COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES http://csitic.nure.ua/ <p style="text-align: center;"><strong><span style="color: #000080; font-size: 12pt;">Welcome to the website</span></strong></p> <p style="text-align: center;"><span style="color: #000080;">of the International Scientific and Technical Conference </span></p> <p style="text-align: center;"><span style="color: #000080;"><strong><span style="font-size: 16pt;">COMPUTER AND INFORMATION</span></strong></span></p> <p style="text-align: center;"><span style="color: #000080;"><strong><span style="font-size: 16pt;"> SYSTEMS AND TECHNOLOGIES</span></strong></span></p> <p style="text-align: center;"><span style="color: #000000;"><strong><span style="font-size: 12pt;">Topics:</span></strong></span></p> <p style="text-align: justify;"><span style="color: #000000;">- Perspective and reliable systems;<br />- Integrated and distributed systems;<br />- Cybersecurity and safety;<br />- Systems and technologies based on NoC, SoC, SiP, FPGA;<br />- IT-infrastructure, IT-systems and services;<br />- Formal methods for development and verification;<br />- Verification, testing, diagnostics and testing of components and systems;<br />- Cooperation between universities and IT-industry;<br />- Databases (computer system for data registration and processing);<br />- Infocommunications.</span></p> <p style="text-align: center;"><span style="color: #000000;"><strong><span style="font-size: 12pt;">Main issues:</span></strong></span></p> <p style="text-align: justify;">- Development and operation of computer and informational systems;<br />- Reliability and safety technologies for computer and information systems;<br />- Flexible integrated systems and robotics;<br />- Design, implementation and operation of information systems and technologies<br />- Infocommunication networks and technologies.</p> en-US info@csitic.com (Vitalii Martovytskyi) vitalii.martovytskyi@nure.ua (Vitalii Martovytskyi) Sun, 30 May 2021 14:53:24 +0300 OJS 3.2.1.2 http://blogs.law.harvard.edu/tech/rss 60 VNF Placement and Connectivity http://csitic.nure.ua/article/view/232900 <p>The Software Defined Wireless Networks is actively using NFV (network virtualization technology), which allows you to virtualize the machine network components using software.&nbsp; Launched on NFV nodes (special virtual machines Support NFV Technology) Network Software Components are called Virtualized&nbsp; Network Functions(VNF).&nbsp; To provide services to the user, a multiple VNF can be combined into one SFC chain.&nbsp; But when using the service, the user can move, which negatively affects the service.&nbsp; However, VNF can be moved to the nearest NFV node.&nbsp; In this article, we will consider several methods of dynamic VNF placement.</p> Vladlen Filippov, Ilya Voloshin, Stanislav Partyka, Oksana Baranova Copyright (c) 2021 Vladlen Filippov, Ilya Voloshin, Stanislav Partyka, Oksana Baranova http://csitic.nure.ua/article/view/232900 Sun, 30 May 2021 00:00:00 +0300 End-to-End Delay Model of the Main Types Satellites for VoIP-telephony over Satellite Links http://csitic.nure.ua/article/view/232901 <p>Over the past few decades, the Internet has become the world's information superhighway, leading to the development of new applications and services. Among them, Voice over IP (VoIP) is one of the most promising industries. Voice over Internet Protocol (VoIP or IP) telephony is a new way of communication.&nbsp; This technology allows users to make calls over a network using Internet protocols. This paper will describe VoIP-telephony, to demonstrate the ability of people to communicate through the Internet, which works via satellite links. The research in this paper demonstrates the basic formula of the latency model when using any type of satellite network such as LEO, GEO, and MEO systems for IP-telephony. In addition, this work provides methods for reducing the latency.</p> Bilash Dmytro, Bondarenko Maksym, Sergiy Lukashov Copyright (c) 2021 Bilash Dmytro, Bondarenko Maksym http://csitic.nure.ua/article/view/232901 Sun, 30 May 2021 00:00:00 +0300 QoS Routing Model over Disjoint Paths with Guaranteed Bandwidth in Software-Defined Networks http://csitic.nure.ua/article/view/232902 <p>A mathematical model for calculating disjoint paths that provide guaranteed bandwidth in the data plane of software-defined telecommunication networks is proposed. The advantage of the solution is the formulation of the routing problem in the optimization form using bilinear conditions to ensure guaranteed bandwidth over the set of calculated paths (multipath). At the same time, the choice of the optimality criterion is determined by the requirements for the level of network security and/or Quality of Service.</p> Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Batoul Sleiman Copyright (c) 2021 Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Batoul Sleiman http://csitic.nure.ua/article/view/232902 Sun, 30 May 2021 00:00:00 +0300 Securing the Internet of Things via VPN technology http://csitic.nure.ua/article/view/232903 <p>The speed at which the Internet of Things is evolving these days looks promising for the smart environment of the future. Along with the popularity of smart devices, concerns about the security of IoT devices are also growing because they are inherently resource-constrained, heterogeneous and they suffer from a lack of standard security controls or protocols. In particular, because of their inability to support today's secure network protocols and security mechanisms, standard security solutions are not suitable for dynamic Internet of Things environments that require large and smart infrastructure deployments. Current Internet of Things environments use predominantly cloud-based approaches so that data can be exchanged in unlimited quantities, leading to additional security and privacy risks. While standard security protocols such as virtual private networks have recently been implemented for certain Internet of Things environments, the implementation models presented have few variations and are virtually unscalable for any dynamically scalable Internet of Things deployment.