https://apcssm.vnu.edu.ua/index.php/conf/issue/feedINTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF COMPUTER SCIENCES, SOFTWARE MODELING AND SECURITY OF DIGITAL SYSTEMS2024-06-10T11:32:03+00:00голова оргкомітету Віталій Булатецькийcomputer.science@vnu.edu.uaOpen Journal Systems<p>The purpose of the conference is the exchange of scientific ideas and consideration of new research results in the field of computer science, mathematical modeling, system analysis, software engineering, cyber security, formation of priority directions for further research on the considered problems, establishment of business contacts between specialists.</p>https://apcssm.vnu.edu.ua/index.php/conf/article/view/77SIMULATION OF SYNCHRONOUS PARALLEL PROCESSES OF A METAL CUTTING SECTION2024-06-04T12:05:09+00:00Lyubov Krestyanpol lkrestyanpol@gmail.com<p><em>Any production process consists of separate, but interconnected by a certain sequence of elements: reserve, workplace, workplace operation, work process. Using these elements, their parameters and establishing connections between them, it is possible to construct process models of various complexity. It is most convenient when creating a simulation model to replace each element graphically and use a block diagram. The article deals with the methodology of preparing models of production system objects for simulation modeling of synchronous parallel processes.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/112ONE CASE OF A PROGNOSTIC MODEL WITH USING SERIES OF LOGISTIC REGRESSIONS 2024-06-05T20:06:59+00:00Tetyana Mamchychtetyana.mamchych@gmail.comAnna Yushchuktetyana.mamchych@gmail.comIvan Mamchychtetyana.mamchych@gmail.com<p><em>The approach with using series of logistic regressions to improve the quality of prognostic model is presented.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/74ON SOME METHODS FOR SOLVING THE RENDERING EQUATION2024-06-04T08:03:49+00:00Dmytro YelisieievYelisieiev.Dmytro@vnu.edu.ua<p style="margin-bottom: 0cm; text-align: justify; text-indent: 1.0cm;"><em><span lang="UK" style="color: black;">This work is dedicated to reviewing the main methods for solving the rendering equation. In particular, it examines direct calculation methods and ray tracing-based methods.</span></em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/102THE APPLICATION OF CELLULAR AUTOMATA IN STUDYING THE DYNAMICS OF INTERACTION BETWEEN IMMUNE CELLS AND PATHOGENS2024-06-05T11:45:42+00:00Roman Kutsenkofant9119@gmail.com<p><em>This paper aims at providing a survey on the problems that can be addressed by cellular automata in immunology. Some of the authors have proposed algorithms for immunology-related problems, but still it is a virgin field for the research. Especially if to talk about combination of cellular automata powered with Marchuk-Petrov model.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/75BOUNDARY ELEMENT METHOD FOR SOLUTION OF SPATIAL THERMOELASTICITY PROBLEMS FOR QUASICRYSTAL SOLIDS2024-06-04T08:15:17+00:00Vitalii Kozelkokozelko.vitalii@vnu.edu.uaIaroslav Pasternakiaroslav.pasternak@vnu.edu.ua<p><em>This study presents a solid approach for boundary element solution of 3D thermoelasticity problems for quasicrystal solids containing cracks and thin soft inclusions.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/94EXPLORATION OF LLM AGENTS FOR AUTOMATING THE REST API DOCUMENTATION FOR MICROSERVICES2024-06-04T20:45:50+00:00Oleh Chapliaoleh.y.chaplia@lpnu.uaHalyna Klymhalyna.i.klym@lpnu.ua<div> <p><em><span lang="EN-US">This research paper explores LLM agents for automated documentation creation for microservices and a self-validated approach based on a set of LLM agents. A set of LLM agents is a microsystem whose primary purpose is to analyze the API endpoints, prepare documentation, write tests, and validate itself. A prototype for this approach was developed and tested. The results provide a foundation for optimizing microservices' development time and costs.</span></em></p> </div>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/33DEVELOPMENT OF METHODS AND SOFTWARE TOOLS FOR RESPONDING TO THE EMOTIONAL STATE OF USERS2024-05-22T19:02:56+00:00Dmytro Kotlyarchukratatyu9898@gmail.comHalyna Chernovolyklina2433@gmail.com<p><em>The development of methods and software tools for responding to the emotional state of users using neural networks is an important tool for improving human-computer interaction. These technologies help automate the analysis of emotions, which can improve the quality of service in various fields, including psychological support, education, and marketing.