Technology audit and production reserves https://journals.uran.ua/tarp <p align="justify"><strong>The aim</strong> of the «Technology audit and production reserves» journal is to publish research papers dealing with the search for opportunities to reduce costs and improve the competitiveness of products in industry. The peculiarity is that <strong>each problem is considered from two sides - the economist’s and the engineer’s</strong>, for example, in the context of forming the «price – quality» criterion, in which the first component concerns research in the field of business economics, and the second - engineering. The research result at the intersection of these disciplines can be used in the actual production to identify reserves, providing the opportunity to reduce costs and improve product competitiveness.</p> <p>Registration of an entity in the media sector: Decision of the National Council of Ukraine on Television and Radio Broadcasting No. 695 dated August 10, 2023, protocol No. 17 (media identifier R30-01128).</p> TECHNOLOGY CENTER PC® en-US Technology audit and production reserves 2664-9969 <p>The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.</p> Development of a method for state estimation and optimisation of multifactor semi-Markov systems https://journals.uran.ua/tarp/article/view/344494 <p><em>The object of this research is a method for solving problems of analysis and optimization of semi-Markov systems. The importance of this topic is determined by the following circumstances. First, traditional, standard theoretical and practical problems of stochastic system research are solved analytically only for Markov systems for which the laws of distribution of the duration of stay in each state before leaving are exponential. Clearly, this strict requirement is not met for real systems. Second, a general method of analytical study does not exist for many probabilistic systems. Third, only numerical methods for solving such problems are available and feasible. Moreover, in each case, a solution can only be obtained for the specific system under study, operating under specific conditions. Clearly, such a solution is uninformative and practically useless for optimization problems of multifactor systems. In this regard, the study aims to develop a universal method for solving analysis and optimization problems, suitable for any semi-Markov systems. The proposed method for solving the formulated problem solves it in two stages. In the first stage, a matrix of distribution densities is found by processing experimental data, representing the duration of the system's stay in each state before transitioning to another state. It is crucial that the densities be in the Erlang distribution class of some order. These densities are found using the least-squares method, using histograms obtained by processing the experimental data. In the second stage, the resulting distribution densities are used to construct a system of differential equations for the probabilities of the system's stay in each possible state. This constructively utilizes the unique property of Erlang distributions: any Erlang flow is a sifted simplest Poisson flow. Sequentially completing these two stages yields a solution to the problem of studying any probabilistic (semi-Markov) systems. Thus, the method proposed in this paper for solving problems of analysis and optimization of semi-Markov systems is universal.</em></p> Lev Raskin Larysa Sukhomlyn Viacheslav Karpenko Dmytro Sokolov Vitalii Vlasenko Copyright (c) 2025 Lev Raskin, Larysa Sukhomlyn, Viacheslav Karpenko, Dmytro Sokolov, Vitalii Vlasenko http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 103 108 10.15587/2706-5448.2025.344494 Enhancing writer identification and writer retrieval with CenSurE and Vision Transformers https://journals.uran.ua/tarp/article/view/343943 <p><em>The object of research is the process of writer identification based on handwritten text. Despite significant progress, existing methods for author identification from handwritten text have limitations that prevent them from achieving maximum accuracy and reliability.</em></p> <p><em>This paper focuses on optimizing and improving the efficiency of writer identification from handwritten text by integrating image preprocessing methods, feature detection, and modern machine learning architectures. To this end, a functional model was developed that uses the CenSurE algorithm to detect key points and extract relevant image areas, and then the Vision Transformer model to identify the writer based on these extracted features. To reduce the variability of the results, experimental validation was conducted using a dual search and classification methodology. The use of the public CVL dataset increases reproducibility and helps in comparative analysis. The findings indicate that the implementation of the proposed approach leads to an improvement in the identification accuracy during retrieval, surpassing the results of other studies. This is evidenced by increased accuracy </em><em>values of hard top k and soft top k by 1% and mean average precision by 2%. In addition, findings indicate significant performance improvement in the feature detection preprocessing stage. This improvement is quantitatively supported by reductions in both the average time per item and total processing duration by 39%, alongside the increase in total count of patches extracted by 70%.