INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF COMPUTER SCIENCES, SOFTWARE MODELING AND SECURITY OF DIGITAL SYSTEMS https://apcssm.vnu.edu.ua/index.php/conf <p>The purpose of the conference is the exchange of scientific ideas and consideration of new research results in the field of computer science, mathematical modeling, system analysis, software engineering, cyber security, formation of priority directions for further research on the considered problems, establishment of business contacts between specialists.</p> Волинський національний університет імені Лесі Українки uk-UA INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF COMPUTER SCIENCES, SOFTWARE MODELING AND SECURITY OF DIGITAL SYSTEMS SIMULATION OF SYNCHRONOUS PARALLEL PROCESSES OF A METAL CUTTING SECTION https://apcssm.vnu.edu.ua/index.php/conf/article/view/77 <p><em>Any production process consists of separate, but interconnected by a certain sequence of elements: reserve, workplace, workplace operation, work process. Using these elements, their parameters and establishing connections between them, it is possible to construct process models of various complexity. It is most convenient when creating a simulation model to replace each element graphically and use a block diagram. The article deals with the methodology of preparing models of production system objects for simulation modeling of synchronous parallel processes.</em></p> Lyubov Krestyanpol Copyright (c) 2024 2024-06-09 2024-06-09 4 5 ONE CASE OF A PROGNOSTIC MODEL WITH USING SERIES OF LOGISTIC REGRESSIONS https://apcssm.vnu.edu.ua/index.php/conf/article/view/112 <p><em>The approach with using series of logistic regressions to improve the quality of prognostic model is presented.</em></p> Tetyana Mamchych Anna Yushchuk Ivan Mamchych Copyright (c) 2024 2024-06-09 2024-06-09 6 6 ON SOME METHODS FOR SOLVING THE RENDERING EQUATION https://apcssm.vnu.edu.ua/index.php/conf/article/view/74 <p style="margin-bottom: 0cm; text-align: justify; text-indent: 1.0cm;"><em><span lang="UK" style="color: black;">This work is dedicated to reviewing the main methods for solving the rendering equation. In particular, it examines direct calculation methods and ray tracing-based methods.</span></em></p> Dmytro Yelisieiev Copyright (c) 2024 2024-06-09 2024-06-09 7 7 THE APPLICATION OF CELLULAR AUTOMATA IN STUDYING THE DYNAMICS OF INTERACTION BETWEEN IMMUNE CELLS AND PATHOGENS https://apcssm.vnu.edu.ua/index.php/conf/article/view/102 <p><em>This paper aims at providing a survey on the problems that can be addressed by cellular automata in immunology. Some of the authors have proposed algorithms for immunology-related problems, but still it is a virgin field for the research. Especially if to talk about combination of cellular automata powered with Marchuk-Petrov model.</em></p> Roman Kutsenko Copyright (c) 2024 2024-06-09 2024-06-09 8 8 BOUNDARY ELEMENT METHOD FOR SOLUTION OF SPATIAL THERMOELASTICITY PROBLEMS FOR QUASICRYSTAL SOLIDS https://apcssm.vnu.edu.ua/index.php/conf/article/view/75 <p><em>This study presents a solid approach for boundary element solution of 3D thermoelasticity problems for quasicrystal solids containing cracks and thin soft inclusions.</em></p> Vitalii Kozelko Iaroslav Pasternak Copyright (c) 2024 2024-06-09 2024-06-09 9 9 EXPLORATION OF LLM AGENTS FOR AUTOMATING THE REST API DOCUMENTATION FOR MICROSERVICES https://apcssm.vnu.edu.ua/index.php/conf/article/view/94 <div> <p><em><span lang="EN-US">This research paper explores LLM agents for automated documentation creation for microservices and a self-validated approach based on a set of LLM agents. A set of LLM agents is a microsystem whose primary purpose is to analyze the API endpoints, prepare documentation, write tests, and validate itself. A prototype for this approach was developed and tested. The results provide a foundation for optimizing microservices' development time and costs.</span></em></p> </div> Oleh Chaplia Halyna Klym Copyright (c) 2024 2024-06-09 2024-06-09 10 10 DEVELOPMENT OF METHODS AND SOFTWARE TOOLS FOR RESPONDING TO THE EMOTIONAL STATE OF USERS https://apcssm.vnu.edu.ua/index.php/conf/article/view/33 <p><em>The development of methods and software tools for responding to the emotional state of users using neural networks is an important tool for improving human-computer interaction. These technologies help automate the analysis of emotions, which can improve the quality of service in various fields, including psychological support, education, and marketing.