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/49ORGANIZATION OF ROLES AND PERMISSIONS SCHEME FOR USERS IN THE DEVELOPMENT OF A WEB APPLICATION FOR EVALUATING THE PERFORMANCE OF RETAIL PHARMACY NETWORKS AT WHOLESALE PRICES2024-05-31T11:18:03+00:00Serhii Semeniukkrsh_2@ukr.netIhor Tretiakkrsh_2@ukr.netAlina Tretiakkrsh_2@ukr.net<p><em>To ensure effective functioning and management of geographically distributed operational points of the retail network, a system with defined employee roles was developed: employee, regional curator (controller), office manager, administrator, super-administrator. With this role-based permission structure, the evaluation system for the retail network of wholesale-priced pharmacies can ensure efficient operation, providing accurate and structured accounting of all business process aspects. Clearly defining the roles and responsibilities of each user will facilitate a rational distribution of duties, improving coordination and increasing management efficiency. This approach will allow the system to respond promptly to market changes, ensuring flexibility and competitiveness of the retail pharmacy network in the modern pharmaceutical environment.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/117TITLE2024-06-07T09:58:08+00:002024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/39CYBER SECURITY ANALYSIS OF THE SOFTWARE OF THE COMPUTER SYSTEM OF NPP MANAGEMENT2024-05-29T11:46:06+00:00Borys Vintenkoboris.vintenko@gmail.comOleksii Smirnovdr.smirnovoa@gmail.comTetiana Smirnovasm.tetyana@gmail.com<p><em>This work is devoted to the detailing of measures to ensure the investigated aspects of cyber security, as well as the description of the sequence of actions that are proposed to ensure the cyber security of new software of a computer control system during the development and assessment of the compliance of the software of existing computer control systems with the requirements of cyber security.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/30ANALYSIS AND EXAMPLES OF INFORMATION ATTACKS IN TELEGRAM MESSENGER2024-05-20T14:36:53+00:00Lyudmyla Glynchuklydmilaglin@ukr.net<p><em>Theses focus attention on informational attacks in Telegram. Some informational messages were selected and their identification as belonging to informational attacks was analyzed.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/56THE METHOD OF SELF-ORGANIZATION OF INFORMATION NETWORKS IN THE CONDITIONS OF THE COMPLEX INFLUENCE OF DESTABILIZING FACTORS2024-06-01T13:04:19+00:00Svitlana Kashkevychsvitlana.kashkevych@npp.nau.edu.ua<div class="w-full text-token-text-primary" dir="auto" data-testid="conversation-turn-92" data-scroll-anchor="false"> <div class="py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5"> <div class="mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]"> <div class="group/conversation-turn relative flex w-full min-w-0 flex-col"> <div class="flex-col gap-1 md:gap-3"> <div class="flex flex-grow flex-col max-w-full"> <div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3" dir="auto" data-message-author-role="user" data-message-id="aaa2c79f-182e-4a4e-9753-28579bebd317"> <div class="relative max-w-[70%]"><em>The sequence of actions of the self-organization method of information networks under the complex influence of destabilizing factors with the use of artificial intelligence, which would allow you to increase the efficiency of the decisions made regarding the management of self-organization parameters of information networks with a given reliability.</em></div> </div> </div> <div class="mt-1 flex gap-3 empty:hidden juice:mr-1 juice:flex-row-reverse"> <div class="-ml-1 mt-0 flex h-7 items-center justify-center gap-[2px] self-end text-gray-400 lg:justify-start lg:self-center visible"> </div> </div> </div> </div> </div> </div> </div> <div class="w-full text-token-text-primary" dir="auto" data-testid="conversation-turn-93" data-scroll-anchor="true"> <div class="py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5"> <div class="mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]"> <div class="flex-shrink-0 flex flex-col relative items-end"> <div> <div class="pt-0.5 juice:pt-0"> <div class="gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full juice:h-8 juice:w-8"> <div class="relative p-1 rounded-sm flex items-center justify-center bg-token-main-surface-primary text-token-text-primary h-6 w-6"> </div> </div> </div> </div> </div> </div> </div> </div>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/111TRENDS OF CYBERSECURITY THREATES2024-06-05T17:34:52+00:00Pavlo Kindratpavlo.kindrat@rshu.edu.ua<p><em>The innovative changes that occurred in 2022-23 have significantly shifted the focus of cybersecurity threats, which is evidenced by the statistics on the emergence and realization of information security threats. To successfully counter information threats in the future, it is essential to understand the causes and trends in the development of cyberspace.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/78THE CONCEPT OF STREAM ENCRYPTION BASED ON TWO QUASIGROUPS2024-06-04T12:40:54+00:00Halyna Krainichuk (Shelepalo)kraynichuk@ukr.netBohdan Zagyrnyakbohdan_2512@ukr.netBohdan Mykytchenko04-20-005.stud@vntu.vn.ua<p><em>The article proposes the new approach to streaming encryption based on a recursive pseudorandom sequence generator constructed from two binary quasigroups. The encryption/decryption algorithm is presented.