</em></p> <p><em>The results obtained contribute to increasing the reliability of automated handwriting analysis systems, especially for the task of writer identification. This achievement is a valuable tool for graphologists and forensic document experts, supporting such critical tasks as the forensic authorship process.</em></p> Mykyta Shupyliuk Vitalii Martovytskyi Yuri Romanenkov Copyright (c) 2025 Mykyta Shupyliuk, Vitalii Martovytskyi, Yuri Romanenkov http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 6 14 10.15587/2706-5448.2025.343943 Development of adaptive reconfiguration method for stream data processing systems using system metrics https://journals.uran.ua/tarp/article/view/344185 <p><em>The object of research is the process of adaptive configuration changes for stream processing applications which is focused on improving specific performance properties. The absence of the generalized automated approach for dynamic reconfiguration of state-store in limited hardware environment is the research problem addressed in this paper. The proposed solution helps to avoid a need for manual application reconfiguration from engineers. The implementation is based on Kafka Streams but designed to be portable across other frameworks that use RocksDB as a state store. Static configuration of modern stream processing systems limits efficiency under variable workloads. In this study, an adaptive module is proposed that monitors system metrics in real-time and automatically updates state-store configurations. The module performs deterministic check to derive new configuration based on predefined thresholds or utilizes a fine-tuned Large Language Model (LLM) to select new configuration values when decisions are vague. The method dynamically applies updates to the affected instance. High-load experimental results reveal the fact that adaptive executions eliminated write stalls, increased memtable hit ratio from 2% to 40% and block-cache hit ratio from 15% to 80%, reduced disk I/O by approximately 50%, and improved throughput by around 5%, at the cost of higher memory consumption. To avoid redundant adaptive updates and outlier-based bias a 10-minute observation frequency was selected. The approach is suitable for systems with fixed resources, state-intensive workloads with high key cardinality. Additionally, if covers the need for safe configuration change under operational constraints. The architecture is framework agnostic for the RocksDB-based based stream processing with state stores.</em></p> Artem Bashtovyi Andrii Fechan Copyright (c) 2025 Artem Bashtovyi, Andrii Fechan http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 15 22 10.15587/2706-5448.2025.344185 Development of clustering models for extended opinion holders based on aggregated stylometric and sentiment features of chat messages https://journals.uran.ua/tarp/article/view/344630 <p><em>The subject of research is the methods and technologies for monitoring holder opinion groups in social media based on stylometric and sentiment features. One of the most important problems is the increasing complexity of text content, which makes user behavior analysis more difficult because of anonymity, informal language, slang, emojis, and non-standard writing styles. Stable, long-term behavioral patterns are not captured by methods based on single-message evaluation.</em></p> <p><em>This research proposes a holder-level clustering method based on aggregated stylometric and sentiment features taken from several messages per user. The methodology includes agglomerative hierarchical clustering, which is enhanced by decision tree analysis for feature selection and cluster interpretability, quantile normalization, dimensionality reduction via PCA (LiveJournal provided six components explaining 81.7% of the variance, while Instagram provided four components explaining 83.5% of the variance), and data preprocessing (VarianceThreshold, removal of highly correlated features). Ultimately, the majority of users were covered by two clusters for LiveJournal and three clusters for Instagram. The result is a set of clustering models that efficiently group holders into logical, understandable clusters based on their overall communication style and emotional expression. The primary advantages of the proposed approach are as follows: holder-level aggregation ensures stability and consistency in profiling; two-stage clustering with intermediate feature selection enhances explainability; the method demonstrates cross-platform applicability, validated on both LiveJournal and Instagram. As a result, over time, more accurate and dynamic user profiles can be developed, enabling improved sentiment analysis, automated moderation, and customized user interaction. This approach offers significant benefits over conventional single-message analysis methods in terms of results transparency, behavioral insight depth, and profile stability. Customized social media recommendations, automated moderation, and social sentiment analysis can all benefit from the study's findings.</em></p> Heorhii Chyzhmak Valeriy Sydorenko Copyright (c) 2025 Heorhii Chyzhmak, Valeriy Sydorenko http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 23 30 10.15587/2706-5448.2025.344630 A privacy-preserving edge data aggregation for TinyML energy forecasting in households https://journals.uran.ua/tarp/article/view/339277 <p><em>The object of this research is the use of tiny machine learning (ML) forecasting models and low-power edge processing as a part of a hybrid energy management system (HEMS) with a particular emphasis on ensuring end-user data privacy and trust. The research addresses the challenge of the collection, aggregation, and processing of sensitive data in smart grid operational modes decision-making tasks.