</em></p> Dmytro Kotlyarchuk Halyna Chernovolyk Copyright (c) 2024 2024-06-09 2024-06-09 11 12 ORGANIZATION OF ROLES AND PERMISSIONS SCHEME FOR USERS IN THE DEVELOPMENT OF A WEB APPLICATION FOR EVALUATING THE PERFORMANCE OF RETAIL PHARMACY NETWORKS AT WHOLESALE PRICES https://apcssm.vnu.edu.ua/index.php/conf/article/view/49 <p><em>To ensure effective functioning and management of geographically distributed operational points of the retail network, a system with defined employee roles was developed: employee, regional curator (controller), office manager, administrator, super-administrator. With this role-based permission structure, the evaluation system for the retail network of wholesale-priced pharmacies can ensure efficient operation, providing accurate and structured accounting of all business process aspects. Clearly defining the roles and responsibilities of each user will facilitate a rational distribution of duties, improving coordination and increasing management efficiency. This approach will allow the system to respond promptly to market changes, ensuring flexibility and competitiveness of the retail pharmacy network in the modern pharmaceutical environment.</em></p> Serhii Semeniuk Ihor Tretiak Alina Tretiak Copyright (c) 2024 2024-06-09 2024-06-09 13 14 TITLE https://apcssm.vnu.edu.ua/index.php/conf/article/view/117 Copyright (c) 2024 2024-06-09 2024-06-09 CYBER SECURITY ANALYSIS OF THE SOFTWARE OF THE COMPUTER SYSTEM OF NPP MANAGEMENT https://apcssm.vnu.edu.ua/index.php/conf/article/view/39 <p><em>This work is devoted to the detailing of measures to ensure the investigated aspects of cyber security, as well as the description of the sequence of actions that are proposed to ensure the cyber security of new software of a computer control system during the development and assessment of the compliance of the software of existing computer control systems with the requirements of cyber security.</em></p> Borys Vintenko Oleksii Smirnov Tetiana Smirnova Copyright (c) 2024 2024-06-09 2024-06-09 15 15 ANALYSIS AND EXAMPLES OF INFORMATION ATTACKS IN TELEGRAM MESSENGER https://apcssm.vnu.edu.ua/index.php/conf/article/view/30 <p><em>Theses focus attention on informational attacks in Telegram. Some informational messages were selected and their identification as belonging to informational attacks was analyzed.</em></p> Lyudmyla Glynchuk Copyright (c) 2024 2024-06-09 2024-06-09 16 16 THE METHOD OF SELF-ORGANIZATION OF INFORMATION NETWORKS IN THE CONDITIONS OF THE COMPLEX INFLUENCE OF DESTABILIZING FACTORS https://apcssm.vnu.edu.ua/index.php/conf/article/view/56 <div class="w-full text-token-text-primary" dir="auto" data-testid="conversation-turn-92" data-scroll-anchor="false"> <div class="py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5"> <div class="mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]"> <div class="group/conversation-turn relative flex w-full min-w-0 flex-col"> <div class="flex-col gap-1 md:gap-3"> <div class="flex flex-grow flex-col max-w-full"> <div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3" dir="auto" data-message-author-role="user" data-message-id="aaa2c79f-182e-4a4e-9753-28579bebd317"> <div class="relative max-w-[70%]"><em>The sequence of actions of the self-organization method of information networks under the complex influence of destabilizing factors with the use of artificial intelligence, which would allow you to increase the efficiency of the decisions made regarding the management of self-organization parameters of information networks with a given reliability.</em></div> </div> </div> <div class="mt-1 flex gap-3 empty:hidden juice:mr-1 juice:flex-row-reverse"> <div class="-ml-1 mt-0 flex h-7 items-center justify-center gap-[2px] self-end text-gray-400 lg:justify-start lg:self-center visible">&nbsp;</div> </div> </div> </div> </div> </div> </div> <div class="w-full text-token-text-primary" dir="auto" data-testid="conversation-turn-93" data-scroll-anchor="true"> <div class="py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5"> <div class="mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]"> <div class="flex-shrink-0 flex flex-col relative items-end"> <div> <div class="pt-0.5 juice:pt-0"> <div class="gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full juice:h-8 juice:w-8"> <div class="relative p-1 rounded-sm flex items-center justify-center bg-token-main-surface-primary text-token-text-primary h-6 w-6">&nbsp;</div> </div> </div> </div> </div> </div> </div> </div> Svitlana Kashkevych Copyright (c) 2024 2024-06-09 2024-06-09 17 17 TRENDS OF CYBERSECURITY THREATES https://apcssm.vnu.edu.ua/index.php/conf/article/view/111 <p><em>The innovative changes that occurred in 2022-23 have significantly shifted the focus of cybersecurity threats, which is evidenced by the statistics on the emergence and realization of information security threats. To successfully counter information threats in the future, it is essential to understand the causes and trends in the development of cyberspace.</em></p> Pavlo Kindrat Copyright (c) 2024 2024-06-09 2024-06-09 18 18 THE CONCEPT OF STREAM ENCRYPTION BASED ON TWO QUASIGROUPS https://apcssm.vnu.edu.ua/index.php/conf/article/view/78 <p><em>The article proposes the new approach to streaming encryption based on a recursive pseudorandom sequence generator constructed from two binary quasigroups. The encryption/decryption algorithm is presented.