INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES https://journals.uran.ua/itssi <table width="100%" border="0"><tbody><tr><td align="center"><img src="http://itssi-journal.com/files/coverRU.png" alt="" width="300" /> </td><td><p><a href="http://journals.uran.ua/itssi/about/editorialPolicies#openAccessPolicy" target="_blank"><img src="http://itssi-journal.com/files/frontOpenAccess.png" alt="" width="275" /></a></p><p><a href="http://journals.uran.ua/itssi/about/editorialPolicies#peerReviewProcess" target="_blank"><img src="http://itssi-journal.com/files/frontPeerReviewed.png" alt="" width="275" /></a></p><p><img src="http://itssi-journal.com/files/frontCrossref.png" alt="" width="275" /></p></td></tr></tbody></table><p align="center"><strong><a href="http://itssi-journal.com/files/Certificate.pdf" target="_blank">СВИДЕТЕЛЬСТВО О ГОСУДАРСТВЕННОЙ РЕГИСТРАЦИИ ПЕЧАТНОГО СРЕДСТВА МАССОВОЙ ИНФОРМАЦИИ</a></strong></p><p align="center"><strong>ЖУРНАЛ ВКЛЮЧЕН В ПЕРЕЧЕНЬ НАУЧНЫХ СПЕЦИАЛИЗИРОВАННЫХ ИЗДАНИЙ УКРАИНЫ ПО СПЕЦИАЛЬНОСТЯМ</strong><br /><a href="http://itssi-journal.com/files/OrderMESU.pdf" target="_blank">Приказ Министерства образования и науки Украины от 16.07.2018 №775</a>)</p><table width="100%" border="0" align="center"><tbody><tr><td>051 Экономика</td><td>125 Кибербезопасность</td></tr><tr><td>073 Менеджмент</td><td>133 Отраслевое машиностроение</td></tr><tr><td>121 Инженерия программного обеспечения</td><td>151 Автоматизация и компьютерно-интегрированные технологии </td></tr><tr><td>122 Компьютерные науки и информационные технологии</td><td>152 Метрология и информационно-измерительная техника</td></tr><tr><td>123 Компьютерная инженерия</td><td>153 Микро- и наносистемная техника</td></tr><tr><td>124 Системный анализ</td><td> </td></tr></tbody></table><p align="justify"><strong>Тематическая направленность журнала:</strong> обмен информацией о научных, технических и экономических достижениях в промышленности.</p><p>Журнал предусматривает в своем составе два <strong>основных направления:</strong> технические и экономические науки.</p><p align="justify"><strong>Направления публикаций: </strong>информационные технологии и системы управления, математическое моделирование процессов в экономике и управлении проектами и программами, энергетика и транспорт, электроника, нанотехнологии, информационно-измерительные системы, управление в экономико-экологических системах, организация и управление производственными процессами, современные технические средства, комплексы и системы, экономика предприятия, проектный менеджмент, маркетинг и прочее.</p><p align="justify"><strong>Основатели журнала:</strong> Харьковский национальный университет радиоэлектроники и Государственное предприятие "Южный государственный проектно-конструкторский и научно-исследовательский институт авиационной промышленности" </p><p>Научный журнал расчитан на ученых, аспирантов, студентов высших учебных заведений.</p><p><strong><strong>Периодичность выпуска:</strong><strong> </strong></strong>ежеквартально, 4 номера в год (март, июнь, сентябрь, декабрь).</p><p align="justify"><strong>Журнал индексируется в международных наукометрических базах, репозиториях, библиотеках, каталогах и поисковых системах:</strong></p><p align="justify"><strong><a href="https://doaj.org/toc/2524-2296" target="_blank">DOAJ (Directory of Open Access Journals)</a>, </strong><a href="http://ulrichsweb.serialssolutions.com/login" target="_blank">Ulrich's Periodicals Directory</a>, <strong><a href="http://www.worldcat.org/search?q=on:DGCNT+http://journals.uran.ua/index.php/index/oai+2522-9818+UANTU" target="_blank">WorldCat</a>, </strong><a href="https://explore.openaire.eu/search/dataprovider?datasourceId=doajarticles::a4fdd4702d38efc7d641a8b412981d3b" target="_blank">OpenAIRE (Open Access Infrastructure for Research in Europe)</a>, <strong><a href="https://www.base-search.net/Search/Results?type=all&amp;lookfor=http%3A%2F%2Fjournals.uran.ua%2Fitssi&amp;ling=1&amp;oaboost=1&amp;name=&amp;thes=&amp;refid=dcresen&amp;newsearch=1" target="_blank">Bielefeld Academic Search Engine (BASE)</a>,</strong><strong><a href="https://scholar.google.com.ua/citations?hl=ru&amp;view_op=list_works&amp;authuser=2&amp;gmla=AJsN-F5c9xBjKB6A8SaxBdTpMYKtBFvKl28P3JKoTDzeJS97uIew2Q6sBw7pg3fscUZ8khQJCM1uihe0O9xYu1Qj0jrqSxA9_xyp0Gb65en1PsoCMyTxyyF3TNq6ggZ_uRlKU6sOheudbhcw_D7qQjDg2-uQCIsphQ&amp;user=M3ptkAMAAAAJ" target="_blank"><strong> </strong></a></strong><a href="https://scholar.google.com.ua/citations?hl=ru&amp;view_op=list_works&amp;authuser=2&amp;gmla=AJsN-F5c9xBjKB6A8SaxBdTpMYKtBFvKl28P3JKoTDzeJS97uIew2Q6sBw7pg3fscUZ8khQJCM1uihe0O9xYu1Qj0jrqSxA9_xyp0Gb65en1PsoCMyTxyyF3TNq6ggZ_uRlKU6sOheudbhcw_D7qQjDg2-uQCIsphQ&amp;user=M3ptkAMAAAAJ" target="_blank">Google Академия</a>, <strong><a href="http://road.issn.org/issn/2524-2296" target="_blank">Directory