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/65SERVICES TO PROTECT AGAINST DDOS ATTACKS 2024-06-03T16:54:38+00:00Roman Stetsykromanstetsyk06@gmail.comVitalii Nosovromanstetsyk06@gmail.com<p><em>This work examines the most popular services for protection against DDoS attacks</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/90ZERO TRUST EVALUATION METHODOLOGY2024-06-04T18:20:01+00:00Kateryna NovosadNovosad.Kateryna2022@vnu.edu.uaVolodymyr Harashchenkobulatetska.lesya@vnu.edu.ua<p><em>This work examines the methodologies for Zero Trust assessment, which include risk analysis to assess current threats and vulnerabilities and the use of metrics to assess performance. </em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/70ANALISYS OF WAYS TO ENSURE ANONYMITY IN CRYPTOCURRENCY TRANSACTIONS2024-06-04T04:54:42+00:00Yulia Kamienievayuliakameneva371@gmail.comNina Zdolbitskazhyharevych.oksana@vnu.edu.ua<p><em>T</em><em>his work presents an analysis of ways to ensure anonymity in cryptocurrency transactions. The research was conducted with the aim of anonymity during transactions with cryptocurrency, which is desired by the population to protect their personal privacy.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/61SOFTWARE IMPLEMENTATION OF SOME STEGANOGRAPHY MODELS FOR HIDING CONFIDENTIAL INFORMATION IN GRAPHIC FILES2024-06-02T19:57:46+00:00Bohdan Butkevychbodia.butik@gmail.com<p><em>This research is devoted to the development of a software application to support the technology of steganographic protection of information. The developed StegoProg application provides sufficiently reliable protection of information based on LSB (Least Significant Bit), DCT (Discrete Cosine Transform), PVD (Pixel Value Differencing) methods for hiding confidential data in graphic files. The application is developed using the Python programming language.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/120MAIN TYPES OF CYBER ATTACKS AND OPERATIONS IN THE CYBER WAR IN UKRAINE2024-06-10T11:32:03+00:00Oleksandr Kapysbulatetska.lesya@vnu.edu.ua<p><em>Based on the data from CERT-UA (the Governmental Computer Emergency Response Team of Ukraine), the following types of cyber operations used in the war against Ukraine have been analyzed and identified: destructive attacks, disruptive attacks, weaponization of personal data, and disinformation.</em></p>2024-06-10T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/110MODELING SYSTEMS WITH PASSWORDLESS AUTHENTICATION BASED ON INDUSTRY STANDARDS2024-06-05T17:27:03+00:00Yuriy Tarnavskyiann271101@gmail.comAnna Diakann271101@gmail.com<p><em>Modeling systems with passwordless authentication based on FIDO2/WebAuthn, NIST SP 800-63, and OAuth 2.0 standards significantly enhances security and convenience for users. Passwordless methods eliminate the vulnerabilities of traditional passwords. Utilizing these standards allows for the creation of robust authentication systems that meet modern cybersecurity requirements.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/82FEATURES OF ELECTROMAGNETIC FIELD SHIELDING FOR PROTECTION AGAINST INFORMATION LEAKAGE THROUGH EME CHANNELS2024-06-04T16:51:59+00:00Oleksii Martyniukalosamartinuk@gmail.comVolodymyr Garashchenkoalosamartinuk@gmail.com<p><em>This report the fundamental principles of electromagnetic fields, the key types of shielding and their constructions, the materials used, and the effectiveness of different shielding methods. Additionally, it explores the practical applications of these shielding techniques in various industries, the current standards, and future trends in electromagnetic compatibility. Implementing these measures is essential to ensure the resilience and continuous safe operation of electronic systems, protecting sensitive information from potential breaches.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/64VLAN HOPPING ATTACKS2024-06-03T13:20:34+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaBogdan Korolovbogdankorolov97@gmail.com<p><em>VLAN hopping is an attack method allowing a host in one VLAN to access traffic in other VLANs. The two main techniques are switch spoofing and double tagging. Switch spoofing involves emulating a trunking switch to access multiple VLANs. Double tagging involves adding two VLAN tags to a frame to bypass VLAN isolation. Proper switch port configuration can mitigate these attacks.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/95DEVELOPMENT AND RESEARCH OF A SYSTEM FOR THE ANALYSIS OF CRYPTOGRAPHIC PROTOCOLS2024-06-04T20:35:12+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaMaxim Ohochtyimaximohotchyi@gmail.comIvanna Shukalovychzhyharevych.oksana@vnu.edu.ua<p><em>In this work, a software tool for generating and analyzing cryptographic protocols has been developed.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/81METHODOLOGY FOR PROTECTING CONFIDENTIAL INFORMATION IN ORACLE DATABASES FROM SQL ATTACKS2024-06-04T13:49:27+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaAnna Dombrovskaannadombrovska2004@gmail.com<p><em>This article explores safeguarding information confidentiality in Oracle databases from SQL attacks, stressing the need for effective protection measures amid increasing cyber threats.