https://journals.uran.ua/itssi/issue/feedINNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES2024-10-29T14:26:15+02:00NATALIIA KOSENKOjournal.itssi@gmail.comOpen Journal Systems<table width="100%" border="0"><tbody><tr><td align="center"><img src="http://itssi-journal.com/files/coverRU.png" alt="" width="300" /> </td><td><p><a href="http://journals.uran.ua/itssi/about/editorialPolicies#openAccessPolicy" target="_blank"><img src="http://itssi-journal.com/files/frontOpenAccess.png" alt="" width="275" /></a></p><p><a href="http://journals.uran.ua/itssi/about/editorialPolicies#peerReviewProcess" target="_blank"><img src="http://itssi-journal.com/files/frontPeerReviewed.png" alt="" width="275" /></a></p><p><img src="http://itssi-journal.com/files/frontCrossref.png" alt="" width="275" /></p></td></tr></tbody></table><p align="center"><strong><a href="http://itssi-journal.com/files/Certificate.pdf" target="_blank">СВИДЕТЕЛЬСТВО О ГОСУДАРСТВЕННОЙ РЕГИСТРАЦИИ ПЕЧАТНОГО СРЕДСТВА МАССОВОЙ ИНФОРМАЦИИ</a></strong></p><p align="center"><strong>ЖУРНАЛ ВКЛЮЧЕН В ПЕРЕЧЕНЬ НАУЧНЫХ СПЕЦИАЛИЗИРОВАННЫХ ИЗДАНИЙ УКРАИНЫ ПО СПЕЦИАЛЬНОСТЯМ</strong><br /><a href="http://itssi-journal.com/files/OrderMESU.pdf" target="_blank">Приказ Министерства образования и науки Украины от 16.07.2018 №775</a>)</p><table width="100%" border="0" align="center"><tbody><tr><td>051 Экономика</td><td>125 Кибербезопасность</td></tr><tr><td>073 Менеджмент</td><td>133 Отраслевое машиностроение</td></tr><tr><td>121 Инженерия программного обеспечения</td><td>151 Автоматизация и компьютерно-интегрированные технологии </td></tr><tr><td>122 Компьютерные науки и информационные технологии</td><td>152 Метрология и информационно-измерительная техника</td></tr><tr><td>123 Компьютерная инженерия</td><td>153 Микро- и наносистемная техника</td></tr><tr><td>124 Системный анализ</td><td> </td></tr></tbody></table><p align="justify"><strong>Тематическая направленность журнала:</strong> обмен информацией о научных, технических и экономических достижениях в промышленности.</p><p>Журнал предусматривает в своем составе два <strong>основных направления:</strong> технические и экономические науки.</p><p align="justify"><strong>Направления публикаций: </strong>информационные технологии и системы управления, математическое моделирование процессов в экономике и управлении проектами и программами, энергетика и транспорт, электроника, нанотехнологии, информационно-измерительные системы, управление в экономико-экологических системах, организация и управление производственными процессами, современные технические средства, комплексы и системы, экономика предприятия, проектный менеджмент, маркетинг и прочее.</p><p align="justify"><strong>Основатели журнала:</strong> Харьковский национальный университет радиоэлектроники и Государственное предприятие "Южный государственный проектно-конструкторский и научно-исследовательский институт авиационной промышленности" </p><p>Научный журнал расчитан на ученых, аспирантов, студентов высших учебных заведений.</p><p><strong><strong>Периодичность выпуска:</strong><strong> </strong></strong>ежеквартально, 4 номера в год (март, июнь, сентябрь, декабрь).</p><p align="justify"><strong>Журнал индексируется в международных наукометрических базах, репозиториях, библиотеках, каталогах и поисковых системах:</strong></p><p align="justify"><strong><a href="https://doaj.org/toc/2524-2296" target="_blank">DOAJ (Directory of Open Access Journals)</a>, </strong><a href="http://ulrichsweb.serialssolutions.com/login" target="_blank">Ulrich's Periodicals Directory</a>, <strong><a href="http://www.worldcat.org/search?q=on:DGCNT+http://journals.uran.ua/index.php/index/oai+2522-9818+UANTU" target="_blank">WorldCat</a>, </strong><a href="https://explore.openaire.eu/search/dataprovider?datasourceId=doajarticles::a4fdd4702d38efc7d641a8b412981d3b" target="_blank">OpenAIRE (Open Access Infrastructure for Research in Europe)</a>, <strong><a href="https://www.base-search.net/Search/Results?type=all&lookfor=http%3A%2F%2Fjournals.uran.ua%2Fitssi&ling=1&oaboost=1&name=&thes=&refid=dcresen&newsearch=1" target="_blank">Bielefeld Academic Search Engine (BASE)</a>,</strong><strong><a href="https://scholar.google.com.ua/citations?hl=ru&view_op=list_works&authuser=2&gmla=AJsN-F5c9xBjKB6A8SaxBdTpMYKtBFvKl28P3JKoTDzeJS97uIew2Q6sBw7pg3fscUZ8khQJCM1uihe0O9xYu1Qj0jrqSxA9_xyp0Gb65en1PsoCMyTxyyF3TNq6ggZ_uRlKU6sOheudbhcw_D7qQjDg2-uQCIsphQ&user=M3ptkAMAAAAJ" target="_blank"><strong> </strong></a></strong><a href="https://scholar.google.com.ua/citations?hl=ru&view_op=list_works&authuser=2&gmla=AJsN-F5c9xBjKB6A8SaxBdTpMYKtBFvKl28P3JKoTDzeJS97uIew2Q6sBw7pg3fscUZ8khQJCM1uihe0O9xYu1Qj0jrqSxA9_xyp0Gb65en1PsoCMyTxyyF3TNq6ggZ_uRlKU6sOheudbhcw_D7qQjDg2-uQCIsphQ&user=M3ptkAMAAAAJ" target="_blank">Google