+03:00Kirill Khrustalevkirill.khrustalev@nure.uaIgor Rubanihor.ruban@nure.uaSofiia Khrustalovasofiia.khrustalova@nure.uaArtur Melezhykartur.melezhyk@nure.ua<p>The paper analysis and highlights are the main factors of internal and external environment that affects the stable functioning of the enterprise. The factor “energetics”, which is necessary to take into account while elaborating of intellectual system of evaluation of the condition of stable functioning of enterprise was grounded<em>.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Kirill Khrustalev, Igor Ruban, Sofiia Khrustalova, Artur Melezhykhttp://csitic.nure.ua/article/view/232804Intelligent Tools for Service Robotic System2021-05-28T12:35:10+03:00Oleksandr Tsymbal oleksandr.tsymbal@nure.ua<p>There is provided an analysis of flexible integrated systems of development for industrial application. Report shows an increasing importance of intelligent components for service robotic units, making supplement operations in production workspaces. There are considered the basic requirements for intelligent decision-making support systems, which can be introduced to production systems to solve the service tasks of different levels.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Tsymbal http://csitic.nure.ua/article/view/232809Implementation of a Software Application for Researching the Face Recognition Algorithm2021-05-28T12:44:30+03:00Oleksandr Mordykoleksandr.mordyk@nure.uaOlekdandr Tsymbaloleksandr.tsymbal@nure.ua<p>Deep learning has recently attracted more and more interest in face recognition. Face recognition is a computer vision problem. There may be slight differences in the faces of humans but overall, it is safe to say that there are certain features that are associated with all the human faces.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Mordyk, Olekdandr Tsymbalhttp://csitic.nure.ua/article/view/232889Method of Annotating a Collection of Text Documents2021-05-30T04:39:50+03:00Olesia Barkovskad_ec@nure.uaVitalii Vodolazkyid_ec@nure.ua<p>The work is devoted to the analysis of methods for annotating text documents, the relevance of which is due to the fact that when familiarizing with the information object presented in text form, reading the annotation by the reader is very much in demand, since it can reduce the time for selecting the necessary sources by several times. The paper considers the method of automatic annotation SumBasic, based on the probabilistic approach. An approach to data decomposition in each of the separate modules that ensure the operation of the method is proposed.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Olesia Barkovska, Vitalii Vodolazkyihttp://csitic.nure.ua/article/view/232890A Study of the Influence of Computing Systems on The Text Vectorization Speed2021-05-30T04:58:48+03:00Olesia Barkovskad_ec@nure.uaVladyslav Kholievd_ec@nure.ua<p>The paper considers a relevant problem of accelerating the speed of text processing. The relevance of the development and modernization of electronic library systems results from the growing need for remote access to information objects. The purpose of the study is to reduce the execution time of one of the text processing methods at the stage of information accumulation, namely, vectorization. The results show that it is possible to achieve a greater acceleration of vectorization of small texts (874 words) on multiprocessor computing systems. Systems with massive parallelism produce good results (speedup up to 4.5 times) for large texts (8348 words).</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Olesia Barkovska, Vladyslav Kholievhttp://csitic.nure.ua/article/view/232891Using OpenMP Directives to Accelerate OCR with Tesseract OCR 2021-05-30T05:07:37+03:00Olesia Barkovskad_ec@nure.uaIhor Ryzhovd_ec@nure.ua<p>This paper is devoted the methods of speed-up optical character recognition which is used for transformation of the scanned image to the edited text format. The example of application of these methods are the systems of the automated search of fragment of text in the catalogues of electronic libraries, where as an entrance format both the entered text and vocal query or scanned fragment of the text document can be used. The paper shows that the quality of the original image, as well as the applied image preprocessing algorithms, has the greatest influence on the quality of text recognition. Today the task of text recognition is implemented in many libraries. An example is the Tesseract OCR, considered in the work. It is shown that the joint use of the standard parallel programming library OpenMP, which is built into all modern C and C ++ compilers, reduces the time of processing up to 33% compared to the sequential implementation.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Olesia Barkovska, Ihor Ryzhovhttp://csitic.nure.ua/article/view/232892Accelerated Localization of the Iris as an Element of the Biometric System2021-05-30T05:13:17+03:00Olesia Barkovskad_ec@nure.uaYevhenii Basd_ec@nure.ua<p>This work is devoted to the topic of localization and recognition of the unique and complex pattern of the iris, which is one of the elements of the biometric identification system along with such characteristics as fingerprints, palm prints, gestures, and facial features. The paper examines the performance of the algorithm for the localization and separation of the iris on the central and graphic processors using CUDA technology.