</p> Mykhailo Hunko, Igor Ruban, Kateryna Hvozdetska Copyright (c) 2021 Віталій Олександрович Мартовицький; Mykhailo Hunko, Igor Ruban, Kateryna Hvozdetska http://csitic.nure.ua/article/view/232903 Sun, 30 May 2021 00:00:00 +0300 Analysis and Selection Performance Indicators Multiservice Communication Networks Based on the Concept NGN and FN http://csitic.nure.ua/article/view/232904 <p>The performance indicators of multiservice commu-nication networks, built in accordance with the con-cept NGN (Next Generation Network) and FN (Fu-ture Network) based on promising telecommunica-tion and information technologies, have been ana-lyzed. The issues of efficiency transmission useful and service traffic by a multifunctional hardware-software complex in the links multiservice commu-nication networks are considered and their struc-tural and functional diagram is proposed. The prob-lems choosing the necessary performance indica-tors hardware and software systems and terminal facilities are considered, taking into account the probabilistic-temporal and speed characteristics multiservice communication networks based on the concept NGN and FN. Analytical expressions are obtained that make it possible to assess the complex performance indicators network link in the provi-sion multimedia services and when establishing a connection.</p> Ibrahimov Bayram Ganimat, Hashimov Elshan Qiyas Copyright (c) 2021 Віталій Олександрович Мартовицький; Ibrahimov Bayram Ganimat, Hashimov Elshan Qiyas http://csitic.nure.ua/article/view/232904 Sun, 30 May 2021 00:00:00 +0300 Analysis of the Current State of Self-healing Systems http://csitic.nure.ua/article/view/231856 <p>Recently, growing interest in the class of so-called self-healing systems. As you know, if the maintenance of the IT infrastructure of the enterprise is associated with the maintenance of only a few servers and a pair of switches, then usually everything works well and with manual control. However, when the number of servers grows and begins to be calculated by tens, some of them have to be temporarily suspended for periods of downtime, the service becomes a complex process. The search for acceptable solutions forced the market to "remember" the technology of autonomous computing (autonomic computing). The process of introduction of tools of autonomics calculations into IT system, realizing the mechanism of self-regulation with a possibility of self-restoration of the initial condition existing before the beginning of disturbances is considered.</p> Igor Ruban, Valentyn Lebediev Copyright (c) 2021 Igor Ruban, Valentyn Lebediev http://csitic.nure.ua/article/view/231856 Sun, 30 May 2021 00:00:00 +0300 Features of the Estimation of the Compromising Emanations Level of a Modern Electronic Computer Videotract http://csitic.nure.ua/article/view/231858 <p>The paper shows the features of the estimation of the compromising emanations level of a modern electronic computer videotract. Particular attention is paid to describing the differences between analog and digital data transfer interface, as well as the structural characteristics of the respective signals. It is proved that there are no differences in the context of digital signal reception due to compromising emanations of the modern computer videotract by the optimal receiver of a technical intelligence device, which allows the application of appropriate techniques designed to receive an analog signal.</p> Viktoriia Perepadia, Volodymyr Zabolotnyj Copyright (c) 2021 Viktoriia Perepadia, Volodymyr Zabolotnyj http://csitic.nure.ua/article/view/231858 Sun, 30 May 2021 00:00:00 +0300 Enterprise Security Operations Center http://csitic.nure.ua/article/view/231860 <p>This article examines the main components of enterprise security operations centers. The main particular models of enterprise security operations centers are considered - classic, MDR and mixed. Also considered and characterized the main levels of SOC implementation in the enterprise.</p> Oleksandr Sievierinov, Marharyta Ovcharenko, Andrii Vlasov Copyright (c) 2021 Oleksandr Sievierinov, Marharyta Ovcharenko, Andrii Vlasov http://csitic.nure.ua/article/view/231860 Sun, 30 May 2021 00:00:00 +0300 Securing Bearer token in OAuth2.0 http://csitic.nure.ua/article/view/231864 <p>This article provides information about the bearer token in Oauth2.0. Considered the threats to which the bearer token is exposed in Oauth, suggested recommendations for the safe use of this type of token.</p> Oleksii Sievierinov, Oleh Kholosha Copyright (c) 2021 Oleksii Sievierinov, Oleh Kholosha http://csitic.nure.ua/article/view/231864 Sun, 30 May 2021 00:00:00 +0300 Security of Web Applications Using AWS Cloud Provider http://csitic.nure.ua/article/view/232170 <p><em>The services of the AWS cloud provider on information security are analyzed. The paper deals with a method of authentication of web application users using the AWS Cognito service. There is described the process of verifying access to a web resource.