Академия</a>, <strong><a href="http://road.issn.org/issn/2524-2296" target="_blank">Directory of Open Access scholarly Resources (ROAD)</a>, </strong><a href="http://www.openarchives.org/Register/BrowseSites?viewRecord=http://itssi-journal.com/index.php/ittsi/oai" target="_blank">Open Archives Initiative</a>, <strong><a href="http://www.irbis-nbuv.gov.ua/cgi-bin/irbis_nbuv/cgiirbis_64.exe?Z21ID=&I21DBN=UJRN&P21DBN=UJRN&S21STN=1&S21REF=10&S21FMT=juu_all&C21COM=S&S21CNR=20&S21P01=0&S21P02=0&S21P03=PREF=&S21COLORTERMS=0&S21STR=dtssi" target="_blank"><strong>Национальная</strong><strong> </strong><strong>библиотека</strong><strong> </strong><strong>Украины</strong><strong> </strong><strong>имени</strong><strong> </strong><strong>В</strong><strong>. </strong><strong>И</strong><strong>. </strong><strong>Вернадского</strong></a></strong><strong>, </strong><a href="http://rzblx1.uni-regensburg.de/ezeit/detail.phtml?bibid=AAAAA&colors=7&lang=en&jour_id=339465" target="_blank">EZB Electronic Journals Library</a>, <strong><a href="https://pbn.nauka.gov.pl/sedno-webapp/journals/56687" target="_blank"><strong>Polska Bibliografia Naukowa</strong></a></strong><strong>, </strong><a href="http://miar.ub.edu/issn/2524-2296" target="_blank">MIAR (Information Matrix for the Analysis of Journals)</a>, <strong><a href="https://katalog.ub.uni-leipzig.de/Record/0021052872" target="_blank"><strong>Библиотека</strong><strong> </strong><strong>Лейпцигского</strong><strong> </strong><strong>университета</strong><strong> (</strong><strong>Библиотека</strong><strong> </strong><strong>Альбертина</strong><strong>)</strong></a></strong><strong>, </strong><a href="http://www.wcosj.com/site/search?Journal%5Btitle%5D=&Journal%5Beissn%5D=&Journal%5Bpissn%5D=2522-9818&Journal%5Bdiscipline_id%5D=&Journal%5Bpublisher_country_id%5D=&yt0=" target="_blank">World Catalogue of Scientific Journals</a>, <strong><a href="http://www.perechen-jurnalov.ru/entity/sovremennoe-sostoyanie-nauchnyh-issledovanij-i-tehnologij-v-promyshlennosti" target="_blank">Открытый каталог научных периодических изданий "Перечень-изданий.ru"</a>, </strong><a href="https://socionet.ru/collection.xml?h=spz:itssi:itssi" target="_blank">Соционет</a>, <strong><a href="http://index.pkp.sfu.ca/index.php/browse/index/3499" target="_blank">PKP Index</a>, </strong><a href="https://www.scilit.net/journals/1071282" target="_blank">Scientific Literature Database (Scilit)</a></p><p align="center"><img src="/public/site/images/admin/divider.png" alt="" width="200" /></p><p align="justify">На все опубликованные в журнале статьи устанавливаются цифровые идентификаторы <strong>DOI</strong>. </p><p>Рукописи в журнал принимаются на одном из трех языков: английский, украинский, русский. </p><p><strong>Контактное лицо:</strong> +38 (050) 324-23-99 Елена Юрьевна Персиянова</p><p><strong>E-mail:</strong> <strong><a href="mailto:journal.itssi@gmail.com">journal.itssi@gmail.com</a></strong></p><p><strong> Наш официальный сайт:</strong> <a href="http://itssi-journal.com" target="_blank"><strong>http://itssi-journal.com</strong></a></p>https://journals.uran.ua/itssi/article/view/314209Low-power coding method in data transmission systems2024-10-29T14:26:15+02:00Yareshchenko Vladyslavvlad.yareschenko@gmail.comViktor Kosenkokosvict@gmail.com<p>The object of the study is the Network-on-Chip (NoC) technology, which has become a popular choice for the on-chip communication architecture of modern System-on-Chip (SoC) devices. The <strong>subject matter</strong> of the article is methods of reducing dissipated power in NoC and SoC. The <strong>goal </strong>of the work is: development of a low-power coding method that allows for the efficient transmission or storage of information. The following <strong>tasks</strong> are solved in the article: analysis of classification methods for combinatorial structures, construction a system of typical representatives and analysis of their characteristics. The research <strong>methods</strong> are based on the use of set theory, system theory and combinatorics. The following <strong>results</strong> are obtained: analyzed factors that affect the dissipated power, considered principles of constructing energy-efficient codes. It is shown that switching activity significantly affects the total power and one of the effective methods for reducing switching activity during communication between devices or on-chip communication is the use of low-power coding methods. A method of hierarchical classification of unit distance codes and algorithms for solving step-by-step problems have been developed. The method