Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT <p>Scientific journal "Science-Based Technologies" has been published since 2008 in National Aviation University (Kiev) 4 times per year in Ukrainian and English. The contents of the journal includes the following topics: Information technology, cyber security; Ecology, chemical technology, biotechnology and bioengineering; Electronics, Telecommunications and Radio Engineering; Transport, transport technologies.</p> <p>The International Standard Serial Number ISSN 2075-0781 to this journal is assigned and registered by ISSN International Center in June 2009.</p> <p>By the order of the Ministry of Education and Science of Ukraine No. 641 dated 28.04.2025, the scientific journal "Science-intensive technologies" is included in the list of scientific publications whose publications are included in the results of the dissertation works in the technical sciences, category "B" (specialties F5, G1, G5, G21, J6).</p> en-US sbt_nau@ukr.net (Аліна Савченко) olga_fatuch@nau.edu.ua (Fatych Olga ) Thu, 12 Feb 2026 07:51:46 +0200 OJS 3.3.0.13 http://blogs.law.harvard.edu/tech/rss 60 ACTION OF A MECHANICAL INERTIAL PROPULSION FROM THE POINT OF VIEW OF THE CENTER OF MASS FOR USE IN AEROSPACE VEHICLES https://jrnl.nau.edu.ua/index.php/SBT/article/view/20741 <p><em>Modern aviation and astronautics are based on ch</em></p> <p>Modern aviation and astronautics are based on chemical jet engines that use the kinetic energy of a jet stream for movement in air and outer space. Currently, in addition to chemical jet engines, jet engines with high kinetic energy of a jet stream are being developed - plasma, ion, nuclear, Hall effect engines, etc. Some of them are at the research and design stage. For long flights, an engine is needed that does not require a supply of chemical fuel. An inertial engine meets these requirements. In studies of an inertial engine (N. Din 1963), when the flywheels rotate in opposite directions, the system body began to vibrate back and forth with a frequency equal to the speed of rotation of the flywheels, trembled and bounced, but the center of mass of the system remained in place. In connection with this experiment, most scientists expressed themselves quite clearly: it is impossible to build an inertial machine on a closed system. In this case, we can say that if the flywheels are rigidly connected to the body of the inertial engine, then the potential energy and momentum will be redistributed between the elements of the system, and the center of mass will remain in place. The flywheels, with their opposite ends of the mount, will have a counter-effect on the elements and the entire main mass of the system. The purpose of the work is to theoretically investigate the possibility or impossibility of creating an inertial engine that creates the movement of the center of mass of the entire system. The work theoretically investigates a system consisting of two oppositely rotating disks. The disks are located in the same plane - not at a distance of radii. The centers of rotation and the center of mass are rigidly connected to each other. The theoretical calculations performed showed that with counter-rotating disks, the moments of rotation of the system around the center of mass will be compensated along the X coordinate. Therefore, only the force acting on the center of mass in the direction of the Y coordinate will remain. Structurally, such a system can be easily implemented for an inertial propulsion system. But if we take into account the energy system that creates the force F on the disk and which is rigidly connected to the X coordinate axis, then all forces will be compensated and the inertial motion of the system will most likely not occur. It should be noted that it is unclear why in a closed system the rotational motion in one coordinate system will lead to translational motion in another coordinate system of the center of mass. To study the motion of the center of mass of the system, new experiments and theoretical calculations for other systems are necessary. <em>emical jet engines that use the kinetic energy of a jet stream for movement in air and outer space. Currently, in addition to chemical jet engines, jet engines with high kinetic energy of a jet stream are being developed - plasma, ion, nuclear, Hall effect engines, etc. Some of them are at the research and design stage. For long flights, an engine is needed that does not require a supply of chemical fuel. An inertial engine meets these requirements. In studies of an inertial engine (N. Din 1963), when the flywheels rotate in opposite directions, the system body began to vibrate back and forth with a frequency equal to the speed of rotation of the flywheels, trembled and bounced, but the center of mass of the system remained in place. In connection with this experiment, most scientists expressed themselves quite clearly: it is impossible to build an inertial machine on a closed system. In this case, we can say that if the flywheels are rigidly connected to the body of the inertial engine, then the potential energy and momentum will be redistributed between the elements of the system, and the center of mass will remain in place. The flywheels, with their opposite ends of the mount, will have a counter-effect on the elements and the entire main mass of the system. The purpose of the work is to theoretically investigate the possibility or impossibility of creating an inertial engine that creates the movement of the center of mass of the entire system. The work theoretically investigates a system consisting of two oppositely rotating disks. The disks are located in the same plane - not at a distance of radii. The centers of rotation and the center of mass are rigidly connected to each other. The theoretical calculations performed showed that with counter-rotating disks, the moments of rotation of the system around the center of mass will be compensated along the X coordinate. Therefore, only the force acting on the center of mass in the direction of the Y coordinate will remain. Structurally, such a system can be easily implemented for an inertial propulsion system. But if we take into account the energy system that creates the force F on the disk and which is rigidly connected to the X coordinate axis, then all forces will be compensated and the inertial motion of the system will most likely not occur. It should be noted that it is unclear why in a closed system the rotational motion in one coordinate system will lead to translational motion in another coordinate system of the center of mass. To study the motion of the center of mass of the system, new experiments and theoretical calculations for other systems are necessary.