Problems of Informatization and Management
https://jrnl.nau.edu.ua/index.php/PIU
<p>The collection covers the problems of analysis and synthesis of computer and telecommunication systems and their management systems: creation of an effective information and measurement tools for determining and estimating the parameters of information technology objects; mathematical, linguistic, hardware and software new, including cyber-physical aviation, and upgraded existing distributed computer and computer systems.<br />It is designed for scientists and specialists who are concerned with the creation and improvement of the theoretical and software base of the means of computer telecommunication systems and their computer components.<br /><br /><span class="hps">Language</span>: Ukrainian<span class="hps">, English.</span></p> <p><span class="hps"> ISSN 2073-4751</span></p>National Aviation Universityen-USProblems of Informatization and Management2073-4751<span>Автори, які публікуються у цьому журналі, погоджуються з наступними умовами:</span><br /><ol type="a"><br /><li>Автори залишають за собою право на авторство своєї роботи та передають журналу право першої публікації цієї роботи на умовах ліцензії <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a>, котра дозволяє іншим особам вільно розповсюджувати опубліковану роботу з обов'язковим посиланням на авторів оригінальної роботи та першу публікацію роботи у цьому журналі.</li><br /><li>Автори мають право укладати самостійні додаткові угоди щодо неексклюзивного розповсюдження роботи у тому вигляді, в якому вона була опублікована цим журналом (наприклад, розміщувати роботу в електронному сховищі установи або публікувати у складі монографії), за умови збереження посилання на першу публікацію роботи у цьому журналі.</li><br /><li>Політика журналу дозволяє і заохочує розміщення авторами в мережі Інтернет (наприклад, у сховищах установ або на особистих веб-сайтах) рукопису роботи, як до подання цього рукопису до редакції, так і під час його редакційного опрацювання, оскільки це сприяє виникненню продуктивної наукової дискусії та позитивно позначається на оперативності та динаміці цитування опублікованої роботи (див. <a href="http://opcit.eprints.org/oacitation-biblio.html" target="_new">The Effect of Open Access</a>).</li></ol>An approach to optimizing the microservices deployment model in a highly loaded environment
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19787
<p>The article proposes the use of a LB-Diversity algorithm for deploying microservices to increase system stability and optimize resources in cloud architectures. Traditional microservice systems often face node failure issues and security vulnerabilities due to homogeneous deployment of identical service instances. The proposed approach addresses these issues by combining load balancing with deployment diversity, where different versions of microservices are distributed across multiple nodes. This strategy reduces the risks associated with a single point of failure and mitigates the impact of attacks targeting common vulnerabilities in containerized environments.</p> <p>To analyze the experiments, our own coefficients for assessing load balancing and system fault tolerance were proposed, which confirmed the results of previous studies on the choice of the LB-Diversity algorithm compared to traditional deployment methods. The diversity of deployment approach effectively limits the damage from potential security breaches by ensuring that only a small portion of the system is affected. This model offers a practical solution for enterprises that require reliable microservice architectures with high availability and security in dynamic environments with limited resources.</p>Y.B. ArtamonovA.B. KotsiurD.V. KrantK.M. Radchenko
Copyright (c) 2025
2025-03-172025-03-1748041510.18372/2073-4751.80.19787A method for fast implementation of Fourier transform with secured use of cloud computing
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19785
<p>The article proposes a method for fast implementation of the discrete Fourier trans-form (DFT) on a terminal microcontroller (TMC), which is based on additive masking of signals and is distinguished by the fact that it updates the mask by changing its bit layers, which allows to update the mask before processing each input signal. The basic procedures of the method are theoretically justified and described in detail. An analysis of the effec-tiveness of the proposed method of homomorphic encryption of signal readings from a real object was performed. It is shown that due to the use of a faster procedure for updating the mask by changing its bit layers, the level of protection of signal readings against attempts to illegally restore them in the cloud is significantly increased. This is achieved by changing the mask for each signal.</p> <p>It is also shown that the proposed method can reduce the time of encryption and de-cryption by two times. The conducted experimental studies generally confirmed the results obtained by theoretical evaluation of efficiency.</p>O.V. RusanovaN.A. HutsuliakP.S. Scvorcov
Copyright (c) 2025
2025-03-152025-03-15480849210.18372/2073-4751.80.19785Method for synthesis of fault-tolerant topologies with implicit clusters based on de Bruijn transformations in redundant numeral systems
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19784
<p>The work is devoted to the development of a method for synthesizing topologies based on de Bruijn transformations in redundant numeral systems, which allows synthesizing fault-tolerant topologies of a given order, including those with implicit clusters. A method for forming such clusters and a method for studying the survivability of topologies using dynamic determination of failure probability based on betweenness centrality are also developed.</p> <p>The proposed comprehensive approach allows us to synthesize graphs that, on the one hand, contain less redundancy, and on the other hand, have higher survivability due to better use of the available redundancy, which allows us to increase fault tolerance with lower costs and ensure better efficiency.</p>O.O. HoncharenkoA.M. Volokyta
Copyright (c) 2025
2025-03-152025-03-15480323910.18372/2073-4751.80.19784Mathematical model of measuring details on a coordinate measuring machine
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19783
<p>The paper explores the significance of measurement accuracy in coordinate measuring machines (CMM), highlighting their role in modern quality control processes. Key sources of measurement errors, including geometric, thermal, kinematic, and random factors, are analyzed. The study presents a novel approach for developing error correction algorithms aimed at enhancing measurement accuracy. The mathematical model developed considers the primary error sources and provides a structured framework for their correction. An algorithm for error correction is proposed, detailing the integration of systematic error adjustments into the measurement process. The algorithm is designed for real-time application, offering dynamic adaptability to varying operational conditions.</p> <p>The implementation of the proposed algorithm in CMM software demonstrates significant improvements in measurement precision. Results of modeling validate its effectiveness across diverse conditions. The paper concludes by emphasizing the scientific contribution of the proposed methodology, which combines theoretical advancements with practical applications to enhance the accuracy of CMM measurements.</p>O.M. Bezvesilna
Copyright (c) 2025
2025-03-152025-03-15480162010.18372/2073-4751.80.19783ReliefF functional selection for traffic anomalies detection
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19779
<p>This paper addresses the problem of network traffic anomaly detection using machine learning techniques and feature selection optimization. As modern computer networks become increasingly complex and data volumes grow, efficient threat detection requires fast and accurate traffic analysis algorithms. A major challenge lies in distinguishing normal network activity from potentially malicious attacks, which may be disguised as legitimate traffic.</p> <p>The study explores the use of the ReliefF method for selecting key network traffic features and its impact on the performance of the Random Forest classification model. The focus is on optimizing feature selection to reduce computational costs and speed up training while preserving essential indicators of anomalous activity. Special attention is given to evaluating system performance under different feature selection scenarios, allowing for an optimal trade-off between accuracy and processing speed.</p> <p>The proposed approach is designed for automated intrusion detection systems (IDS) operating in real-time, requiring rapid responses to potential threats such as DDoS attacks, port scanning, unauthorized access, and exploits. The research aims to enhance the efficiency of existing network traffic analysis methods and adapt feature selection algorithms for high-load network environments.</p>S.O. KudrenkoA.L. StoliarI.G. Makieiev