is based on the invariant approach and construction of a system of different representatives. Estimates of their number have been obtained, characteristics have been determined, and catalogs of typical representatives have been formed. <strong>Conclusions. </strong>The article analyzes factors that affect dissipated power, and considers the principles of constructing energy-efficient codes. A method of hierarchical classification of single distance codes and algorithms for solving step-by-step problems have been developed, and catalogs of typical representatives have been formed. The application of the developed method will allow developers to analyze and select codes with the best properties and, as a result, obtain better results in terms of network delays, energy costs, and other design limitations for computer systems.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314207Management of innovative projects to ensure innovative development of enterprises2024-10-29T14:10:22+02:00Olena IastremskaIastremska_om@hneu.netLyudmyla Malyaretsmalyarets@ukr.netViktoriia Samoilenkosvita4448@gmail.comOleksii Budarinbudarin@ukrenergymachines.com<p>The<strong> subject </strong>of the study is theoretical provisions, methodology of adaptive management of innovation projects and innovative development of enterprises, methodological basis, practical proposals for its research in modern conditions. The<strong> purpose </strong>of the article is to summarize generalization of the theoretical basis of the features of innovative projects, the expediency of using organizational structures for managing the processes of their formation and implementation, analysis of adaptive methodologies for managing innovative projects to ensure the employment of workers, their innovative development, and development of practical recommendations on these issues for a working enterprise. The purpose is revealed by solving the following <strong>tasks</strong>: generalize the features of innovative projects that determine the success of their implementation; determine the feasibility of using organizational structures of enterprise management for the formation and implementation of innovative projects to ensure innovative development; identify and propose the use of adaptive management methodologies for innovative projects to achieve successful innovative development of enterprises; develop a hybrid organizational structure for innovation management; the main directions of innovative personnel management of enterprises to promote their employment and management of innovative development are proposed. To solve the tasks, the following<strong> methods </strong>were used: theoretical generalization, analysis, synthesis, induction and deduction, structural and logical analysis, systemic and situational approaches, the method of working day photography, Agile adaptive management methodology, graphic method, and the authors' own practical experience. The<strong> conclusions and results </strong>of the article are as follows: it is proved that the management of innovation projects should take into account their features, be based on the use of project, matrix and hybrid organizational management structures and the application of adaptive methodologies for managing innovation development and the formation and implementation of innovation projects, such as Agile, Scrum, Kanban, Lean. For the operating enterprise Nebozvid LLC, using adaptive management methodologies, a hybrid organizational structure of the project department has been developed to ensure the innovative development of the enterprise through the implementation of innovative projects with the organization of small project teams. The main trends in innovative personnel management of enterprises are proposed, the use of which contributes to the success of innovative project management to ensure the innovative development of enterprises.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314122Application of derivative and integral terminal sliding modes in leader-follower type systems"2024-10-28T13:56:28+02:00Vasylysa Kalashnikovav.kakashnikova@khai.edu<p><strong>Subject matter</strong>: The study focuses on the control methods for dr20 type robot swarms, specifically on the derivative and integral terminal sliding mode control combined with a nonlinear disturbance observer. The problem of effective swarm control is highly relevant in the current conditions of automation and robotics, especially in the context of performing complex tasks in limited space and in the presence of disturbances. <strong>Goal</strong>: The development and analysis of a simulation model for the movement of a robot swarm using advanced control methods to ensure system accuracy and stability. The research aims to improve the control methods for robot swarms, enhancing their efficiency and reliability in various operational conditions. <strong>Tasks</strong>: 1) Develop a simulation model of a robot swarm in the CoppeliaSimEDU environment, considering all necessary parameters for modeling real operating conditions. 