https://apcssm.vnu.edu.ua/index.php/conf/issue/feed INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF COMPUTER SCIENCES, SOFTWARE MODELING AND SECURITY OF DIGITAL SYSTEMS 2024-06-10T11:32:03+00:00 голова оргкомітету Віталій Булатецький computer.science@vnu.edu.ua Open Journal Systems <p>The purpose of the conference is the exchange of scientific ideas and consideration of new research results in the field of computer science, mathematical modeling, system analysis, software engineering, cyber security, formation of priority directions for further research on the considered problems, establishment of business contacts between specialists.</p> https://apcssm.vnu.edu.ua/index.php/conf/article/view/77 SIMULATION OF SYNCHRONOUS PARALLEL PROCESSES OF A METAL CUTTING SECTION 2024-06-04T12:05:09+00:00 Lyubov Krestyanpol lkrestyanpol@gmail.com <p><em>Any production process consists of separate, but interconnected by a certain sequence of elements: reserve, workplace, workplace operation, work process. Using these elements, their parameters and establishing connections between them, it is possible to construct process models of various complexity. It is most convenient when creating a simulation model to replace each element graphically and use a block diagram. The article deals with the methodology of preparing models of production system objects for simulation modeling of synchronous parallel processes.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/112 ONE CASE OF A PROGNOSTIC MODEL WITH USING SERIES OF LOGISTIC REGRESSIONS 2024-06-05T20:06:59+00:00 Tetyana Mamchych tetyana.mamchych@gmail.com Anna Yushchuk tetyana.mamchych@gmail.com Ivan Mamchych tetyana.mamchych@gmail.com <p><em>The approach with using series of logistic regressions to improve the quality of prognostic model is presented.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/74 ON SOME METHODS FOR SOLVING THE RENDERING EQUATION 2024-06-04T08:03:49+00:00 Dmytro Yelisieiev Yelisieiev.Dmytro@vnu.edu.ua <p style="margin-bottom: 0cm; text-align: justify; text-indent: 1.0cm;"><em><span lang="UK" style="color: black;">This work is dedicated to reviewing the main methods for solving the rendering equation. In particular, it examines direct calculation methods and ray tracing-based methods.</span></em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/102 THE APPLICATION OF CELLULAR AUTOMATA IN STUDYING THE DYNAMICS OF INTERACTION BETWEEN IMMUNE CELLS AND PATHOGENS 2024-06-05T11:45:42+00:00 Roman Kutsenko fant9119@gmail.com <p><em>This paper aims at providing a survey on the problems that can be addressed by cellular automata in immunology. Some of the authors have proposed algorithms for immunology-related problems, but still it is a virgin field for the research. Especially if to talk about combination of cellular automata powered with Marchuk-Petrov model.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/75 BOUNDARY ELEMENT METHOD FOR SOLUTION OF SPATIAL THERMOELASTICITY PROBLEMS FOR QUASICRYSTAL SOLIDS 2024-06-04T08:15:17+00:00 Vitalii Kozelko kozelko.vitalii@vnu.edu.ua Iaroslav Pasternak iaroslav.pasternak@vnu.edu.ua <p><em>This study presents a solid approach for boundary element solution of 3D thermoelasticity problems for quasicrystal solids containing cracks and thin soft inclusions.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/94 EXPLORATION OF LLM AGENTS FOR AUTOMATING THE REST API DOCUMENTATION FOR MICROSERVICES 2024-06-04T20:45:50+00:00 Oleh Chaplia oleh.y.chaplia@lpnu.ua Halyna Klym halyna.i.klym@lpnu.ua <div> <p><em><span lang="EN-US">This research paper explores LLM agents for automated documentation creation for microservices and a self-validated approach based on a set of LLM agents. A set of LLM agents is a microsystem whose primary purpose is to analyze the API endpoints, prepare documentation, write tests, and validate itself. A prototype for this approach was developed and tested. The results provide a foundation for optimizing microservices' development time and costs.</span></em></p> </div> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/33 DEVELOPMENT OF METHODS AND SOFTWARE TOOLS FOR RESPONDING TO THE EMOTIONAL STATE OF USERS 2024-05-22T19:02:56+00:00 Dmytro Kotlyarchuk ratatyu9898@gmail.com Halyna Chernovolyk lina2433@gmail.com <p><em>The development of methods and software tools for responding to the emotional state of users using neural networks is an important tool for improving human-computer interaction. These technologies help automate the analysis of emotions, which can improve the quality of service in various fields, including psychological support, education, and marketing.