</em></p> Vladyslav Lysakov, Oleksandr Sievierinov, Igor Taran Copyright (c) 2021 Vladyslav Lysakov, Oleksandr Sievierinov, Igor Taran http://csitic.nure.ua/article/view/232170 Sun, 30 May 2021 00:00:00 +0300 The Overview of Decentralized Systems Scaling Methods http://csitic.nure.ua/article/view/232174 <p><em>Decentralized systems and protocols are becoming more popular every year. The main limitations of public permissionless blockchains are low bandwidth and high fees. There are various ways to reduce the load on the network to address these drawbacks, the majority of them were developed for Ethereum but stay valid for many other chains. The paper considers the following options for scaling decentralized systems: consensus modification and sharding that are embedded in the core of a blockchain, second layer solutions and sidechains that can be built on top of a network.</em></p> Oleksandr Marukhnenko, Gennady Khalimov Copyright (c) 2021 Oleksandr Marukhnenko, Gennady Khalimov http://csitic.nure.ua/article/view/232174 Sun, 30 May 2021 00:00:00 +0300 Hard Problems for Non-abelian Group Cryptography http://csitic.nure.ua/article/view/232176 <p>The security of the DH key exchange protocol and many other public&nbsp; key cryptosystems such as RSA,&nbsp;&nbsp;&nbsp; ElGamal and ECC is based on the assumption that complex mathematical problems such as factorization (FP), discrete logarithm over finite fields (DLP), or elliptical curves (ECDLP) are intractable. The implementation of Shor and Grover's algorithms reduces the security of cryptosystems based on the intractability of these problems.<strong>&nbsp; </strong></p> Yevgen Kotukh, Gennady Khalimov Copyright (c) 2021 Yevgen Kotukh, Gennady Khalimov http://csitic.nure.ua/article/view/232176 Sun, 30 May 2021 00:00:00 +0300 Software and Hardware Simulator of Company Security Audit http://csitic.nure.ua/article/view/232178 <p>To ensure the tasks of training professionals in the field of cybersecurity, a software and hardware complex has been created that provides training in various methods of protecting information and countering attacks. The possibilities of the complex are considered, as well as the experiments that were carried out during its development.</p> Illia Fedorov, Gennady Khalimov Copyright (c) 2021 Illia Fedorov, Gennady Khalimov http://csitic.nure.ua/article/view/232178 Sun, 30 May 2021 00:00:00 +0300 Improvement of the Task Scheduler Model Taking Into Account the Heterogeneity of the Entities http://csitic.nure.ua/article/view/232181 <p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">In the modern world, the need and requirements for the efficiency of using net-work computing resources that perform key functions of automating data pro-cessing and storage are significantly increasing. These factors require improvements to existing task schedulers to handle them.The purpose of the work presented in this article is to study existing models of task scheduling and improve models of task scheduling, taking into account the heterogeneity of entities, which will reduce time costs and increase the efficiency of using existing resources of computer systems.In this paper, the methods of GERT-network modeling are used to study the scheme of the scheduler of data dissemination tasks in real time by mathematical formalization of the scheduling process of data dissemination tasks.As a result, a model was developed for the planning of data dissemination tasks, which made it possible to reduce time costs and increase the efficiency of using existing resources of computer systems.</span></span></p> Serhii Semenov, Maksym Bartosh, Viacheslav Davydov, Oleksii Turuta Copyright (c) 2021 Serhii Semenov, Maksym Bartosh, Viacheslav Davydov, Oleksii Turuta http://csitic.nure.ua/article/view/232181 Sun, 30 May 2021 00:00:00 +0300 Measuring Vulnerability in Threat Modeling With Risk Matrix http://csitic.nure.ua/article/view/232185 <p>Threat modeling is one of the most important parts when it comes to security in development of programing product. The main challenges for that are time and prioritization of the scope of work. Risk matrix is effective tool for making clear what should be done first and which consequences can be. There are few levels of consequences which are ranged by the influence on business. With help of vulnerability assessment threats can be measured by impact on confidentiality, integrity, and availability. The Common Vulnerability Scoring System is appropriate tool for catching the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.</p> Andrii Hapon, Volodimir Fedorchenko Copyright (c) 2021 Andrii Hapon, Volodimir Fedorchenko http://csitic.nure.ua/article/view/232185 Sun, 30 May 2021 00:00:00 +0300 Model for Providing the Second Factor of Authentication Into Authentication Services with Centralized Account Databases http://csitic.nure.ua/article/view/232201 <p>The study developed a&nbsp; model for providing the second factor of authentication into authentication services with centralized account databases.This paper focuses on developing a model for providing the second factor of authentication into authentication services with centralized account databases.The paper describes the modeling methods, the modeling method based on PERT networks is described in detail. Is described the model of the process of integration of the second factor in authentication services with centralized account databases on the basis of mathematical formalization technology based on PERT, the sequence diagram of modules interaction at change password in the external target system (authentication service with centralized account database), PERT diagram representing time spent for the execution of each module on a certain stage.</p> Bohdan Rezanov, Anna Semenova, Inna Petrovska, Tetiana Fesenko Copyright (c) 2021 Bohdan Rezanov, Anna Semenova, Inna Petrovska, Tetiana Fesenko http://csitic.nure.ua/article/view/232201 Sun, 30 May 2021 00:00:00 +0300 Analysis of Variations in Biometric Authentication Methods in Mobile Devices http://csitic.nure.ua/article/view/232202 <p><em>The analysis of variability of biometric authentication methods was carried out, the classification of biometric methods was examined. To ensure the required level of protection, it is recommended to use rich-factor authentication.