Copyright (c) 2025
2025-03-132025-03-13480647010.18372/2073-4751.80.19779Routing method in wireless IoT networks with high device density
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19778
<p>This research is based on the assumption that in the immediate vicinity of the calculated coordinates are located transit nodes, which are located along a straight line connecting the initial and final nodes of the route. This assumption is valid for networks with a high density of nodes. For networks with a limited number of nodes, it is advisable to focus on solving the problem of determining the required number of nodes of the route based on the distances between them.</p> <p>The proposed method reduces the use of network resources by selecting a near-optimal route, taking into account the influence of the transmission speed on the level of the useful signal power and interference from neighboring nodes on the route. For example, it allows you to increase the overall data transfer rate compared to the approach based on determining the shortest route based on the number of transit sections.</p>S.S. ChumachenkoB.S. ChumachenkoM.M. MaloiedR.S. OdarchenkoV.O. Fesenko
Copyright (c) 2025
2025-03-132025-03-1348013314610.18372/2073-4751.80.19778Research on the modernization of the data transmission standard ARINC629
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19777
<p>As of 2024, due to its high reliability and efficient data transmission between various aircraft systems, enhancing flight safety and efficiency, the ARINC 629 digital data bus exchange standard is still used in various aircraft models: Boeing 777-200/300/ER/F, Boeing 787-8/9, Boeing 747-8, Airbus A350-900/1000, Airbus A380-800, Embraer E-190/E-195, Bombardier CRJ900/1000, and Sukhoi Superjet 100. The aircraft listed above utilize ARINC 629 for data transmission among different systems: Flight Management System (FMS), Engine Control System (ECS), Air Conditioning (AC), Lighting (L), and Communication (C). The article suggests replacing the signal transmission material with fiber optic technology. Indeed, there are upgrades to this standard in the form of ARINC 818 [11, 12]. However, the implementation of these standards tends to be more specialized and less flexible.</p>T.V. KholyavkinaM.О. Kravchenko
Copyright (c) 2025
2025-03-132025-03-1348012413210.18372/2073-4751.80.19777Improvement of the mathematical model of the routing table taking into account the psychophysiological mechanisms of the reaction of the computer network administrator
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19776
<p>The presented work considers the problem of optimizing the topological structure of the network. In this case, an improved logarithmic function of the administrative distance was used, which corresponds to the fundamental law of the analysis of “man-machine” systems – the Weber-Fechner law. The results of calculations and computer modeling indicate that the intuitive reactions of the computer network administrator to changes in the logarithm of the administrative distance are accelerated when applying the administrative distances of the Weber-Fechner law, an approximately 10...15 percent acceleration of the intuitive reactions of the network administrator to sudden excitations is observed, which gives an additional gain in reducing the delays of adaptation to route changes by approximately 2%-3%.</p>O.V. TolstikovaS.V. VodopianovO.V. AndreievV.I. Drovovozov
Copyright (c) 2025
2025-03-132025-03-1348011812310.18372/2073-4751.80.19776Challenges and requirements for developing a secure computer-integrated warehouse for aircraft components with enhanced data confidentiality
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19775
<p>The article discusses in detail the challenges and requirements for developing a secure, computer-integrated warehouse for aviation components with an increased level of data confidentiality, comprehensively explores the concept of a computer-integrated warehouse for aviation components and emphasises the critical importance of enhanced security measures. The first section outlines the challenges faced by traditional warehouse systems in aviation, emphasizing the risks associated with manual tracking and management of aircraft components. It also highlights the growing significance of technology in optimizing warehouse operations. The subsequent section delves into recent advancements in computer-integrated warehousing, including the integration of IoT, automation, and robotics. Recognizing the sensitive nature of aircraft components, the article underscores the importance of increased securityThe article further explores data confidentiality measures, encompassing encryption, secure data transmission, access control, and authentication protocols. It advocates for the implementation of blockchain technology to enhance data integrity and compliance with industry-specific data protection regulations. The subsequent section outlines the multifaceted benefits of computer-integrated warehousing with heightened security. Through compelling case studies, the article showcases successful implementations of computer-integrated warehouses in the aviation industry, emphasizing their positive impact on security and data confidentiality. Potential challenges in implementation, balancing security measures with operational efficiency, and addressing workforce adaptation and training concerns are also examined. In conclusion, the article summarizes key points and underscores the crucial role of computer-integrated warehousing with heightened security in the aviation sector. It encourages further research and investment in advancing warehouse technologies for sustainable growth in the industry.</p>I.Y. Sergeyev
Copyright (c) 2025
2025-03-132025-03-1348010411710.18372/2073-4751.80.19775Modular exponentation method with protection against power analysis
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19774
<p>The article proposes a method of modular exponentiation on terminal microcontrollers, which provides protection against recovery of secret operands by power analysis. The method is based on the separation in time of processing of the exponent code bits and correspondent modular multiplication operations by storing the operands necessary for multiplication in memory. This prevents the comparison of the modular multiplications detected from the power consumption diagram with the values of the secret exponent code bits. A formalized procedure for modular exponentiation is presented, the functionality of which is illustrated by an example. A method for selecting the procedure parameters is developed in view of microcontroller embedded memory limitations.</p> <p>It has been theoretically and experimentally proved by the proposed method, which provides protection against both simple and differential analysis of the power analysis without affecting the time of calculating the modular exponent.</p>O.V. RusanovaO.P. MarkovskyiV.V. Vovk
Copyright (c) 2025
2025-03-132025-03-134809310310.18372/2073-4751.80.19774Modified model of noise filtering in images based on convulsive neural network with the addition of residual connections and attention module
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19773