2) Implement control algorithms for the leader and followers to maintain the swarm structure and avoid collisions. 3) Conduct a series of experiments to test the effectiveness of the proposed methods, analyzing the results in terms of stability and control accuracy. <strong>Methods</strong>: Modeling in CoppeliaSimEDU, implementing control algorithms based on derivative and integral terminal sliding mode control, applying a nonlinear disturbance observer to improve system stability. The applied methods allow for the consideration of various disturbances and ensure high control accuracy. <strong>Results</strong>: he proposed control model allows achieving high following accuracy and collision avoidance even in complex conditions. Experiments have shown that the control methods ensure the stability and accuracy of the robot swarm's movement, reducing the response time to external disturbances. The research results demonstrate that the use of derivative and integral terminal sliding mode control combined with a nonlinear disturbance observer significantly enhances the efficiency of multi-robot systems. <strong>Conclusions</strong>: The use of advanced control methods significantly improves the efficiency of multi-robot systems, ensuring their reliability and accuracy in real operating conditions. The proposed methods can be applied in various fields where the coordination of a large number of robots is required, including logistics, rescue operations, and environmental monitoring.</p>2024-10-29T00:00:00+02:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314136Models of forming logistics infrastructure for complex equipment recycling2024-10-28T17:24:26+02:00Maksym Kikotmaxym1111111@gmail.comJulia Malieievajuliabelokon84@gmail.com<p><strong>Subject matter</strong>: models for forming the logistics infrastructure for complex equipment recycling. The work aims to create optimization models that consider key factors in forming recycling infrastructure and combine centralized and decentralized elements to enhance the efficiency of this process. <strong>Tasks</strong>: analyze modern approaches to organizing complex equipment recycling; identify criteria and factors for optimizing recycling infrastructure; develop a multi-level recycling infrastructure; formulate optimization models for recycling infrastructure, taking into account enterprise production capacities, logistical costs, environmental impact, and other factors. <strong>Methods:</strong> a systems approach, structural modeling, optimization models. <strong>Research results</strong>: approaches to organizing recycling infrastructure were analyzed: centralized, distributed, and combined; the selection of a combined approach for creating logistics infrastructure for complex equipment recycling was justified; a structural multi-level model of recycling infrastructure was developed with a lower level (sorting enterprises), middle level (processing enterprises), and upper level (organizational management); mathematical models for optimizing recycling infrastructure were formulated, considering enterprise production capacities, logistical costs, and environmental impact. <strong>The conclusions</strong>: proposed structural multi-level model of complex equipment recycling infrastructure combines the advantages of centralized and decentralized management, ensuring flexibility, system reliability against external influences, cost minimization, and sustainable process control. The application of the developed optimization models allows for consideration of enterprise production capacities, logistical costs, environmental impact, and other factors to find the most effective configuration of recycling infrastructure. Implementation of the proposed recycling infrastructure will ensure the formation of coherent interaction between government bodies, enterprises, public organizations, and international partners.