</em></p> Oleksandr Sievierinov, Lesia Bilan Copyright (c) 2021 Oleksandr Sievierinov, Lesia Bilan http://csitic.nure.ua/article/view/232202 Sun, 30 May 2021 00:00:00 +0300 Ways of protecting the CMS WordPress-based sites http://csitic.nure.ua/article/view/232204 <p><em>WordPress is the most popular software for websites or blogs as millions of users use it today. It allows customizing the site to one’s own tastes and needs without spending money and regardless of the technical skills of the user. Yet, incorrect configuration and/or usage of untested external software (e.g. plugins and graphical environments) may lead the site to compromisation. The paper has reviewing of ways to increase the security of a WordPress-based web resource as its goal.</em></p> Maksym Akshentsev, Gennady Khalimov Copyright (c) 2021 Віталій Олександрович Мартовицький http://csitic.nure.ua/article/view/232204 Sun, 30 May 2021 00:00:00 +0300 Evaluation and Decision-Making System as Vulnerability Management Process in Information and Telecommunication Systems http://csitic.nure.ua/article/view/232206 <p><em>This article proposes a system for risk assessment and management of software vulnerabilities. Such a system should function as part of the security policy of information security management systems.</em></p> Vadym Poddubnyi , Roman Gvozdov, Oleksandr Sievierinov, Vitalii Martovytskyi Copyright (c) 2021 Віталій Олександрович Мартовицький; Vadym Poddubnyi , Roman Gvozdov, Oleksandr Sievierinov, Vitalii Martovytskyi http://csitic.nure.ua/article/view/232206 Sun, 30 May 2021 00:00:00 +0300 Development of Computer State Identification Method Based on Boosting Ensemble http://csitic.nure.ua/article/view/232208 <p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">This work is about developing a modification of boosting method by using a special preprocessing procedure to improve the accuracy of computer system state identification. The aim of the research is to develop method for detection computer threats, malware, etc.</span></span> <span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">Experimental research have confirmed the effectiveness of the proposed method, which makes it possible to recommend it for practical use in order to improve the accuracy of identifying the state of the computer system. Prospects for further research may be to develop an ensemble of fuzzy decision trees based on the proposed method, optimizing their software implementation.</span></span></p> Viktor Chelak, Svitlana Gavrylenko Copyright (c) 2021 Viktor Cheak, Svitlana Gavrylenko http://csitic.nure.ua/article/view/232208 Sun, 30 May 2021 00:00:00 +0300 Research of the Quality of Functioning Multiservice Communication Networks When Establishing a Multimedia Session http://csitic.nure.ua/article/view/232209 <p class="Abstract" style="line-height: 92%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 92%; font-weight: normal;">Considering the nature of a network traffic systems and the signaling protocols NGN/IMS, the mathematical model of multimedia service considering joint service of the official and useful traffic when rendering multimedia services is offered. </span></span></p> Bayram Ganimat Ibrаhimov, Arif Hasan Hasanov Copyright (c) 2021 Bayram Ganimat Ibrаhimov, Arif Hasan Hasanov http://csitic.nure.ua/article/view/232209 Sun, 30 May 2021 00:00:00 +0300 Research and Analysis of the Effectiveness Multiservice Communication Networks NGN/IMS http://csitic.nure.ua/article/view/232210 <p class="Abstract" style="line-height: 95%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 95%; font-weight: normal;">The subject of the study is multiservice communication network using the concept NGN (Next Generation Network) based on the open network architecture IMS (Internet Protocol Multimedia Subsystem), supporting a wide range of services. The purpose of the article is to analyze the existing technical capabilities of the IMS multimedia messaging subsystem and perspective solutions for the functioning of the NGN/IMS network efficiency in providing multimedia services.</span></span></p> Bayram Ganimat Ibrаhimov, Aziz Mashalla Talibov Copyright (c) 2021 Bayram Ganimat Ibrаhimov, Aziz Mashalla Talibov http://csitic.nure.ua/article/view/232210 Sun, 30 May 2021 00:00:00 +0300 The Role of Modern Technology-Based Systems in the Organization of Interaction in the Army http://csitic.nure.ua/article/view/232212 <p class="Abstract" style="line-height: 95%;"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; line-height: 95%; font-weight: normal;">Timely and secure processing, transmission, reception and analysis of information is the highest priority when organizing the interaction of different types of troops. To address these issues, surveillance, intelligence and combat management tools, computer-based electronic data analysis systems are widely used.</span></span></p> Katekhliyev Vusal Muhammad Copyright (c) 2021 Katekhliyev Vusal Muhammad http://csitic.nure.ua/article/view/232212 Sun, 30 May 2021 00:00:00 +0300 Methods for Automating Development Processes and Deployment of Microservice Applications http://csitic.nure.ua/article/view/231722 <p>The presented work is devoted to automation CI/CD<br>pipeline for deploying microservices. Main methodologies and<br>practices of software products development are considered:<br>Waterfall, Agile, Scrum, Kanban and DevOps as well as<br>detailed description of them. Developed and deployed a CI /<br>CD process to automate web application deployment using a<br>variety of software tools such as Kubernetes and Jenkins.