<p>In numerous applied image processing tasks, ranging from technical diagnostics to medical imaging, the accurate restoration of images affected by severe salt-and-pepper (SAP) noise is of critical importance. This type of noise introduces isolated but highly intense white or black pixels, which can significantly distort the visual representation and complicate subsequent analysis.</p> <p>This study presents a modification of the existing SeConvNet convolutional neural network, specifically designed to enhance SAP noise removal. The primary objective is to improve the processing of images with prominent white noise artifacts, where the original SeConvNet model has demonstrated suboptimal performance. The proposed modification incorporates a novel block that combines residual connections with both channel and spatial attention mechanisms (Channel+Spatial Attention). This integration, implemented through the Convolutional Block Attention Module (CBAM), enables the network to emphasize informative channels and critical spatial regions, thereby enhancing the suppression of high-contrast noise artifacts while preserving fine structural details.</p> <p>Experimental results indicate a notable improvement in image restoration quality, particularly in datasets where noise-affected regions exhibited a high intensity of bright spots within a 5–8% range. The proposed approach was evaluated on MRI scans, confirming its efficacy in handling complex textures and domain-specific noise artifacts. The significance of these findings lies in the potential integration of the enhanced SeConvNet into medical diagnostic applications and other fields where the precise preservation of fine image structures is paramount.</p> <p>Despite computational constraints, the introduced modifications have led to improved SAP noise suppression, underscoring the strong potential of this approach for further research and practical implementations.</p>V.Y. MukhinA.O. Lynovskyi
Copyright (c) 2025
2025-03-132025-03-13480768310.18372/2073-4751.80.19773Using fuzzy logic methods in precision part measurement on a coordinate measuring machine
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19771
<p>This article examines the application of fuzzy logic methods for correcting measurement errors on coordinate measuring machines. An adaptive correction algorithm is proposed, which significantly reduces systematic errors and improves the accuracy of precision part measurements. The algorithm is based on the use of fuzzy sets to model and compensate for errors arising during the measurement of complex geometric shapes. A detailed simulation of the algorithm’s performance has been conducted, confirming its effectiveness in reducing the mean measurement error and its dispersion. The proposed method can be integrated into the software of coordinate measuring machines for automatic correction of measurement results, ensuring improved accuracy without significant operator intervention. The obtained results can be applied in the aerospace, mechanical engineering, and other high-precision industries, where quality and accuracy in geometric parameter control are of utmost importance.</p>V.Y. Larin
Copyright (c) 2025
2025-03-132025-03-13480717510.18372/2073-4751.80.19771Improving measurement accuracy on coordinate measuring machines under destabilizing factors
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19770
<p>The paper develops theoretical foundations for improving measurement accuracy on coordinate measuring machines (CMM) through comprehensive consideration of destabilizing factors' influence. A generalized mathematical model based on fourth-rank tensor fields is proposed, which takes into account the mutual influence of thermal deformations, vibrations, mechanical stresses, changes in humidity, air pressure, and electromagnetic interference. A system of nonlinear integral equations for describing deformation fields and an error compensation algorithm based on nonlinear filtering methods have been developed. The possibility of improving measurement accuracy through the application of the developed model and results correction algorithm has been theoretically substantiated. A methodology for practical application of the proposed approach for various types of coordinate measuring machines and operating conditions is presented.</p>L.V. Kolomiets
Copyright (c) 2025
2025-03-132025-03-13480596310.18372/2073-4751.80.19770Mathematical model of trajectory planning for measuring precision spatial surfaces on a coordinate measuring machine
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19769
<p>The paper presents a novel approach to optimizing the probe tip trajectory of a coordinate measuring machine when inspecting complex spatial surfaces. A comprehensive mathematical model has been developed, incorporating B-spline trajectory representation, system dynamics modeling, and a stochastic measurement error model. A quality functional is proposed that accounts for surface geometric features, system dynamic characteristics, thermal deformations, and vibrational effects. A trajectory optimization algorithm based on sequential quadratic programming has been developed. The algorithm convergence and measurement uncertainty estimation methods are theoretically substantiated. Tensor analysis of local surface topology and a thermoelastic deformation model are presented. An adaptive measurement strategy with dynamic trajectory parameter correction is proposed.</p>V.V. Kozlovskyi
Copyright (c) 2025
2025-03-132025-03-13480535810.18372/2073-4751.80.19769Method of developing automated information support for integrated modular avionics systems: monitoring, diagnostics and reliability improvement
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19768
<p>Advances in avionics technology have significantly increased the complexity of modern aircraft systems. Integrated modular avionics (IMA) plays a critical role in providing an efficient, reliable, and maintainable avionics architecture by consolidating multiple functions onto common computing resources. This paper presents a method for developing automated information support software for IMA, focusing on real-time monitoring, diagnostics, and state management of avionics modules. The proposed approach emphasizes automation of data collection and processing, which enables early fault detection, predictive maintenance, and rapid response to component failures or degradation. By integrating automated monitoring capabilities, aircraft operators can improve system reliability, minimize downtime, and optimize maintenance planning. This paper highlights key cybersecurity considerations, including protection from external threats, intrusion detection, and secure data transfer between IMA modules. As networked avionics systems become increasingly prevalent, implementing robust security measures is essential to prevent unauthorized access, data manipulation, or system failures that could jeopardize flight safety. Additionally, this study examines key aspects of system architecture design, emphasizing modularity, scalability, and compliance with industry standards such as ARINC 653 and DO-178C. The modular nature of IMA provides greater flexibility in system design, allowing new features to be integrated or existing modules to be upgraded without extensive reconfiguration. Compliance with aviation safety standards and software certification ensures that automated information support solutions meet regulatory requirements. Recommendations for improving diagnostic and monitoring algorithms are provided to optimize system performance. Advanced data analytics techniques, including machine learning and predictive analytics, are explored to improve fault detection accuracy and optimize maintenance schedules. Using real-time data analytics, operators can implement condition-based maintenance strategies, reducing unnecessary inspections while improving overall system reliability. The results of this study confirm that the integration of automated information support systems significantly improves the efficiency and reliability of IMA-based avionics. By implementing advanced monitoring and diagnostic capabilities, these systems contribute to increased aircraft availability, reduced maintenance costs, and improved flight safety. In addition, by ensuring compliance with modern aviation standards, such solutions align with industry best practices and regulatory requirements. In conclusion, the development and implementation of automated information support software for IMA represents an important step towards achieving higher levels of operational efficiency, reliability, and cybersecurity in modern aviation. As avionics systems continue to evolve, the integration of intelligent monitoring solutions will be essential to meet the growing demands of next-generation aircraft while ensuring compliance with stringent safety and certification standards.</p>Y.B. KovalenkoI.O. Kozlyuk
Copyright (c) 2025
2025-03-132025-03-13480405210.18372/2073-4751.80.19768Method of exponentiation on Galois fields for fast implementation of cryptographic protection in IOT
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19767