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/93STUDY OF METHODS OF PROTECTING THE INFORMATION RESOURCES OF THE ENTERPRISE USING CLOUD TECHNOLOGIES2024-06-04T20:13:52+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaValentyna Skalovazhyharevych.oksana@vnu.edu.uaDmytro Tsiupiashchukweuron12340@gmail.com<p><em>This paper examines the methods of protecting the company's information resources when using cloud technologies. The purpose of the study is to analyze the effectiveness of existing protection methods and develop recommendations for increasing the level of information security. The work examines modern threats and risks associated with the use of cloud environments, such as unauthorized access, data leakage, malicious attacks and software vulnerabilities</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/36INFINIDAT. SOLUTIONS FOR DATA STORAGE SYSTEMS2024-05-27T08:29:18+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaValentyna Shylanshilan2015n@gmail.com<p><em>Data storage systems are critical for modern enterprises, as they provide secure storage and quick access to a large amount of information that supports the efficiency of business processes. They also guarantee business continuity by enabling quick data recovery in the event of disruptions or disasters. This enables companies to meet service level requirements and comply with regulatory standards.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/87SYNTHESIS OF A DECISION-MAKING SUPPORT SYSTEM FOR ASSESSING THREATS TO THE INFORMATION SECURITY OF AN ENTERPRISE2024-06-04T17:49:42+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaVasyl Shlapavasylshlapa1904@gmail.com<p><em>In today's dynamic and interconnected world, information security (IS) has become paramount for enterprises of all sizes. The ever-evolving landscape of cyber threats poses a significant challenge to organizations, demanding robust and adaptable security measures. A decision support system (DSS) specifically designed for assessing IS threats can serve as a valuable tool for enterprises seeking to enhance their cybersecurity posture.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/101SUBLIME SECURITY INTEGRATION FOR BUSINESS2024-06-05T07:11:03+00:00Viktoriia Sydorenkoviktoriia.sydorenko@npp.nau.edu.uaOksana ZhyharevychZhyharevych.Oksana@vnu.edu.uaVolodymyr Yablonskyivolodymyryablonskyi@gamil.com<p>Sublime Security is a modern email security solution that uses programmable rules and artificial intelligence to detect and block a variety of threats. The platform integrates with popular email services such as Microsoft 365, Google Workspace, and IMAP, providing protection against phishing, business electronic compromise (BEC), and malware.</p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/100INTEGRATION OF CISCO UMBRELLA IN THE FACULTY NETWORK2024-06-05T12:32:30+00:00Vadym Yablonskyivadymyablonskyi@gmail.comVolodymyr HarashchenkoHarashchenko.Volodymyr@vnu.edu.ua<p style="margin: 0cm; text-align: justify; text-indent: 1.0cm;"><em>The process of integrating Cisco Umbrella into the network of the Faculty of Information Technology and Mathematics at Lesya Ukrainka Volyn National University is presented by configuring the network gateway and local DNS server to use Cisco Umbrella DNS servers.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/116CYBERSECURITY AND AWARENESS OF CRITICAL INFORMATION INFRASTRUCTURE PERSONNEL ON PROTECTION AGAINST CYBER THREATS2024-06-07T07:42:00+00:00Oksana Zhyharevychzhyharevych.oksana@vnu.edu.uaSofiia Lapchukzhyharevych.oksana@vnu.edu.ua<p><em>The article examines the theoretical and methodological aspects of cyber security of critical information infrastructure enterprises, the classification of cyber threats and requirements for the formation of a protection system. Analysis of the potential of personnel in the context of countering cybercrime and the development of recommendations for increasing the awareness and competence of employees.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/107PROBLEMATIC ISSUES ARISING IN THE CONDUCT OF ART STUDIES ON OBJECTS CONTAINING EROTIC AND PORNOGRAPHIC CONTENT IN SOCIAL MEDIA ON THE WORLD WIDE WEB «INTERNET»2024-06-05T16:39:54+00:00Mykhailo Kravchukmikewoolf@online.ua<div class="flex flex-grow flex-col max-w-full"> <div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3" dir="auto" data-message-author-role="assistant" data-message-id="ee61e3f6-fd25-473e-b34d-10d32872e1e4"> <div class="markdown prose w-full break-words dark:prose-invert dark"> <p><em>The article examines the methodology of forensic art expert analysis of pornographic material. The concept of pornography is defined as the vulgar, naturalistic, cynical, and obscene depiction of sexual acts and the display of genitals, which offends human honor and dignity and incites unworthy instincts. Pornographic material includes any tangible objects, printed matter, photographs, and videos that contain detailed depictions of sexual acts or pornographic content.</em></p> </div> </div> </div>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/118ARTIFICIAL INTELLIGENCE AS A CYBERATTACK TOOL AND CYBERSECURITY2024-06-07T13:23:49+00:00Yuriy Kaunyustask@gmail.comOksana Sobchukoksobchuk@gmail.com<p><em>The report discusses the possibilities of using artificial intelligence tools to create fakes, malware, phishing emails, and possible ways to combat them.