</p> Oleksandr Koshedran, Vitaliy Tkachov Copyright (c) 2021 Oleksandr Koshedran, Vitaliy Tkachov http://csitic.nure.ua/article/view/231722 Sun, 30 May 2021 00:00:00 +0300 Methods of Construction of Overline Infrastructures in the Cloud Environment http://csitic.nure.ua/article/view/231737 <p><em>The aim of the work is to develop a system for automatic deployment, configuration, and monitoring of web applications with the most popular cloud providers such as (Amazon, Google, Microsoft). The system interacts with a web application whose server part is written in python (flask). This server uses other tools such as Terraform, Ansible, Docker, Grafana, Influxdb, Telegraf, and others.</em></p> Yevhen Laptii, Vitalii Tkachov Copyright (c) 2021 Yevhen Laptii, Vitalii Tkachov http://csitic.nure.ua/article/view/231737 Sun, 30 May 2021 00:00:00 +0300 Personalized Glucose Prediction Model for Patients With Type I Diabetes http://csitic.nure.ua/article/view/231817 <p>This paper represents an attempt to use machine learning techniques to personalize glucose predictions for patients with type I diabetes (T1D). The study aims at proposing a personalized model, capable to provide real-time blood glucose estimations, taking into consideration patient’s health preconditions. The proposed model represents a neural network based on the use of Self-Organized Maps (SOM).&nbsp; It was elaborated using data from 5 patients with T1D, collected with help of a specially created for these purposes support system and pre-trained using a clinical dataset. The study lasted for 3 months.</p> Ghenadie Usic Copyright (c) 2021 Ghenadie Usic http://csitic.nure.ua/article/view/231817 Sun, 30 May 2021 00:00:00 +0300 Model of Integration of Voice Assistants in the Construction of Web Applications http://csitic.nure.ua/article/view/231818 <p>Today, voice assistants can radically change the interaction of computer users. For many users, the ability to read and print is impossible to access information. Voice assistants can fill the information gap for these users. Embedding these capabilities in today's consumer technology would be much more cost-effective than specially designed devices and many users would find it convenient to control these devices.</p> Mykola Slisarenko, Oleksii Liashenko Copyright (c) 2021 Mykola Slisarenko, Oleksii Liashenko http://csitic.nure.ua/article/view/231818 Sun, 30 May 2021 00:00:00 +0300 Review of Approaches to Diagnosis of Post-Traumatic Stress Disorders http://csitic.nure.ua/article/view/231819 <p><em>Many doctors of various specialties throughout Ukraine meet internally displaced persons and combatants from the eastern regions of Ukraine among their patients. Given that such events are taking place on the territory of Ukraine for the first time in all the years of independence, they are unusual, atypical, such that they go beyond the ordinary. This, in turn, has a significant impact on the mental life of Ukrainians - both those in areas where the confrontation continues, and those who lead a peaceful life.</em></p> Nelia Miroshnichenko, iryna.perova@nure.ua Copyright (c) 2021 Віталій Олександрович Мартовицький; Nelia Miroshnichenko, Iryna Perova http://csitic.nure.ua/article/view/231819 Sun, 30 May 2021 00:00:00 +0300 Security system development for “Smart House” http://csitic.nure.ua/article/view/231821 <p>The best minds of humanity are constantly developing new technologies to improve human life and provide comfort. Comfort has always been one of the engines of progress, forcing human thought to invent more and more new devices to make their lives easier. One such invention was “Smart House” system.</p> Yuliia Ivanenko , Anastasiia Hliuza, Denys Honcharenko , Oleksii Liashenko Copyright (c) 2021 Віталій Олександрович Мартовицький; Yuliia Ivanenko , Anastasiia Hliuza, Denys Honcharenko , Oleksii Liashenko http://csitic.nure.ua/article/view/231821 Sun, 30 May 2021 00:00:00 +0300 Research on CNN (Convolutional Neural Network)-based Forecasting Method http://csitic.nure.ua/article/view/231823 <p>The article deals with the problem of predicting the COVID-19 spreading in Ukraine. This task becomes more relevant each day. From all the modern models of CNN-based time series forecasting, the InceptionTime model was chosen. Its advantages are high accuracy and scalability. The research is implemented using the Python high-level programming language. The results are presented as the mean absolute error for each region. The InceptionTime model has proved its high accuracy for this task.</p> Yuliia Andrusenko Copyright (c) 2021 Yuliia Andrusenko http://csitic.nure.ua/article/view/231823 Sun, 30 May 2021 00:00:00 +0300 Hybrid Scheme of Using Lightweight Cryptographic Algorithms for IoT Security http://csitic.nure.ua/article/view/231827 <p>------------------</p> Oleksii Liashenko, Oleh Zhurylo, Kateryna Komarets, Serhii Liashenko Copyright (c) 2021 Oleksii Liashenko, Oleh Zhurylo, Kateryna Komarets, Serhii Liashenko http://csitic.nure.ua/article/view/231827 Sun, 30 May 2021 00:00:00 +0300 Analyze and use neural networks for intrusion detection http://csitic.nure.ua/article/view/231828 <p>---------------------------------------------</p> Oleksii Liashenko, Denys Holtsev, Vladyslav Diachenko, Serhii Liashenko Copyright (c) 2021 Oleksii Liashenko, Denys Holtsev, Vladyslav Diachenko, Serhii Liashenko http://csitic.nure.ua/article/view/231828 Sun, 30 May 2021 00:00:00 +0300 Territory Modeling With Computer Graphics, Rendering and Geographic Information Systems http://csitic.nure.ua/article/view/231830 <p>The main goal of this thesis is to analyze existing technologies for three-dimensional modeling of architectural objects, including a comprehensive analysis of the adjacent territory. Visualization of the object and the corresponding relief, complemented by powerful analytical capabilities. It is carried out with the proposed effective set of tools in the environment of a geographic information system. The considered proposals for the use of three-dimensional modeling programs in geographic information systems will significantly simplify and improve interactions with them, as well as expand their areas of application.