<p>A new organization for the exponent on Galois fields computing is proposed for the rapid implementation of cryptographic mechanisms for protection against external interference in the operation of remote control systems based on IoT technologies. The contraction of computation time is achieved by combining two multiplicative operations on Galois fields: squaring and multiplication by a constant number with the use of recalculations. The mathematical justification of the proposed method and numerical examples illustrating its operation are given.</p> <p>Theoretical and experimental estimates of the effectiveness of the proposed method for accelerating the implementation of exponentiation on Galois fields were obtained: it was shown that it allows reducing the time of the corresponding calculations by 4.5 times compared to known methods.</p>O.A. VerbaS.S. Nikolskyi
Copyright (c) 2025
2025-03-132025-03-13480213110.18372/2073-4751.80.19767Exploratory data analysis and visualization on the example of an e-commerce enterprise
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19385
<p>This article presents an approach to exploratory data analysis and visualization using the example of an e-commerce company. The study examines key stages of exploratory data analysis, including data preprocessing, visualization, anomaly detection, correlation analysis, and cluster analysis, aimed at preparing data for solving machine learning tasks in future research. These tasks include estimating a time series model, identifying trends, seasonal and cyclical components of time series, customer clustering, new customer classification, and predicting the quantity of items sold within customer clusters. The proposed approach can be applied to the analysis of other e-commerce datasets.</p>S.R. Suleimanova
Copyright (c) 2025
2024-11-042024-11-04480697510.18372/2073-4751.79.19385Increasing the sensitivity of the sensor of the coordinate machine
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19376
<p>The article investigates the sensitivity of the coordinate measuring machine sensor to external factors. Mathematical models have been developed for the evaluation and compensation of systematic and random errors arising from temperature changes and vibrations. A comprehensive model describing the sensor behavior in three-dimensional space, taking into account rotational errors, is presented. Methods for optimizing error compensation based on minimizing the root mean square error are proposed. The obtained results have practical significance for improving the accuracy of coordinate measurements in various industries.</p>O.V. ChalyiD.T. Siryy
Copyright (c) 2024
2024-11-042024-11-04480889210.18372/2073-4751.79.19376Improving measurement accuracy of aviation parts on a coordinate measuring machine
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19375
<p>This article is devoted to the development of methods for enhancing the accuracy of aviation parts measurements on coordinate measuring machines, which is critically important for ensuring quality and safety in aviation manufacturing. A mathematical model is proposed that accounts for the main types of errors: geometric, kinematic, and thermal. An automatic correction algorithm is also developed, allowing for the minimization of these errors' impact on measurement results. The application of this approach contributes to the improvement of accuracy and reliability in controlling geometric parameters, which is essential for the production of structurally complex and critical aviation components.</p>S.F. FilonenkoV.Y. LarinD.M. Kvashuk
Copyright (c) 2024
2024-11-042024-11-04480828710.18372/2073-4751.79.19375Method of synthesis of digital controller for UAV automatic control system
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19374
<p>In this article the method for synthesizing a digital controller for an unmanned aerial vehicle (UAV) automatic control system is proposed. The suggested method is simple to use and enables rapid parametric tuning of the digital controller for a specific loop of the UAV automatic control system. The synthesized digital controller can be integrated into the software or hardware of the UAV automatic control system. The proposed method can be used to design digital controllers for automatic control systems of any type of UAV.</p>O.M. TachininaO.I. LysenkoS.O. PonomarenkoV.O. Kutiepov
Copyright (c) 2024
2024-11-042024-11-04480768110.18372/2073-4751.79.19374The method of adaptive K-path routing in special purpose wireless networks
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19372
<p>The task of ensuring the end-to-end quality of service of heterogeneous wireless networks (HWNs) with random multiple access is considered. The processes of the emergence of conflicts between the universality and complexity of route selection and resource allocation in BPM are analyzed. A technique for eliminating conflicts between fairness and optimality of resource allocation with different numbers K of routes has been developed. It is shown that with a rational choice of the number of routes, depending on the state and parameters of the autonomous segments and the network as a whole, the functions of each level and, accordingly, the information parameters of the traffic at this level can be attributed to one of two alternative groups: functions that depend on a specific technical implementation networks or application-oriented functions. Accordingly, a global approach to the optimal selection of a radio access technology (RAT) to each of the routes included in the set K is formulated, and an approach to RAT selection using a distributed adaptive search algorithm based on the peak rate at which users are able to receive and transmit is proposed traffic flows. The advantage of the adaptive K-path routing method compared to the classical method was estimated by means of calculations and computer simulations. A distributed system for choosing the number of routes has been developed based on the optimization of the set of routes with the elimination of redundancy.</p>A.A. Skrypnychenko
Copyright (c) 2024
2024-11-042024-11-04480596810.18372/2073-4751.79.19372Method of modular multiplication by invariable number for open key cryptography quick implementation in IoT
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19371
<p>The article proposes a method of accelerating the operation of modular multiplication important for cryptographic applications due to use of precomputations. The technology for forming a table of precomputations, whose depend on a invariable multiplier and modulus, has been developed in detail. A formalized description of the proposed procedure for accelerated modular multiplication using precomputations is given. The statement is illustrated by a numerical example. It has been theoretically proven and experimentally confirmed that by using preccomputations according to the proposed method, the implementation of this operation is accelerated by four times. At the same time, the execution time of the basic operation of public-key cryptography – modular exponentiation – is reduced by 1.6 times.</p>V.L. SelivanovGhassan Abdel Jalil Halil Al-Mrayat
Copyright (c) 2024
2024-11-042024-11-04480505810.18372/2073-4751.79.19371Modernization of flight information reading and processing means
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19370
<p>In modern conditions, the task of quickly transferring primary data directly from the on-board recorder of the aircraft to a solid-state information carrier for further processing arises. The article proposes the modernization of flight information reading and processing complexes using the developed prototype of the hardware and software part of the BIF-4T interface block and its own software. This will contribute to increasing the efficiency and comfort of the work of aircraft maintenance specialists, as well as saving time resources and reducing the human factor.</p>A.S. SavchenkoM.V. MatrosovM.O. Kravchenko
Copyright (c) 2024
2024-11-042024-11-04480414910.18372/2073-4751.79.19370Technology of analyzing electronic media to identify informational and psychological influence
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19369