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/49 ORGANIZATION OF ROLES AND PERMISSIONS SCHEME FOR USERS IN THE DEVELOPMENT OF A WEB APPLICATION FOR EVALUATING THE PERFORMANCE OF RETAIL PHARMACY NETWORKS AT WHOLESALE PRICES 2024-05-31T11:18:03+00:00 Serhii Semeniuk krsh_2@ukr.net Ihor Tretiak krsh_2@ukr.net Alina Tretiak krsh_2@ukr.net <p><em>To ensure effective functioning and management of geographically distributed operational points of the retail network, a system with defined employee roles was developed: employee, regional curator (controller), office manager, administrator, super-administrator. With this role-based permission structure, the evaluation system for the retail network of wholesale-priced pharmacies can ensure efficient operation, providing accurate and structured accounting of all business process aspects. Clearly defining the roles and responsibilities of each user will facilitate a rational distribution of duties, improving coordination and increasing management efficiency. This approach will allow the system to respond promptly to market changes, ensuring flexibility and competitiveness of the retail pharmacy network in the modern pharmaceutical environment.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/117 TITLE 2024-06-07T09:58:08+00:00 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/39 CYBER SECURITY ANALYSIS OF THE SOFTWARE OF THE COMPUTER SYSTEM OF NPP MANAGEMENT 2024-05-29T11:46:06+00:00 Borys Vintenko boris.vintenko@gmail.com Oleksii Smirnov dr.smirnovoa@gmail.com Tetiana Smirnova sm.tetyana@gmail.com <p><em>This work is devoted to the detailing of measures to ensure the investigated aspects of cyber security, as well as the description of the sequence of actions that are proposed to ensure the cyber security of new software of a computer control system during the development and assessment of the compliance of the software of existing computer control systems with the requirements of cyber security.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/30 ANALYSIS AND EXAMPLES OF INFORMATION ATTACKS IN TELEGRAM MESSENGER 2024-05-20T14:36:53+00:00 Lyudmyla Glynchuk lydmilaglin@ukr.net <p><em>Theses focus attention on informational attacks in Telegram. Some informational messages were selected and their identification as belonging to informational attacks was analyzed.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/56 THE METHOD OF SELF-ORGANIZATION OF INFORMATION NETWORKS IN THE CONDITIONS OF THE COMPLEX INFLUENCE OF DESTABILIZING FACTORS 2024-06-01T13:04:19+00:00 Svitlana Kashkevych svitlana.kashkevych@npp.nau.edu.ua <div class="w-full text-token-text-primary" dir="auto" data-testid="conversation-turn-92" data-scroll-anchor="false"> <div class="py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5"> <div class="mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]"> <div class="group/conversation-turn relative flex w-full min-w-0 flex-col"> <div class="flex-col gap-1 md:gap-3"> <div class="flex flex-grow flex-col max-w-full"> <div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3" dir="auto" data-message-author-role="user" data-message-id="aaa2c79f-182e-4a4e-9753-28579bebd317"> <div class="relative max-w-[70%]"><em>The sequence of actions of the self-organization method of information networks under the complex influence of destabilizing factors with the use of artificial intelligence, which would allow you to increase the efficiency of the decisions made regarding the management of self-organization parameters of information networks with a given reliability.</em></div> </div> </div> <div class="mt-1 flex gap-3 empty:hidden juice:mr-1 juice:flex-row-reverse"> <div class="-ml-1 mt-0 flex h-7 items-center justify-center gap-[2px] self-end text-gray-400 lg:justify-start lg:self-center visible">&nbsp;</div> </div> </div> </div> </div> </div> </div> <div class="w-full text-token-text-primary" dir="auto" data-testid="conversation-turn-93" data-scroll-anchor="true"> <div class="py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5"> <div class="mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]"> <div class="flex-shrink-0 flex flex-col relative items-end"> <div> <div class="pt-0.5 juice:pt-0"> <div class="gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full juice:h-8 juice:w-8"> <div class="relative p-1 rounded-sm flex items-center justify-center bg-token-main-surface-primary text-token-text-primary h-6 w-6">&nbsp;</div> </div> </div> </div> </div> </div> </div> </div> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/111 TRENDS OF CYBERSECURITY THREATES 2024-06-05T17:34:52+00:00 Pavlo Kindrat pavlo.kindrat@rshu.edu.ua <p><em>The innovative changes that occurred in 2022-23 have significantly shifted the focus of cybersecurity threats, which is evidenced by the statistics on the emergence and realization of information security threats. To successfully counter information threats in the future, it is essential to understand the causes and trends in the development of cyberspace.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/78 THE CONCEPT OF STREAM ENCRYPTION BASED ON TWO QUASIGROUPS 2024-06-04T12:40:54+00:00 Halyna Krainichuk (Shelepalo) kraynichuk@ukr.net Bohdan Zagyrnyak bohdan_2512@ukr.net Bohdan Mykytchenko 04-20-005.stud@vntu.vn.ua <p><em>The article proposes the new approach to streaming encryption based on a recursive pseudorandom sequence generator constructed from two binary quasigroups. The encryption/decryption algorithm is presented.