</p> Dmytro Karnaukhov, Nataliia Yeromina Copyright (c) 2021 Dmytro Karnaukhov, Nataliia Yeromina http://csitic.nure.ua/article/view/231830 Sun, 30 May 2021 00:00:00 +0300 Functionality and Usage of ACeSYRI Portal http://csitic.nure.ua/article/view/231832 <p>Created Advanced Centre for PhD students and young researchers in informatics (ACeSYRI) is provide an innovative infrastructure for international cooperation among students, researchers, and teaching staff of Partner Countries and EU universities. ACeSYRI portal is one of the essential parts of this Centre. This portal connects representatives of three target groups: (a) young researchers (Master and PhD students) from Partner Countries; (b) their scientific supervisors from national Universities; and (c) potential co-advisors of PhD thesis from foreign universities. The goal, functionality, and usage of the ACeSYRI portal are presented at the paper.</p> Vitaly Levashenko, Martin Lukac Copyright (c) 2021 Vitaly Levashenko, Martin Lukac http://csitic.nure.ua/article/view/231832 Sun, 30 May 2021 00:00:00 +0300 Predicting Traffic Anomalies in Container Virtualization http://csitic.nure.ua/article/view/231833 <p>Container solutions have a number of advantages over traditional ones. However, as the number of containers grows, the management complexity factor grows exponentially. In this case, the occurrence of traffic anomalies leads to deviations from the required QoS parameters. A method for predicting traffic anomalies in container virtualization has been developed. The method takes into account the peculiarities of traffic generated by a pool of containers under the control of a special system that ensures its routing and balancing in the environment of a computer system. Therefore, to predict traffic anomalies during container virtualization, it is necessary to analyze changes in the Hurst parameter.</p> Nina Kuchuk , Andriy Kovalenko , Vitalii Tkachov , Dmytro Rosinskiy , Heorhii Kuchuk Copyright (c) 2021 Nina Kuchuk , Andriy Kovalenko , Vitalii Tkachov , Dmytro Rosinskiy , Heorhii Kuchuk http://csitic.nure.ua/article/view/231833 Sun, 30 May 2021 00:00:00 +0300 Adaptive Visual Mobile Robot Control http://csitic.nure.ua/article/view/232774 <p>The work is devoted to modern Industry 4.0 approaches, such as mobile robot visual control on manufacturing plant. The main idea is a solution of the actual problem a flexible integrated robotic system control using an adaptive visual control system. The research methods are based on the usage of the research results analysis of modern theoretical and applied developments of native and foreign scientists in the field of adaptive visual control models and methods. Information and software support for the control system for a mobile transport robot has been developed, practically realizes the analysis of the working space using a computer / technical vision system and provides the selection of the main objects of the workspace, the identification of work and individual objects of space, obtaining their spatial coordinates, which improves the quality and speed of functioning flexible integrated robotic system.</p> Artem Bronnikov Copyright (c) 2021 Artem Bronnikov http://csitic.nure.ua/article/view/232774 Sun, 30 May 2021 00:00:00 +0300 Production Workspace Obstacle Avoidance Mobile Robot Trajectory Modeling http://csitic.nure.ua/article/view/232778 <p>The paper describes a method for determining the trajectory of a mobile robot inside a production workspace among obstacles. To determine the path of movement, a navigation system is used, which determines the robot's own coordinates, plans the trajectory at the current time and controls its movement. A software tool for modeling the behavior of a mobile robot taking into account the properties of its mechatronic platform is proposed. The model of the adaptive control system of the mobile platform is described. The block diagram of the program for modeling the method of finding the optimal way to move a mobile platform among uncertain obstacles is considered. The simulation results are given.</p> Igor Nevludov, Sergiy Novoselov, Oksana Sychova, Serhii Tesliuk Copyright (c) 2021 Igor Nevludov, Sergiy Novoselov, Oksana Sychova, Serhii Tesliuk http://csitic.nure.ua/article/view/232778 Sun, 30 May 2021 00:00:00 +0300 Research on the Properties of Complex Signal Ensembles Obtained by Frequency Segments Permutation http://csitic.nure.ua/article/view/232783 <p><em>For cognitive telecommunication systems, the problem of reducing the level of multiple access interference (intrasystem interference), which occur during the simultaneous operation of different subscribers of one system in a common frequency band, is relevant. To this end, the formation methods of large ensembles of complex signals obtained by permutation of the frequency segments of the output sequences with a low level of interaction in the time domain, have been developed [1]. The cross-correlation level of the received signals shows the degree of signal interaction in the time domain and, thus, makes it possible to assess the level of multiple access problems in the cognitive telecommunication system. An important task is to determine the maximum emission level of the cross-correlation functions of the resulting complex signal ensembles depending on the filtering bands and, accordingly, their impact on the volume of the ensembles. Also, the dependence of multiple access interference level on the number and duration of pulses in the output sequences, which are used to form complex signal ensembles based on the frequency segments permutations, was interesting. The solution of these problems will make it possible to simplify the procedure for determining the width of the filter bands for the formation of complex signal ensembles by permutation of frequency segments.