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Olesia Barkovska, Yevhenii Bashttp://csitic.nure.ua/article/view/232893Preliminary assessment on Choosing a Cloud Platform2021-05-30T05:20:08+03:00Vladimir Sayenko vladimir.sayenko@nure.ua<p>The fast progress of information technology has led to significant changes in the functionality of cloud platforms. First of all, this affected the development of cloud services. The quantity of cloud platform grows. Cloud platforms are becoming more and more different from each other. The choice of a specific platform for complex information systems is an actual task. An advanced method on the choice of a cloud platform for designing information system is proposed. The method is based on the development of existing approaches, taking into account the changes in the functionality of the platforms.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Vladimir Sayenko http://csitic.nure.ua/article/view/232894Concept and Method for Development of Corporate Information System2021-05-30T05:31:22+03:00Viktor Borysenkoviktor.borysenko@nure.uaTatjana Borysenkotetiana.borysenko@nure.ua<p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">The report covers modern method for development of Corporate Information System (CIS). The main system-technical effect of the introduction of CIS lies in the transition from a localized, poorly synchronized, heterogeneous set of autonomous systems to a single, integrated, system architecture, which is built on the basis of a universal set of modern service tools</span></span></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Viktor Borysenko, Tatjana Borysenkohttp://csitic.nure.ua/article/view/232895The Air Humidity Accuracy Improving by Separating the Humidifier Functions2021-05-30T05:43:42+03:00Dariia Varchenkodariia.varchenko@nure.uaAlina Komashchukalina.komashchuk@nure.ua<p>The article proposes a new approach to increasing the air humidity indicators measuring accuracy. The "smart" air humidification system implementation based on built-in systems with all the advantages and disadvantages is proposed and considered. The basis of the embedded system is a microcontroller with Wi-Fi function. The server or mobile application implementation as a graphical user interface (GUI) for monitoring the operation of the system as a whole is considered.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Dariia Varchenko, Alina Komashchukhttp://csitic.nure.ua/article/view/232896The Usage of The Technology of Constructing “AS-IS” Models of Initial Maturity Levels of Process Management 2021-05-30T05:51:42+03:00Ievgen Bogatovbogatovevgeniy@gmail.comSerhii Chalyiserhii.chalyi@nure.ua<p>Research of enterprise maturity levels has shown that enterprises above the second maturity level have well-structured and documented processes. At the same time, systems of maturity level below the second don’t operate processes at all. Instead, such systems have workflows as an analogy of processes. Building of “as-is” model with Process Mining technology is complicated for such kind of systems due to the inconsistency of log structures of the management systems to requirements defined by the mining technology. To resolve the constraints the technology of construction of graph models of business processes of zero and first maturity levels of process management on the basis of the analysis of event logs is offered. The technology involves structuring the event log, building graph models of workflows of the system, forming business process logs by combining routes, and building graph models of workflows "as is" by means of intellectual analysis of processes.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Ievgen Bogatov, Serhii Chalyihttp://csitic.nure.ua/article/view/232899The Construction of Explanations in Intelligent Systems on the Basis of Interactive Clarification of the Decision’s Reasons2021-05-30T06:13:25+03:00Volodymyr Leshchynskyivolodymyr.leshchynskyi@nure.uaIrina Leshchynskairyna.leshchynska@nure.ua<p>The problem of interactive formation of explanations in intelligent information systems, as a problem of interactive interpretation and substantiation of stages of decision-making is considered. A combined approach to constructing an explanation is proposed, which combines the interpretation of the process of the intelligent system and the explanation of the obtained result. The approach implements the process of interactive clarification of the reasons for the decision as a basis for explanation.