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/114PROTECTION OF COMPUTER SYSTEMS2024-06-06T07:48:28+00:00Andrii Yatsiukyatsyuk.svitlana@vnu.edu.uaSerhiy Muzychukyatsyuk.svitlana@vnu.edu.uaSvitlana Yatsiukyatsyuk.svitlana@vnu.edu.ua<p><em>The main directions of information protection in computer systems, including technical, organizational, and legal aspects, have been studied.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/69STRUCTURAL AND TOPOLOGICAL FEATURES OF THE DESIGN OF PULSE-TO-NUMBER FUNCTIONAL CONVERTERS WITH VARIABLE BIT RATE, TAKING INTO ACCOUNT THEIR SPEED2024-06-04T05:00:13+00:00Roman Baranroman.d.baran@lpnu.ua<p><em>The paper proposes a certain sequence of performance evaluation of number-pulse functional converters (</em><em>NPFC)</em><em> with variable bit rate. Requirements for the criteria to ensure the optimal speed of the NPFC with variable bit rate are also formulated.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/80DEVELOPMENT OF INDOOR AIR QUALITY MONITORING SYSTEM USING ARDUINO UNO AND MULTIFUNCTIONAL SENSORS2024-06-04T13:27:45+00:00Ivan Rudavskyiivan2001rud@gmail.comHalyna Klymivan2001rud@gmail.com<p><em>This research introduces an indoor air quality monitoring system based on the Arduino Uno microcontroller. The system is enhanced with a moving average filter and incorporates data fusion techniques from two multifunctional sensors. The primary innovation of this system lies in its capability to process and integrate data from multiple sensors, ensuring high accuracy and reliability in indoor air quality (IAQ) evaluations. Comprehensive testing and empirical analysis were performed in various residential environments to validate the system's performance. The outcomes demonstrate that the system furnishes real-time and precise insights into the air quality. This investigation makes a substantial contribution to the field by presenting an effective solution for air quality monitoring. It employs state-of-the-art sensor technology and advanced data processing techniques to enhance the indoor living conditions.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/92EXPERIMENTAL STUDIES OF OPEN-SOURCE 5G NETWORK PERFORMANCE2024-06-05T04:21:42+00:00Alla Pinchukpinchuk.ad87@gmail.comRoman Odarchenkoodarchenko.r.s@ukr.net<p><em>The deployment of 5G network testbeds based on open-source solutions becomes more popular among telcom engineers around the world. Such deployments can bring a lot of opportunities for further research in 5G network direction. The aim of this paper is to provide results of 5G testbed performance testing based on open-source projects, in particular OpenAirInterface5G end-to-end solution.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/79STATE MANAGEMENT APPROACHES IN MICRO-FRONTEND COMMUNICATIONS2024-06-04T12:44:19+00:00Oleksandr Stepanovoleksandr.v.stepanov@lpnu.uaHalyna Klymoleksandr.v.stepanov@lpnu.ua<p><em>Suggested combine mixed approaches for effective state management in micro-frontends, maintain local state within each micro-frontend to ensure modularity and independence; implement an event-driven approach for managing shared state and facilitating inter-frontend communication; and utilize Module Federation to share common utilities and state management logic across micro-frontends, thereby combining the strengths of each method to create a scalable, efficient, and maintainable micro-frontend architecture.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/60MATHEMATICAL MODEL OF MODIFIED REAL-TIME OBSTACLE AVOIDANCE METHOD BASED ON LAPLACE ARTIFICIAL POTENTIAL FIELD2024-06-02T14:23:31+00:00Ihor Berizkaihor.berizka@lnu.edu.uaIvan Karbovnykihor.berizka@lnu.edu.ua<p><em>In this report we provide a brief overview of the family of modified obstacle avoidance methods based on classic approach which was introduced by O. Khatib in 1984. The main idea of method is in calculation of 3 fields: attractive (drives robot towards target locations), repulsive (generated by obstacles to repel robot away) and total field. </em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/54METHODS OF HIGH-EFFICIENCY DATA PROCESSING IN ORACLE USING TABLE AND INDEX PARTITIONING2024-05-31T16:48:12+00:00Anastasiia Omelchukbulatetska.lesya@vnu.edu.uaAnna Yuzvabulatetska.lesya@vnu.edu.uaLesіa Bulatetskabulatetska.lesya@vnu.edu.ua<p><em>Table partitioning in databases is an important method for improving system productivity and reliability. The need for table partitioning is driven by increasing data volumes in the database. Partitioning allows large tables to be divided into smaller, more manageable parts, improving query efficiency, speeding up response times, and simplifying data administration.