</em></p> Halyna Krainichuk (Shelepalo) Bohdan Zagyrnyak Bohdan Mykytchenko Copyright (c) 2024 2024-06-09 2024-06-09 19 19 SERVICES TO PROTECT AGAINST DDOS ATTACKS https://apcssm.vnu.edu.ua/index.php/conf/article/view/65 <p><em>This work examines the most popular services for protection against DDoS attacks</em></p> Roman Stetsyk Vitalii Nosov Copyright (c) 2024 2024-06-09 2024-06-09 20 20 ZERO TRUST EVALUATION METHODOLOGY https://apcssm.vnu.edu.ua/index.php/conf/article/view/90 <p><em>This work examines the methodologies for Zero Trust assessment, which include risk analysis to assess current threats and vulnerabilities and the use of metrics to assess performance. </em></p> Kateryna Novosad Volodymyr Harashchenko Copyright (c) 2024 2024-06-09 2024-06-09 21 22 ANALISYS OF WAYS TO ENSURE ANONYMITY IN CRYPTOCURRENCY TRANSACTIONS https://apcssm.vnu.edu.ua/index.php/conf/article/view/70 <p><em>T</em><em>his work presents an analysis of ways to ensure anonymity in cryptocurrency transactions. The research was conducted with the aim of anonymity during transactions with cryptocurrency, which is desired by the population to protect their personal privacy.</em></p> Yulia Kamienieva Nina Zdolbitska Copyright (c) 2024 2024-06-09 2024-06-09 23 24 SOFTWARE IMPLEMENTATION OF SOME STEGANOGRAPHY MODELS FOR HIDING CONFIDENTIAL INFORMATION IN GRAPHIC FILES https://apcssm.vnu.edu.ua/index.php/conf/article/view/61 <p><em>This research is devoted to the development of a software application to support the technology of steganographic protection of information. The developed StegoProg application provides sufficiently reliable protection of information based on LSB (Least Significant Bit), DCT (Discrete Cosine Transform), PVD (Pixel Value Differencing) methods for hiding confidential data in graphic files. The application is developed using the Python programming language.</em></p> Bohdan Butkevych Copyright (c) 2024 2024-06-09 2024-06-09 25 25 MAIN TYPES OF CYBER ATTACKS AND OPERATIONS IN THE CYBER WAR IN UKRAINE https://apcssm.vnu.edu.ua/index.php/conf/article/view/120 <p><em>Based on the data from CERT-UA (the Governmental Computer Emergency Response Team of Ukraine), the following types of cyber operations used in the war against Ukraine have been analyzed and identified: destructive attacks, disruptive attacks, weaponization of personal data, and disinformation.</em></p> Oleksandr Kapys Copyright (c) 2024 2024-06-10 2024-06-10 26 26 MODELING SYSTEMS WITH PASSWORDLESS AUTHENTICATION BASED ON INDUSTRY STANDARDS https://apcssm.vnu.edu.ua/index.php/conf/article/view/110 <p><em>Modeling systems with passwordless authentication based on FIDO2/WebAuthn, NIST SP 800-63, and OAuth 2.0 standards significantly enhances security and convenience for users. Passwordless methods eliminate the vulnerabilities of traditional passwords. Utilizing these standards allows for the creation of robust authentication systems that meet modern cybersecurity requirements.</em></p> Yuriy Tarnavskyi Anna Diak Copyright (c) 2024 2024-06-09 2024-06-09 27 27 FEATURES OF ELECTROMAGNETIC FIELD SHIELDING FOR PROTECTION AGAINST INFORMATION LEAKAGE THROUGH EME CHANNELS https://apcssm.vnu.edu.ua/index.php/conf/article/view/82 <p><em>This report the fundamental principles of electromagnetic fields, the key types of shielding and their constructions, the materials used, and the effectiveness of different shielding methods. Additionally, it explores the practical applications of these shielding techniques in various industries, the current standards, and future trends in electromagnetic compatibility. Implementing these measures is essential to ensure the resilience and continuous safe operation of electronic systems, protecting sensitive information from potential breaches.</em></p> Oleksii Martyniuk Volodymyr Garashchenko Copyright (c) 2024 2024-06-09 2024-06-09 28 28 VLAN HOPPING ATTACKS https://apcssm.vnu.edu.ua/index.php/conf/article/view/64 <p><em>VLAN hopping is an attack method allowing a host in one VLAN to access traffic in other VLANs. The two main techniques are switch spoofing and double tagging. Switch spoofing involves emulating a trunking switch to access multiple VLANs. Double tagging involves adding two VLAN tags to a frame to bypass VLAN isolation. Proper switch port configuration can mitigate these attacks.</em></p> Oksana Zhyharevych Bogdan Korolov Copyright (c) 2024 2024-06-09 2024-06-09 29 29 DEVELOPMENT AND RESEARCH OF A SYSTEM FOR THE ANALYSIS OF CRYPTOGRAPHIC PROTOCOLS https://apcssm.vnu.edu.ua/index.php/conf/article/view/95 <p><em>In this work, a software tool for generating and analyzing cryptographic protocols has been developed.</em></p> Oksana Zhyharevych Maxim Ohochtyi Ivanna Shukalovych Copyright (c) 2024 2024-06-09 2024-06-09 30 30 METHODOLOGY FOR PROTECTING CONFIDENTIAL INFORMATION IN ORACLE DATABASES FROM SQL ATTACKS https://apcssm.vnu.edu.ua/index.php/conf/article/view/81 <p><em>This article explores safeguarding information confidentiality in Oracle databases from SQL attacks, stressing the need for effective protection measures amid increasing cyber threats.