<p>Our many years of research into media information flows have allowed us to reveal a general scheme for implementing informational and psychological influence. The structures created by the decision-making centers (DMCs – “Kremlin towers”) of the aggressor during the hybrid war are designed to conduct information and special informational-psychological operations (SIPO) that support military actions through acts of informational-psychological influence. These operations are implemented by publishing “toxic” messages in news media controlled by the aggressor. The content of these messages poses an informational threat. These messages are then spread further by the aggressor’s network of “bot farms” on social media, simulating public opinion. During wartime, SIPO aim to exhaust society, undermine the morale of the military, and prompt ill-considered military-political decisions by state authorities. Together, structured messages and topics form an “information matrix” that characterizes the information content of individual IPI in the process of conducting hybrid SIPO. The work is devoted to the further development of models and methods of detection and assessment of PR influence to identify and establish the informational content of informational and psychological influence. The refined technology is formulated in an analytical form. The main elements necessary for its practical implementation are identified. The technological process of analyzing electronic media to identify and establish the information content of IPI is described using a UML usage diagram. An example of fragments of an automatically generated report, built using the analyst's AW software, is provided, which form the basis of the final analytical report, and the analyst's conclusion on narratives and identified IPI for the reporting period in the form of abstracts.</p>M.O. RiabyiO.A. Khatian
Copyright (c) 2024
2024-11-042024-11-04480304010.18372/2073-4751.79.19369Overview of data collection and analysis methods in intelligent information processing systems
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19368
<p>This article examines modern methods of data collection and analysis in intelligent information processing (IIP) systems. A review of available services, their features, advantages, and disadvantages across various fields such as marketing, jurisprudence, medicine, and military affairs is provided. Special attention is paid to the integration of data from messengers and public channels. The article proposes an approach that combines traditional data collection services with sources such as Telegram, Facebook, and YouTube to build a more comprehensive and representative informational framework.</p> <p>The results of experimental research demonstrate that even non-standard information sources can be effectively integrated into analytical systems for automated detection of patterns, trends, and anomalies. A conceptual model is proposed, which integrates hyper-automation with IIP to improve the efficiency of data collection, processing, and analysis. Experimental research confirms the feasibility of implementing such solutions, particularly for detecting disinformation, forecasting threats, and automating routine tasks.</p> <p>The article highlights the prospects for developing hyper-automated systems in the context of a rapidly evolving information environment.</p>M.O. RyabyyA.Y. Spiridonov
Copyright (c) 2024
2024-11-042024-11-04480212910.18372/2073-4751.79.19368Development of communication strategies for small agricultural enterprises: online platform creation
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19367
<p>An analysis of current trends shows that the development of information technology plays an important role in agriculture, helping to improve the efficiency and competitiveness of the industry. In this regard, there is a need to improve communication systems with consumers to ensure effective interaction and expand market opportunities for agricultural enterprises.</p> <p>The article discusses the role of an online platform in the development of small-scale agriculture, in particular through the creation of a website based on a content management system. It emphasizes the potential of this tool to increase consumer confidence, improve communication with them, and attract new customers. The advantages of using a CMS are considered in the context of ease of use, flexibility in customization and the ability to quickly update information about products and services.</p> <p>Based on the analysis of a family farm, the authors demonstrate how to effectively implement these technologies to ensure successful customer interaction. In addition, the authors highlight the process of building a website, taking into account the needs and expectations of the target audience. This approach allows not only to improve communication with consumers but also to create a solid foundation for the development of agriculture in the online environment.</p>N.S. VovkR.S. PazderskaA.A. Konoval
Copyright (c) 2024
2024-11-042024-11-04480132010.18372/2073-4751.79.19367Using the Levenshtein algorithm for the categorization of information systems users
https://jrnl.nau.edu.ua/index.php/PIU/article/view/19366
<p>The study is devoted to the application of the Levenshtein distance algorithm to categorize users based on behavior in information systems, with an emphasis on dynamic adaptation in e-learning environments. The experiment used data from the MS SQL Server online course and the hardware and software complex for teaching the Braille font, which allows you to switch the content based on scenarios that correspond to the category of users. The results show the effectiveness of using the Levenshtein distance algorithm for user categorization and training has maintained a positive trend of advancement according to predefined training scenarios. The study also highlights the potential of adaptive e-learning systems to improve learning outcomes by adapting content to the individual needs of users.</p>Y.B. ArtamonovI.I. GolovachD.V. KrantK.M. Radchenko
Copyright (c) 2024
2024-11-042024-11-0448041210.18372/2073-4751.79.19366Internet network model with account of network location
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18970
<p>The purpose of this research is to prove the usefulness of the conclusions of the percolation theory for the assessment of the connectivity of the Internet of Things network. The probability that there is a route between two pairs of nodes determines the connectivity of the network. When this probability approaches unity, the network is considered connected. For example, finding the shortest paths between all pairs of nodes (the vertices of the graph describing the network) can be used to assess connectivity in a particular situation. Two reasons make this problem difficult to solve. First, the computational resource required for this grows proportionally to n3, where n is the number of vertices of the graph. Second, existing analytical approaches are usually focused on specific cases rather than on a large number of nodes.</p> <p>The article proposes a network model in the form of a lattice, which serves as a logical basis for structuring connections between nodes located in different rooms. The shape of the grid is controlled by the layout of the building. The obtained model makes it possible to evaluate the efficiency of the communication channel using the estimation of the PSP and the general ratio of the SS for the nodes of the network. The use of the model allows us to confidently state that in a modern multi-story structure, if the nodes are strategically placed in each room, it is quite possible to create a wireless communication network. In addition, the quality of the radio channel allows you to use data transfer rates that meet the highest standards of modern technologies.</p>S.S. ChumachenkoB.S. ChumachenkoM.M. MaloiedR.S. OdarchenkoKhavikova Y.I. Khavikova
Copyright (c) 2024
2024-07-012024-07-0148012413410.18372/2073-4751.78.18970Priority management in IT service for airline employees
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18969
<p>The purpose of the processing is the automatic prioritization of IT service requests for employees of airline`s departments. The object types affecting request priorities identified. The simple function for calculating the priorities of requests based on the analysis of such components as the user's department, position, the location of the problem, the service that must be restored, the work that will solve the problem and the plan for performing this work proposed to use. The result is obtained by successive transformation of relations of sets departments, positions, locations, services, works and their execution plans.</p>V.F. SuraievS.O. Kudrenko
Copyright (c) 2024
2024-07-012024-07-0148012012310.18372/2073-4751.78.18969Overfitting in machine learning
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18968