of Open Access scholarly Resources (ROAD)</a>, </strong><a href="http://www.openarchives.org/Register/BrowseSites?viewRecord=http://itssi-journal.com/index.php/ittsi/oai" target="_blank">Open Archives Initiative</a>, <strong><a href="http://www.irbis-nbuv.gov.ua/cgi-bin/irbis_nbuv/cgiirbis_64.exe?Z21ID=&amp;I21DBN=UJRN&amp;P21DBN=UJRN&amp;S21STN=1&amp;S21REF=10&amp;S21FMT=juu_all&amp;C21COM=S&amp;S21CNR=20&amp;S21P01=0&amp;S21P02=0&amp;S21P03=PREF=&amp;S21COLORTERMS=0&amp;S21STR=dtssi" target="_blank"><strong>Национальная</strong><strong> </strong><strong>библиотека</strong><strong> </strong><strong>Украины</strong><strong> </strong><strong>имени</strong><strong> </strong><strong>В</strong><strong>. </strong><strong>И</strong><strong>. </strong><strong>Вернадского</strong></a></strong><strong>, </strong><a href="http://rzblx1.uni-regensburg.de/ezeit/detail.phtml?bibid=AAAAA&amp;colors=7&amp;lang=en&amp;jour_id=339465" target="_blank">EZB Electronic Journals Library</a>, <strong><a href="https://pbn.nauka.gov.pl/sedno-webapp/journals/56687" target="_blank"><strong>Polska Bibliografia Naukowa</strong></a></strong><strong>, </strong><a href="http://miar.ub.edu/issn/2524-2296" target="_blank">MIAR (Information Matrix for the Analysis of Journals)</a>, <strong><a href="https://katalog.ub.uni-leipzig.de/Record/0021052872" target="_blank"><strong>Библиотека</strong><strong> </strong><strong>Лейпцигского</strong><strong> </strong><strong>университета</strong><strong> (</strong><strong>Библиотека</strong><strong> </strong><strong>Альбертина</strong><strong>)</strong></a></strong><strong>, </strong><a href="http://www.wcosj.com/site/search?Journal%5Btitle%5D=&amp;Journal%5Beissn%5D=&amp;Journal%5Bpissn%5D=2522-9818&amp;Journal%5Bdiscipline_id%5D=&amp;Journal%5Bpublisher_country_id%5D=&amp;yt0=" target="_blank">World Catalogue of Scientific Journals</a>, <strong><a href="http://www.perechen-jurnalov.ru/entity/sovremennoe-sostoyanie-nauchnyh-issledovanij-i-tehnologij-v-promyshlennosti" target="_blank">Открытый каталог научных периодических изданий "Перечень-изданий.ru"</a>, </strong><a href="https://socionet.ru/collection.xml?h=spz:itssi:itssi" target="_blank">Соционет</a>, <strong><a href="http://index.pkp.sfu.ca/index.php/browse/index/3499" target="_blank">PKP Index</a>, </strong><a href="https://www.scilit.net/journals/1071282" target="_blank">Scientific Literature Database (Scilit)</a></p><p align="center"><img src="/public/site/images/admin/divider.png" alt="" width="200" /></p><p align="justify">На все опубликованные в журнале статьи устанавливаются цифровые идентификаторы <strong>DOI</strong>. </p><p>Рукописи в журнал принимаются на одном из трех языков: английский, украинский, русский. </p><p><strong>Контактное лицо:</strong> +38 (050) 324-23-99 Елена Юрьевна Персиянова</p><p><strong>E-mail:</strong> <strong><a href="mailto:journal.itssi@gmail.com">journal.itssi@gmail.com</a></strong></p><p><strong> Наш официальный сайт:</strong> <a href="http://itssi-journal.com" target="_blank"><strong>http://itssi-journal.com</strong></a></p> en-US <p align="justify">Our journal abides by the <strong><a href="http://creativecommons.org/">Creative Commons</a></strong> copyright rights and permissions for open access journals.</p><p align="justify">Authors who publish with this journal agree to the following terms:</p><ul><li><p align="justify"><strong>Authors hold the copyright without restrictions</strong> and grant the journal right of first publication with the work simultaneously licensed under a <strong><a href="http://creativecommons.org/licenses/by-nc-sa/4.0/" target="_new">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0)</a></strong> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</p></li><li><p align="justify"><strong>Authors are able</strong> to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</p></li><li><p align="justify"><strong>Authors are permitted and encouraged</strong> to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.</p></li></ul> journal.itssi@gmail.com (NATALIIA KOSENKO) journal.itssi@gmail.com (NATALIIA KOSENKO) Mon, 30 Sep 2024 00:00:00 +0300 OJS 3.2.1.2 http://blogs.law.harvard.edu/tech/rss 60 Low-power coding method in data transmission systems https://journals.uran.ua/itssi/article/view/314209 <p>The object of the study is the Network-on-Chip (NoC) technology, which has become a popular choice for the on-chip communication architecture of modern System-on-Chip (SoC) devices. The <strong>subject matter</strong> of the article is methods of reducing dissipated power in NoC and SoC. The <strong>goal </strong>of the work is: development of a low-power coding method that allows for the efficient transmission or storage of information. The following <strong>tasks</strong> are solved in the article: analysis of classification methods for