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/85INDOOR POSITIONING WITH MOBILE IMAGE RECOGNITION AND BLE2024-06-04T17:16:35+00:00Tadei-Nazarii Kalynchuktadejj@ukr.netDmytro Myroniuktadejj@ukr.netIvan Karbovnyktadejj@ukr.net<p><em>An experimental system is presented that allows for the recognition of objects in images using neural networks on microcomputers and the determination of the distance to objects using Bluetooth Low Energy signals. The advantages and disadvantages of the presented system are described.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/109RESEARCH OF THE OPERATION OF AUTOMATIC SYSTEMS USING THE BOX – BEHNKEN DESIGN2024-06-05T17:14:22+00:00Oleksandr Burbansashaboorban@gmail.comRoman Demediuksashaboorban@gmail.com<p><em>The influence of physical and technological parameters on the operation of the automatic system with sound control was investigated. The experiment according to the Box-Behnken design method was planned.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/108ARTIFICIAL INTELLIGENCE SYSTEM DESIGN WITH MICROSOFT AZURE QUANTUM2024-06-05T16:55:05+00:00Yevhen Bershchankyiyevhen.v.bershchanskyi@lpnu.uaHalyna Klymyevhen.v.bershchanskyi@lpnu.ua<div class="flex-shrink-0 flex flex-col relative items-end"> <div> <div class="pt-0.5 juice:pt-0"> <div class="gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full juice:h-8 juice:w-8"><em>The integration of artificial intelligence (AI) with quantum computing offers transformative capabilities for solving complex problems. This article explores AI system design using Microsoft Azure Quantum, a leading quantum computing platform. Also, review of quantum computing fundamentals, AI principles, and Azure Quantum's features. This work aims to guide in leveraging Azure Quantum for advanced AI system design.</em></div> </div> </div> </div> <div class="group/conversation-turn relative flex w-full min-w-0 flex-col agent-turn"> <div class="font-semibold select-none"> </div> </div>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/59DEVELOPMENT OF USER INTERFACE OF BUSINESS AND ENTERPRISE MANAGEMENT APPLICATION USING UX LAWS2024-06-02T12:25:53+00:00Nazarii Bolibrukhbolibruhnazar@gmail.com<p><em>Striving for optimal and efficient user communication with the software is an important aspect of providing an intuitive and easy-to-use interface. In a world where efficiency and user satisfaction are important, creating these types of interfaces becomes a priority. Applying the laws of UX when designing interfaces allows us to achieve a high level of usability, which helps reduce the time spent on tasks and increase overall productivity.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/44SDEPLOYMENT OF LMS MOODLE BASED ON ORACLE VIRTUALBOX WITH VPN SUPPORT2024-05-30T09:45:32+00:00Vitalii Bulatetskyibulatetsky.vitaly@vnu.edu.uaLesіa Bulatetskabulatetska.lesya@vnu.edu.uaYulia Pavlenkopavlenko.yulya@vnu.edu.ua<p><em>Analyzed ways to simplify the use of the Moodle system and created a portable package based on Oracle VirtualBox for use in a local network and remotely via VPN. Outlined approaches for creating a specialized interface for managing this package. This package was tested in real-world conditions.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/63ALGORITHM FOR GENERATING MATHEMATICAL FORMULAS USING A BINARY TREE2024-06-03T11:28:34+00:00Tetiana HryshanovychHryshanovych.Tatiana@vnu.edu.ua<p style="margin-bottom: 0cm; text-align: justify; text-indent: 1.0cm;"><em><span style="color: black;">This work is dedicated to generating mathematical formulas using the "binary tree" data structure. An algorithm for such generation has been developed, and a class has been implemented that saves information and generates text using its own method.</span></em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/68WEB-ORIENTED PLATFORM FOR MANAGEMENT OF SOFTWARE DEVELOPMENT PROJECTS2024-06-03T20:27:56+00:00Yurii HalushkaHalushka.Yurii2020@vnu.edu.ua<p><em>Development of a web resource for project management. Built in C# and Blazor, it integrates MSSQL Server for data storage and JWT tokens for security. Users can create accounts, manage projects, set deadlines and monitor progress. In essence, it effectively meets the basic needs of project management.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/50REPETITIONS OF ELEMENTS OF NOISY DIGITAL IMAGES2024-05-31T13:56:08+00:00Oleksii Kravchukoleksii.kravchuk@lnu.edu.uaIvan Dovhanoleksii.kravchuk@lnu.edu.uaOleh Kushniroleh.kushnir@lnu.edu.ua<p><em>Шляхом експериментальних досліджень низки цифрових зображень виявлено, що насичене значення повторюваності v<sub>0</sub> при великих t є наближено монотонною функцією відсотку білого шуму на зображеннях. Взаємозв’язок повторюваності v<sub>0</sub> у зображеннях і частки білого шуму на них дає змогу використати параметр v<sub>0</sub> як своєрідну метрику шуму і цим запропонувати новий метод встановлення співвідношення між інформативною та шумовою складовою зображень.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/28PASSWORD MANAGER DEVELOPMENT USING REACT.JS AND NESTJS2024-05-09T13:10:02+00:00Stanislav Pastushok stan3slaw@gmail.com<p><em>This article describes the relevance of online password managers as a means of storing passwords. The purpose of this work is to develop a password manager using modern methods. The result is a web service with functionality for creating and storing passwords.