</em></p> <p><em>An in-depth literature review revealed that failing to meet user expectations for control and privacy often leads to dissatisfaction and disengagement. This study introduced a complex solution that tries to solve the indicated gap and proposes a prototype of a HEMS data aggregation subsystem designed to supply information to an energy consumption forecasting module based on mobile ML models.</em></p> <p><em>The developed LSTM-based household energy consumption forecasting models were converted into CoreML and TensorFlow Lite formats, maintained accuracy with an RMSE of 0.211 kWh, inference time under 0.5 ms, 800 kB size on disk, and up to 20</em><em> </em><em>MB RAM usage. These results confirm their feasibility for deployment in HEMS forecasting subsystems on low-power edge devices.</em></p> <p><em>To supply these models with data, a prototype of the HEMS data aggregation system was developed. It uses open-source software (Home Assistant, InfluxDB) and a scalable, privacy-centered container architecture that keeps sensitive data at the edge. Tests on Raspberry Pi 5 (16 GB) showed 97.2% availability over 72 hours, with 12% RAM usage, 18% CPU load, and CPU temperatures of 44–51°C when processing 1440 records per sensor daily. This confirms reliable aggregation with low resource demands and good scalability.</em></p> <p><em>Considering the results, the models and prototype can be considered as the sensing and edge computing layers of HEMS, providing the necessary data for operational mode selection in household microgrids.</em></p> Anton Komin Olha Boiko Copyright (c) 2025 Anton Komin, Olha Boiko http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 31 38 10.15587/2706-5448.2025.339277 Development of strategies for enhancing cybersecurity and digital trust in Azerbaijan’s digital landscape https://journals.uran.ua/tarp/article/view/342927 <p><em>This research focuses on assessing cybersecurity practices and the level of digital trust in Azerbaijan and identifying key weaknesses using real-world data.</em></p> <p><em>The object of the research is cybersecurity practices and digital trust among organizations and users in Azerbaijan.</em></p> <p><em>The research solves the problem of insufficient empirical data on cybersecurity practices and digital trust in Azerbaijan, which contributes to low awareness, weak security implementation, frequent cyber incidents, and limited trust in digital services and legislation.</em></p> <p><em>The research methodology included a quantitative survey of 129 participants, Spearman correlation analysis, and risk heatmap modeling. Data analysis was conducted using a personal computer with Microsoft Excel and (Statistical Package for the Social Sciences) SPSS software.</em></p> <p><em>The results show that 55% of organizations have moderate cybersecurity awareness, 17.8% have low awareness, and 53.5% do not provide cybersecurity training to employees. Although 76% of banks use multifactor authentication (MFA), 40.3% have experienced fraud incidents. Spearman correlation analysis indicates a negative relationship between awareness and cyber incidents (–0.33) and between training and incidents (–0.29), while MFA usage shows a positive correlation with fraud detection (+0.3446). In addition, 64.3% of users feel somewhat safe, and 41.1% identify public education as the most important area requiring improvement.</em></p> <p><em>The findings demonstrate that insufficient training, incomplete adoption of modern protective measures, and weak public education increase cybersecurity risks even in organizations with moderate awareness. The results can support the State Service for Special Communication and Information Security (SSSCIS) in improving the National Cybersecurity Strategy and assist banks, businesses, and educational institutions in strengthening cybersecurity practices for the period 2025–2030.</em></p> Khayala Alasgarova Sahib Ramazanov Copyright (c) 2025 Khayala Alasgarova, Sahib Ramazanov http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 39 56 10.15587/2706-5448.2025.342927 Evaluation of the efficiency of large language models for extracting entities from unstructured documents https://journals.uran.ua/tarp/article/view/341926 <p><em>The object of research is arrays of unstructured documents located on public websites of rural and urban communities of Ukraine.</em></p> <p><em>The study is devoted to solving the problem of choosing a large language model (LLM), which is the best for applied use in solving named entity recognition (NER) problems during document processing. Modern researchers recognize that such a choice is significantly influenced by the features of the subject area and the language of document creation. However, when studying the feasibility of using LLM to solve NER problems, the features of the operation of such models are practically not taken into account. The issues of evaluating such features remain largely unexplored.