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/65 SERVICES TO PROTECT AGAINST DDOS ATTACKS 2024-06-03T16:54:38+00:00 Roman Stetsyk romanstetsyk06@gmail.com Vitalii Nosov romanstetsyk06@gmail.com <p><em>This work examines the most popular services for protection against DDoS attacks</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/90 ZERO TRUST EVALUATION METHODOLOGY 2024-06-04T18:20:01+00:00 Kateryna Novosad Novosad.Kateryna2022@vnu.edu.ua Volodymyr Harashchenko bulatetska.lesya@vnu.edu.ua <p><em>This work examines the methodologies for Zero Trust assessment, which include risk analysis to assess current threats and vulnerabilities and the use of metrics to assess performance. </em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/70 ANALISYS OF WAYS TO ENSURE ANONYMITY IN CRYPTOCURRENCY TRANSACTIONS 2024-06-04T04:54:42+00:00 Yulia Kamienieva yuliakameneva371@gmail.com Nina Zdolbitska zhyharevych.oksana@vnu.edu.ua <p><em>T</em><em>his work presents an analysis of ways to ensure anonymity in cryptocurrency transactions. The research was conducted with the aim of anonymity during transactions with cryptocurrency, which is desired by the population to protect their personal privacy.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/61 SOFTWARE IMPLEMENTATION OF SOME STEGANOGRAPHY MODELS FOR HIDING CONFIDENTIAL INFORMATION IN GRAPHIC FILES 2024-06-02T19:57:46+00:00 Bohdan Butkevych bodia.butik@gmail.com <p><em>This research is devoted to the development of a software application to support the technology of steganographic protection of information. The developed StegoProg application provides sufficiently reliable protection of information based on LSB (Least Significant Bit), DCT (Discrete Cosine Transform), PVD (Pixel Value Differencing) methods for hiding confidential data in graphic files. The application is developed using the Python programming language.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/120 MAIN TYPES OF CYBER ATTACKS AND OPERATIONS IN THE CYBER WAR IN UKRAINE 2024-06-10T11:32:03+00:00 Oleksandr Kapys bulatetska.lesya@vnu.edu.ua <p><em>Based on the data from CERT-UA (the Governmental Computer Emergency Response Team of Ukraine), the following types of cyber operations used in the war against Ukraine have been analyzed and identified: destructive attacks, disruptive attacks, weaponization of personal data, and disinformation.</em></p> 2024-06-10T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/110 MODELING SYSTEMS WITH PASSWORDLESS AUTHENTICATION BASED ON INDUSTRY STANDARDS 2024-06-05T17:27:03+00:00 Yuriy Tarnavskyi ann271101@gmail.com Anna Diak ann271101@gmail.com <p><em>Modeling systems with passwordless authentication based on FIDO2/WebAuthn, NIST SP 800-63, and OAuth 2.0 standards significantly enhances security and convenience for users. Passwordless methods eliminate the vulnerabilities of traditional passwords. Utilizing these standards allows for the creation of robust authentication systems that meet modern cybersecurity requirements.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/82 FEATURES OF ELECTROMAGNETIC FIELD SHIELDING FOR PROTECTION AGAINST INFORMATION LEAKAGE THROUGH EME CHANNELS 2024-06-04T16:51:59+00:00 Oleksii Martyniuk alosamartinuk@gmail.com Volodymyr Garashchenko alosamartinuk@gmail.com <p><em>This report the fundamental principles of electromagnetic fields, the key types of shielding and their constructions, the materials used, and the effectiveness of different shielding methods. Additionally, it explores the practical applications of these shielding techniques in various industries, the current standards, and future trends in electromagnetic compatibility. Implementing these measures is essential to ensure the resilience and continuous safe operation of electronic systems, protecting sensitive information from potential breaches.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/64 VLAN HOPPING ATTACKS 2024-06-03T13:20:34+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Bogdan Korolov bogdankorolov97@gmail.com <p><em>VLAN hopping is an attack method allowing a host in one VLAN to access traffic in other VLANs. The two main techniques are switch spoofing and double tagging. Switch spoofing involves emulating a trunking switch to access multiple VLANs. Double tagging involves adding two VLAN tags to a frame to bypass VLAN isolation. Proper switch port configuration can mitigate these attacks.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/95 DEVELOPMENT AND RESEARCH OF A SYSTEM FOR THE ANALYSIS OF CRYPTOGRAPHIC PROTOCOLS 2024-06-04T20:35:12+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Maxim Ohochtyi maximohotchyi@gmail.com Ivanna Shukalovych zhyharevych.oksana@vnu.edu.ua <p><em>In this work, a software tool for generating and analyzing cryptographic protocols has been developed.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/81 METHODOLOGY FOR PROTECTING CONFIDENTIAL INFORMATION IN ORACLE DATABASES FROM SQL ATTACKS 2024-06-04T13:49:27+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Anna Dombrovska annadombrovska2004@gmail.com <p><em>This article explores safeguarding information confidentiality in Oracle databases from SQL attacks, stressing the need for effective protection measures amid increasing cyber threats.