</em></p> Borys Zhurylenko Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20741 Tue, 10 Feb 2026 00:00:00 +0200 DYNAMIC MOTION MODEL OF AN UNMANNED AERIAL VEHICLE FOR CONTROL AND NAVIGATION TASKS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20451 <p>Relevance. The use of unmanned aerial vehicles (UAVs) in civil and military applications is rapidly increasing, but their effectiveness significantly decreases under the influence of gusts, wind shear, and turbulence. This problem is especially critical for monitoring, mapping, search and rescue operations, and delivery tasks, where accuracy, reliability, and energy efficiency are crucial. In such conditions, standard control schemes that do not account for atmospheric disturbances are effective only under weak influences, limiting functionality and reducing operational safety. Thus, there is a growing need for adequate mathematical models and modern information technologies capable of compensating the negative effects of wind.</p> <p>Problem statement. Traditional simplified flight models and standard controllers ensure stability only under weak disturbances, which does not meet the requirements for accuracy and reliability. One of the key prerequisites for developing advanced information technologies for flight control is the construction of a mathematical model of a UAV that correctly accounts for wind effects in its motion equations.</p> <p>Solution approach. The paper proposes a dynamic model of UAV motion that describes its behavior in six degrees of freedom. The model includes projections of gravity, thrust, and aerodynamic forces onto velocity, normal, and trajectory axes, and incorporates wind disturbances through the relationship between airspeed and ground speed. This approach enables the linearization of equations, decomposition into longitudinal and lateral motion subsystems, and derivation of transfer functions necessary for the analysis and synthesis of automatic control systems.</p> <p>Results. The developed model makes it possible to study longitudinal and lateral disturbed motion, evaluate stability, and assess the quality of transient processes in control systems. It provides a formalized basis for integrating wind models, testing different flight scenarios, and comparing methods of disturbance compensation.</p> <p>Conclusions. The proposed model is a scientific and practical foundation for designing information technologies for UAV flight control under wind disturbances. It enables the development of robust and predictive control algorithms that improve accuracy, energy efficiency, and reliability of UAV missions under challenging atmospheric conditions.</p> Mykola Komar, Oleksandr Volkov, Oleksii Makhalin Copyright (c) 2025 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20451 Tue, 10 Feb 2026 00:00:00 +0200 ANALYTICAL JUSTIFICATIONS FOR THE DEVELOPMENT OF A SIMULATION MODEL OF MAINTENANCE OF AVIATION GROUND EQUIPMENT TAKING INTO ACCOUNT THE NEED FOR SPARE PARTS AND MATERIALS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20376 <p>The article considers the issues of improving the maintenance system of modern special equipment at airports through the optimization of processes related to ensuring its operation with spare parts and materials. It was shown that the efficiency of a modern airport’s operations largely depends on the quality of management at all levels, including the organization of the proper use of special equipment and machinery. The quality of these processes significantly depends on the availability of accurate information corresponding to the condition and development trends of a specific airport, as well as methodological support, in particular for processes related to the maintenance of aviation ground equipment. The conducted research considers the framework of addressing the global challenge of risk management in the aviation industry. For this purpose, a model of the functioning of the airport special transport service’s spare parts and materials supply system was proposed. Additionally, an objective function was introduced, and the most significant constraints in achieving the set goal were analyzed. In particular, the main patterns that determine the consumption and variation in the consumption of material resources used during the maintenance of aviation ground equipment were studied: changes over time in operating conditions; changes over time in the intensity of operation; the influence of operating conditions on the resource of parts replaced based on condition; changes over time in the consumption of parts replaced based on condition; changes over time in the amount of maintenance work by type and level; changes over time in the consumption of materials replaced based on operating time; and the influence of operational intensity and the frequency of different forms of maintenance on the number of maintenance operations by type and level. The developed simulation model of maintenance demand for aviation ground equipment allowed for the improvement of a generalized model for the operation of special equipment and machinery at a modern airport, regardless of the condition and size of the equipment fleet.</p> Oleksandr Tamarhazin, Liudmyla Pryimak, Svitlana Kabyka Copyright (c) 2025 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20376 Tue, 10 Feb 2026 00:00:00 +0200 OVERVIEW OF AVIATION AIRPORT INFRASTRUCTURE IN THE SYSTEM OF ENSURING SECURITY PROCEDURES AT THE AIRPORT https://jrnl.nau.edu.ua/index.php/SBT/article/view/20742 <p>The study examines the <strong>«SECURITY–QUALITY»</strong> model in the context of airport operational efficiency. The assessment of airport performance is based both on calculations using simple linear indicators and on the application of more sophisticated models with specific parameters and clearly defined constraints. As a result of the analysis and research, a mathematical model of <strong>«SECURITY–QUALITY»</strong> has been developed. This model reflects the full dynamics of passenger flows through the lens of all technological procedures of the airport and enables the calculation of the dynamic allocation of available resources for performing all prescribed inspection procedures, both under normal operational conditions and in emergency situations. Scientific approaches to evaluating airport efficiency include both calculations based on simple linear indicators and the use of complex models with clearly established operational constraints. The study further analyzes the impact of security measures on the time intervals required for passengers to complete necessary airport procedures, which directly depend on passenger behavior and the throughput capacity of the airport. Airport infrastructure is a fundamental component of the aviation sector, providing essential facilities and services required to ensure efficient and seamless operations as well as satisfactory quality of air passenger transportation. Supporting aviation operations necessitates comprehensive planning, design, construction, and maintenance of a wide range of physical assets, complemented by the integration of advanced technologies and systems. Within this framework, security considerations remain a priority for all technological elements and operational resources within the airport environment. Analysis of the <strong>«SECURITY–QUALITY»</strong> model demonstrates that increasing the time allocated to passenger security procedures may lead to several subjectively perceived negative consequences for travelers. Accordingly, the implementation of additional security measures - which generally require additional time and apply to all flights - results in resource deficits and increased delays in subsequent flight operations.