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/51ANALYSIS OF DEEP NEURAL NETWORKS USING FOURIER TRANSFORM2024-05-31T14:19:20+00:00Oleksandr Tymoshchuksashatymoshchuk07@gmail.comPetro Yanchukjanchukp@ukr.net<p><em>Deep neural networks (DNNs) have become an important tool in various fields of science and technology due to their ability to recognize complex patterns and find hidden relationships in large volumes of data. However, understanding the inner workings of these models remains a challenge. This thesis examines the application of the Fourier transform to analyze the internal structure and behavior of deep neural networks.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/115USING UI KIT AND DESIGN SYSTEMS IN USER INTERFACE DESIGN2024-06-06T08:51:33+00:00Yulia Pavlenkopavlenko.yulya@vnu.edu.ua<p><em>The main characteristics of UI Kit and design systems, the necessity of their creation when designing and developing various types of software are presented.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/89SENTIMENT ANALYSIS OF TEXT USING BERT AND DISTILBERT MODELS2024-06-04T18:20:10+00:00Marianna Prytulamariannapritula@gmail.comIgor Olenychiolenych@gmail.com<p><em>The work describes the fine-tuning </em><em>of BERT and DistilBERT pre-trained transformer models for the binary sentiment classification of user comments in the Ukrainian language. The models </em><em>were evaluated according to accuracy, precision, recall, and F1-score metrics. An overall accuracy of 91% obtained for both models demonstrates the significant potential of incorporating these models into sentiment analysis tasks.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/62ANALYSIS OF THE EFFICIENCY OF CLUSTERIZATION SYSTEMS2024-06-03T08:11:10+00:00Ihor Kovalaspirant_kovalja@lntu.edu.ua<p><em>Аnalysis of the performance of clustering systems includes the selection of appropriate metrics, comparison of different algorithms, and assessment of the stability of the results. This allows you to draw reasonable conclusions about the quality of clustering for a specific data set and task.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/55ANALYSIS OF CUSTOMERS USING FUZZY SEGMENTATION 2024-06-01T12:50:23+00:00Pavlo Melnykpashamelnik@gmail.comKateryna Melnykekaterinamelnik@gmail.comSvitlana Lavrenchuk s.lavrenchuk@lntu.edu.ua<p><em>The article substantiates the relevance of using machine learning methods for customer base segmentation. Classical and fuzzy clustering methods are compared and advantages and disadvantages of these methods are investigated.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/53MODEL OF ELECTROMECHANICAL ENCRYPTION MACHINE ENIGMA2024-05-31T15:57:31+00:00Mykola Holovinninaholovina@gmail.comNina Holovinaninaholovina@gmail.comDmytro Huzachovninaholovina@gmail.com<p><em>A visual model of encryption and decryption with the Enigma code using ordinary two-dimensional tables is presented. This original visual application can be used when studying a related topic in data encryption. The presented visual model can also be interesting as a conceptual precursor to a software implementation of the Enigma electromechanical encryption machine model in a university cryptography or programming course.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/38ANALYSIS OF THE SELENIUM TOOL AND ITS ROLE IN TEST AUTOMATION2024-05-28T13:07:43+00:00Denys Skorykskoden2002@gmail.com<p align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;"><em>Automated testing is an integral part of the modern software development process, ensuring efficiency and product quality. Selenium, one of the most popular tools for automated testing, is widely used for testing web applications. This thesis examines the capabilities and features of Selenium, as well as its advantages and the challenges developers face when using this tool.</em></span></span></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/43ANALYSIS OF LOCALIZATIONS AND ADAPTATIONS OF GAMES IN UKRAINIAN2024-05-30T09:02:48+00:00Illia Denys illuhsa.denys@gmail.com<p><em>This work explores the necessity of creating and adapting games to meet the cultural and societal needs of Ukrainian users, especially in the context of modern technology and the current war in Ukraine. The research highlights the importance of developing games that support the Ukrainian language, fostering a positive informational environment and promoting linguistic and cultural identity.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/41DEVELOPMENT AND IMPLEMENTATION OF AN ANDROID - APPLICATION FOR THE GENERATION OF MATHEMATICAL EXAMPLES IN THE KOTLIN PROGRAMMING LANGUAGE2024-05-29T21:19:08+00:00Yaroslav Lytvynchuk pavloprybuletc@gmail.com<p><em><span style="font-weight: 400;">The work is aimed at the development and implementation of an Android application for generating mathematical examples using the Kotlin programming language. The application provides quick and efficient creation of various tasks for learning mathematics based on user-defined parameters. The use of advanced Android application development technologies and programming methods will ensure the creation of a convenient and intuitive interface. The result is an innovative tool that helps improve the process of learning mathematics on mobile devices.