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/93 STUDY OF METHODS OF PROTECTING THE INFORMATION RESOURCES OF THE ENTERPRISE USING CLOUD TECHNOLOGIES 2024-06-04T20:13:52+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Valentyna Skalova zhyharevych.oksana@vnu.edu.ua Dmytro Tsiupiashchuk weuron12340@gmail.com <p><em>This paper examines the methods of protecting the company's information resources when using cloud technologies. The purpose of the study is to analyze the effectiveness of existing protection methods and develop recommendations for increasing the level of information security. The work examines modern threats and risks associated with the use of cloud environments, such as unauthorized access, data leakage, malicious attacks and software vulnerabilities</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/36 INFINIDAT. SOLUTIONS FOR DATA STORAGE SYSTEMS 2024-05-27T08:29:18+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Valentyna Shylan shilan2015n@gmail.com <p><em>Data storage systems are critical for modern enterprises, as they provide secure storage and quick access to a large amount of information that supports the efficiency of business processes. They also guarantee business continuity by enabling quick data recovery in the event of disruptions or disasters. This enables companies to meet service level requirements and comply with regulatory standards.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/87 SYNTHESIS OF A DECISION-MAKING SUPPORT SYSTEM FOR ASSESSING THREATS TO THE INFORMATION SECURITY OF AN ENTERPRISE 2024-06-04T17:49:42+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Vasyl Shlapa vasylshlapa1904@gmail.com <p><em>In today's dynamic and interconnected world, information security (IS) has become paramount for enterprises of all sizes. The ever-evolving landscape of cyber threats poses a significant challenge to organizations, demanding robust and adaptable security measures. A decision support system (DSS) specifically designed for assessing IS threats can serve as a valuable tool for enterprises seeking to enhance their cybersecurity posture.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/101 SUBLIME SECURITY INTEGRATION FOR BUSINESS 2024-06-05T07:11:03+00:00 Viktoriia Sydorenko viktoriia.sydorenko@npp.nau.edu.ua Oksana Zhyharevych Zhyharevych.Oksana@vnu.edu.ua Volodymyr Yablonskyi volodymyryablonskyi@gamil.com <p>Sublime Security is a modern email security solution that uses programmable rules and artificial intelligence to detect and block a variety of threats. The platform integrates with popular email services such as Microsoft 365, Google Workspace, and IMAP, providing protection against phishing, business electronic compromise (BEC), and malware.</p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/100 INTEGRATION OF CISCO UMBRELLA IN THE FACULTY NETWORK 2024-06-05T12:32:30+00:00 Vadym Yablonskyi vadymyablonskyi@gmail.com Volodymyr Harashchenko Harashchenko.Volodymyr@vnu.edu.ua <p style="margin: 0cm; text-align: justify; text-indent: 1.0cm;"><em>The process of integrating Cisco Umbrella into the network of the Faculty of Information Technology and Mathematics at Lesya Ukrainka Volyn National University is presented by configuring the network gateway and local DNS server to use Cisco Umbrella DNS servers.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/116 CYBERSECURITY AND AWARENESS OF CRITICAL INFORMATION INFRASTRUCTURE PERSONNEL ON PROTECTION AGAINST CYBER THREATS 2024-06-07T07:42:00+00:00 Oksana Zhyharevych zhyharevych.oksana@vnu.edu.ua Sofiia Lapchuk zhyharevych.oksana@vnu.edu.ua <p><em>The article examines the theoretical and methodological aspects of cyber security of critical information infrastructure enterprises, the classification of cyber threats and requirements for the formation of a protection system.&nbsp;&nbsp; Analysis of the potential of personnel in the context of countering cybercrime and the development of recommendations for increasing the awareness and competence of employees.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/107 PROBLEMATIC ISSUES ARISING IN THE CONDUCT OF ART STUDIES ON OBJECTS CONTAINING EROTIC AND PORNOGRAPHIC CONTENT IN SOCIAL MEDIA ON THE WORLD WIDE WEB «INTERNET» 2024-06-05T16:39:54+00:00 Mykhailo Kravchuk mikewoolf@online.ua <div class="flex flex-grow flex-col max-w-full"> <div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3" dir="auto" data-message-author-role="assistant" data-message-id="ee61e3f6-fd25-473e-b34d-10d32872e1e4"> <div class="markdown prose w-full break-words dark:prose-invert dark"> <p><em>The article examines the methodology of forensic art expert analysis of pornographic material. The concept of pornography is defined as the vulgar, naturalistic, cynical, and obscene depiction of sexual acts and the display of genitals, which offends human honor and dignity and incites unworthy instincts. Pornographic material includes any tangible objects, printed matter, photographs, and videos that contain detailed depictions of sexual acts or pornographic content.</em></p> </div> </div> </div> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/118 ARTIFICIAL INTELLIGENCE AS A CYBERATTACK TOOL AND CYBERSECURITY 2024-06-07T13:23:49+00:00 Yuriy Kaun yustask@gmail.com Oksana Sobchuk oksobchuk@gmail.com <p><em>The report discusses the possibilities of using artificial intelligence tools to create fakes, malware, phishing emails, and possible ways to combat them.