</p> Mariia Bahrii , Alla Valko, Olena Sokolova, Iryna Borets Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20742 Tue, 10 Feb 2026 00:00:00 +0200 JUSTIFICATION OF THE PARAMETERS OF SHIELDING STRUCTURES TO COUNTER TEMPEST THREATS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20237 <p>In the era of digital transformation and escalation of cyber espionage threats, physical protection of information acquires the status of a critical condition for ensuring national security. The article is devoted to the study and justification of engineering parameters of shielding structures aimed at effective counteraction to TEMPEST threats. The relevance of the study is enhanced by the growing intensity and broadband of radiation generated by modern high-performance equipment (servers, communication systems), which requires the use of specialized protective solutions. Recommendations are substantiated for optimizing key physical parameters of shielding structures necessary to ensure a guaranteed level of attenuation of side electromagnetic radiation in accordance with international standards. A comparative characteristic of TEMPEST protection levels according to SDIP-27 and NSTISSAM standards is provided. It is proven that the effectiveness of the screen is achieved due to two main mechanisms - reflection (dominant at high frequencies) and absorption of electromagnetic waves by the material. The calculated formulas for the reflection and absorption coefficients demonstrate their critical dependence on the ratio of wave resistances and screen thickness. The features of flat and perforated screens are considered. Successful counteraction to TEMPEST threats lies in the synergy between the material and the design. It has been established that the most promising for broadband protection are materials that combine high conductivity and absorption capacity. It has been proven that the implementation of calculation methods at the design stage allows predicting the protective properties of materials, taking into account the spatial distribution of metal inclusions, which significantly minimizes the volume of costly full-scale tests and simplifies the procedure for planning electromagnetic safety work. The results of the study are a fundamental basis for developing engineering solutions that meet the highest requirements of international electromagnetic safety.</p> Valerii Kozlovsky, Yurii Balanyuk, Diana Kozlovska, Nataliia Vyshnevska Copyright (c) 2025 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20237 Tue, 10 Feb 2026 00:00:00 +0200 REVIEW OF NEURAL NETWORK MODELS FOR 2D OBJECT DETECTION https://jrnl.nau.edu.ua/index.php/SBT/article/view/20280 <p>This review article presents a catalogue of deep learning neural network models for detecting 2D objects in images. These models are divided into three groups: single-stage, two-stage, and transformer-based models. Traditional methods developed prior to the application of deep learning in classification and detection tasks are also mentioned. The following computer vision tasks are considered: image classification, image localization, object detection, and image segmentation. Some fundamental components of 2D object detection are considered, such as commonly used data sets (PASCAL-VOC, ILSVRC, MS-COCO, OpenImages, Objects365), and a list of quality indicators with a brief description. The last ones are split into quality metrics and performance metrics. The list of quality metrics includes Precision, Recall, Average Precision (AP), Mean Average Precision (mAP), and Average Recall (AR). The list of performance metrics includes Inference Time, FPS (Frames Per Second), Latency, and Throughput. The mAP values for different models and datasets are presented. Also examples of mAP dependence on speed and number of parameters for different versions of the YOLO model family are presented. A method for conducting a comparative analysis of different detection models is presented, with an indication of suitable software tools. A brief description of the idea is provided for each group of models. The article contains a brief historical overview of the triumph of the AlexNet model in 2012 at the ILSVRC (ImageNet Large Scale Visual Recognition Challenge) competition. This overview is undoubtedly of interest to those who are unfamiliar with the topic of detecting 2D objects using neural networks and machine learning methods, but who want to quickly get up to speed.</p> Serhii Bielov, Maksym Zaliskyi Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20280 Tue, 10 Feb 2026 00:00:00 +0200 SYSTEM FOR ASSESSING THE CYBERSECURITY STATE BASED ON CYBERDIPLOMACY INDICATORS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20768 <p>The article addresses the problem of formalized assessment of a state’s cybersecurity level under conditions of growing hybrid threats, uncertainty of initial data, and the need to account not only for technical, but also legal, organizational, and foreign-policy aspects. It is shown that existing international index systems, maturity models, and regulatory approaches (GCI, NCSI, CMM, NIS2, NIST, OECD) do not provide for the construction of an integrated adaptive assessment system suitable for use at the state level in conditions of military confrontation and dynamic transformation of cyber threats. The purpose of the study is to develop and implement in software a system for assessing the level of a state’s cybersecurity, based on a formalized system of criteria, including a cyberdiplomacy dimension, and implementing a multicriteria fuzzy method for integrating expert assessments. The proposed system makes it possible to account for linguistic expert evaluations, different weights of criteria and sub-criteria, and to operate under conditions of incomplete and fuzzy information. The paper develops a structural model of the assessment system consisting of a data input and management subsystem and an assessment and data processing subsystem, as well as the corresponding functional modules for authentication, initialization of criteria and sub-criteria, formation of scales and reference benchmarks, determination of weighting coefficients, expert assessment, fuzzification, aggregation, defuzzification of results, and report generation. A basic algorithm for the system’s operation is proposed, ensuring consistent processing of expert data and the formation of an integral indicator of the cybersecurity level. To verify the correctness and sensitivity of the method, experimental modeling of the system’s operation was conducted for three scenarios corresponding to low, medium, and high levels of the cybersecurity state. The experimental results confirmed the monotonic behavior of the integral indicator when transitioning between scenarios and the unambiguous classification of levels based on the generalized Hamming distance to reference benchmarks. A prototype software application of the state cybersecurity assessment system was developed, providing automation of the collection of expert assessments, their processing, and visualization of results in the form of an integral level and criterion-based evaluations. The proposed approach can be used as a decision-support tool in the field of state cyber policy, strategic planning, and international cyberdiplomatic cooperation.