<p>The problem of overfitting in machine learning is relevant and important for achieving high accuracy and reliability of predictions on real data. This article is dedicated to exploring the problem of overfitting from a mathematical perspective. It begins with a general overview of the problem and its importance for scientific and practical tasks such as pattern recognition, forecasting, and diagnostics. Starting with defining key concepts such as model complexity, sample size, bias-variance tradeoff, and dispersion, the text reveals the relationship between them and the influence of sample size on the learning process. To demonstrate these concepts, Python code is developed that uses polynomial regression as a model for analysis. Through the creation of synthetic data and fitting different models to them, the phenomenon of overfitting and its impact on prediction accuracy is illustrated. The concluding remarks emphasize the importance of understanding the mathematical aspects of overfitting for developing reliable and effective models in machine learning. Further analysis of recent research and publications in this field demonstrates various approaches to solving the problem, including regularization methods, the use of ensemble methods, and the development of new neural network architectures. Unresolved aspects, such as finding the optimal balance between model complexity and generality, are highlighted for further investigation. The ultimate goal of the article is to identify the key aspects of the overfitting problem and formulate goals for further research in this area.</p>M.V. StrukYu.B. Modenov
Copyright (c) 2024
2024-07-012024-07-0148011511910.18372/2073-4751.78.18968A method for prioritizing IT incidents at critical information infrastructure facilities of the state
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18967
<p>The article is devoted to the development of a method for prioritizing IT incidents at critical information infrastructure facilities of the state. The study considers the main approaches to classifying and managing IT incidents, such as ITIL, COBIT, ISO/IEC 20000 and NIST Cybersecurity Framework. The proposed method is based on the use of the pairwise comparison method (AHP) to assess and prioritize threats, taking into account their impact on different levels of critical facilities. The article describes in detail the stages of method development, including threat identification, local and global prioritization, and synthesis of the results obtained for effective IT security management. The proposed approach allows rational allocation of resources, ensuring the reliability and resilience of critical information infrastructure. Experimental studies confirm the practical value of the method, which makes it a useful tool for increasing the level of security and effective response to IT incidents in the face of modern threats to IT-security.</p>V.M. SydorenkoA.A. PolozhentsevS.Y. SydorenkoA.A. Skurativskyi
Copyright (c) 2024
2024-07-012024-07-0148010411410.18372/2073-4751.78.18967Method of distributed modular exponentiation on IoT terminal microcontrollers with protected involvement of cloud computing
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18966
<p>The method of distributed modular exponentiation on IoT terminal microcontrollers with secure involvement of remote computer systems is theoretically justified, developed and researched, the use of which allows to accelerate the implementation of this basic operation of public key cryptography.</p> <p>Acceleration is achieved by reducing the computing load on the terminal computing platform. The paper theoretically substantiates this possibility by increasing the load on cloud computing, provides a detailed description of the method, the work of which is illustrated by a numerical example, and presents a detailed assessment of efficiency.</p> <p>Theoretically and experimentally shown. that the proposed method allows to speed up modular exponentiation by 3-4 times compared to known methods of its implementation on IoT terminal devices with the involvement of cloud computing.</p>O.V. RusanovaM.A. Haidukevych
Copyright (c) 2024
2024-07-012024-07-014809110310.18372/2073-4751.78.18966A model for identifying the source of pseudorandom number sequences based on a hybrid neural network
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18965
<p>This article presents a model for identifying random number sources based on a hybrid neural network. The proposed model combines recurrent (RNN) and convolutional (CNN) neural networks to achieve high classification accuracy. The study discusses the key stages of model development, including data preparation, model construction, training, and performance evaluation. Experimental results confirm that the model can effectively identify random number sources with an accuracy of more than 95% for some generators. The developed approach provides high reliability and can be applied in various fields, including cryptography and modeling.</p>D.P. ProskurinS.O. GnatyukCh. OkoroT.O. OkhrimenkoT.V. Hryniuk
Copyright (c) 2024
2024-07-012024-07-01480839010.18372/2073-4751.78.18965One-directional mapping for cryptographic security of the quasi-regular language sentences to interact light aviation systems subjects
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18964
<p>One from the problems of the interaction processes (communications) protection between subjects of ultralight aviation systems that functioning (perform targeting) in an autonomous mode is considered – the problem of communications cryptographic protection in conditions when the interacting components information and communication capabilities are low An asymmetric cryptographic protection system based on the use of a modified regular language of communications is proposed, relevant to the low availability of information and computing resources.</p>M.K. PechurinL.P. KondratovaS.M. Pechurin
Copyright (c) 2024
2024-07-012024-07-01480778210.18372/2073-4751.78.18964Algorithm for calculating the power system voltage frequency using quadrature components
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18963
<p>The scientific article solves an important scientific and technical problem – minimizing the error in calculating the power system voltage frequency. The calculation of the voltage frequency is important because it helps to ensure the reliability and stability of power facilities. Long-term operation of equipment with a significant deviation of the voltage frequency from the nominal value leads to increased wear and premature failure. In addition, a mismatch between the frequency and the nominal value can lead to additional errors when measuring other parameters of power facilities.</p> <p>The algorithm is based on calculating the power system voltage frequency using quadrature components. In the course of the work, a structural scheme for calculating the voltage frequency using digital filters was proposed. The synthesis of digital filters was also performed. To verify the results obtained, a computer simulation was performed using the Python programming language. An algorithm for calculating the voltage frequency in the power grid is proposed.</p>R.V. Petrosian
Copyright (c) 2024
2024-07-012024-07-01480697610.18372/2073-4751.78.18963Construction of the software of the information system for the formation of specialized thematic virtual communities
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18962
<p>The article is devoted to the study of the software operation processes of specialized thematic virtual communities based on informational messages and user behavior in the social network. Attention is also paid to the research of virtual communities, which led to the emergence of specialized thematic virtual communities.</p> <p>The results of the information system for the formation of specialized thematic virtual communities are presented, which will improve the process of dissemination of information content by users. Attention is focused on the following processes: creation of a specialized thematic virtual community based on the selection of users, analysis of the activity of an existing specialized virtual community and its search for the purpose of publishing the specified information content.</p> <p>A formal modeling for the subject area is presented, on the basis of which the methodology formulation of the degree of correspondence of the information content of the specialization and the topic according to the defined keywords and tags, which were used to implement the system's tasks, took place.</p> <p>The research results can be used to optimize the work of specialized thematic virtual communities.</p>R.S. PazderskaV.P. Kvasnikov