</em></p> Oksana Zhyharevych Anna Dombrovska Copyright (c) 2024 2024-06-09 2024-06-09 31 31 STUDY OF METHODS OF PROTECTING THE INFORMATION RESOURCES OF THE ENTERPRISE USING CLOUD TECHNOLOGIES https://apcssm.vnu.edu.ua/index.php/conf/article/view/93 <p><em>This paper examines the methods of protecting the company's information resources when using cloud technologies. The purpose of the study is to analyze the effectiveness of existing protection methods and develop recommendations for increasing the level of information security. The work examines modern threats and risks associated with the use of cloud environments, such as unauthorized access, data leakage, malicious attacks and software vulnerabilities</em></p> Oksana Zhyharevych Valentyna Skalova Dmytro Tsiupiashchuk Copyright (c) 2024 2024-06-09 2024-06-09 32 32 INFINIDAT. SOLUTIONS FOR DATA STORAGE SYSTEMS https://apcssm.vnu.edu.ua/index.php/conf/article/view/36 <p><em>Data storage systems are critical for modern enterprises, as they provide secure storage and quick access to a large amount of information that supports the efficiency of business processes. They also guarantee business continuity by enabling quick data recovery in the event of disruptions or disasters. This enables companies to meet service level requirements and comply with regulatory standards.</em></p> Oksana Zhyharevych Valentyna Shylan Copyright (c) 2024 2024-06-09 2024-06-09 33 34 SYNTHESIS OF A DECISION-MAKING SUPPORT SYSTEM FOR ASSESSING THREATS TO THE INFORMATION SECURITY OF AN ENTERPRISE https://apcssm.vnu.edu.ua/index.php/conf/article/view/87 <p><em>In today's dynamic and interconnected world, information security (IS) has become paramount for enterprises of all sizes. The ever-evolving landscape of cyber threats poses a significant challenge to organizations, demanding robust and adaptable security measures. A decision support system (DSS) specifically designed for assessing IS threats can serve as a valuable tool for enterprises seeking to enhance their cybersecurity posture.</em></p> Oksana Zhyharevych Vasyl Shlapa Copyright (c) 2024 2024-06-09 2024-06-09 35 35 SUBLIME SECURITY INTEGRATION FOR BUSINESS https://apcssm.vnu.edu.ua/index.php/conf/article/view/101 <p>Sublime Security is a modern email security solution that uses programmable rules and artificial intelligence to detect and block a variety of threats. The platform integrates with popular email services such as Microsoft 365, Google Workspace, and IMAP, providing protection against phishing, business electronic compromise (BEC), and malware.</p> Viktoriia Sydorenko Oksana Zhyharevych Volodymyr Yablonskyi Copyright (c) 2024 2024-06-09 2024-06-09 36 36 INTEGRATION OF CISCO UMBRELLA IN THE FACULTY NETWORK https://apcssm.vnu.edu.ua/index.php/conf/article/view/100 <p style="margin: 0cm; text-align: justify; text-indent: 1.0cm;"><em>The process of integrating Cisco Umbrella into the network of the Faculty of Information Technology and Mathematics at Lesya Ukrainka Volyn National University is presented by configuring the network gateway and local DNS server to use Cisco Umbrella DNS servers.</em></p> Vadym Yablonskyi Volodymyr Harashchenko Copyright (c) 2024 2024-06-09 2024-06-09 37 37 CYBERSECURITY AND AWARENESS OF CRITICAL INFORMATION INFRASTRUCTURE PERSONNEL ON PROTECTION AGAINST CYBER THREATS https://apcssm.vnu.edu.ua/index.php/conf/article/view/116 <p><em>The article examines the theoretical and methodological aspects of cyber security of critical information infrastructure enterprises, the classification of cyber threats and requirements for the formation of a protection system.&nbsp;&nbsp; Analysis of the potential of personnel in the context of countering cybercrime and the development of recommendations for increasing the awareness and competence of employees.</em></p> Oksana Zhyharevych Sofiia Lapchuk Copyright (c) 2024 2024-06-09 2024-06-09 38 38 PROBLEMATIC ISSUES ARISING IN THE CONDUCT OF ART STUDIES ON OBJECTS CONTAINING EROTIC AND PORNOGRAPHIC CONTENT IN SOCIAL MEDIA ON THE WORLD WIDE WEB «INTERNET» https://apcssm.vnu.edu.ua/index.php/conf/article/view/107 <div class="flex flex-grow flex-col max-w-full"> <div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3" dir="auto" data-message-author-role="assistant" data-message-id="ee61e3f6-fd25-473e-b34d-10d32872e1e4"> <div class="markdown prose w-full break-words dark:prose-invert dark"> <p><em>The article examines the methodology of forensic art expert analysis of pornographic material. The concept of pornography is defined as the vulgar, naturalistic, cynical, and obscene depiction of sexual acts and the display of genitals, which offends human honor and dignity and incites unworthy instincts. Pornographic material includes any tangible objects, printed matter, photographs, and videos that contain detailed depictions of sexual acts or pornographic content.</em></p> </div> </div> </div> Mykhailo Kravchuk Copyright (c) 2024 2024-06-09 2024-06-09 39 39 ARTIFICIAL INTELLIGENCE AS A CYBERATTACK TOOL AND CYBERSECURITY https://apcssm.vnu.edu.ua/index.php/conf/article/view/118 <p><em>The report discusses the possibilities of using artificial intelligence tools to create fakes, malware, phishing emails, and possible ways to combat them.