</p> Svitlana Kazmirchuk, Volodymyr Shulha Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20768 Tue, 10 Feb 2026 00:00:00 +0200 GROUP STATE ROUTING PROTOCOL (MYCELIA): НОВА МОДЕЛЬ КООРДИНАЦІЇ РО-ЗПОДІЛЕНОЇ МЕРЕЖІ https://jrnl.nau.edu.ua/index.php/SBT/article/view/20240 <p>The following article is describing a new model of managing secure communication channels in a distributed environment with the aim of minimizing cryptographic windows and attack vectors based on traffic correlation analysis. In the contemporary world of digital interconnection, having the ability to preserve the confidentiality of the data exchange between multiple peers gains significant importance. A secure communication channel must provide meaningful guarantees of confidentiality, integrity, and availability of the data that is being transmitted as well as ensure minimized latencies due to security mechanism overhead.</p> <p>Existing solutions centered around Virtual Private Networks, mesh-like topologies, and relays share limitations in their ability to avoid traffic concentration points such as entry and public-facing nodes. Thus, it is possible for cryptanalysts to correlate traffic in some cases and potentially compromise the secrecy of communication. Hence, the proposed model aims to avoid such concentration points during traffic transmission by leveraging the capabilities of group routing and decentralized cluster state coordination based on the Replica State Discovery Protocol.</p> <p>A comparative analysis has been conducted to illustrate the difference in communication topologies between existing solutions and the proposed protocol. At the basis of this research is a theoretical analysis of the proposed model’s topology and methods used to facilitate the secure channels’ creation and traffic relay mechanisms. Mathematical modeling has been leveraged to formally describe the properties of the proposed protocol to further facilitate its integration into the modern communication systems.</p> <p>As a result, a model for a distributed management of secure communication channels has been developed and analyzed that reduces the likelihood of attacks based on traffic correlation and thus improves the confidentiality characteristics of the connection between participating peers. A new path routing method based on relay groups has been proposed as well as the traffic dispersion principles related to the outgoing traffic from the mesh network. Secondly, a method of distributed traffic dispersion and coordination has been developed based on the RSDP that allows for avoiding concentration of authority and thus lays the foundation for the decentralized version of building secure communication channels</p> Serhii Toliupa , Maksym Kotov Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20240 Tue, 10 Feb 2026 00:00:00 +0200 PYROLYSIS OF THE HYDROCARBON PART OF OIL SLUDGE FORMED AS A RESULT OF OIL REFINING https://jrnl.nau.edu.ua/index.php/SBT/article/view/20743 <p>The article proposes a method for obtaining motor fuel components by low-temperature pyrolysis of the hydrocarbon part of long-term storage oil sludge. The advantage of this method is the possibility of processing raw materials of any composition. For the research, oil sludges formed during oil processing at PJSC "Neftokhimik Prykarpattya" (Nadvirna, Ivano-Frankivsk region) were used. Sampling was carried out from a long-term storage pond at different depths. Then, using heat treatment methods with the addition of water, settling, filtering and drying, the organic (hydrocarbon) part was separated from the oil sludges. Based on the results of derivatographic analysis, it was established that the optimal temperature range for thermal destruction of the hydrocarbon part of oil sludges is 420-460°C. The pyrolysis process was carried out on a laboratory batch plant at a temperature of 440 °C, in a metal sealed reactor with a water cooler and a receiving flask. As a result of pyrolysis, liquid pyrocondensate, solid residue in the reactor and pyrolysis gases were obtained. The pyrocondensate was separated into narrow fractions – gasoline, diesel and residue – and their properties were studied to determine the directions of practical application. The gasoline fraction contains a high content of sulfur and unsaturated hydrocarbons, so it can be used as a component of commercial gasoline after hydrotreating and catalytic reforming. Similarly, the diesel fraction, after hydrotreating, is suitable for the production of commercial diesel fuel. The residue after distillation of pyrocondensate can serve as a component of fuel oil or an additive to plastic lubricants. The solid residue formed during pyrolysis is recommended for use in road construction for the arrangement of the lower layers of the road surface. Using X-ray fluorescence spectral analysis, it was established that the content of metals in the pyrocondensate, its fractions and the residue is quite low, which contributes to their further processing by catalytic processes. In the fractions of the studied pyrocondensate, an increase in the concentration of metals is observed with an increase in the boiling point of the fractions.