combinatorial structures, construction a system of typical representatives and analysis of their characteristics. The research <strong>methods</strong> are based on the use of set theory, system theory and combinatorics. The following <strong>results</strong> are obtained: analyzed factors that affect the dissipated power, considered principles of constructing energy-efficient codes. It is shown that switching activity significantly affects the total power and one of the effective methods for reducing switching activity during communication between devices or on-chip communication is the use of low-power coding methods. A method of hierarchical classification of unit distance codes and algorithms for solving step-by-step problems have been developed. The method is based on the invariant approach and construction of a system of different representatives. Estimates of their number have been obtained, characteristics have been determined, and catalogs of typical representatives have been formed. <strong>Conclusions. </strong>The article analyzes factors that affect dissipated power, and considers the principles of constructing energy-efficient codes. A method of hierarchical classification of single distance codes and algorithms for solving step-by-step problems have been developed, and catalogs of typical representatives have been formed. The application of the developed method will allow developers to analyze and select codes with the best properties and, as a result, obtain better results in terms of network delays, energy costs, and other design limitations for computer systems.</p> Yareshchenko Vladyslav, Viktor Kosenko Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314209 Mon, 30 Sep 2024 00:00:00 +0300 Management of innovative projects to ensure innovative development of enterprises https://journals.uran.ua/itssi/article/view/314207 <p>The<strong> subject </strong>of the study is theoretical provisions, methodology of adaptive management of innovation projects and innovative development of enterprises, methodological basis, practical proposals for its research in modern conditions. The<strong> purpose </strong>of the article is to summarize generalization of the theoretical basis of the features of innovative projects, the expediency of using organizational structures for managing the processes of their formation and implementation, analysis of adaptive methodologies for managing innovative projects to ensure the employment of workers, their innovative development, and development of practical recommendations on these issues for a working enterprise. The purpose is revealed by solving the following <strong>tasks</strong>: generalize the features of innovative projects that determine the success of their implementation; determine the feasibility of using organizational structures of enterprise management for the formation and implementation of innovative projects to ensure innovative development; identify and propose the use of adaptive management methodologies for innovative projects to achieve successful innovative development of enterprises; develop a hybrid organizational structure for innovation management; the main directions of innovative personnel management of enterprises to promote their employment and management of innovative development are proposed. To solve the tasks, the following<strong> methods </strong>were used: theoretical generalization, analysis, synthesis, induction and deduction, structural and logical analysis, systemic and situational approaches, the method of working day photography, Agile adaptive management methodology, graphic method, and the authors' own practical experience. The<strong> conclusions and results </strong>of the article are as follows: it is proved that the management of innovation projects should take into account their features, be based on the use of project, matrix and hybrid organizational management structures and the application of adaptive methodologies for managing innovation development and the formation and implementation of innovation projects, such as Agile, Scrum, Kanban, Lean. For the operating enterprise Nebozvid LLC, using adaptive management methodologies, a hybrid organizational structure of the project department has been developed to ensure the innovative development of the enterprise through the implementation of innovative projects with the organization of small project teams. The main trends in innovative personnel management of enterprises are proposed, the use of which contributes to the success of innovative project management to ensure the innovative development of enterprises.