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицький; Volodymyr Leshchynskyi, Irina Leshchynskahttp://csitic.nure.ua/article/view/232900VNF Placement and Connectivity2021-05-30T06:29:21+03:00Vladlen Filippovvladlen.filippov@nure.uaIlya VoloshinIlya.voloshin@nure.uaStanislav Partykastanislav.partyka@nure.uaOksana Baranovaoksana.baranova@nure.ua<p>The Software Defined Wireless Networks is actively using NFV (network virtualization technology), which allows you to virtualize the machine network components using software. Launched on NFV nodes (special virtual machines Support NFV Technology) Network Software Components are called Virtualized Network Functions(VNF). To provide services to the user, a multiple VNF can be combined into one SFC chain. But when using the service, the user can move, which negatively affects the service. However, VNF can be moved to the nearest NFV node. In this article, we will consider several methods of dynamic VNF placement.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Vladlen Filippov, Ilya Voloshin, Stanislav Partyka, Oksana Baranovahttp://csitic.nure.ua/article/view/232901End-to-End Delay Model of the Main Types Satellites for VoIP-telephony over Satellite Links2021-05-30T06:37:12+03:00Bilash Dmytrodmytro.bilash@nure.uaBondarenko Maksymbondarenko@ieee.orgSergiy LukashovSerhii.Liashenko@a.com<p>Over the past few decades, the Internet has become the world's information superhighway, leading to the development of new applications and services. Among them, Voice over IP (VoIP) is one of the most promising industries. Voice over Internet Protocol (VoIP or IP) telephony is a new way of communication. This technology allows users to make calls over a network using Internet protocols. This paper will describe VoIP-telephony, to demonstrate the ability of people to communicate through the Internet, which works via satellite links. The research in this paper demonstrates the basic formula of the latency model when using any type of satellite network such as LEO, GEO, and MEO systems for IP-telephony. In addition, this work provides methods for reducing the latency.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Bilash Dmytro, Bondarenko Maksymhttp://csitic.nure.ua/article/view/232902QoS Routing Model over Disjoint Paths with Guaranteed Bandwidth in Software-Defined Networks2021-05-30T06:46:18+03:00Oleksandr Lemeshkooleksandr.lemeshko.ua@ieee.orgOleksandra Yeremenkooleksandra.yeremenko.ua@ieee.orgMaryna Yevdokymenkomaryna.yevdokymenko@ieee.orgBatoul Sleiman sleimanbatoul@hotmail.com<p>A mathematical model for calculating disjoint paths that provide guaranteed bandwidth in the data plane of software-defined telecommunication networks is proposed. The advantage of the solution is the formulation of the routing problem in the optimization form using bilinear conditions to ensure guaranteed bandwidth over the set of calculated paths (multipath). At the same time, the choice of the optimality criterion is determined by the requirements for the level of network security and/or Quality of Service.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Batoul Sleiman http://csitic.nure.ua/article/view/232903Securing the Internet of Things via VPN technology2021-05-30T06:53:05+03:00Mykhailo Hunkohunko@ieee.orgIgor Rubanihor.ruban@nure.uaKateryna Hvozdetskakateryna.hvozdetska@ieee.org<p>The speed at which the Internet of Things is evolving these days looks promising for the smart environment of the future. Along with the popularity of smart devices, concerns about the security of IoT devices are also growing because they are inherently resource-constrained, heterogeneous and they suffer from a lack of standard security controls or protocols. In particular, because of their inability to support today's secure network protocols and security mechanisms, standard security solutions are not suitable for dynamic Internet of Things environments that require large and smart infrastructure deployments. Current Internet of Things environments use predominantly cloud-based approaches so that data can be exchanged in unlimited quantities, leading to additional security and privacy risks. While standard security protocols such as virtual private networks have recently been implemented for certain Internet of Things environments, the implementation models presented have few variations and are virtually unscalable for any dynamically scalable Internet of Things deployment.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицький; Mykhailo Hunko, Igor Ruban, Kateryna Hvozdetskahttp://csitic.nure.ua/article/view/232904Analysis and Selection Performance Indicators Multiservice Communication Networks Based on the Concept NGN and FN2021-05-30T07:01:30+03:00Ibrahimov Bayram Ganimati.bayram@mail.ruHashimov Elshan Qiyashasimovel@gmail.com<p>The performance indicators of multiservice commu-nication networks, built in accordance with the con-cept NGN (Next Generation Network) and FN (Fu-ture Network) based on promising telecommunica-tion and information technologies, have been ana-lyzed. The issues of efficiency transmission useful and service traffic by a multifunctional hardware-software complex in the links multiservice commu-nication networks are considered and their struc-tural and functional diagram is proposed. The prob-lems choosing the necessary performance indica-tors hardware and software systems and terminal facilities are considered, taking into account the probabilistic-temporal and speed characteristics multiservice communication networks based on the concept NGN and FN. Analytical expressions are obtained that make it possible to assess the complex performance indicators network link in the provi-sion multimedia services and when establishing a connection.