</p> Oleg Grynyshyn , Yurii Znak Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20743 Tue, 10 Feb 2026 00:00:00 +0200 BIOCONVERSION OF CORN GRAIN COMPOUNDS TO OBTAIN BIOETHANOL https://jrnl.nau.edu.ua/index.php/SBT/article/view/20744 <p>The paper shows that starch-containing raw materials are one of the promising types of raw materials for bioethanol production due to the high conversion rate and yield of bioethanol. Currently, leading countries in the world are switching to the use of bioethanol and also use non-traditional raw materials for its production. Ukraine, due to agro-climatic conditions, is rich in the production of starch-containing raw materials. A significant proportion of grain raw materials is substandard (for example, substandard corn grain) and is not use for food purposes. Such raw materials are promising starch-containing raw materials for processing into bioethanol. Intensification of alcohol production has a number of technological solutions aimed at increasing the yield of alcohol, one of which is proteolysis. Many scientific studies have been devoted to the study of the issue of proteolysis, while the use of modern commercial enzyme preparations requires further development of this area. The studies used modern drugs that are common at alcohol enterprises. Studies have shown that the action of the proteolytic enzyme preparation softens the structure of the starch-protein matrix and intensifies its destruction during heating. This allows you to adjust the mash dilution mode by using proteolytic and amylolytic enzyme preparations, reduces the viscosity of the mash, reducing its value by 60.4%, compared to the mash in which there is no enzyme preparation. The use of proteolysis during saccharification contributed to the intensive accumulation of sugars, the reason for which is the synergism of the action of protease and glucoamylase preparations. It established that the quality indicators of the matured mash show the effectiveness of the use of the proteolytic enzyme preparation during the dilution of corn mash. In addition, adjusting the process of bioconversion of corn raw materials and significantly shorten the saccharification process. It has been proven that proteolysis improves the saccharification process and provides the wort with easily digestible nitrogen nutrition, the yeast generation process and increases the alcohol yield by 0.4 dal/t of raw material.</p> Volodymyr Khomichak, Inha Kuznіetsova, Sergii Oliynychuk, Olga Koval Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20744 Tue, 10 Feb 2026 00:00:00 +0200 USE OF SHYDLOVSKY, LANGMUR, MICHAELIS-MENTHEN EQUATIONS FOR CHARACTERISTICS OF MEDICINAL SUBSTANCES. https://jrnl.nau.edu.ua/index.php/SBT/article/view/20442 <p><strong><em>In the work based on experimental and simulated data, the issue of the reliability of determining the coefficients of the Shydlovsky, Langmuir, Michaelis-Menten equations for the characteristics of medicinal substances at small values ​​of independent variables is considered.</em></strong></p> <p><strong><em>The problem of determining the coefficients of Shydlovsky, Langmuir, Michaelis-Menten under different conditions of experimental experiments is identified and explained. The results of mathematical modeling of the kinetics of enzymatic catalysis and proposals for the choice of the substrate concentration interval are presented.</em></strong></p> <p><strong><em>It is established that for small values of independent variables of the equations of Shidlovsky, Langmuir, Michaelis-Menten, when determining the coefficients, it is necessary to take into account the presence of correlation between them. It is proved that for small values of independent variables of the equations of Shidlovsky, Langmuir, Michaelis-Menten, structural non-identity of parameters of mathematical models occurs.</em></strong></p> <p><strong><em>The analysis of the shape of the surface of the objective functions of the studied mathematical models indicates the presence of a canyon with an almost flat bottom, which complicates the calculations of reliable parameters of mathematical models</em></strong></p> <p><strong><em>The obtained experimental results from measurements of surface tension and adsorption confirm the possibility of structural non-identity of parameters of mathematical models.</em></strong></p> <p><strong><em>Further research will be aimed at studying and analyzing methods for obtaining reliable values ​​of parameters of mathematical models, which can be an important step in planning the conditions for conducting experimental experiments in chemistry and chemical technology of pharmaceuticals.</em></strong></p> <p><strong> </strong></p> Vitaliiy Chumak, Mariia Maksymiuk, Vira Rudenko, Olena Matvyeyeva, Igor Trofimov Copyright (c) 2025 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20442 Tue, 10 Feb 2026 00:00:00 +0200 STEGANOGRAPHIC TRANSFORMATION METHOD WITH DETECTION OF STRUCTURAL DEPENDEN-CIES OF VIDEO CONTAINERS https://jrnl.nau.edu.ua/index.php/SBT/article/view/18945 <p>transmitted from robotic complexes. For this, selective processing is used. However, the problematic issue here is that with the increase in the complexity of video images, the number of segments whose information requires protection increases. There are losses in the compression level. The main reason for this is the destruction of dependencies used in the process of reducing redundancy. Hence, the relevant scientific and applied problem is related to increasing the level of confidentiality of video information for robotic platforms with achieving the required level of processing time. The article considers two approaches to solving the problem. The first approach concerns improving the quality of selective processing of video images. Another option is to organize the protection of video information during its compression. An option here may be the use of steganographic transformations. The special properties of steganographic transformations are shown. Firstly, the use of steganographic methods in complex information protection systems allows to increase the level of information confidentiality. Secondly, steganographic methods have the potential to reduce the impact on the destruction of compression-important dependencies. The article considers several directions for building steganographic information protection methods. Cases of building containers based on video content are presented. It is indicated that the most practically tested is the implementation of steganographic information embedding using least significant bit (LSB) methods. However, under the conditions of the required level of steganographic capacity, compression level losses occur. Hence, it is important to create alternative technologies for steganographic information hiding to the LSB method. The article presents the development of a method of steganographic transformations by taking into account dependencies in the structural space based on the modification of the adaptive P-basis. The advantage of the created steganographic system over existing approaches in terms of steganographic capacity in the conditions of the required resistance to visual attacks (attacks on the detection of the fact of embedded messages) is proven.