</em></p> Volodymyr Lysechko, Oleksandr Zhuchenko, Iryna Kovtun, Serhii Indyk Copyright (c) 2021 Volodymyr Lysechko, Oleksandr Zhuchenko, Iryna Kovtun, Serhii Indyk http://csitic.nure.ua/article/view/232783 Sun, 30 May 2021 00:00:00 +0300 Double-Circuit Organization of a Distributed Computer System for the Effective Control of ITS Functioning http://csitic.nure.ua/article/view/232786 <p>The ensuring of the continuous control and software updates in the control nodes of a distributed data processing system requires the development of a network structure in such a way that a group of control nodes supports the functioning of its subnetwork and, if necessary, may transfer the data processing to the another group of control nodes. This structure consists of two circuits: a control node circuit and a data circuit.</p> Vadym Mukhin, Yaroslav Kornaga, Valery Zavgorodnii, Maksym Basaliy, Oleg Mukhin Copyright (c) 2021 Vadym Mukhin, Yaroslav Kornaga, Valery Zavgorodnii, Maksym Basaliy, Oleg Mukhin http://csitic.nure.ua/article/view/232786 Sun, 30 May 2021 00:00:00 +0300 Determining the factors affecting the stability of enterprise functioning http://csitic.nure.ua/article/view/232798 <p>The paper analysis and highlights are the main factors of internal and external environment that affects the stable functioning of the enterprise. The factor “energetics”, which is necessary to take into account while elaborating of intellectual system of evaluation of the condition of stable functioning of enterprise was grounded<em>.</em></p> Kirill Khrustalev, Igor Ruban, Sofiia Khrustalova, Artur Melezhyk Copyright (c) 2021 Kirill Khrustalev, Igor Ruban, Sofiia Khrustalova, Artur Melezhyk http://csitic.nure.ua/article/view/232798 Sun, 30 May 2021 00:00:00 +0300 Intelligent Tools for Service Robotic System http://csitic.nure.ua/article/view/232804 <p>There is provided an analysis of flexible integrated systems of development for industrial application. Report shows an increasing importance of intelligent components for service robotic units, making supplement operations in production workspaces. There are considered the basic requirements for intelligent decision-making support systems, which can be introduced to production systems to solve the service tasks of different levels.</p> Oleksandr Tsymbal Copyright (c) 2021 Oleksandr Tsymbal http://csitic.nure.ua/article/view/232804 Sun, 30 May 2021 00:00:00 +0300 Implementation of a Software Application for Researching the Face Recognition Algorithm http://csitic.nure.ua/article/view/232809 <p>Deep learning has recently attracted more and more interest in face recognition. Face recognition is a computer vision problem. There may be slight differences in the faces of humans but overall, it is safe to say that there are certain features that are associated with all the human faces.</p> Oleksandr Mordyk, Olekdandr Tsymbal Copyright (c) 2021 Oleksandr Mordyk, Olekdandr Tsymbal http://csitic.nure.ua/article/view/232809 Sun, 30 May 2021 00:00:00 +0300 Method of Annotating a Collection of Text Documents http://csitic.nure.ua/article/view/232889 <p>The work is devoted to the analysis of methods for annotating text documents, the relevance of which is due to the fact that when familiarizing with the information object presented in text form, reading the annotation by the reader is very much in demand, since it can reduce the time for selecting the necessary sources by several times. The paper considers the method of automatic annotation SumBasic, based on the probabilistic approach. An approach to data decomposition in each of the separate modules that ensure the operation of the method is proposed.</p> Olesia Barkovska, Vitalii Vodolazkyi Copyright (c) 2021 Olesia Barkovska, Vitalii Vodolazkyi http://csitic.nure.ua/article/view/232889 Sun, 30 May 2021 00:00:00 +0300 A Study of the Influence of Computing Systems on The Text Vectorization Speed http://csitic.nure.ua/article/view/232890 <p>The paper considers a relevant problem of accelerating the speed of text processing. The relevance of the development and modernization of electronic library systems results from the growing need for remote access to information objects. The purpose of the study is to reduce the execution time of one of the text processing methods at the stage of information accumulation, namely, vectorization. The results show that it is possible to achieve a greater acceleration of vectorization of small texts (874 words) on multiprocessor computing systems. Systems with massive parallelism produce good results (speedup up to 4.5 times) for large texts (8348 words).</p> Olesia Barkovska, Vladyslav Kholiev Copyright (c) 2021 Olesia Barkovska, Vladyslav Kholiev http://csitic.nure.ua/article/view/232890 Sun, 30 May 2021 00:00:00 +0300 Using OpenMP Directives to Accelerate OCR with Tesseract OCR http://csitic.nure.ua/article/view/232891 <p>This &nbsp;paper is devoted the methods of speed-up optical character recognition which is used for transformation of the scanned image to the edited text format. The example of application of these methods are the systems of the automated search of fragment of text in the catalogues of electronic libraries, where as an entrance format both the entered text and vocal query or scanned fragment of the text document can be used. The paper shows that the quality of the original image, as well as the applied image preprocessing algorithms, has the greatest influence on the quality of text recognition. Today the task of text recognition is implemented in many libraries.