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицький; Ibrahimov Bayram Ganimat, Hashimov Elshan Qiyashttp://csitic.nure.ua/article/view/231856Analysis of the Current State of Self-healing Systems2021-05-18T07:45:57+03:00Igor Rubanihor.ruban@nure.uaValentyn Lebedievvalentyn.lebediev@nure.ua<p>Recently, growing interest in the class of so-called self-healing systems. As you know, if the maintenance of the IT infrastructure of the enterprise is associated with the maintenance of only a few servers and a pair of switches, then usually everything works well and with manual control. However, when the number of servers grows and begins to be calculated by tens, some of them have to be temporarily suspended for periods of downtime, the service becomes a complex process. The search for acceptable solutions forced the market to "remember" the technology of autonomous computing (autonomic computing). The process of introduction of tools of autonomics calculations into IT system, realizing the mechanism of self-regulation with a possibility of self-restoration of the initial condition existing before the beginning of disturbances is considered.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Igor Ruban, Valentyn Lebedievhttp://csitic.nure.ua/article/view/231858Features of the Estimation of the Compromising Emanations Level of a Modern Electronic Computer Videotract2021-05-18T08:02:33+03:00Viktoriia Perepadiavita.perepadya@gmail.comVolodymyr Zabolotnyjvolodymyr.zabolotnyi@nure.ua<p>The paper shows the features of the estimation of the compromising emanations level of a modern electronic computer videotract. Particular attention is paid to describing the differences between analog and digital data transfer interface, as well as the structural characteristics of the respective signals. It is proved that there are no differences in the context of digital signal reception due to compromising emanations of the modern computer videotract by the optimal receiver of a technical intelligence device, which allows the application of appropriate techniques designed to receive an analog signal.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Viktoriia Perepadia, Volodymyr Zabolotnyjhttp://csitic.nure.ua/article/view/231860Enterprise Security Operations Center 2021-05-18T08:36:06+03:00Oleksandr Sievierinovoleksandr.sievierinov@nure.uaMarharyta Ovcharenkomarharyta.ovcharenko@nure.uaAndrii Vlasov andrii.vlasov@nure.ua<p>This article examines the main components of enterprise security operations centers. The main particular models of enterprise security operations centers are considered - classic, MDR and mixed. Also considered and characterized the main levels of SOC implementation in the enterprise.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Sievierinov, Marharyta Ovcharenko, Andrii Vlasov http://csitic.nure.ua/article/view/231864Securing Bearer token in OAuth2.02021-05-18T11:00:22+03:00Oleksii Sievierinovoleksandr.sievierinov@nure.uaOleh Kholoshaoleh.kholosha@nure.ua<p>This article provides information about the bearer token in Oauth2.0. Considered the threats to which the bearer token is exposed in Oauth, suggested recommendations for the safe use of this type of token.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksii Sievierinov, Oleh Kholoshahttp://csitic.nure.ua/article/view/232170Security of Web Applications Using AWS Cloud Provider2021-05-21T06:29:27+03:00Vladyslav Lysakovvladyslav.lysakov@nure.uaOleksandr Sievierinovoleksandr.sievierinov@nure.uaIgor Taranigor.taran@nure.ua<p><em>The services of the AWS cloud provider on information security are analyzed. The paper deals with a method of authentication of web application users using the AWS Cognito service. There is described the process of verifying access to a web resource.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Vladyslav Lysakov, Oleksandr Sievierinov, Igor Taranhttp://csitic.nure.ua/article/view/232174The Overview of Decentralized Systems Scaling Methods2021-05-21T06:49:41+03:00Oleksandr Marukhnenkooleksandr.marukhnenko@nure.uaGennady Khalimovhennadii.khalimov@nure.ua<p><em>Decentralized systems and protocols are becoming more popular every year. The main limitations of public permissionless blockchains are low bandwidth and high fees. There are various ways to reduce the load on the network to address these drawbacks, the majority of them were developed for Ethereum but stay valid for many other chains. The paper considers the following options for scaling decentralized systems: consensus modification and sharding that are embedded in the core of a blockchain, second layer solutions and sidechains that can be built on top of a network.