</em></p> Yuriy Kaun Oksana Sobchuk Copyright (c) 2024 2024-06-09 2024-06-09 40 41 PROTECTION OF COMPUTER SYSTEMS https://apcssm.vnu.edu.ua/index.php/conf/article/view/114 <p><em>The main directions of information protection in computer systems, including technical, organizational, and legal aspects, have been studied.</em></p> Andrii Yatsiuk Serhiy Muzychuk Svitlana Yatsiuk Copyright (c) 2024 2024-06-09 2024-06-09 42 42 STRUCTURAL AND TOPOLOGICAL FEATURES OF THE DESIGN OF PULSE-TO-NUMBER FUNCTIONAL CONVERTERS WITH VARIABLE BIT RATE, TAKING INTO ACCOUNT THEIR SPEED https://apcssm.vnu.edu.ua/index.php/conf/article/view/69 <p><em>The paper proposes a certain sequence of performance evaluation of number-pulse functional converters (</em><em>NPFC)</em><em> with variable bit rate. Requirements for the criteria to ensure the optimal speed of the NPFC with variable bit rate are also formulated.</em></p> Roman Baran Copyright (c) 2024 2024-06-09 2024-06-09 43 43 DEVELOPMENT OF INDOOR AIR QUALITY MONITORING SYSTEM USING ARDUINO UNO AND MULTIFUNCTIONAL SENSORS https://apcssm.vnu.edu.ua/index.php/conf/article/view/80 <p><em>This research introduces an indoor air quality monitoring system based on the Arduino Uno microcontroller. The system is enhanced with a moving average filter and incorporates data fusion techniques from two multifunctional sensors. The primary innovation of this system lies in its capability to process and integrate data from multiple sensors, ensuring high accuracy and reliability in indoor air quality (IAQ) evaluations. Comprehensive testing and empirical analysis were performed in various residential environments to validate the system's performance. The outcomes demonstrate that the system furnishes real-time and precise insights into the air quality. This investigation makes a substantial contribution to the field by presenting an effective solution for air quality monitoring. It employs state-of-the-art sensor technology and advanced data processing techniques to enhance the indoor living conditions.</em></p> Ivan Rudavskyi Halyna Klym Copyright (c) 2024 2024-06-09 2024-06-09 44 44 EXPERIMENTAL STUDIES OF OPEN-SOURCE 5G NETWORK PERFORMANCE https://apcssm.vnu.edu.ua/index.php/conf/article/view/92 <p><em>The deployment of 5G network testbeds based on open-source solutions becomes more popular among telcom engineers around the world. Such deployments can bring a lot of opportunities for further research in 5G network direction. The aim of this paper is to provide results of 5G testbed performance testing based on open-source projects, in particular OpenAirInterface5G end-to-end solution.</em></p> Alla Pinchuk Roman Odarchenko Copyright (c) 2024 2024-06-09 2024-06-09 45 45 STATE MANAGEMENT APPROACHES IN MICRO-FRONTEND COMMUNICATIONS https://apcssm.vnu.edu.ua/index.php/conf/article/view/79 <p><em>Suggested combine mixed approaches for effective state management in micro-frontends, maintain local state within each micro-frontend to ensure modularity and independence; implement an event-driven approach for managing shared state and facilitating inter-frontend communication; and utilize Module Federation to share common utilities and state management logic across micro-frontends, thereby combining the strengths of each method to create a scalable, efficient, and maintainable micro-frontend architecture.</em></p> Oleksandr Stepanov Halyna Klym Copyright (c) 2024 2024-06-09 2024-06-09 46 46 MATHEMATICAL MODEL OF MODIFIED REAL-TIME OBSTACLE AVOIDANCE METHOD BASED ON LAPLACE ARTIFICIAL POTENTIAL FIELD https://apcssm.vnu.edu.ua/index.php/conf/article/view/60 <p><em>In this report we provide a brief overview of the family of modified obstacle avoidance methods based on classic approach which was introduced by O. Khatib in 1984. The main idea of method is in calculation of 3 fields: attractive (drives robot towards target locations), repulsive (generated by obstacles to repel robot away) and total field. </em></p> Ihor Berizka Ivan Karbovnyk Copyright (c) 2024 2024-06-09 2024-06-09 47 47 METHODS OF HIGH-EFFICIENCY DATA PROCESSING IN ORACLE USING TABLE AND INDEX PARTITIONING https://apcssm.vnu.edu.ua/index.php/conf/article/view/54 <p><em>Table partitioning in databases is an important method for improving system productivity and reliability. The need for table partitioning is driven by increasing data volumes in the database. Partitioning allows large tables to be divided into smaller, more manageable parts, improving query efficiency, speeding up response times, and simplifying data administration.</em></p> Anastasiia Omelchuk Anna Yuzva Lesіa Bulatetska Copyright (c) 2024 2024-06-09 2024-06-09 48 48 INDOOR POSITIONING WITH MOBILE IMAGE RECOGNITION AND BLE https://apcssm.vnu.edu.ua/index.php/conf/article/view/85 <p><em>An experimental system is presented that allows for the recognition of objects in images using neural networks on microcomputers and the determination of the distance to objects using Bluetooth Low Energy signals. The advantages and disadvantages of the presented system are described.