</p> Olena Iastremska, Lyudmyla Malyarets, Viktoriia Samoilenko, Oleksii Budarin Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314207 Mon, 30 Sep 2024 00:00:00 +0300 Application of derivative and integral terminal sliding modes in leader-follower type systems" https://journals.uran.ua/itssi/article/view/314122 <p><strong>Subject matter</strong>: The study focuses on the control methods for dr20 type robot swarms, specifically on the derivative and integral terminal sliding mode control combined with a nonlinear disturbance observer. The problem of effective swarm control is highly relevant in the current conditions of automation and robotics, especially in the context of performing complex tasks in limited space and in the presence of disturbances. <strong>Goal</strong>: The development and analysis of a simulation model for the movement of a robot swarm using advanced control methods to ensure system accuracy and stability. The research aims to improve the control methods for robot swarms, enhancing their efficiency and reliability in various operational conditions. <strong>Tasks</strong>: 1) Develop a simulation model of a robot swarm in the CoppeliaSimEDU environment, considering all necessary parameters for modeling real operating conditions. 2) Implement control algorithms for the leader and followers to maintain the swarm structure and avoid collisions. 3) Conduct a series of experiments to test the effectiveness of the proposed methods, analyzing the results in terms of stability and control accuracy. <strong>Methods</strong>: Modeling in CoppeliaSimEDU, implementing control algorithms based on derivative and integral terminal sliding mode control, applying a nonlinear disturbance observer to improve system stability. The applied methods allow for the consideration of various disturbances and ensure high control accuracy. <strong>Results</strong>: he proposed control model allows achieving high following accuracy and collision avoidance even in complex conditions. Experiments have shown that the control methods ensure the stability and accuracy of the robot swarm's movement, reducing the response time to external disturbances. The research results demonstrate that the use of derivative and integral terminal sliding mode control combined with a nonlinear disturbance observer significantly enhances the efficiency of multi-robot systems. <strong>Conclusions</strong>: The use of advanced control methods significantly improves the efficiency of multi-robot systems, ensuring their reliability and accuracy in real operating conditions. The proposed methods can be applied in various fields where the coordination of a large number of robots is required, including logistics, rescue operations, and environmental monitoring.</p> Vasylysa Kalashnikova Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314122 Tue, 29 Oct 2024 00:00:00 +0200 Models of forming logistics infrastructure for complex equipment recycling https://journals.uran.ua/itssi/article/view/314136 <p><strong>Subject matter</strong>: models for forming the logistics infrastructure for complex equipment recycling. The work aims to create optimization models that consider key factors in forming recycling infrastructure and combine centralized and decentralized elements to enhance the efficiency of this process. <strong>Tasks</strong>: analyze modern approaches to organizing complex equipment recycling; identify criteria and factors for optimizing recycling infrastructure; develop a multi-level recycling infrastructure; formulate optimization models for recycling infrastructure, taking into account enterprise production capacities, logistical costs, environmental impact, and other factors. <strong>Methods:</strong> a systems approach, structural modeling, optimization models. <strong>Research results</strong>: approaches to organizing recycling infrastructure were analyzed: centralized, distributed, and combined; the selection of a combined approach for creating logistics infrastructure for complex equipment recycling was justified; a structural multi-level model of recycling infrastructure was developed with a lower level (sorting enterprises), middle level (processing enterprises), and upper level (organizational management); mathematical models for optimizing recycling infrastructure were formulated, considering enterprise production capacities, logistical costs, and environmental impact. <strong>The conclusions</strong>: proposed structural multi-level model of complex equipment recycling infrastructure combines the advantages of centralized and decentralized management, ensuring flexibility, system reliability against external influences, cost minimization, and sustainable process control. The application of the developed optimization models allows for consideration of enterprise production capacities, logistical costs, environmental impact, and other factors to find the most effective configuration of recycling infrastructure. Implementation of the proposed recycling infrastructure will ensure the formation of coherent interaction between government bodies, enterprises, public organizations, and international partners.