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/114 PROTECTION OF COMPUTER SYSTEMS 2024-06-06T07:48:28+00:00 Andrii Yatsiuk yatsyuk.svitlana@vnu.edu.ua Serhiy Muzychuk yatsyuk.svitlana@vnu.edu.ua Svitlana Yatsiuk yatsyuk.svitlana@vnu.edu.ua <p><em>The main directions of information protection in computer systems, including technical, organizational, and legal aspects, have been studied.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/69 STRUCTURAL AND TOPOLOGICAL FEATURES OF THE DESIGN OF PULSE-TO-NUMBER FUNCTIONAL CONVERTERS WITH VARIABLE BIT RATE, TAKING INTO ACCOUNT THEIR SPEED 2024-06-04T05:00:13+00:00 Roman Baran roman.d.baran@lpnu.ua <p><em>The paper proposes a certain sequence of performance evaluation of number-pulse functional converters (</em><em>NPFC)</em><em> with variable bit rate. Requirements for the criteria to ensure the optimal speed of the NPFC with variable bit rate are also formulated.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/80 DEVELOPMENT OF INDOOR AIR QUALITY MONITORING SYSTEM USING ARDUINO UNO AND MULTIFUNCTIONAL SENSORS 2024-06-04T13:27:45+00:00 Ivan Rudavskyi ivan2001rud@gmail.com Halyna Klym ivan2001rud@gmail.com <p><em>This research introduces an indoor air quality monitoring system based on the Arduino Uno microcontroller. The system is enhanced with a moving average filter and incorporates data fusion techniques from two multifunctional sensors. The primary innovation of this system lies in its capability to process and integrate data from multiple sensors, ensuring high accuracy and reliability in indoor air quality (IAQ) evaluations. Comprehensive testing and empirical analysis were performed in various residential environments to validate the system's performance. The outcomes demonstrate that the system furnishes real-time and precise insights into the air quality. This investigation makes a substantial contribution to the field by presenting an effective solution for air quality monitoring. It employs state-of-the-art sensor technology and advanced data processing techniques to enhance the indoor living conditions.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/92 EXPERIMENTAL STUDIES OF OPEN-SOURCE 5G NETWORK PERFORMANCE 2024-06-05T04:21:42+00:00 Alla Pinchuk pinchuk.ad87@gmail.com Roman Odarchenko odarchenko.r.s@ukr.net <p><em>The deployment of 5G network testbeds based on open-source solutions becomes more popular among telcom engineers around the world. Such deployments can bring a lot of opportunities for further research in 5G network direction. The aim of this paper is to provide results of 5G testbed performance testing based on open-source projects, in particular OpenAirInterface5G end-to-end solution.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/79 STATE MANAGEMENT APPROACHES IN MICRO-FRONTEND COMMUNICATIONS 2024-06-04T12:44:19+00:00 Oleksandr Stepanov oleksandr.v.stepanov@lpnu.ua Halyna Klym oleksandr.v.stepanov@lpnu.ua <p><em>Suggested combine mixed approaches for effective state management in micro-frontends, maintain local state within each micro-frontend to ensure modularity and independence; implement an event-driven approach for managing shared state and facilitating inter-frontend communication; and utilize Module Federation to share common utilities and state management logic across micro-frontends, thereby combining the strengths of each method to create a scalable, efficient, and maintainable micro-frontend architecture.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/60 MATHEMATICAL MODEL OF MODIFIED REAL-TIME OBSTACLE AVOIDANCE METHOD BASED ON LAPLACE ARTIFICIAL POTENTIAL FIELD 2024-06-02T14:23:31+00:00 Ihor Berizka ihor.berizka@lnu.edu.ua Ivan Karbovnyk ihor.berizka@lnu.edu.ua <p><em>In this report we provide a brief overview of the family of modified obstacle avoidance methods based on classic approach which was introduced by O. Khatib in 1984. The main idea of method is in calculation of 3 fields: attractive (drives robot towards target locations), repulsive (generated by obstacles to repel robot away) and total field. </em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/54 METHODS OF HIGH-EFFICIENCY DATA PROCESSING IN ORACLE USING TABLE AND INDEX PARTITIONING 2024-05-31T16:48:12+00:00 Anastasiia Omelchuk bulatetska.lesya@vnu.edu.ua Anna Yuzva bulatetska.lesya@vnu.edu.ua Lesіa Bulatetska bulatetska.lesya@vnu.edu.ua <p><em>Table partitioning in databases is an important method for improving system productivity and reliability. The need for table partitioning is driven by increasing data volumes in the database. Partitioning allows large tables to be divided into smaller, more manageable parts, improving query efficiency, speeding up response times, and simplifying data administration.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/85 INDOOR POSITIONING WITH MOBILE IMAGE RECOGNITION AND BLE 2024-06-04T17:16:35+00:00 Tadei-Nazarii Kalynchuk tadejj@ukr.net Dmytro Myroniuk tadejj@ukr.net Ivan Karbovnyk tadejj@ukr.net <p><em>An experimental system is presented that allows for the recognition of objects in images using neural networks on microcomputers and the determination of the distance to objects using Bluetooth Low Energy signals. The advantages and disadvantages of the presented system are described.