</p> Volodymyr Barannik, Rodion Prokopenko Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/18945 Tue, 10 Feb 2026 00:00:00 +0200 METHOD OF DECODING TRANSFORMANT COMPONENTS BY THE DIAGONAL-LOCATION FORMAT https://jrnl.nau.edu.ua/index.php/SBT/article/view/19047 <p>The article shows that the transmission of video data with increasing bit intensity is organized on the basis of infocommunication networks of the wireless segment. A characteristic feature of such types of network technologies is their limited performance in terms of data transmission speed. This forms a imbalance in the process of ensuring sufficient quality of video content. The cause of the imbalance is the insufficient level of data transmission speed in networks relative to the bit intensity of video data according to modern customer requirements. Localization of the insufficient level of data transmission speed is possible by applying technologies for limiting the bit intensity of the video stream. The main result regarding compression for these technologies is based on removing the amount of psychovisual redundancy. The consideration of psychovisual redundancy is implemented during: macro-formatting of video images; transforming the video image into the spectral domain; quantization of spectral coefficients. However, such transformations have signs of a lossy nature. This is the reason for the appearance of characteristic compression artifacts, which cause violations of the structural and semantic content and the nature of relationships between the components of video images. Therefore, the necessity of developing compression methods with the presence of mechanisms for restoring video data with the required level of semantic integrity is shown. For the purpose of improving compression technologies in the direction of ensuring the required level of compression under conditions of preserving compression properties, one can outline approaches based on developing compression processes with localization of the influence of the psychovisual component on achieving the level of video data compression. Among the implementations of the approach regarding reducing the influence of the amount of psychovisual redundancy on the level of compression is the coding method in the diagonal-spectral location format. At the same time, restoration processes for such code structures have an insufficient technological basis. A method has been developed for restoring video data in the location-diagonal format of transformed segments of the video image. This makes it possible to ensure the required level of semantic integrity of the restored video data in the truncated-positional basis without loss of compression properties under conditions of localizing the influence of the amount of removed psychovisual redundancy on the level of bit-volume reduction.</p> Volodymyr Barannik, Cyril Revva Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/19047 Tue, 10 Feb 2026 00:00:00 +0200 METHOD OF SEMANTIC SEGMENTATION OF VIDEO IMAGES USING U-NET NEURAL NETWORK https://jrnl.nau.edu.ua/index.php/SBT/article/view/19045 <p>In today's information environment, video information has become one of the most massive and valuable types of data. Surveillance cameras, mobile devices, drones and online platforms generate huge amounts of visual data every day, a significant part of which contains confidential or personal information. Traditional approaches to protection, such as full encryption of the video stream, provide a high level of security, but have significant limitations: they require significant computing resources, increase transmission delays and do not allow for effective real-time operation. The article considers the scientific and applied problem of selective protection of video information in conditions of limited computing resources, which is relevant for video surveillance systems, medical records and other areas where it is necessary to ensure the confidentiality of only critically important areas of the image. The purpose of the research is to create a software tool for dynamic identification and encryption of significant fragments of a video image using semantic segmentation methods and machine learning technologies. The proposed system is based on the architecture of the U-Net neural network, which allows to accurately identify areas requiring cryptographic protection and apply selective encryption to them. The Stanford Background dataset was used as an experimental basis, the test results confirm the effectiveness of the chosen approach. The presented methods can be integrated into practical systems with limited resources and increased requirements for performance and security.</p> Andrii Kostromytskyi, Valery Bezruk, Іgor Malinin, Artem Panchuk, Bohdan Breslavets Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/19045 Tue, 10 Feb 2026 00:00:00 +0200 METHOD OF EVALUATING RADIO-ELECTRONIC EQUIPMENT FAILURE RATES USING REFERENCE DATA https://jrnl.nau.edu.ua/index.php/SBT/article/view/20734 <p><em>Reliability indicators of radio-electronic equipment (probability of failure-free operation, mean time to failure, failure rate, and availability factor) are typically evaluated through tests or statistical analysis. However, under current conditions, when foreign-made dual-use technical systems with limited input information are used by the armed forces, it's impossible to properly assess their reliability. This article proposes a method for evaluating one of the reliability indicators of radio-electronic armament samples</em><em>-</em><em>the failure rate</em><em>-</em><em>based on reference data.</em></p> <p><em>The relevance of the work is due to the widespread use of foreign</em><em>-</em><em>made technical systems and dual</em><em>-</em><em>use samples in the armed forces. Such systems have the following characteristics: they have been stored in warehouses for a long time; they come with limited technical documentation; and there is a lack of technical condition monitoring systems and evaluation methods. Moreover, in most cases, the manufacturer of such systems does not permit repairs to be carried out on the territory of another country. Therefore, the equipment user </em><em>(</em><em>maintenance personnel, engineering and technical staff</em><em>)</em><em> is forced to find ways to integrate the received equipment into the existing maintenance and repair system and to find ways to assess its reliability.</em></p> <p><em>The approach proposed in this work allows for obtaining a value for the failure rate (as one of the reliability indicators), which characterizes the failure-free property of radio</em><em>-</em><em>electronic equipment. The method helps to reduce the subjectivity of the reliability assessments obtained and is suitable for foreign-origin equipment supplied without information on manufacturing and testing conditions. The results can be applied in Ukraine's security and defense sector to integrate radio-electronic equipment into the adopted maintenance and repair system.</em></p> <p><em>An example is provided for calculating the failure rate of a hypothetical radio-electronic equipment unit containing various types of radio-electronic components </em><em>(</em><em>integrated circuits, resistors, capacitors</em><em>)</em><em> based on the MIL</em><em>-</em><em>HDBK</em><em>-</em><em>217 handbook.