Copyright (c) 2024
2024-07-012024-07-01480616810.18372/2073-4751.78.18962Soft-adaptation of reference algorithm for discrete control
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18961
<p>An applied technique for quickly transitioning from a pre-optimized reference control algorithm to its discretized (software) alternative for the needs of discrete control of objects operating on the “on-off” principle is proposed. This technique can effectively facilitate the design and implementation of low-cost automatic control systems, in particular, based on a unified information and control network organized by the client-server principle. The method application involves some stages, namely: basic formalization of the control circuits and obtaining of optimal transient processes through modeling (implemented using the MatLab Simulink environment in the current article), identifying the optimal reference control algorithm and its parameters, an adaptation characteristic constructing, software implementation of the adaptation characteristic on controller level.</p>V.S. NozdrenkovA.V. PavlovG.A. OleksiienkoO.Y. ZhuravlovY.O. Zhuravlov
Copyright (c) 2024
2024-07-012024-07-01480526010.18372/2073-4751.78.18961Using a resource classifier in traffic forecasting models for SDN networks
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18960
<p>This publication reviews existing solutions for predicting SDN traffic. The proposed solution uses a resource classifier of client requests for predicting the network response to these requests. This short-term forecasting is performed using a convolutional neural network. The article considers aspects of parallel computing and forecasting in a dynamically reconfigurable system. Forecasting results can be used in QoS/QoE services, SDN controller for traffic routing and detection of anomalous traffic by network protection systems.</p>Y.O. KulakovO.V. KorochkinA.S. Omelyanskiy
Copyright (c) 2024
2024-07-012024-07-01480445110.18372/2073-4751.78.18960Load balancing method in SDN networks using artificial intelligence
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18959
<p>This paper provides an overview of load balancing in corporate networks using SDN technology and artificial intelligence. It discusses the features and methods of using AI in these networks and identifies potential problems.</p> <p>The paper reviews the method of load balancing in corporate SDN networks using AI and concludes that AI can automate the process of load balancing in the network. The implementation of AI can enhance network efficiency, decrease costs, and bolster security. This paper suggests the use of artificial intelligence in corporate networks through SDN technology to improve network efficiency and security.</p> <p>This paper suggests the use of artificial intelligence in corporate networks through SDN technology to improve network efficiency and security. The paper reviews the method of applying AI in these networks and outlines promising areas of research.</p> <p>This paper presents a theoretical overview of load balancing in enterprise SDN networks, considering their features, and establishes the foundation for future research in this area. The integration of artificial intelligence into corporate networks is a pressing task as it enhances network efficiency and security while also creating new opportunities for development.</p>Y.O. KulakovD.V. Korenko
Copyright (c) 2024
2024-07-012024-07-01480354310.18372/2073-4751.78.18959Control of linear motors with gas lubrication of the coordinate measurement system
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18958
<p>The problem of the influence of non-Gaussian disturbance on the control system during the measurement of coordinate measuring system of mechanical quantities of objects with a complex spatial surface is described in the article. It is shown that the accuracy of the filtering of the random process of measuring mechanical quantities is significantly affected if to take into account the disturbing factors with non-Gaussian probability distribution density.</p>V.P. KvasnikovV.M. IlchenkoK.V. Molchanova
Copyright (c) 2024
2024-07-012024-07-01480303410.18372/2073-4751.78.18958Challenges of data collection for monitoring technical characteristics and location of specialized airport vehicles
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18957
<p>The study analyzed the procurement of Boryspil Airport from open sources, as well as regulatory and legislative documents regarding data transmission via radio modems. It was found that over the past few years, the airport has been tendering for systems using GPRS cellular network operator networks (networks of third-party companies not controlled by airport services). The aim of this study is to calculate the parameters of the radio network, determine the data to be transmitted from sensors to the database, select radio modules to provide coverage of the airport's radio network area, create an architecture of a computer-integrated monitoring system for technical characteristics and location of specialized airport vehicles with the goal of transitioning from using networks of third-party companies to an independent internal network. The study calculated the parameters of the airport's radio network, analyzed the prospects for the development of the data transmission subsystem, additional possibilities for determining the location of special vehicles using radio modules and GPS. It considered reducing the impact of other unwanted sources of interference on the radio module's operating frequency, reducing the risk of data interception and decryption transmitted by the radio network, and choosing a radio module based on SX1280 for the development of a prototype for further research.</p>Y.Y. KarpovO.V. Vovna
Copyright (c) 2024
2024-07-012024-07-01480182910.18372/2073-4751.78.18957Using an object tracking algorithm by video image for the implementation of an autonomous target tracking function for UAV
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18956
<p>The article examines the spheres of UAV commissioning. The problem of controlling the UAV by the operator through the control panel is described. The paper proposes an approach for implementing the autonomous function of following a given object. A software part consisting of a video stream processing module, object tracking, and control command generation was developed. The program additionally implements mechanisms to increase system reliability, such as data processing to prevent sudden movements and an algorithm to restore tracking when an object is lost. Further steps for the integration of the MAVLink library for the formation of control commands and the assembly of the hardware part of the system based on a Raspberry Pi single-board computer and a Pixhawk flight controller are described.</p>I.A. ZhukovY.V. Lukash
Copyright (c) 2024
2024-07-012024-07-01480141710.18372/2073-4751.78.18956Method for cryptographically strict identification with password reuse blocking
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18955
<p>A method for cryptographically strict identification of remote users with the combined use of irreversible transformations of modular arithmetic and functionally interconnected session passwords is theoretically justified and developed, which eliminates the possibility of their reuse by an attacker.</p> <p>In addition, to speed up the identification process on the system side, it is proposed to use irreversible transformations of modular algebra that are asymmetric in the volume of calculations.</p> <p>A mathematical justification for the proposed method and numerical examples that illustrate its operation are given. It has been theoretically and experimentally proven that the proposed method makes it possible to block the reuse of user passwords, as well as speed up the process of identification by the system by 2-3 orders of magnitude.</p>O.A. VerbaI.V. Daiko
Copyright (c) 2024
2024-07-012024-07-0148041310.18372/2073-4751.78.18955Multi-model data representation for ontology-driven decision-making
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18667