</p> Maksym Kikot, Julia Malieieva Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314136 Mon, 30 Sep 2024 00:00:00 +0300 Adaptive pre-processing methods for increasing the accuracy of segmentation of dental X-RAY images https://journals.uran.ua/itssi/article/view/314137 <p>The <strong>subject</strong> of research in the article is the effectiveness of adaptive methods of preprocessing of medical images, in particular adaptive bilateral filter and modified CLAHE, in the tasks of segmentation of dental X-ray images. These methods make it possible to preserve important image details and effectively reduce noise, even in cases of high variability of images coming from different sources. The <strong>goal</strong> of the work is to study the impact of adaptive preprocessing methods on increasing the accuracy of segmentation of medical images and to determine the optimal combination of methods that provide the best results in segmentation tasks. The article addresses the following <strong>tasks</strong>: experimental comparison of adaptive preprocessing methods with traditional approaches, evaluation of segmentation efficiency using metrics such as Dice Score, Jacquard Coefficient (IoU Score), Precision and Sensitivity/Completeness (Recall)), as well as analysis of the effect of pre-processing on the quality of segmentation. The following <strong>methods</strong> are used: mathematical modeling, neural network training based on the U-Net model with a pre-trained timm-resnest101e encoder, image scaling to 512x512 pixels, training with a fixed learning rate of 0.001. The following <strong>results</strong> were obtained: the combined use of the adaptive bilateral filter and the modified CLAHE provided the highest segmentation quality indicators (Dice Score 0.9603 and Jacquard Coefficient (IoU Score) 0.94501), surpassing traditional methods. This proves the advantage of adaptive approaches in preserving the contours of objects and reducing noise. <strong>Conclusions</strong>: the application of adaptive preprocessing methods significantly improves the accuracy of segmentation of medical images. The combined approach including the adaptive bilateral filter and the modified CLAHE is the most effective for medical imaging tasks, which increases the accuracy of diagnosis and the reliability of automated decision support systems.</p> Oleh Komenchuk Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314137 Mon, 30 Sep 2024 00:00:00 +0300 Architecture of an automated program complex based on a multiple kernel svm classifier for analyzing malicious executable files https://journals.uran.ua/itssi/article/view/314140 <p><strong>Subject matter.</strong> This article presents the development and architecture of an automated program complex designed to identify and analyze malicious executable files using a classifier based on a multiple kernel support vector machine (SVM). <strong>Goal.</strong> The aim of the work is to create an automated system that enhances the accuracy and efficiency of malware detection by combining static and dynamic analysis into a single framework capable of processing large volumes of data with optimal time expenditure. <strong>Tasks.</strong> To achieve this goal, tasks were carried out that included developing a program complex that automates the collection of static and dynamic data from executable files using tools like IDA Pro, IDAPython, and Drakvuf; integrating a multiple kernel SVM classifier to analyze the collected heterogeneous data; validating the system's effectiveness based on a substantial dataset containing 1,389 executable samples; and demonstrating the system's scalability and practical applicability in real-world conditions. <strong>Methods.</strong> The methods involved a hybrid approach that combines static analysis – extracting byte code, disassembled instructions, and control flow graphs using IDA Pro and IDAPython – with dynamic analysis, which entails monitoring real-time behavior using Drakvuf. The multiple kernel SVM classifier integrates different data representations using various kernels, allowing for both linear and nonlinear relationships to be considered in the classification process. <strong>Results.</strong> The results of the study show that the system achieves a high level of accuracy and completeness, as evidenced by key performance metrics such as an F-score of 0.93 and ROC AUC and PR AUC values. The automated program complex reduces the analysis time of a single file from an average of 11 minutes to approximately 5 minutes, effectively doubling the throughput compared to previous methods. This significant reduction in processing time is critically important for deployment in environments where rapid and accurate malware detection is necessary. Furthermore, the system's scalability allows for efficient processing of large data volumes, making it suitable for real-world applications. <strong>Conclusions.