</em></p> <p><em>A method for recognizing selected varieties of legal unstructured texts in the Ukrainian language is proposed. Unlike existing ones, this method solves the NER problem for those documents that are subject to recognition/classification. Metrics for the cost of processing input and output tokens are proposed and a methodology for evaluating the cost of using LLM is developed. Based on these results, a comparative evaluation of the application of common LLMs to solve the NER problem on Ukrainian texts that need to be recognized was conducted. According to the evaluation results, it was recognized that: (I) GPT-4o is the best in terms of accuracy and quality of processing (Precision = 0.919; Recall = 0.954; F1 = 0.936); (II) GPT-4o-mini with discounts is the best in terms of average document processing cost (0.00045 USD per document); (III) GPT-4.1-mini with discounts is the best in terms of quality/cost ratio (the indicator value is 0.938). The GPT-4.1-mini LLM is recommended as the best for applied application.</em></p> <p><em>The evaluation results obtained allow to significantly simplify the choice of LLM, which is advisable to use for creating information systems and technologies for processing unstructured documents created in Ukrainian.</em></p> Oleksandr Shyshatskyi Borys Moroz Maksym Ievlanov Ihor Levykin Dmytro Moroz Copyright (c) 2025 Oleksandr Shyshatskyi, Borys Moroz, Maksym Ievlanov, Ihor Levykin, Dmytro Moroz http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 57 67 10.15587/2706-5448.2025.341926 Development of an optoelectronic image segmentation method from unmanned aerial vehicles based on the ant colony optimization algorithm under the influence of salt-and-pepper noise https://journals.uran.ua/tarp/article/view/344562 <p><em>The object of research is the process of segmenting an image from an unmanned aerial vehicle based on the ant algorithm under the influence of salt-and-pepper noise.</em></p> <p><em>“</em><em>Salt</em><em>”</em><em>-and-</em><em>“</em><em>pepper</em><em>”</em><em> noise occurs due to data transmission errors, failures of digital camera sensors or malfunctions during recording/reading of information. It is characterized by the random appearance of individual pixels in the image, the value of which is equal to the minimum (“pepper”) or maximum (“salt”) brightness level.</em></p> <p><em>Unlike the known ones, the method of segmenting an optoelectronic image based on the ant algorithm provides image segmentation under the influence of salt-and-pepper noise and involves:</em></p> <p><em>– </em><em>initialization of initial parameters;</em></p> <p><em>– </em><em>calculation of the length of the path segment of agents;</em></p> <p><em>– </em><em>calculation of the attractiveness of the route for the agent;</em></p> <p><em>– </em><em>updating the pheromone concentration;</em></p> <p><em>– </em><em>calculation of the probability of transition of agents;</em></p> <p><em>– </em><em>calculation of the objective function;</em></p> <p><em>– </em><em>movement of agents;</em></p> <p><em>– </em><em>determination of the best route of agents.</em></p> <p><em>Experimental studies have shown that the segmentation method based on the ant algorithm provides a reduction in segmentation errors of the first kind on average:</em></p> <p><em>– </em><em>in the absence of salt-and-pepper noise – 4%;</em></p> <p><em>– </em><em>at the intensity of salt-and-pepper noise σ = 5–21%;</em></p> <p><em>– </em><em>at the intensity of salt-and-pepper noise σ = 15–10%.</em></p> <p><em>The segmentation method based on the ant algorithm provides a reduction in segmentation errors of the second kind on average:</em></p> <p><em>– </em><em>in the absence of salt-and-pepper noise – 3%;</em></p> <p><em>– </em><em>at the intensity of salt-and-pepper noise σ = 5–15%;</em></p> <p><em>– </em><em>at the intensity of salt-and-pepper noise σ = 15–6%.</em></p> <p><em>The practical significance of the segmentation method based on the ant algorithm is to ensure high-quality image segmentation under the influence of salt-and-pepper noise.</em></p> Igor Ruban Hennadii Khudov Vladyslav Khudov Oleksandr Makoveichuk Irina Khizhnyak Ihor Butko Andrii Hryzo Rostyslav Khudov Petro Mynko Oleksii Baranik Copyright (c) 2025 Igor Ruban, Hennadii Khudov, Vladyslav Khudov, Oleksandr Makoveichuk, Irina Khizhnyak, Ihor Butko, Andrii Hryzo, Rostyslav Khudov, Petro Mynko, Oleksii Baranik http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 68 75 10.15587/2706-5448.2025.344562 Development of a simulation model of a WEB-oriented servo drive frequency control system based on “Digital Twins” technology https://journals.uran.ua/tarp/article/view/345825 <p><em>The object of this research is the information processes of interaction between virtual components of a WEB-oriented simulation model of a frequency control system for a synchronous servo drive. The research problem lies in the need for a comprehensive solution to the tasks of developing simulation models of control systems for technological objects based on advanced algorithms, procedures, and unified hardware and software tools.</em></p> <p><em>A project of a frequency control system for a SIMOTICS S-1FK2 synchronous servo drive was developed using a PLC S7-1500 and a FC SINAMICS S210 within the TIA Portal environment. Application software for the frequency control system was developed in FBD language with an integrated specialized technological object “SpeedAxis”.</em></p> <p><em>During the development of the simulation model, a “Digital Twins” were generated for the frequency converter with an integrated synchronous servo drive. To ensure interaction between the virtual components of the simulation model, procedures for basic parameterization and loading of the TIA Portal project components into the “Digital Twins” were implemented.