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314137Adaptive pre-processing methods for increasing the accuracy of segmentation of dental X-RAY images2024-10-28T17:39:20+02:00Oleh Komenchukkomenchuk77@gmail.com<p>The <strong>subject</strong> of research in the article is the effectiveness of adaptive methods of preprocessing of medical images, in particular adaptive bilateral filter and modified CLAHE, in the tasks of segmentation of dental X-ray images. These methods make it possible to preserve important image details and effectively reduce noise, even in cases of high variability of images coming from different sources. The <strong>goal</strong> of the work is to study the impact of adaptive preprocessing methods on increasing the accuracy of segmentation of medical images and to determine the optimal combination of methods that provide the best results in segmentation tasks. The article addresses the following <strong>tasks</strong>: experimental comparison of adaptive preprocessing methods with traditional approaches, evaluation of segmentation efficiency using metrics such as Dice Score, Jacquard Coefficient (IoU Score), Precision and Sensitivity/Completeness (Recall)), as well as analysis of the effect of pre-processing on the quality of segmentation. The following <strong>methods</strong> are used: mathematical modeling, neural network training based on the U-Net model with a pre-trained timm-resnest101e encoder, image scaling to 512x512 pixels, training with a fixed learning rate of 0.001. The following <strong>results</strong> were obtained: the combined use of the adaptive bilateral filter and the modified CLAHE provided the highest segmentation quality indicators (Dice Score 0.9603 and Jacquard Coefficient (IoU Score) 0.94501), surpassing traditional methods. This proves the advantage of adaptive approaches in preserving the contours of objects and reducing noise. <strong>Conclusions</strong>: the application of adaptive preprocessing methods significantly improves the accuracy of segmentation of medical images. The combined approach including the adaptive bilateral filter and the modified CLAHE is the most effective for medical imaging tasks, which increases the accuracy of diagnosis and the reliability of automated decision support systems.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314140Architecture of an automated program complex based on a multiple kernel svm classifier for analyzing malicious executable files2024-10-28T17:48:05+02:00Alan NafiievAlan.nafiev@gmail.comAndrii Rodionovandrey.rodionov@gmail.com<p><strong>Subject matter.</strong> This article presents the development and architecture of an automated program complex designed to identify and analyze malicious executable files using a classifier based on a multiple kernel support vector machine (SVM). <strong>Goal.</strong> The aim of the work is to create an automated system that enhances the accuracy and efficiency of malware detection by combining static and dynamic analysis into a single framework capable of processing large volumes of data with optimal time expenditure. <strong>Tasks.</strong> To achieve this goal, tasks were carried out that included developing a program complex that automates the collection of static and dynamic data from executable files using tools like IDA Pro, IDAPython, and Drakvuf; integrating a multiple kernel SVM classifier to analyze the collected heterogeneous data; validating the system's effectiveness based on a substantial dataset containing 1,389 executable samples; and demonstrating the system's scalability and practical applicability in real-world conditions. <strong>Methods.</strong> The methods involved a hybrid approach that combines static analysis – extracting byte code, disassembled instructions, and control flow graphs using IDA Pro and IDAPython – with dynamic analysis, which entails monitoring real-time behavior using Drakvuf. The multiple kernel SVM classifier integrates different data representations using various kernels, allowing for both linear and nonlinear relationships to be considered in the classification process. <strong>Results.</strong> The results of the study show that the system achieves a high level of accuracy and completeness, as evidenced by key performance metrics such as an F-score of 0.93 and ROC AUC and PR AUC values. The automated program complex reduces the analysis time of a single file from an average of 11 minutes to approximately 5 minutes, effectively doubling the throughput compared to previous methods. This significant reduction in processing time is critically important for deployment in environments where rapid and accurate malware detection is necessary. Furthermore, the system's scalability allows for efficient processing of large data volumes, making it suitable for real-world applications. <strong>Conclusions.