</span></em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/57AUTOMATION OF THE PROCESS OF SENDING LETTERS USING COMMON POSTAL SERVICES2024-06-01T15:02:47+00:00Nazarii Manoiloman.nazar2003@gmail.comVitalii Bulatetskyibulatetsky.vitaly@vnu.edu.ua<p><em>Досліджено процес створення програмного забезпечення для реалізації автоматизованого надсилання листів з використанням можливостей поширених поштових сервісів. Проаналізовано вимоги до подібних програмних розробок.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/72GAMBLING NETWORK APPLICATIONS RESEARCH AND DEVELOPMENT2024-06-04T06:45:13+00:00Vladyslav Malashchukvladmal28@gmail.com<p><em>The process of creating software in the field of online gambling was studied. The most popular igaming applications were analyzed and the mechanics of one well-known game were reproduced.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/40FEATURES OF USING THE SFML LIBRARY FOR VISUALIZING ALGORITHMS2024-05-29T13:34:19+00:00Petro Shepeliuk shepeliuk.petro2020@vnu.edu.ua<p><em>This paper discusses the features of using the SFML library to visualize algorithms. The main advantages of SFML are described, such as ease of use, flexibility and cross-platform. Examples of using the library to visualize sorting algorithms, find paths, and work with trees are given. Compare the capabilities of SFML with other popular libraries such as SDL, OpenGL, and Qt. The stages of creating visualizations, as well as methods for optimizing performance, are discussed</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/71"PIECE BY PIECE" – ГРА НА ОСНОВІ ЗМІШУВАННЯ ЖАНРІВ2024-06-04T06:45:29+00:00Mykola Vozniakmikola.v.2016@gmail.com<p><em>The </em><em>computer</em><em> game “Piece by Piece” is a puzzle arcade game with strategy elements. The main goal of the game is to form a certain structure on the playing field according to the provided sample by</em><em> gradually joining the periodically appearing fragments. The player has a constant movement and can change its direction. Successful completion of the level occurs when building a structure identical to the sample. There are various obstacles and bonuses. </em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/32DATA STORAGE ORGANIZATION IN THE DEVELOPMENT OF MOBILE APPLICATIONS FOR ONLINE STORE2024-05-21T10:42:08+00:00Bohdan Nazarbulatetska.lesia2023@vnu.edu.uaLesіa Bulatetskabulatetska.lesya@vnu.edu.ua<p><em>The selection of tools for organizing data storage in the development of a mobile application for automating retail processes has been discussed. The combination of SQLite with RoomDatabase for local data storage and Firebase Realtime Database for real-time synchronization creates a reliable and efficient architecture for such an application.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/91USING SPECTRAL ANALYSIS TO BUILD A FUNCTIONAL TUNER2024-06-05T15:19:16+00:00Volodymyr MarkitanMarkitan.Volodymyr2020@vnu.edu.ua<p><em>A software application has been developed that provides real-time analysis of the incoming audio signal, determines the frequency of the played note, and compares it with standard note frequencies. The Hann window function and noise suppression techniques have been applied to enhance the accuracy of the analysis.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/48LOCALIZATION IN REACT NATIVE APPLICATIONS2024-05-31T10:45:59+00:00Kateryna Plodnikplodnikate@gmail.com<p><em>Mobile app localization is a comprehensive process that adapts an application to the specific linguistic, cultural, and technical requirements of different global markets, involving more than just translation but also the customization of content, design, and functionality. Various tools, assist developers in implementing these changes effectively, ensuring that apps meet the diverse needs of international users.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/84DEVELOPMENT OF A MOBILE SOLUTION FOR THE ANALYSIS OF PERSONAL FINANCIAL EXPENSES 2024-06-04T16:56:04+00:00Mykola Rasikkolyarasik20@gmail.com<p><em>The "FinanceTracker" application offers a comprehensive toolkit for keeping track of expenses and their analysis. A convenient and intuitive interface, as well as a wide range of functions, expense accounting, creating reports in the form of charts and reliable data storage.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/58ANALYSIS OF DOMAIN NAME AND IP ADDRESS SECURITY MONITORING TOOLS2024-06-01T18:48:15+00:00Anastasiia Omelchukomelchuk.anastasiia2020@vnu.edu.uaLesіa Bulatetskabulatetska.lesya@vnu.edu.ua<p><em>Collecting and analyzing data about domain names and IP addresses helps to detect cyber threats. A service like AbuseIPDB provides tools for this. Additionally, Shodan and VirusTotal allow for detecting hosts on the Internet and analyzing files for malware, enabling quick response to threats.</em></p>2024-06-09T00:00:00+00:00Copyright (c) 2024