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Marukhnenko, Gennady Khalimovhttp://csitic.nure.ua/article/view/232176Hard Problems for Non-abelian Group Cryptography2021-05-21T06:59:32+03:00Yevgen Kotukhyevgenkotukh@gmail.comGennady Khalimovhennadii.khalimov@nure.ua<p>The security of the DH key exchange protocol and many other public key cryptosystems such as RSA, ElGamal and ECC is based on the assumption that complex mathematical problems such as factorization (FP), discrete logarithm over finite fields (DLP), or elliptical curves (ECDLP) are intractable. The implementation of Shor and Grover's algorithms reduces the security of cryptosystems based on the intractability of these problems.<strong> </strong></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Yevgen Kotukh, Gennady Khalimovhttp://csitic.nure.ua/article/view/232178Software and Hardware Simulator of Company Security Audit2021-05-21T07:13:29+03:00Illia Fedorovillia.fedorov@nure.uaGennady Khalimovhennadii.khalimov@nure.ua<p>To ensure the tasks of training professionals in the field of cybersecurity, a software and hardware complex has been created that provides training in various methods of protecting information and countering attacks. The possibilities of the complex are considered, as well as the experiments that were carried out during its development.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Illia Fedorov, Gennady Khalimovhttp://csitic.nure.ua/article/view/232181Improvement of the Task Scheduler Model Taking Into Account the Heterogeneity of the Entities2021-05-21T07:39:32+03:00Serhii Semenovserhii.semenov@khpi.edu.uaMaksym Bartoshmaksym.bartosh@khpi.edu.uaViacheslav Davydovviacheslav.davydov@khpi.edu.uaOleksii Turutaoleksii.turuta@nure.ua<p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">In the modern world, the need and requirements for the efficiency of using net-work computing resources that perform key functions of automating data pro-cessing and storage are significantly increasing. These factors require improvements to existing task schedulers to handle them.The purpose of the work presented in this article is to study existing models of task scheduling and improve models of task scheduling, taking into account the heterogeneity of entities, which will reduce time costs and increase the efficiency of using existing resources of computer systems.In this paper, the methods of GERT-network modeling are used to study the scheme of the scheduler of data dissemination tasks in real time by mathematical formalization of the scheduling process of data dissemination tasks.As a result, a model was developed for the planning of data dissemination tasks, which made it possible to reduce time costs and increase the efficiency of using existing resources of computer systems.</span></span></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Serhii Semenov, Maksym Bartosh, Viacheslav Davydov, Oleksii Turutahttp://csitic.nure.ua/article/view/232185Measuring Vulnerability in Threat Modeling With Risk Matrix2021-05-21T07:59:08+03:00Andrii Hapongapon.andrei@gmail.comVolodimir Fedorchenkovolodymyr.fedorchenko@nure.ua<p>Threat modeling is one of the most important parts when it comes to security in development of programing product. The main challenges for that are time and prioritization of the scope of work. Risk matrix is effective tool for making clear what should be done first and which consequences can be. There are few levels of consequences which are ranged by the influence on business. With help of vulnerability assessment threats can be measured by impact on confidentiality, integrity, and availability. The Common Vulnerability Scoring System is appropriate tool for catching the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Andrii Hapon, Volodimir Fedorchenkohttp://csitic.nure.ua/article/view/232201Model for Providing the Second Factor of Authentication Into Authentication Services with Centralized Account Databases2021-05-21T11:05:45+03:00Bohdan RezanovBohdan.Rezanov@khpi.edu.uaAnna SemenovaAnna.Semenova@khpi.edu.uaInna PetrovskaInna.Petrovska@khpi.edu.uaTetiana FesenkoTetiana.Fesenko@nure.ua<p>The study developed a model for providing the second factor of authentication into authentication services with centralized account databases.This paper focuses on developing a model for providing the second factor of authentication into authentication services with centralized account databases.The paper describes the modeling methods, the modeling method based on PERT networks is described in detail. Is described the model of the process of integration of the second factor in authentication services with centralized account databases on the basis of mathematical formalization technology based on PERT, the sequence diagram of modules interaction at change password in the external target system (authentication service with centralized account database), PERT diagram representing time spent for the execution of each module on a certain stage.</p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Bohdan Rezanov, Anna Semenova, Inna Petrovska, Tetiana Fesenkohttp://csitic.nure.ua/article/view/232202Analysis of Variations in Biometric Authentication Methods in Mobile Devices 2021-05-21T11:15:32+03:00Oleksandr Sievierinovoleksandr.sievierinov@nure.uaLesia Bilanlesia.bilan@nure.ua<p><em>The analysis of variability of biometric authentication methods was carried out, the classification of biometric methods was examined. To ensure the required level of protection, it is recommended to use rich-factor authentication.