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/109 RESEARCH OF THE OPERATION OF AUTOMATIC SYSTEMS USING THE BOX – BEHNKEN DESIGN 2024-06-05T17:14:22+00:00 Oleksandr Burban sashaboorban@gmail.com Roman Demediuk sashaboorban@gmail.com <p><em>The influence of physical and technological parameters on the operation of the automatic system with sound control was investigated. The experiment according to the Box-Behnken design method was planned.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/108 ARTIFICIAL INTELLIGENCE SYSTEM DESIGN WITH MICROSOFT AZURE QUANTUM 2024-06-05T16:55:05+00:00 Yevhen Bershchankyi yevhen.v.bershchanskyi@lpnu.ua Halyna Klym yevhen.v.bershchanskyi@lpnu.ua <div class="flex-shrink-0 flex flex-col relative items-end"> <div> <div class="pt-0.5 juice:pt-0"> <div class="gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full juice:h-8 juice:w-8"><em>The integration of artificial intelligence (AI) with quantum computing offers transformative capabilities for solving complex problems. This article explores AI system design using Microsoft Azure Quantum, a leading quantum computing platform. Also, review of quantum computing fundamentals, AI principles, and Azure Quantum's features. This work aims to guide in leveraging Azure Quantum for advanced AI system design.</em></div> </div> </div> </div> <div class="group/conversation-turn relative flex w-full min-w-0 flex-col agent-turn"> <div class="font-semibold select-none"> </div> </div> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/59 DEVELOPMENT OF USER INTERFACE OF BUSINESS AND ENTERPRISE MANAGEMENT APPLICATION USING UX LAWS 2024-06-02T12:25:53+00:00 Nazarii Bolibrukh bolibruhnazar@gmail.com <p><em>Striving for optimal and efficient user communication with the software is an important aspect of providing an intuitive and easy-to-use interface. In a world where efficiency and user satisfaction are important, creating these types of interfaces becomes a priority. Applying the laws of UX when designing interfaces allows us to achieve a high level of usability, which helps reduce the time spent on tasks and increase overall productivity.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/44 SDEPLOYMENT OF LMS MOODLE BASED ON ORACLE VIRTUALBOX WITH VPN SUPPORT 2024-05-30T09:45:32+00:00 Vitalii Bulatetskyi bulatetsky.vitaly@vnu.edu.ua Lesіa Bulatetska bulatetska.lesya@vnu.edu.ua Yulia Pavlenko pavlenko.yulya@vnu.edu.ua <p><em>Analyzed ways to simplify the use of the Moodle system and created a portable package based on Oracle VirtualBox for use in a local network and remotely via VPN. Outlined approaches for creating a specialized interface for managing this package. This package was tested in real-world conditions.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/63 ALGORITHM FOR GENERATING MATHEMATICAL FORMULAS USING A BINARY TREE 2024-06-03T11:28:34+00:00 Tetiana Hryshanovych Hryshanovych.Tatiana@vnu.edu.ua <p style="margin-bottom: 0cm; text-align: justify; text-indent: 1.0cm;"><em><span style="color: black;">This work is dedicated to generating mathematical formulas using the "binary tree" data structure. An algorithm for such generation has been developed, and a class has been implemented that saves information and generates text using its own method.</span></em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/68 WEB-ORIENTED PLATFORM FOR MANAGEMENT OF SOFTWARE DEVELOPMENT PROJECTS 2024-06-03T20:27:56+00:00 Yurii Halushka Halushka.Yurii2020@vnu.edu.ua <p><em>Development of a web resource for project management. Built in C# and Blazor, it integrates MSSQL Server for data storage and JWT tokens for security. Users can create accounts, manage projects, set deadlines and monitor progress. In essence, it effectively meets the basic needs of project management.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/50 REPETITIONS OF ELEMENTS OF NOISY DIGITAL IMAGES 2024-05-31T13:56:08+00:00 Oleksii Kravchuk oleksii.kravchuk@lnu.edu.ua Ivan Dovhan oleksii.kravchuk@lnu.edu.ua Oleh Kushnir oleh.kushnir@lnu.edu.ua <p><em>Шляхом експериментальних досліджень низки цифрових зображень виявлено, що насичене значення повторюваності v<sub>0</sub> при великих t є наближено монотонною функцією відсотку білого шуму на зображеннях. Взаємозв’язок повторюваності v<sub>0</sub> у зображеннях і частки білого шуму на них дає змогу використати параметр v<sub>0</sub> як своєрідну метрику шуму і цим запропонувати новий метод встановлення співвідношення між інформативною та шумовою складовою зображень.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/28 PASSWORD MANAGER DEVELOPMENT USING REACT.JS AND NESTJS 2024-05-09T13:10:02+00:00 Stanislav Pastushok stan3slaw@gmail.com <p><em>This article describes the relevance of online password managers as a means of storing passwords. The purpose of this work is to develop a password manager using modern methods. The result is a web service with functionality for creating and storing passwords.