</strong> In conclusion, the automated program complex developed in this study demonstrates significant improvements in the accuracy and efficiency of malware detection. By integrating multiple kernel SVM classification with static and dynamic analysis, the system shows potential for real-time malware detection and analysis. Its scalability and practical applicability indicate that it could become an important tool in combating modern cyber threats, providing organizations with an effective means to enhance their cybersecurity.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314189Development of a model of the process of development of manufacturing defects in automation means2024-10-29T12:34:43+02:00Igor Nevliudovigor.nevliudov@nure.uaNikolaj Starodubcevnikolaj.starodubcev@nure.uaHennadii Makarenkohennadii.makarenko@nure.uaMatvii Bilousovmatvii.bilousov@nure.uaSerhii Shybanovserhii.shybanov@nure.uaYusifov Ramalramalyus.kyros@gmail.com<p>In automated process control systems, automation equipment (sensors, converters, amplifiers, etc.) with technical defects arising during their manufacture, which are one of the main causes of failures, is widely used. The paper establishes the possibility of using the laws of nonequilibrium thermodynamics as the basis for determining the relationship between the controlled parameters of automation equipment and the parameters of the displayed medium, which made it possible to build a deterministic model of the development of production defects and, ultimately, determine the directions for changing and adjusting the technological processes of production of automation equipment. A method has been developed for implementing a guaranteed forecast of changes in the parameters of automation equipment based on solving the evolution equation using optimal filtering algorithms, which is the <strong>subject</strong> of research. The <strong>purpose</strong> of the work is to improve the quality and reliability of automation equipment by improving the monitoring of defects arising in the production of instruments, functional units and sensors of automation equipment. The article solves the following <strong>problems</strong>: analysis of existing approaches to the problem of manufacturing defects and methods for their detection and setting a research task; modeling of the process of development of production defects causing changes in the technical condition of automation equipment; development of a decision-making method based on guaranteed prediction of the technical state of automation equipment. The <strong>methodology</strong> of work is based on the methods of thermodynamic description of the kinetics of processes (when developing a model of the process of development of production defects that cause a change in technical condition) and methods of assessment and forecasting based on optimal filtering algorithms (when developing a decision-making method based on guaranteed foresight of technical condition). The <strong>results</strong> of the work include a model of the process of development of manufacturing defects that cause a change in the technical condition of automation equipment, and a decision-making method based on a guaranteed forecast of the technical condition of automation equipment. <strong>Conclusions.</strong> The paper establishes the possibility of using the laws of nonequilibrium thermodynamics to determine the relationship between the controlled parameters of automation equipment and the displayed medium, and to build a deterministic thermodynamic model of the development of production defects. Disclosed is an equation of evolution of technical state of automation equipment based on a deterministic kinetic model of processes occurring in a multicomponent medium, and an observation model which takes into account errors caused by instability of external effects and measurement errors. Disclosed is a method of implementing a guaranteed forecast of change in parameters of automation equipment based on solving the evolution equation using optimal filtering algorithms, which are used to solve estimation and prediction problems.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314194Aggregation-based obfuscation method for electronic systems design2024-10-29T13:16:56+02:00Olha Ponomarenkoolha.ponomarenko@nure.uaValeriy Gorbachovvaleriy.gorbachov@nure.ua<p>Hardware Trojan attacks relate to malicious modifications of integrated circuits during design or manufacturing, involving untrusted design tools or components. Such modifications can lead to undesired behavior of integrated circuits or the appearance of hidden data leakage channels. There are various methods of classification, detection and prevention of hardware Trojans insertion. One approach to prevent of Trojans insertion is an obfuscation-based design approach. This approach is based on hiding the functional and structural properties of