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Oleksandr Sievierinov, Lesia Bilanhttp://csitic.nure.ua/article/view/232204Ways of protecting the CMS WordPress-based sites2021-05-21T11:24:25+03:00Maksym Akshentsevmaksym.akshentsev@nure.uaGennady Khalimovhennadii.khalimov@nure.ua<p><em>WordPress is the most popular software for websites or blogs as millions of users use it today. It allows customizing the site to one’s own tastes and needs without spending money and regardless of the technical skills of the user. Yet, incorrect configuration and/or usage of untested external software (e.g. plugins and graphical environments) may lead the site to compromisation. The paper has reviewing of ways to increase the security of a WordPress-based web resource as its goal.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицькийhttp://csitic.nure.ua/article/view/232206Evaluation and Decision-Making System as Vulnerability Management Process in Information and Telecommunication Systems2021-05-21T11:36:11+03:00Vadym Poddubnyi vadym.poddubnyi@nure.uaRoman Gvozdovroman.hvozdov@nure.uaOleksandr Sievierinovoleksandr.sievierinov@nure.uaVitalii Martovytskyivitalii.martovytskyi@nure.ua<p><em>This article proposes a system for risk assessment and management of software vulnerabilities. Such a system should function as part of the security policy of information security management systems.</em></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Віталій Олександрович Мартовицький; Vadym Poddubnyi , Roman Gvozdov, Oleksandr Sievierinov, Vitalii Martovytskyihttp://csitic.nure.ua/article/view/232208Development of Computer State Identification Method Based on Boosting Ensemble2021-05-21T11:44:38+03:00Viktor Chelakvictor.chelak@gmail.comSvitlana Gavrylenko gavrilenko08@gmail.com<p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">This work is about developing a modification of boosting method by using a special preprocessing procedure to improve the accuracy of computer system state identification. The aim of the research is to develop method for detection computer threats, malware, etc.</span></span> <span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">Experimental research have confirmed the effectiveness of the proposed method, which makes it possible to recommend it for practical use in order to improve the accuracy of identifying the state of the computer system. Prospects for further research may be to develop an ensemble of fuzzy decision trees based on the proposed method, optimizing their software implementation.</span></span></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Viktor Cheak, Svitlana Gavrylenko http://csitic.nure.ua/article/view/232209Research of the Quality of Functioning Multiservice Communication Networks When Establishing a Multimedia Session2021-05-21T11:52:34+03:00Bayram Ganimat Ibrаhimovbayram@mail.ruArif Hasan Hasanovarifhasan2828@yandex.ru<p class="Abstract" style="line-height: 92%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 92%; font-weight: normal;">Considering the nature of a network traffic systems and the signaling protocols NGN/IMS, the mathematical model of multimedia service considering joint service of the official and useful traffic when rendering multimedia services is offered. </span></span></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Bayram Ganimat Ibrаhimov, Arif Hasan Hasanovhttp://csitic.nure.ua/article/view/232210Research and Analysis of the Effectiveness Multiservice Communication Networks NGN/IMS2021-05-21T11:58:33+03:00Bayram Ganimat Ibrаhimovbayram@mail.ruAziz Mashalla Talibovaziztalibov@mail.ru<p class="Abstract" style="line-height: 95%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 95%; font-weight: normal;">The subject of the study is multiservice communication network using the concept NGN (Next Generation Network) based on the open network architecture IMS (Internet Protocol Multimedia Subsystem), supporting a wide range of services. The purpose of the article is to analyze the existing technical capabilities of the IMS multimedia messaging subsystem and perspective solutions for the functioning of the NGN/IMS network efficiency in providing multimedia services.</span></span></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Bayram Ganimat Ibrаhimov, Aziz Mashalla Talibovhttp://csitic.nure.ua/article/view/232212The Role of Modern Technology-Based Systems in the Organization of Interaction in the Army2021-05-21T12:04:24+03:00Katekhliyev Vusal Muhammadkatexlivusal1987@gmail.com<p class="Abstract" style="line-height: 95%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 95%; font-weight: normal;">Timely and secure processing, transmission, reception and analysis of information is the highest priority when organizing the interaction of different types of troops. To address these issues, surveillance, intelligence and combat management tools, computer-based electronic data analysis systems are widely used.</span></span></p>2021-05-30T00:00:00+03:00Copyright (c) 2021 Katekhliyev Vusal Muhammad