</em></p> Vasyl Kuzavkov, Anton Lanko Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20734 Tue, 10 Feb 2026 00:00:00 +0200 FROM SMS TO RCS: INTELLIGENT FRAMEWORKS FOR RESILIENT MESSAGING IN EMERGENCY SCENARIOS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20800 <p>The article investigates the transformation of mobile messaging technologies from the traditional Short Message Service (SMS) to the modern Rich Communication Services (RCS) within the context of 5G networks and emergency communications. The authors emphasize that, despite SMS remaining the cornerstone of public alerting systems due to its universality and compliance with regulatory requirements, it demonstrates technical limitations during high-load situations. RCS, in contrast, introduces enhanced user interactivity and multimedia capabilities but lacks mechanisms for guaranteed delivery under degraded network conditions.&nbsp;To overcome these challenges, the paper introduces two key concepts: the <strong>Intelligent Emergency Messaging Optimization Framework (IEMOF)</strong> and the <strong>Guaranteed Delivery Index (IGDP)</strong><strong>.</strong> IEMOF represents a multi-layer architecture that dynamically determines the optimal communication channel using real-time network and device data, while IGDP provides a quantitative metric for assessing delivery reliability based on probability, latency, and freshness of channel information. The methodology involves Monte Carlo simulations, analysis of empirical datasets from telecom operators and CPaaS platforms, and regression fitting to calibrate model parameters.&nbsp;Simulation results demonstrate that integrating SMS and RCS through intelligent fallback mechanisms significantly enhances delivery performance and resilience during emergencies. The study also outlines the importance of maintaining updated device and network capability maps to ensure accuracy of routing decisions. The authors conclude that the convergence of SMS and RCS, guided by intelligent frameworks like IEMOF and validated by IGDP metrics, forms the foundation for next-generation, adaptive, and user-centric public alert systems. The research provides practical recommendations for the future standardization of hybrid emergency communication protocols and their implementation within 5G infrastructures.</p> Mykhailo Odarchenko, Maksym Zaliskyi Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20800 Tue, 10 Feb 2026 00:00:00 +0200 FEATURES AND FIRST EXPERIENCE OF CALIBRATING W-BAND METEOROLOGICAL RADARS USING LASER DISDROMETER DATA https://jrnl.nau.edu.ua/index.php/SBT/article/view/20736 <p>Calibration of weather radars remains a significant challenge in radar meteorology when it comes to quantitative measurements. While traditional methods have proven themselves well for radars operating at centimeter wavelengths, the advent of millimeter-wave cloud radars, especially at W-band frequencies, poses unique calibration challenges. This is primarily due to the differences in the scattering of the sounding signal by hydrometeors, when the wavelength becomes of the same order as the diameters of the scatterers and instead of a simple Rayleigh model, it is necessary to switch to resonant scattering models. Another significant problem is the strong attenuation of millimeter waves in both precipitation and atmospheric gases. This work explores the numerous subtleties of W-band cloud radars and evaluates viable calibration strategies to ensure accurate measurements. The emphasis is on a calibration approach using disdrometer rain data, in particular the distribution of drops in both size and ground-level droplet velocity. Similar calibration approaches are expected for use in European W-band cloud radars that provide data to ACTRIS, a European research infrastructure dedicated to the observation of short-range atmospheric components such as aerosols, clouds and gases, and the study of their interactions. In this paper, synchronous data from a mobile weather station are used as additional information needed to implement algorithms for comparing and fusing radar and disdrometer data. Key aspects of the methodology are outlined, implemented in a research software tool, and demonstrated. This software tool has the potential to be extended to facilitate the comparison of additional Doppler moments and spectra using disdrometer and cloud radar inputs. Illustrative examples are provided demonstrating the capabilities of the software for comprehensive analysis of radar reflectivity, Doppler spectra, and other meteorological parameters, including their statistics, thereby improving the calibration process.</p> Felix Yanovsky, Oleksandr Pitertsev Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20736 Tue, 10 Feb 2026 00:00:00 +0200 INTELLIGENT NODE MANAGEMENT METHOD IN DISTRIBUTED TELECOMMUNICATION SYSTEMS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20737 <p>The article proposes an intelligent node management method in distributed telecommunication systems based on the integration of neural network prediction, adaptive optimization, and self-organized coordination in Fog/Edge environments. The purpose of the developed method is to enhance the resilience and scalability of control processes under conditions of dynamic load variation, delays, and possible node failures. The proposed approach, implemented as the SENTRY-L (Secure Neuro-predictive Risk-aware Leader) method, provides intelligent prediction of node stability, assessment of security risks, and asynchronous transfer of coordination authority without initiating centralized election procedures. A key feature of the method is the use of a neural network to model the behavior of nodes within a cluster, allowing prediction of each node’s state based on current parameters such as bandwidth, computational resources, latency, and energy consumption. This enables a shift from reactive to proactive control, where decisions on re-electing the coordinator are made before a failure occurs. Additionally, the Security-Scoring Hub (SSH) generates a risk index and a trust matrix between nodes, integrating security directly into the coordination algorithm. Experimental modeling demonstrated that the proposed method reduces the average coordinator failure response time by 27–35% compared to classical algorithms, decreases control traffic overhead by 18–22%, and maintains decision consistency levels of 0.94–0.97 even with packet loss up to 10%.</p> <p>Thus, the SENTRY-L method ensures efficient, secure, and adaptive node management in distributed telecommunication systems, combining prediction, optimization, and self-organization functions. Its implementation improves the scalability, adaptability, and resilience of next-generation Fog/Edge telecommunication networks, which is particularly relevant for applications in critical infrastructures, unmanned systems, and intelligent transport networks.