</em></p> Tadei-Nazarii Kalynchuk Dmytro Myroniuk Ivan Karbovnyk Copyright (c) 2024 2024-06-09 2024-06-09 49 50 RESEARCH OF THE OPERATION OF AUTOMATIC SYSTEMS USING THE BOX – BEHNKEN DESIGN https://apcssm.vnu.edu.ua/index.php/conf/article/view/109 <p><em>The influence of physical and technological parameters on the operation of the automatic system with sound control was investigated. The experiment according to the Box-Behnken design method was planned.</em></p> Oleksandr Burban Roman Demediuk Copyright (c) 2024 2024-06-09 2024-06-09 51 51 ARTIFICIAL INTELLIGENCE SYSTEM DESIGN WITH MICROSOFT AZURE QUANTUM https://apcssm.vnu.edu.ua/index.php/conf/article/view/108 <div class="flex-shrink-0 flex flex-col relative items-end"> <div> <div class="pt-0.5 juice:pt-0"> <div class="gizmo-bot-avatar flex h-6 w-6 items-center justify-center overflow-hidden rounded-full juice:h-8 juice:w-8"><em>The integration of artificial intelligence (AI) with quantum computing offers transformative capabilities for solving complex problems. This article explores AI system design using Microsoft Azure Quantum, a leading quantum computing platform. Also, review of quantum computing fundamentals, AI principles, and Azure Quantum's features. This work aims to guide in leveraging Azure Quantum for advanced AI system design.</em></div> </div> </div> </div> <div class="group/conversation-turn relative flex w-full min-w-0 flex-col agent-turn"> <div class="font-semibold select-none"> </div> </div> Yevhen Bershchankyi Halyna Klym Copyright (c) 2024 2024-06-09 2024-06-09 52 52 DEVELOPMENT OF USER INTERFACE OF BUSINESS AND ENTERPRISE MANAGEMENT APPLICATION USING UX LAWS https://apcssm.vnu.edu.ua/index.php/conf/article/view/59 <p><em>Striving for optimal and efficient user communication with the software is an important aspect of providing an intuitive and easy-to-use interface. In a world where efficiency and user satisfaction are important, creating these types of interfaces becomes a priority. Applying the laws of UX when designing interfaces allows us to achieve a high level of usability, which helps reduce the time spent on tasks and increase overall productivity.</em></p> Nazarii Bolibrukh Copyright (c) 2024 2024-06-09 2024-06-09 53 53 SDEPLOYMENT OF LMS MOODLE BASED ON ORACLE VIRTUALBOX WITH VPN SUPPORT https://apcssm.vnu.edu.ua/index.php/conf/article/view/44 <p><em>Analyzed ways to simplify the use of the Moodle system and created a portable package based on Oracle VirtualBox for use in a local network and remotely via VPN. Outlined approaches for creating a specialized interface for managing this package. This package was tested in real-world conditions.</em></p> Vitalii Bulatetskyi Lesіa Bulatetska Yulia Pavlenko Copyright (c) 2024 2024-06-09 2024-06-09 54 55 ALGORITHM FOR GENERATING MATHEMATICAL FORMULAS USING A BINARY TREE https://apcssm.vnu.edu.ua/index.php/conf/article/view/63 <p style="margin-bottom: 0cm; text-align: justify; text-indent: 1.0cm;"><em><span style="color: black;">This work is dedicated to generating mathematical formulas using the "binary tree" data structure. An algorithm for such generation has been developed, and a class has been implemented that saves information and generates text using its own method.</span></em></p> Tetiana Hryshanovych Copyright (c) 2024 2024-06-09 2024-06-09 56 56 WEB-ORIENTED PLATFORM FOR MANAGEMENT OF SOFTWARE DEVELOPMENT PROJECTS https://apcssm.vnu.edu.ua/index.php/conf/article/view/68 <p><em>Development of a web resource for project management. Built in C# and Blazor, it integrates MSSQL Server for data storage and JWT tokens for security. Users can create accounts, manage projects, set deadlines and monitor progress. In essence, it effectively meets the basic needs of project management.</em></p> Yurii Halushka Copyright (c) 2024 2024-06-09 2024-06-09 57 57 REPETITIONS OF ELEMENTS OF NOISY DIGITAL IMAGES https://apcssm.vnu.edu.ua/index.php/conf/article/view/50 <p><em>Шляхом експериментальних досліджень низки цифрових зображень виявлено, що насичене значення повторюваності v<sub>0</sub> при великих t є наближено монотонною функцією відсотку білого шуму на зображеннях. Взаємозв’язок повторюваності v<sub>0</sub> у зображеннях і частки білого шуму на них дає змогу використати параметр v<sub>0</sub> як своєрідну метрику шуму і цим запропонувати новий метод встановлення співвідношення між інформативною та шумовою складовою зображень.</em></p> Oleksii Kravchuk Ivan Dovhan Oleh Kushnir Copyright (c) 2024 2024-06-09 2024-06-09 58 58 PASSWORD MANAGER DEVELOPMENT USING REACT.JS AND NESTJS https://apcssm.vnu.edu.ua/index.php/conf/article/view/28 <p><em>This article describes the relevance of online password managers as a means of storing passwords. The purpose of this work is to develop a password manager using modern methods. The result is a web service with functionality for creating and storing passwords.