the design, which makes it difficult for an attacker to insert Trojans. <strong>The subject matter of research</strong> is an aggregation-based obfuscation method for electronic systems design. <strong>The goal of the work</strong> is to study the process of aggregation-based obfuscation of the electronic systems design. The main idea is that the development and connection phase of the reference monitor is performed in a trusted environment. Thus, an attacker will not be able to obtain its functionality and original structure. <strong>The relevance of the work</strong> lies in the fact that this approach prevents the possibility of functioning of hardware Trojans. <strong>The following tasks were solved in the work</strong>: development and study of an aggregation-based obfuscation algorithm for electronic systems design; implementation of the reference monitor presentation as a separate subsystem associated with the main design; experimental evaluation of the possibilities of the method. <strong>As a result of the work</strong> the aggregation-based obfuscation method for electronic systems design was demonstrated; reference monitor was presented as a separate subsystem associated with the main design; experimental evaluation of the possibilities of the method was demonstrated. The studies allow us to <strong>conclude</strong>: the obfuscation-based design approach is that the integrated circuit is modified, thus, the functional and structural properties of the design are hidden, which makes it difficult for an attacker to insert Trojans. Aggregation-based obfuscation considers the reference monitor as a separate subsystem associated with the main design.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314196Development of the architecture of the remote access system to educational laboratory equipment using automated solutions2024-10-29T13:29:55+02:00Oleh Posashkovoleh.posashkov@nure.uaOleksandr Tsymbaloleksandr.tsymbal@nure.ua<p>The <strong>subject of the study</strong> is remote access to Raspberry Pi-based training equipment and remote desktop software. The <strong>purpose</strong> of the work is to analyze the means of remote control of equipment and develop the architecture of the system of remote access of students to laboratory equipment for the implementation of distance learning. The following tasks are solved in the article: the branches in which application of means of remote access is the most critical are analyzed, among which the special place is occupied by the educational branch; analysis of existing methods of organization of remote access to training equipment was carried out, advantages and disadvantages of each method were allocated; justification is being made for choosing a Raspberry Pi minicomputer as a hardware platform for building remote access systems; describes the architecture of a complex of technical solutions based on Raspberry Pi for remote control of educational laboratory equipment; implementation of applied system of temperature and humidity monitoring using developed approach is described. <strong>Research methods</strong> include comparative analysis of existing remote control technologies, prototyping and experimental testing of the developed system. The following <strong>results</strong> were obtained: the feasibility of using the remote desktop approach and AnyDesk software for organizing access was substantiated, a system based on the Raspberry Pi minicomputer for managing equipment and visualizing data was developed, an applied system for monitoring temperature and humidity using Raspberry Pi and AnyDesk was implemented. <strong>Conclusions</strong>: The proposed approach of using Raspberry Pi and remote desktop software allows students to effectively organize remote access to laboratory equipment from engineering disciplines during distance learning. This solution combines ease of implementation, interaction with real physical equipment and low cost compared to the use of industrial PLCs.