</p> Pavlo Biеliaіev , Volodymyr Pastushenko Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20737 Tue, 10 Feb 2026 00:00:00 +0200 METHOD FOR OPTIMIZING COMPLEX SIGNAL ENSEMBLES IN COGNITIVE NETWORKS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20738 <p>The paper proposes a method for optimizing ensembles of complex signals in the time domain based on the integration of stochastic search with local nonlinear optimization. The method is aimed at reducing mutual signal correlation and equalizing the energy–spectral characteristics of the ensemble under conditions of stochastic uncertainty and interference in cognitive telecommunication networks. Unlike existing approaches that consider only linear models or static parameters, the proposed method implements a multistage adaptation of signal time intervals using stochastic search for global exploration of the solution space and local optimization (gradient descent and Levenberg–Marquardt algorithm) for fine-tuning parameters within the identified subregions.</p> <p>Analytical dependencies are developed for evaluating cross-correlation and energy indicators of the ensemble, ensuring a balance between interference immunity and ensemble volume. The signal permutation mechanism between time intervals has been improved through the introduction of a modified superfactorial that incorporates weighting coefficients of intervals and correlation constraints, allowing minimization of mutual interference without reducing structural diversity.</p> <p>Experimental modeling on LTE and 5G NR signals demonstrated that increasing the number of time segments from 0 to 16 reduces the average mutual correlation coefficient from 0.42 to 0.08, which corresponds to quasi-orthogonality conditions (ε ≈ 0.1). The use of local optimization improved ensemble stability under varying environmental parameters, while the modified permutation procedure reduced correlation peaks by up to 27%.</p> <p>Thus, the proposed method provides comprehensive optimization of complex signal ensembles by combining the advantages of stochastic and deterministic approaches, making it suitable for application in adaptive telecommunication environments with multiple access and dynamic channels.</p> Oleksandr Veklych , Oleksandr Drobyk Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20738 Tue, 10 Feb 2026 00:00:00 +0200 TIME-DOMAIN FORMATION OF SIGNAL ENSEMBLES USING LPT-SEQUENCES https://jrnl.nau.edu.ua/index.php/SBT/article/view/20739 <p>The article proposes a method for forming signal ensembles in the time domain based on LPT-sequences, aimed at improving scalability, reducing mutual signal correlation, and ensuring uniform energy distribution within the ensemble. The proposed approach relies on deterministic permutations of time intervals generated using LPT-sequences, which provide uniform coverage of the time-permutation space while preserving the structural diversity of signals. A key feature of the method is the combination of properties of low-discrepancy uniformly distributed sequences with the principles of time-domain signal decomposition, which allows the formation of ensembles with improved correlation metrics without reducing their volume or energy stability. Unlike known energy-based or stochastic methods, the LPT-sequence-based approach ensures a controlled structure of time-segment permutations, enabling the minimization of mutual interference and the stabilization of the ensemble’s internal organization as its size increases. Analytical dependencies have been derived to assess the scalability and cross-correlation characteristics of ensembles formed using LPT-permutations, and a comparative simulation with the energy-based S<sub>h-energy</sub> method has been conducted. The results show that the average ensemble volume generated using LPT-permutations exceeds that of the Sh-energy method by an average of 6.8%, with the gain ranging from ≈3.8% at P = 100 to ≈9.7% at P = 2089. This confirms the high scalability of the method and its ability to generate a larger number of unique admissible signals without deterioration of correlation properties. Thus, the LPT-permutation method achieves an optimal balance between deterministic signal structure and a low level of mutual correlation. Its deterministic nature ensures uniform coverage of the time-permutation space, allowing the formation of signal ensembles 6–10% larger than those produced by existing methods while simultaneously reducing mutual correlation by approximately 20–25%. The obtained results confirm the effectiveness of using LPT-permutations for generating ensembles of complex signals in cognitive telecommunication systems.</p> Ihor Tulenko , Oleksii Komar Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20739 Tue, 10 Feb 2026 00:00:00 +0200 METHOD OF TIME PERMUTATIONS BASED ON MARKOV MODELS https://jrnl.nau.edu.ua/index.php/SBT/article/view/20740 <p>The paper proposes a Markov-based permutation method designed to optimize ensembles of complex signals in the time domain under conditions of interference and stochastic uncertainty. The distinctive feature of the method is a forecast-oriented selection of time-segment permutations, implemented through Markov modeling of state transitions within the signal ensemble. Unlike conventional approaches that rely only on the current correlation level, the proposed method incorporates the predicted ensemble dynamics, allowing minimization of the risk of transition to highly correlated states and maintaining the temporal stability of signal structures. Within the developed framework, a set of candidate permutations in the time domain is generated, for each of which the expected value of the predicted correlation and the entropy-based uncertainty measure are calculated. The integral optimality criterion provides a comprehensive assessment of the energy balance and structural-temporal coherence of the ensemble. Introducing the uncertainty coefficient β enables adaptive control of the trade-off between decorrelation speed and ensemble stability: at β ≈ 0,15, the number of state transitions decreases by about 60 % with minimal loss in forecast accuracy. Experimental studies performed for broadband communication signals with a sampling frequency of 10 MHz demonstrated a reduction of the average mutual correlation coefficient from 0,496 to 0,272 (≈ 45 %) and an improvement of the integrated side-lobe level (ISL) by ≈ 3 dB. The spectral flatness measure (SFM) increased from 0,67 to 0,83, confirming improved structural organization and temporal alignment of the ensemble. It was shown that algorithmic convergence is achieved within 10–12 iterations. Thus, the developed method ensures adaptive minimization of mutual correlation, stabilization of energy parameters, and enhancement of interference immunity of complex signal ensembles. The obtained results confirm the effectiveness of the proposed approach for application in cognitive telecommunication environments with multiple access and dynamically varying transmission conditions.</p> Oleksii Shevchenko , Volodymyr Lysechko Copyright (c) 2026 Science-based technologies https://jrnl.nau.edu.ua/index.php/SBT/article/view/20740 Tue, 10 Feb 2026 00:00:00 +0200