</em></p> Stanislav Pastushok Copyright (c) 2024 2024-06-09 2024-06-09 59 59 ANALYSIS OF DEEP NEURAL NETWORKS USING FOURIER TRANSFORM https://apcssm.vnu.edu.ua/index.php/conf/article/view/51 <p><em>Deep neural networks (DNNs) have become an important tool in various fields of science and technology due to their ability to recognize complex patterns and find hidden relationships in large volumes of data. However, understanding the inner workings of these models remains a challenge. This thesis examines the application of the Fourier transform to analyze the internal structure and behavior of deep neural networks.</em></p> Oleksandr Tymoshchuk Petro Yanchuk Copyright (c) 2024 2024-06-09 2024-06-09 60 60 USING UI KIT AND DESIGN SYSTEMS IN USER INTERFACE DESIGN https://apcssm.vnu.edu.ua/index.php/conf/article/view/115 <p><em>The main characteristics of UI Kit and design systems, the necessity of their creation when designing and developing various types of software are presented.</em></p> Yulia Pavlenko Copyright (c) 2024 2024-06-09 2024-06-09 61 61 SENTIMENT ANALYSIS OF TEXT USING BERT AND DISTILBERT MODELS https://apcssm.vnu.edu.ua/index.php/conf/article/view/89 <p><em>The work describes the fine-tuning </em><em>of BERT and DistilBERT pre-trained transformer models for the binary sentiment classification of user comments in the Ukrainian language. The models </em><em>were evaluated according to accuracy, precision, recall, and F1-score metrics. An overall accuracy of 91% obtained for both models demonstrates the significant potential of incorporating these models into sentiment analysis tasks.</em></p> Marianna Prytula Igor Olenych Copyright (c) 2024 2024-06-09 2024-06-09 62 62 ANALYSIS OF THE EFFICIENCY OF CLUSTERIZATION SYSTEMS https://apcssm.vnu.edu.ua/index.php/conf/article/view/62 <p><em>Аnalysis of the performance of clustering systems includes the selection of appropriate metrics, comparison of different algorithms, and assessment of the stability of the results. This allows you to draw reasonable conclusions about the quality of clustering for a specific data set and task.</em></p> Ihor Koval Copyright (c) 2024 2024-06-09 2024-06-09 63 63 ANALYSIS OF CUSTOMERS USING FUZZY SEGMENTATION https://apcssm.vnu.edu.ua/index.php/conf/article/view/55 <p><em>The article substantiates the relevance of using machine learning methods for customer base segmentation. Classical and fuzzy clustering methods are compared and advantages and disadvantages of these methods are investigated.</em></p> Pavlo Melnyk Kateryna Melnyk Svitlana Lavrenchuk Copyright (c) 2024 2024-06-09 2024-06-09 64 64 MODEL OF ELECTROMECHANICAL ENCRYPTION MACHINE ENIGMA https://apcssm.vnu.edu.ua/index.php/conf/article/view/53 <p><em>A visual model of encryption and decryption with the Enigma code using ordinary two-dimensional tables is presented. This original visual application can be used when studying a related topic in data encryption. The presented visual model can also be interesting as a conceptual precursor to a software implementation of the Enigma electromechanical encryption machine model in a university cryptography or programming course.</em></p> Mykola Holovin Nina Holovina Dmytro Huzachov Copyright (c) 2024 2024-06-09 2024-06-09 65 66 ANALYSIS OF THE SELENIUM TOOL AND ITS ROLE IN TEST AUTOMATION https://apcssm.vnu.edu.ua/index.php/conf/article/view/38 <p align="justify"><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;"><em>Automated testing is an integral part of the modern software development process, ensuring efficiency and product quality. Selenium, one of the most popular tools for automated testing, is widely used for testing web applications. This thesis examines the capabilities and features of Selenium, as well as its advantages and the challenges developers face when using this tool.</em></span></span></p> Denys Skoryk Copyright (c) 2024 2024-06-09 2024-06-09 67 67 ANALYSIS OF LOCALIZATIONS AND ADAPTATIONS OF GAMES IN UKRAINIAN https://apcssm.vnu.edu.ua/index.php/conf/article/view/43 <p><em>This work explores the necessity of creating and adapting games to meet the cultural and societal needs of Ukrainian users, especially in the context of modern technology and the current war in Ukraine. The research highlights the importance of developing games that support the Ukrainian language, fostering a positive informational environment and promoting linguistic and cultural identity.</em></p> Illia Denys Copyright (c) 2024 2024-06-09 2024-06-09 68 68 DEVELOPMENT AND IMPLEMENTATION OF AN ANDROID - APPLICATION FOR THE GENERATION OF MATHEMATICAL EXAMPLES IN THE KOTLIN PROGRAMMING LANGUAGE https://apcssm.vnu.edu.ua/index.php/conf/article/view/41 <p><em><span style="font-weight: 400;">The work is aimed at the development and implementation of an Android application for generating mathematical examples using the Kotlin programming language. The application provides quick and efficient creation of various tasks for learning mathematics based on user-defined parameters. The use of advanced Android application development technologies and programming methods will ensure the creation of a convenient and intuitive interface. The result is an innovative tool that helps improve the process of learning mathematics on mobile devices.