</em></p> <p><em>Testing and investigation of the information exchange processes between the virtual components of the simulation model were carried out in “on-line” mode using the capabilities of the integrated WEB-server.</em></p> <p><em>The tests were conducted at speeds of 2000 rpm and 4000 rpm, switched periodically every 12 sec. Parameters of the reference and actual speed, as well as the instantaneous voltage, current, torque, and output power of the virtual frequency converter, were measured and analyzed.</em></p> <p><em>Based on the test results, the feasibility and correctness of the joint operation of the simulation model components in an isochronous real-time mode with a 1 ms synchronization cycle were confirmed, demonstrating the effectiveness of the approach based on “Digital Twins” technology.</em></p> Leonid Zamikhovskyі Mykola Nykolaychuk Ivan Levytskyi Copyright (c) 2025 Leonid Zamikhovskyі, Mykola Nykolaychuk, Ivan Levytskyi http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 76 90 10.15587/2706-5448.2025.345825 Assessment of strike effectiveness against enemy landing groups considering sequential volleys and combat potential reduction in computer simulation https://journals.uran.ua/tarp/article/view/346398 <p><em>The object of research is a naval landing operations and interactions between anti-ship missiles and naval forces in a variety of simulation scenarios.</em> <em>Computer simulation is an essential tool for modeling and evaluating complex processes. Strategy-oriented video games allow model and interact with multi-layered systems in a modern warfare, in a variety of scenarios. This research presents a framework for modeling naval landing operation in a strategic wargame. The model focused on the interactions between attacking player using transport ships for naval landing, fire-support ships, minesweepers, electronic warfare units, and interceptor aircraft, and defending player which using anti-ship missile launchers and naval minefields. A key objective is to identify optimal defensive strategies under resource constraints, calculation possible unit interactions, to estimate possible outcomes, which can help that determine the best tools to prevent or execute successful naval landing operation.</em></p> <p><em>The methodology was implemented using stochastic mathematical model to estimate the effectiveness of anti-ship missiles against different types of ships with different defensive setups. The methodology proposes different approaches, for the defending side player, targeting the most vulnerable or most important parts of attacking player convoy to ensure the most effective way to prevent naval landing operation.</em></p> <p><em>Experiment results show the importance of dynamic targets prioritization for the defending player, and allows increase the efficiency of the provided resources up to two times compared to the basic targeting algorithm.</em></p> <p><em>The given framework allows to improve realism of naval combat simulations in a video game and offers a scalable foundation for game balance adjustments or potential application in tactical training environments.</em></p> Oleksii Neizhpapa Maksym Maksymov Oleksandr Toshev Copyright (c) 2025 Oleksii Neizhpapa, Maksym Maksymov, Oleksandr Toshev http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 91 96 10.15587/2706-5448.2025.346398 Identification of dangerous situations in the road infrastructure using unmanned aerial vehicles https://journals.uran.ua/tarp/article/view/347074 <p><em>The object of the research is the developed automated computational model (AI-driven system) for real-time monitoring and analysis of road traffic, focusing on the identification and assessment of dangerous situations (traffic violations, congestion, and accident risks).</em> <em>This paper examines how the increased number of people moving to cities and their vehicles increases the likelihood of traffic accidents on public roads. It is also noted that traditional inspections are carried out very slowly and do not fully detect violations of traffic rules. To overcome these limitations, it is proposed a novel automated computational model for vehicle and accident tracking, based on UAVs combined with computer vision and artificial intelligence technologies. The proposed model allows for real-time threat detection and evaluation. The study, modeled in the MATLAB environment using real traffic data from drone-captured video. This model demonstrates significant improvements in operational metrics, an average detection achieved accuracy 89% for vehicles and critical events (e.</em><em> </em><em>g., congestion, deviations). The model successfully visualizes risk areas with heat maps and predicts short-term traffic pattern changes, increasing the reliability of traffic management and expanding the possibilities of traffic risk forecasting. The results obtained during the simulation can be used in practice by transport services, road, and maintenance organizations, particularly at difficult intersections and on highly accident-prone highways in urban, heavily built-up areas.</em></p> Nurzhigit Smailov Yerzhan Nussupov Kyrmyzy Taissariyeva Aidar Kuttybayev Moldir Baigulbayeva Mukhit Turumbetov Yulian Hryhoriev Serhii Lutsenko Copyright (c) 2025 Nurzhigit Smailov, Yerzhan Nussupov, Kyrmyzy Taissariyeva, Aidar Kuttybayev, Moldir Baigulbayeva, Mukhit Turumbetov, Yulian Hryhoriev, Serhii Lutsenko http://creativecommons.org/licenses/by/4.0 2025-12-29 2025-12-29 6 2(86) 97 102 10.15587/2706-5448.2025.347074