</strong> In conclusion, the automated program complex developed in this study demonstrates significant improvements in the accuracy and efficiency of malware detection. By integrating multiple kernel SVM classification with static and dynamic analysis, the system shows potential for real-time malware detection and analysis. Its scalability and practical applicability indicate that it could become an important tool in combating modern cyber threats, providing organizations with an effective means to enhance their cybersecurity.</p> Alan Nafiiev, Andrii Rodionov Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314140 Mon, 30 Sep 2024 00:00:00 +0300 Development of a model of the process of development of manufacturing defects in automation means https://journals.uran.ua/itssi/article/view/314189 <p>In automated process control systems, automation equipment (sensors, converters, amplifiers, etc.) with technical defects arising during their manufacture, which are one of the main causes of failures, is widely used. The paper establishes the possibility of using the laws of nonequilibrium thermodynamics as the basis for determining the relationship between the controlled parameters of automation equipment and the parameters of the displayed medium, which made it possible to build a deterministic model of the development of production defects and, ultimately, determine the directions for changing and adjusting the technological processes of production of automation equipment. A method has been developed for implementing a guaranteed forecast of changes in the parameters of automation equipment based on solving the evolution equation using optimal filtering algorithms, which is the <strong>subject</strong> of research. The <strong>purpose</strong> of the work is to improve the quality and reliability of automation equipment by improving the monitoring of defects arising in the production of instruments, functional units and sensors of automation equipment. The article solves the following <strong>problems</strong>: analysis of existing approaches to the problem of manufacturing defects and methods for their detection and setting a research task; modeling of the process of development of production defects causing changes in the technical condition of automation equipment; development of a decision-making method based on guaranteed prediction of the technical state of automation equipment. The <strong>methodology</strong> of work is based on the methods of thermodynamic description of the kinetics of processes (when developing a model of the process of development of production defects that cause a change in technical condition) and methods of assessment and forecasting based on optimal filtering algorithms (when developing a decision-making method based on guaranteed foresight of technical condition). The <strong>results</strong> of the work include a model of the process of development of manufacturing defects that cause a change in the technical condition of automation equipment, and a decision-making method based on a guaranteed forecast of the technical condition of automation equipment. <strong>Conclusions.</strong> The paper establishes the possibility of using the laws of nonequilibrium thermodynamics to determine the relationship between the controlled parameters of automation equipment and the displayed medium, and to build a deterministic thermodynamic model of the development of production defects. Disclosed is an equation of evolution of technical state of automation equipment based on a deterministic kinetic model of processes occurring in a multicomponent medium, and an observation model which takes into account errors caused by instability of external effects and measurement errors. Disclosed is a method of implementing a guaranteed forecast of change in parameters of automation equipment based on solving the evolution equation using optimal filtering algorithms, which are used to solve estimation and prediction problems.