</span></em></p> Yaroslav Lytvynchuk Copyright (c) 2024 2024-06-09 2024-06-09 69 69 AUTOMATION OF THE PROCESS OF SENDING LETTERS USING COMMON POSTAL SERVICES https://apcssm.vnu.edu.ua/index.php/conf/article/view/57 <p><em>Досліджено процес створення програмного забезпечення для реалізації автоматизованого надсилання листів з використанням можливостей поширених поштових сервісів. Проаналізовано вимоги до подібних програмних розробок.</em></p> Nazarii Manoilo Vitalii Bulatetskyi Copyright (c) 2024 2024-06-09 2024-06-09 70 70 GAMBLING NETWORK APPLICATIONS RESEARCH AND DEVELOPMENT https://apcssm.vnu.edu.ua/index.php/conf/article/view/72 <p><em>The process of creating software in the field of online gambling was studied. The most popular igaming applications were analyzed and the mechanics of one well-known game were reproduced.</em></p> Vladyslav Malashchuk Copyright (c) 2024 2024-06-09 2024-06-09 71 71 FEATURES OF USING THE SFML LIBRARY FOR VISUALIZING ALGORITHMS https://apcssm.vnu.edu.ua/index.php/conf/article/view/40 <p><em>This paper discusses the features of using the SFML library to visualize algorithms. The main advantages of SFML are described, such as ease of use, flexibility and cross-platform. Examples of using the library to visualize sorting algorithms, find paths, and work with trees are given. Compare the capabilities of SFML with other popular libraries such as SDL, OpenGL, and Qt. The stages of creating visualizations, as well as methods for optimizing performance, are discussed</em></p> Petro Shepeliuk Copyright (c) 2024 2024-06-09 2024-06-09 72 72 "PIECE BY PIECE" – ГРА НА ОСНОВІ ЗМІШУВАННЯ ЖАНРІВ https://apcssm.vnu.edu.ua/index.php/conf/article/view/71 <p><em>The </em><em>computer</em><em> game “Piece by Piece” is a puzzle arcade game with strategy elements. The main goal of the game is to form a certain structure on the playing field according to the provided sample by</em><em> gradually joining the periodically appearing fragments. The player has a constant movement and can change its direction. Successful completion of the level occurs when building a structure identical to the sample. There are various obstacles and bonuses. </em></p> Mykola Vozniak Copyright (c) 2024 2024-06-09 2024-06-09 73 73 DATA STORAGE ORGANIZATION IN THE DEVELOPMENT OF MOBILE APPLICATIONS FOR ONLINE STORE https://apcssm.vnu.edu.ua/index.php/conf/article/view/32 <p><em>The selection of tools for organizing data storage in the development of a mobile application for automating retail processes has been discussed. The combination of SQLite with RoomDatabase for local data storage and Firebase Realtime Database for real-time synchronization creates a reliable and efficient architecture for such an application.</em></p> Bohdan Nazar Lesіa Bulatetska Copyright (c) 2024 2024-06-09 2024-06-09 74 74 USING SPECTRAL ANALYSIS TO BUILD A FUNCTIONAL TUNER https://apcssm.vnu.edu.ua/index.php/conf/article/view/91 <p><em>A software application has been developed that provides real-time analysis of the incoming audio signal, determines the frequency of the played note, and compares it with standard note frequencies. The Hann window function and noise suppression techniques have been applied to enhance the accuracy of the analysis.</em></p> Volodymyr Markitan Copyright (c) 2024 2024-06-09 2024-06-09 75 75 LOCALIZATION IN REACT NATIVE APPLICATIONS https://apcssm.vnu.edu.ua/index.php/conf/article/view/48 <p><em>Mobile app localization is a comprehensive process that adapts an application to the specific linguistic, cultural, and technical requirements of different global markets, involving more than just translation but also the customization of content, design, and functionality. Various tools, assist developers in implementing these changes effectively, ensuring that apps meet the diverse needs of international users.</em></p> Kateryna Plodnik Copyright (c) 2024 2024-06-09 2024-06-09 76 76 DEVELOPMENT OF A MOBILE SOLUTION FOR THE ANALYSIS OF PERSONAL FINANCIAL EXPENSES https://apcssm.vnu.edu.ua/index.php/conf/article/view/84 <p><em>The "FinanceTracker" application offers a comprehensive toolkit for keeping track of expenses and their analysis. A convenient and intuitive interface, as well as a wide range of functions, expense accounting, creating reports in the form of charts and reliable data storage.</em></p> Mykola Rasik Copyright (c) 2024 2024-06-09 2024-06-09 77 77 ANALYSIS OF DOMAIN NAME AND IP ADDRESS SECURITY MONITORING TOOLS https://apcssm.vnu.edu.ua/index.php/conf/article/view/58 <p><em>Collecting and analyzing data about domain names and IP addresses helps to detect cyber threats. A service like AbuseIPDB provides tools for this. Additionally, Shodan and VirusTotal allow for detecting hosts on the Internet and analyzing files for malware, enabling quick response to threats.</em></p> Anastasiia Omelchuk Lesіa Bulatetska Copyright (c) 2024 2024-06-09 2024-06-09 78 78