<p>Nowadays ontology-driven decision-making is the result of the combination and integration of knowledge and data of different nature and purpose, solving multiple interconnected decision-making problems, synthesizing different points of view on the problem and the decision-making process. For many decision-making problems, the use of only one data model, usually a relational one, is not enough. Today, to solve the problem of "diversity" of data, the concept of multi-model data management is used. Modern aspects of decision-making based on the use of ontologies as a tool of understanding and presentation of decision-making areas and processes, which integrates the methods of system, process and situational analysis are discusses. The possible types of data representations (models) that are necessary for the implementation of ontology-guided decision-making, and also defines the corresponding types of information are defined. In the work, polyglot persistence storage, multi-model storage and cloud-based storage were considered and analyzed for the implementation of multi-model data management. The conclusion is made about the choice of multi-variant storage as a means of multi-model presentation of data within the framework of projects carried out by the authors of the article. The selected software tools for implementing the defined multi-model data representation are described.</p>Y.P. ChaplinskyyO.V. Subbotina
Copyright (c) 2024
2024-04-012024-04-0148011812410.18372/2073-4751.77.18667Synergy of cosine similarity and generative artificial intelligence
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18666
<p>First and foremost, the synergy between cosine similarity and generative artificial intelligence in the context of developing a contextual search application is a promising direction, especially given that most search systems rely on keyword-based search. The new approach proposed by artificial intelligence is based on neural and semantic search, focusing not on individual keywords but on their context and relationships, which opens up broad possibilities for improving the accuracy and relevance of search results.</p> <p>To meet users' needs, chatbots are being developed. Chatbots are utilized in various fields, including customer service, consultation, user support, and other tasks that require interaction with people through text or voice interfaces. Their popularity is constantly increasing in response to demand from users, the majority of whom regularly use chatbots in their everyday lives. The article covers concepts of artificial intelligence, AI-based chatbots, contextual search, and cosine similarity. The focus is on the application of contextual search based on artificial intelligence. An explanation of the approach and specific details of the implementation of its development is provided.</p>T.V. KholyavkinaI.V. ChubaA.Y. Sholupata
Copyright (c) 2024
2024-04-012024-04-0148010911710.18372/2073-4751.77.18666A model of an opportunistic computer network control system
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18665
<p>The mobile multi-service network is considered – a segment of the information and communication system of control, management, and maintenance of a large air hub. It is shown that under conditions of sudden entry of aircraft into and out of the network coverage area, the latter acquires the properties of an opportunistic network, and sometimes – a network with tolerance to delays and disconnections. It has been established that as a result of a change in the number of active network nodes, the network topology may change and there is a need to change data delivery routes. A model of the processes observed in the opportunistic network is built. As a mathematical basis of the model, a non-homogeneous alternating restoration process is used, which takes into account changes in the transition intervals from one phase state to another. It is proved that with different variants of dominance, the appearance of new mobile nodes or the disappearance of nodes that were part of the network earlier, the asymptotic convergence of the network states changes accordingly.</p>O.V. TolstikovaS.V. VodopianovO.V. AndreievA.B. Kotsiur
Copyright (c) 2024
2024-04-012024-04-0148010410810.18372/2073-4751.77.18665Method of project management based on Story Points estimations
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18664
<p>The paper is devoted to the development of building project management systems methods that allows to perform automatic project scheduling, where tasks are estimated in story points. The paper reviewed the existing systems and proposed an approach to the automation of project scheduling in minimum time, and using the minimum employees number who will complete the project in the given time.</p> <p>The proposed approach allows taking into account the velocity, specialization and salaries of employees. Taking into account these features, and using of the tasks complexity in story points, brings scheduling closer to reality, which allows to increase the accuracy of scheduling, reduce the time of project execution and/or costs for employees and the project in general.</p>O.V. RusanovaO.V. KorochkinA.V. Achilov
Copyright (c) 2024
2024-04-012024-04-014809610310.18372/2073-4751.77.18664ІЕЕЕ 802.15.1 МАС-to-PHYSICAL level transition protocol and one-directional parsing function
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18662
<p>The procedure of inter-level transformations of PDUs is considered on the example of the MAC sub-level of the channel and physical levels of the Reference model of the interconnection of open systems for interacting UAVs of the first class, taking into account the main recommendations of IEEE 802.15.1 regarding the protection of information from unauthorized access. Distinctive features of first-class UAV computer systems and networks are low transmission speed and limited computing power of computer equipment. The recommendations regarding the relationship between the channel and physical layers, subject to the application of the IEEE 802.15.1 standard to ensure the security of the UAV system with resource limitations, are considered in detail, on the basis of which a model in the class of models of formal grammars is built. The analysis of the model showed that in order to apply the method of protection based on the unidirectional function of grammatical analysis of regular language sentences, it is necessary to exclude the considered procedure from the protocol stack of the Reference Model of Open Systems Interaction.</p>M.K. PechurinL.P. KondratovaS.M. Pechurin
Copyright (c) 2024
2024-04-012024-04-01480899510.18372/2073-4751.77.18662Method of fast exposure in Galua fields in cryptographic data protection systems
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18660
<p>The method of accelerated calculation of the exponent on Galois fields – the basic operation of a wide range of cryptographic data protection algorithms is proposed and investigated. Acceleration is achieved by reducing the execution time of the ascent to the square in Galois fields, which is based on the use of the properties of the polynomial square, Montgomery reduction and the use of precalculations that depend only on the Galois Field base polynomial. The mathematical substantiation of the offered method and numerical examples which illustrate its work are resulted.</p> <p>It is theoretically and experimentally proved that the proposed method allows to almost twice accelerate the exponentiation on Galois fields in comparison with known methods.</p>O.P. MarkovskyiI.V. Daiko
Copyright (c) 2024
2024-04-012024-04-01480808810.18372/2073-4751.77.18660Method for accelerated modular squaring of long length numbers for cryptographic application
https://jrnl.nau.edu.ua/index.php/PIU/article/view/18659
<p>The article theoretically substantiates and proposes a method for accelerated modular squaring of long length numbers.</p> <p>Acceleration modular square calculation is achieved through the combined using of abridged multiplication technology, alternating cycles of multiplicative operations and partial modular reduction, as well as organizing simultaneous processing of a group of bits using pre-calculations under reduction.</p> <p>The methodology for constructing of precomputations table for group Montgomery reduction is described in detail, as well as the proposed procedure for quickly calculating a modular square using abridged multiplication technologies and simultaneous Montgomery reduction of several digits. The presentation is illustrated with a numerical example.</p> <p>It is shown that the proposed method makes it possible to speed up the computational implementation of the modular squaring operation, which is important for cryptographic applications, by 5-6 times compared to known technologies.</p>O.P. MarkovskyiGhassan Abdel Jalil Halil Al-Mrayat
Copyright (c) 2024
2024-04-012024-04-01480687910.18372/2073-4751.77.18659