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/51 ANALYSIS OF DEEP NEURAL NETWORKS USING FOURIER TRANSFORM 2024-05-31T14:19:20+00:00 Oleksandr Tymoshchuk sashatymoshchuk07@gmail.com Petro Yanchuk janchukp@ukr.net <p><em>Deep neural networks (DNNs) have become an important tool in various fields of science and technology due to their ability to recognize complex patterns and find hidden relationships in large volumes of data. However, understanding the inner workings of these models remains a challenge. This thesis examines the application of the Fourier transform to analyze the internal structure and behavior of deep neural networks.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/115 USING UI KIT AND DESIGN SYSTEMS IN USER INTERFACE DESIGN 2024-06-06T08:51:33+00:00 Yulia Pavlenko pavlenko.yulya@vnu.edu.ua <p><em>The main characteristics of UI Kit and design systems, the necessity of their creation when designing and developing various types of software are presented.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/89 SENTIMENT ANALYSIS OF TEXT USING BERT AND DISTILBERT MODELS 2024-06-04T18:20:10+00:00 Marianna Prytula mariannapritula@gmail.com Igor Olenych iolenych@gmail.com <p><em>The work describes the fine-tuning </em><em>of BERT and DistilBERT pre-trained transformer models for the binary sentiment classification of user comments in the Ukrainian language. The models </em><em>were evaluated according to accuracy, precision, recall, and F1-score metrics. An overall accuracy of 91% obtained for both models demonstrates the significant potential of incorporating these models into sentiment analysis tasks.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/62 ANALYSIS OF THE EFFICIENCY OF CLUSTERIZATION SYSTEMS 2024-06-03T08:11:10+00:00 Ihor Koval aspirant_kovalja@lntu.edu.ua <p><em>Аnalysis of the performance of clustering systems includes the selection of appropriate metrics, comparison of different algorithms, and assessment of the stability of the results. This allows you to draw reasonable conclusions about the quality of clustering for a specific data set and task.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/55 ANALYSIS OF CUSTOMERS USING FUZZY SEGMENTATION 2024-06-01T12:50:23+00:00 Pavlo Melnyk pashamelnik@gmail.com Kateryna Melnyk ekaterinamelnik@gmail.com Svitlana Lavrenchuk s.lavrenchuk@lntu.edu.ua <p><em>The article substantiates the relevance of using machine learning methods for customer base segmentation. Classical and fuzzy clustering methods are compared and advantages and disadvantages of these methods are investigated.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/53 MODEL OF ELECTROMECHANICAL ENCRYPTION MACHINE ENIGMA 2024-05-31T15:57:31+00:00 Mykola Holovin ninaholovina@gmail.com Nina Holovina ninaholovina@gmail.com Dmytro Huzachov ninaholovina@gmail.com <p><em>A visual model of encryption and decryption with the Enigma code using ordinary two-dimensional tables is presented. This original visual application can be used when studying a related topic in data encryption. The presented visual model can also be interesting as a conceptual precursor to a software implementation of the Enigma electromechanical encryption machine model in a university cryptography or programming course.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/38 ANALYSIS OF THE SELENIUM TOOL AND ITS ROLE IN TEST AUTOMATION 2024-05-28T13:07:43+00:00 Denys Skoryk skoden2002@gmail.com <p align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;"><em>Automated testing is an integral part of the modern software development process, ensuring efficiency and product quality. Selenium, one of the most popular tools for automated testing, is widely used for testing web applications. This thesis examines the capabilities and features of Selenium, as well as its advantages and the challenges developers face when using this tool.</em></span></span></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/43 ANALYSIS OF LOCALIZATIONS AND ADAPTATIONS OF GAMES IN UKRAINIAN 2024-05-30T09:02:48+00:00 Illia Denys illuhsa.denys@gmail.com <p><em>This work explores the necessity of creating and adapting games to meet the cultural and societal needs of Ukrainian users, especially in the context of modern technology and the current war in Ukraine. The research highlights the importance of developing games that support the Ukrainian language, fostering a positive informational environment and promoting linguistic and cultural identity.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/41 DEVELOPMENT AND IMPLEMENTATION OF AN ANDROID - APPLICATION FOR THE GENERATION OF MATHEMATICAL EXAMPLES IN THE KOTLIN PROGRAMMING LANGUAGE 2024-05-29T21:19:08+00:00 Yaroslav Lytvynchuk pavloprybuletc@gmail.com <p><em><span style="font-weight: 400;">The work is aimed at the development and implementation of an Android application for generating mathematical examples using the Kotlin programming language. The application provides quick and efficient creation of various tasks for learning mathematics based on user-defined parameters. The use of advanced Android application development technologies and programming methods will ensure the creation of a convenient and intuitive interface. The result is an innovative tool that helps improve the process of learning mathematics on mobile devices.