</p> Igor Nevliudov, Nikolaj Starodubcev, Hennadii Makarenko, Matvii Bilousov, Serhii Shybanov, Yusifov Ramal Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314189 Mon, 30 Sep 2024 00:00:00 +0300 Aggregation-based obfuscation method for electronic systems design https://journals.uran.ua/itssi/article/view/314194 <p>Hardware Trojan attacks relate to malicious modifications of integrated circuits during design or manufacturing, involving untrusted design tools or components. Such modifications can lead to undesired behavior of integrated circuits or the appearance of hidden data leakage channels. There are various methods of classification, detection and prevention of hardware Trojans insertion. One approach to prevent of Trojans insertion is an obfuscation-based design approach. This approach is based on hiding the functional and structural properties of the design, which makes it difficult for an attacker to insert Trojans. <strong>The subject matter of research</strong> is an aggregation-based obfuscation method for electronic systems design. <strong>The goal of the work</strong> is to study the process of aggregation-based obfuscation of the electronic systems design. The main idea is that the development and connection phase of the reference monitor is performed in a trusted environment. Thus, an attacker will not be able to obtain its functionality and original structure. <strong>The relevance of the work</strong> lies in the fact that this approach prevents the possibility of functioning of hardware Trojans. <strong>The following tasks were solved in the work</strong>: development and study of an aggregation-based obfuscation algorithm for electronic systems design; implementation of the reference monitor presentation as a separate subsystem associated with the main design; experimental evaluation of the possibilities of the method. <strong>As a result of the work</strong> the aggregation-based obfuscation method for electronic systems design was demonstrated; reference monitor was presented as a separate subsystem associated with the main design; experimental evaluation of the possibilities of the method was demonstrated. The studies allow us to <strong>conclude</strong>: the obfuscation-based design approach is that the integrated circuit is modified, thus, the functional and structural properties of the design are hidden, which makes it difficult for an attacker to insert Trojans. Aggregation-based obfuscation considers the reference monitor as a separate subsystem associated with the main design.</p> Olha Ponomarenko, Valeriy Gorbachov Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314194 Mon, 30 Sep 2024 00:00:00 +0300 Development of the architecture of the remote access system to educational laboratory equipment using automated solutions https://journals.uran.ua/itssi/article/view/314196 <p>The <strong>subject of the study</strong> is remote access to Raspberry Pi-based training equipment and remote desktop software. The <strong>purpose</strong> of the work is to analyze the means of remote control of equipment and develop the architecture of the system of remote access of students to laboratory equipment for the implementation of distance learning. The following tasks are solved in the article: the branches in which application of means of remote access is the most critical are analyzed, among which the special place is occupied by the educational branch; analysis of existing methods of organization of remote access to training equipment was carried out, advantages and disadvantages of each method were allocated; justification is being made for choosing a Raspberry Pi minicomputer as a hardware platform for building remote access systems; describes the architecture of a complex of technical solutions based on Raspberry Pi for remote control of educational laboratory equipment; implementation of applied system of temperature and humidity monitoring using developed approach is described. <strong>Research methods</strong> include comparative analysis of existing remote control technologies, prototyping and experimental testing of the developed system. The following <strong>results</strong> were obtained: the feasibility of using the remote desktop approach and AnyDesk software for organizing access was substantiated, a system based on the Raspberry Pi minicomputer for managing equipment and visualizing data was developed, an applied system for monitoring temperature and humidity using Raspberry Pi and AnyDesk was implemented. <strong>Conclusions</strong>: The proposed approach of using Raspberry Pi and remote desktop software allows students to effectively organize remote access to laboratory equipment from engineering disciplines during distance learning. This solution combines ease of implementation, interaction with real physical equipment and low cost compared to the use of industrial PLCs.