&nbsp; An example is the Tesseract OCR, considered in the work. It is shown that the joint use of the standard parallel programming library OpenMP, which is built into all modern C and C ++ compilers, reduces the time of processing up to 33% compared to the sequential implementation.</p> Olesia Barkovska, Ihor Ryzhov Copyright (c) 2021 Olesia Barkovska, Ihor Ryzhov http://csitic.nure.ua/article/view/232891 Sun, 30 May 2021 00:00:00 +0300 Accelerated Localization of the Iris as an Element of the Biometric System http://csitic.nure.ua/article/view/232892 <p>This work is devoted to the topic of localization and recognition of the unique and complex pattern of the iris, which is one of the elements of the biometric identification system along with such characteristics as fingerprints, palm prints, gestures, and facial features. The paper examines the performance of the algorithm for the localization and separation of the iris on the central and graphic processors using CUDA technology.</p> Olesia Barkovska, Yevhenii Bas Copyright (c) 2021 Olesia Barkovska, Yevhenii Bas http://csitic.nure.ua/article/view/232892 Sun, 30 May 2021 00:00:00 +0300 Preliminary assessment on Choosing a Cloud Platform http://csitic.nure.ua/article/view/232893 <p>The fast progress of information technology has led to significant changes in the functionality of cloud platforms. First of all, this affected the development of cloud services. The quantity of cloud platform grows. Cloud platforms are becoming more and more different from each other. The choice of a specific platform for complex information systems&nbsp; is an actual task. An advanced method on the choice of a cloud platform for designing information system is proposed. The method is based on the development of existing approaches, taking into account the changes in the functionality of the platforms.</p> Vladimir Sayenko Copyright (c) 2021 Vladimir Sayenko http://csitic.nure.ua/article/view/232893 Sun, 30 May 2021 00:00:00 +0300 Concept and Method for Development of Corporate Information System http://csitic.nure.ua/article/view/232894 <p class="Abstract"><span class="Abstractnew0"><span lang="EN-US" style="font-size: 10.0pt; font-weight: normal;">The report covers modern method for development of Corporate Information System (CIS). The main system-technical effect of the introduction of CIS lies in the transition from a localized, poorly synchronized, heterogeneous set of autonomous systems to a single, integrated, system architecture, which is built on the basis of a universal set of modern service tools</span></span></p> Viktor Borysenko, Tatjana Borysenko Copyright (c) 2021 Viktor Borysenko, Tatjana Borysenko http://csitic.nure.ua/article/view/232894 Sun, 30 May 2021 00:00:00 +0300 The Air Humidity Accuracy Improving by Separating the Humidifier Functions http://csitic.nure.ua/article/view/232895 <p>The article proposes a new approach to increasing the air humidity indicators measuring accuracy. The "smart" air humidification system implementation based on built-in systems with all the advantages and disadvantages is proposed and considered. The basis of the embedded system is a microcontroller with Wi-Fi function. The server or mobile application implementation as a graphical user interface (GUI) for monitoring the operation of the system as a whole is considered.</p> Dariia Varchenko, Alina Komashchuk Copyright (c) 2021 Dariia Varchenko, Alina Komashchuk http://csitic.nure.ua/article/view/232895 Sun, 30 May 2021 00:00:00 +0300 The Usage of The Technology of Constructing “AS-IS” Models of Initial Maturity Levels of Process Management http://csitic.nure.ua/article/view/232896 <p>Research of enterprise maturity levels has shown that enterprises above the second maturity level have well-structured and documented processes. At the same time, systems of maturity level below the second don’t operate processes at all. Instead, such systems have workflows as an analogy of processes. Building of “as-is” model with Process Mining technology is complicated for such kind of systems due to the inconsistency of log structures of the management systems to requirements defined by the mining technology. To resolve the constraints the technology of construction of graph models of business processes of zero and first maturity levels of process management on the basis of the analysis of event logs is offered. The technology involves structuring the event log, building graph models of workflows of the system, forming business process logs by combining routes, and building graph models of workflows "as is" by means of intellectual analysis of processes.</p> Ievgen Bogatov, Serhii Chalyi Copyright (c) 2021 Ievgen Bogatov, Serhii Chalyi http://csitic.nure.ua/article/view/232896 Sun, 30 May 2021 00:00:00 +0300 The Construction of Explanations in Intelligent Systems on the Basis of Interactive Clarification of the Decision’s Reasons http://csitic.nure.ua/article/view/232899 <p>The problem of interactive formation of explanations in intelligent information systems, as a problem of interactive interpretation and substantiation of stages of decision-making is considered. A combined approach to constructing an explanation is proposed, which combines the interpretation of the process of the intelligent system and the explanation of the obtained result. The approach implements the process of interactive clarification of the reasons for the decision as a basis for explanation.</p> Volodymyr Leshchynskyi, Irina Leshchynska Copyright (c) 2021 Віталій Олександрович Мартовицький; Volodymyr Leshchynskyi, Irina Leshchynska http://csitic.nure.ua/article/view/232899 Sun, 30 May 2021 00:00:00 +0300