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314200Analysis of authentication methods for full-stack applications and implementation of a web application with an integrated authentication system2024-10-29T13:44:13+02:00Tamara Radivilovatamara.radivilova@nure.uaLyudmyla Kirichenkoludmila.kirichenko@gmail.comVadym Pantelieievvadym.pantelieiev@nure.uaArtem Mazepayertom500@gmail.comVolodymyr Bilodidvibos111@gmail.com<p>The <strong>subject </strong>of research is methods and techniques for secure user authentication in web applications. The <strong>goal</strong> of the work is to analyse authentication methods and implement a web application with an authentication system integrating JWT tokens and the OAuth v2.0 standard. The article solves the <strong>tasks</strong> of analysis of the main protocols and methods of user authentication in web applications, implementation of authentication based on the OAuth 2.0 standard and JWT access/refresh token, and analysis of the risks of vulnerabilities and attacks for the implemented web applications. <strong>Methods</strong> used: comparison, empirical analysis, calculation methods. The next <strong>results</strong> have been obtained: analysed the protocols and methods of user authentication in web applications; selected authentication methods of JWT token and OAuth v2.0 standard for building modern web applications; created a web application based on the selected authentication methods in web applications; analysed the risks of vulnerabilities and attacks in web applications. <strong>Conclusions:</strong> The most well-known authentication methods for web applications are analyzed. It is established that most modern authentication methods have many disadvantages, which leads to increased risks when using these authentication methods. It is shown that one of the most reliable methods of web application user data security is the use of a combination of JWT Access/Refresh token and browser fingerprints. The implementation, configuration, and analysis of this methodology have shown that this combination provides the most reliable prevention of token theft and use from another computer. OAuth 2.0 authentication was also implemented. The study found that delegating authentication to services such as Facebook or Google can provide a low risk of attacks and vulnerabilities for a web application. It is noted that authentication using OAuth 2.0 can be compromised only at the beginning of the connection between the client and the server, or rather when the client first sends initial information from the browser fingerprints. This information is sent over the secure HTTPS (Hypertext Transfer Protocol Secure) protocol, so the risk of compromising OAuth 2.0 authentication is low.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024 https://journals.uran.ua/itssi/article/view/314205Choosing strategies for deployment and ensuring the reliability of a UAV swarm to support communications in destruction conditions2024-10-29T14:01:03+02:00Dmytro Terenykd.terenik@student.csn.khai.eduVyacheslav Kharchenkov.kharchenko@csn.khai.edu<p>The <strong>subject matter</strong> of the article is the system of communication networks of UAVs (flying networks, FNs), which use LiFi technology for data transmission from the source to the receiver in conditions of physical obstacles and cyber threats, as well as deployment and reliability assurance strategies (DRAS) of FNs. The <strong>goal </strong>of the work is to develop criteria and algorithms for choosing DRAS of FNs that provide the necessary level of reliability and efficiency under given constraints. The following <strong>tasks </strong>were solved in the article: systematization of deployment strategies and ensuring the reliability of the flying network; formulation of principles and development of an algorithm for choosing the optimal deployment strategy and ensuring the reliability of FNs; providing recommendations on choosing the optimal deployment strategies and ensuring the reliability of the flying network. The following <strong>methods </strong>are used: system analysis for choosing the optimal DRAS; theory of reliability and system efficiency. The following <strong>results</strong> were obtained: the classifier of FNs deployment strategies was expanded due to additional features of repair and maintenance, as well as the presence of cyber attacks; the criteria for choosing deployment strategies and ensuring the reliability of FNs are formulated; an algorithm for choosing the optimal deployment strategy and ensuring the reliability of FNs was developed; the analysis is carried out and an example of the application of the developed algorithms is given to illustrate the step-by-step procedure for choosing a strategy, which is accompanied by calculations of reliability indicators. <strong>Conclusions</strong>: the proposed sets, criteria, and algorithm for choosing deployment and reliability assurance strategies of FNs enable the substantiation of a set of parameters and planning of the implementation of the optimal (according to the defined criterion) policy for the introduction of an automatic communication support system at critical infrastructure objects under conditions of destruction and cyber influence, as well as increase efficiency (minimize cost) of the use of flying networks.</p>2024-09-30T00:00:00+03:00Copyright (c) 2024