</p> Oleh Posashkov, Oleksandr Tsymbal Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314196 Mon, 30 Sep 2024 00:00:00 +0300 Analysis of authentication methods for full-stack applications and implementation of a web application with an integrated authentication system https://journals.uran.ua/itssi/article/view/314200 <p>The <strong>subject </strong>of research is methods and techniques for secure user authentication in web applications. The <strong>goal</strong> of the work is to analyse authentication methods and implement a web application with an authentication system integrating JWT tokens and the OAuth v2.0 standard. The article solves the <strong>tasks</strong> of analysis of the main protocols and methods of user authentication in web applications, implementation of authentication based on the OAuth 2.0 standard and JWT access/refresh token, and analysis of the risks of vulnerabilities and attacks for the implemented web applications. <strong>Methods</strong> used: comparison, empirical analysis, calculation methods. The next <strong>results</strong> have been obtained: analysed the protocols and methods of user authentication in web applications; selected authentication methods of JWT token and OAuth v2.0 standard for building modern web applications; created a web application based on the selected authentication methods in web applications; analysed the risks of vulnerabilities and attacks in web applications. <strong>Conclusions:</strong> The most well-known authentication methods for web applications are analyzed. It is established that most modern authentication methods have many disadvantages, which leads to increased risks when using these authentication methods. It is shown that one of the most reliable methods of web application user data security is the use of a combination of JWT Access/Refresh token and browser fingerprints. The implementation, configuration, and analysis of this methodology have shown that this combination provides the most reliable prevention of token theft and use from another computer. OAuth 2.0 authentication was also implemented. The study found that delegating authentication to services such as Facebook or Google can provide a low risk of attacks and vulnerabilities for a web application. It is noted that authentication using OAuth 2.0 can be compromised only at the beginning of the connection between the client and the server, or rather when the client first sends initial information from the browser fingerprints. This information is sent over the secure HTTPS (Hypertext Transfer Protocol Secure) protocol, so the risk of compromising OAuth 2.0 authentication is low.</p> Tamara Radivilova, Lyudmyla Kirichenko, Vadym Pantelieiev, Artem Mazepa, Volodymyr Bilodid Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314200 Mon, 30 Sep 2024 00:00:00 +0300 Choosing strategies for deployment and ensuring the reliability of a UAV swarm to support communications in destruction conditions https://journals.uran.ua/itssi/article/view/314205 <p>The <strong>subject matter</strong> of the article is the system of communication networks of UAVs (flying networks, FNs), which use LiFi technology for data transmission from the source to the receiver in conditions of physical obstacles and cyber threats, as well as deployment and reliability assurance strategies (DRAS) of FNs. The <strong>goal </strong>of the work is to develop criteria and algorithms for choosing DRAS of FNs that provide the necessary level of reliability and efficiency under given constraints. The following <strong>tasks </strong>were solved in the article: systematization of deployment strategies and ensuring the reliability of the flying network; formulation of principles and development of an algorithm for choosing the optimal deployment strategy and ensuring the reliability of FNs; providing recommendations on choosing the optimal deployment strategies and ensuring the reliability of the flying network. The following <strong>methods </strong>are used: system analysis for choosing the optimal DRAS; theory of reliability and system efficiency. The following <strong>results</strong> were obtained: the classifier of FNs deployment strategies was expanded due to additional features of repair and maintenance, as well as the presence of cyber attacks; the criteria for choosing deployment strategies and ensuring the reliability of FNs are formulated; an algorithm for choosing the optimal deployment strategy and ensuring the reliability of FNs was developed; the analysis is carried out and an example of the application of the developed algorithms is given to illustrate the step-by-step procedure for choosing a strategy, which is accompanied by calculations of reliability indicators. <strong>Conclusions</strong>: the proposed sets, criteria, and algorithm for choosing deployment and reliability assurance strategies of FNs enable the substantiation of a set of parameters and planning of the implementation of the optimal (according to the defined criterion) policy for the introduction of an automatic communication support system at critical infrastructure objects under conditions of destruction and cyber influence, as well as increase efficiency (minimize cost) of the use of flying networks.</p> Dmytro Terenyk, Vyacheslav Kharchenko Copyright (c) 2024 http://creativecommons.org/licenses/by-nc-sa/4.0 https://journals.uran.ua/itssi/article/view/314205 Mon, 30 Sep 2024 00:00:00 +0300