</span></em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/57 AUTOMATION OF THE PROCESS OF SENDING LETTERS USING COMMON POSTAL SERVICES 2024-06-01T15:02:47+00:00 Nazarii Manoilo man.nazar2003@gmail.com Vitalii Bulatetskyi bulatetsky.vitaly@vnu.edu.ua <p><em>Досліджено процес створення програмного забезпечення для реалізації автоматизованого надсилання листів з використанням можливостей поширених поштових сервісів. Проаналізовано вимоги до подібних програмних розробок.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/72 GAMBLING NETWORK APPLICATIONS RESEARCH AND DEVELOPMENT 2024-06-04T06:45:13+00:00 Vladyslav Malashchuk vladmal28@gmail.com <p><em>The process of creating software in the field of online gambling was studied. The most popular igaming applications were analyzed and the mechanics of one well-known game were reproduced.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/40 FEATURES OF USING THE SFML LIBRARY FOR VISUALIZING ALGORITHMS 2024-05-29T13:34:19+00:00 Petro Shepeliuk shepeliuk.petro2020@vnu.edu.ua <p><em>This paper discusses the features of using the SFML library to visualize algorithms. The main advantages of SFML are described, such as ease of use, flexibility and cross-platform. Examples of using the library to visualize sorting algorithms, find paths, and work with trees are given. Compare the capabilities of SFML with other popular libraries such as SDL, OpenGL, and Qt. The stages of creating visualizations, as well as methods for optimizing performance, are discussed</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/71 "PIECE BY PIECE" – ГРА НА ОСНОВІ ЗМІШУВАННЯ ЖАНРІВ 2024-06-04T06:45:29+00:00 Mykola Vozniak mikola.v.2016@gmail.com <p><em>The </em><em>computer</em><em> game “Piece by Piece” is a puzzle arcade game with strategy elements. The main goal of the game is to form a certain structure on the playing field according to the provided sample by</em><em> gradually joining the periodically appearing fragments. The player has a constant movement and can change its direction. Successful completion of the level occurs when building a structure identical to the sample. There are various obstacles and bonuses. </em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/32 DATA STORAGE ORGANIZATION IN THE DEVELOPMENT OF MOBILE APPLICATIONS FOR ONLINE STORE 2024-05-21T10:42:08+00:00 Bohdan Nazar bulatetska.lesia2023@vnu.edu.ua Lesіa Bulatetska bulatetska.lesya@vnu.edu.ua <p><em>The selection of tools for organizing data storage in the development of a mobile application for automating retail processes has been discussed. The combination of SQLite with RoomDatabase for local data storage and Firebase Realtime Database for real-time synchronization creates a reliable and efficient architecture for such an application.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/91 USING SPECTRAL ANALYSIS TO BUILD A FUNCTIONAL TUNER 2024-06-05T15:19:16+00:00 Volodymyr Markitan Markitan.Volodymyr2020@vnu.edu.ua <p><em>A software application has been developed that provides real-time analysis of the incoming audio signal, determines the frequency of the played note, and compares it with standard note frequencies. The Hann window function and noise suppression techniques have been applied to enhance the accuracy of the analysis.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/48 LOCALIZATION IN REACT NATIVE APPLICATIONS 2024-05-31T10:45:59+00:00 Kateryna Plodnik plodnikate@gmail.com <p><em>Mobile app localization is a comprehensive process that adapts an application to the specific linguistic, cultural, and technical requirements of different global markets, involving more than just translation but also the customization of content, design, and functionality. Various tools, assist developers in implementing these changes effectively, ensuring that apps meet the diverse needs of international users.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/84 DEVELOPMENT OF A MOBILE SOLUTION FOR THE ANALYSIS OF PERSONAL FINANCIAL EXPENSES 2024-06-04T16:56:04+00:00 Mykola Rasik kolyarasik20@gmail.com <p><em>The "FinanceTracker" application offers a comprehensive toolkit for keeping track of expenses and their analysis. A convenient and intuitive interface, as well as a wide range of functions, expense accounting, creating reports in the form of charts and reliable data storage.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024 https://apcssm.vnu.edu.ua/index.php/conf/article/view/58 ANALYSIS OF DOMAIN NAME AND IP ADDRESS SECURITY MONITORING TOOLS 2024-06-01T18:48:15+00:00 Anastasiia Omelchuk omelchuk.anastasiia2020@vnu.edu.ua Lesіa Bulatetska bulatetska.lesya@vnu.edu.ua <p><em>Collecting and analyzing data about domain names and IP addresses helps to detect cyber threats. A service like AbuseIPDB provides tools for this. Additionally, Shodan and VirusTotal allow for detecting hosts on the Internet and analyzing files for malware, enabling quick response to threats.</em></p> 2024-06-09T00:00:00+00:00 Copyright (c) 2024