COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION https://cit.lntu.edu.ua/index.php/cit <p>The journal has been founded in December 2010 by the Decision made of Presidium of the High Attestation Commission of Ukraine on March 30, 2011 registered with 1-05/3 and included in the list of the specialized scientific editions.The journal contains sections: Informatics and Computing Technique, Automation and Controlling, Telecommunications and Radio Engineering, Project Management. Languages of the journal edition are Ukrainian, English, Russian.The journal has research and production purpose.</p> Lutsk National Technical University en-US COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2524-0552 Development of an automated system for determining a person's emotional state based on facial images https://cit.lntu.edu.ua/index.php/cit/article/view/704 <p><span lang="UK">The article considers the design and development of an automated system for determining a person's emotional state from a facial image. The justification for the relevance of developing system is provided. An analysis of existing </span><span lang="PL">similar </span><span lang="UK">systems designed to determine a person's emotional state is carried out, and their advantages and disadvantages are also given. A structural diagram of an automated system for determining a person's emotional state from a facial image is developed. Use case diagrams for system users are constructed. Block diagrams of the system's operation algorithms are provided. A functional model of the system and diagrams of different levels of its decomposition are developed. A diagram of the system components is developed. All components of the system and the user</span><span lang="PL">s</span><span lang="UK"> interface are implemented. Te</span><span lang="PL">sts </span><span lang="UK">are </span><span lang="PL">executed</span><span lang="UK">. The developed automated system for determining a person's emotional state from a facial image can be successfully used to automate the process of recognizing and analyzing the emotional state of people in various subject areas of human activity</span></p> Ya. Kovivchak V. Dubuk K. Baranov Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 6 15 10.36910/6775-2524-0560-2025-59-01 Adaptive Approach to Responding to Cyber Resilience Breaches of Critical Infrastructure Facilities https://cit.lntu.edu.ua/index.php/cit/article/view/705 <p><span lang="EN-GB">Cyberattacks on critical infrastructure during modern full-scale war have become an integral aspect of pressure on distribution systems and one of the key components of direct military action. In particular, recent attacks in cyberspace are aimed not only at damaging individual local subsystems, but also at destabilising internal processes in the country by affecting energy companies and divisions, water supply networks, financial institutions and other vital facilities. That is why the issue of quantitative assessment of cyber resilience, specifically the ability of a system/enterprise to withstand a certain negative impact and recover to an acceptable functional state in the future, remains relevant. At the same time, it is also important to understand the precise structure and hierarchy of the criticality of such cyber incidents, since, as recent events have shown, they can be of a completely different nature, depending on the field or sector of the state. Thus, the paper analysed the largest existing frameworks and systems for assessing cyber resilience, specifically from the point of view of quantitative rather than qualitative assessment. The paper described the inadequacy of traditional qualitative assessment methods and justified the need to introduce quantitative metrics that allow assessing the level of cyber resilience, modelling and evaluating potential losses. The paper analysed modern approaches to quantitative assessment of cyber resilience, their applicability in the Ukrainian energy sector and proposed a classification of cyber incidents by criticality, response procedure and potential areas of damage</span></p> V. Lychyk Copyright (c) 2025-06-15 2025-06-15 59 16 28 10.36910/6775-2524-0560-2025-59-02 Personal Budgeting: Analysis of Software Solutions and Optimization Opportunities https://cit.lntu.edu.ua/index.php/cit/article/view/706 <p><span lang="EN-US">In the current context of rapid digital technology development and widespread adoption of internet banking, the popularity of cashless transactions and electronic banking services is growing significantly. This trend, in turn, stimulates interest in personal budgeting and financial planning tools, which enable users to better control expenses, build savings, achieve long-term goals, and make informed financial decisions on a daily basis. This article presents an analysis of five popular mobile applications for personal budgeting, evaluating their functionality, advantages, and limitations. The study examines the presence of built-in mechanisms for budget planning, goal setting, income and expense monitoring, and tools for automated fund allocation. Particular attention is given to the issue of budget optimization using modern mathematical methods. The article explores the potential integration of the simplex method of linear programming into mobile applications for personal financial planning, aiming to create budgets under resource constraints and meet specific financial objectives. A practical example of solving an optimal expense allocation problem using the Python programming language and the scipy.optimize library is provided. The implementation of this model into an Android application via the Chaquopy plugin is also demonstrated. The study considers modern literature on financial literacy, behavioral finance, and psychological aspects of money management, including Thaler’s theory of mental accounting. Additionally, it reviews relevant sources on software tools and mathematical methods. The results may serve as a basis for developing more effective mobile applications with adaptive budgeting functionality.</span></p> І. Andrushchak І. Vakulyuk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 29 36 10.36910/6775-2524-0560-2025-59-03 Ensuring the Reliability of Monitoring Systems in Corporate Networks: Typical Problems and Solutions https://cit.lntu.edu.ua/index.php/cit/article/view/707 <p style="font-weight: 400;">The article explores current aspects of ensuring the reliability of monitoring systems in corporate computer networks. Given the growing complexity of IT infrastructures, monitoring reliability is critically important for maintaining service continuity, ensuring timely incident response, and preventing financial losses. A detailed analysis of common problems is provided, including single points of failure (SPOF), system overload, false trigger activations, data loss, and unreliable alerting channels. Statistical data from authoritative sources and real-world examples are cited to illustrate the consequences of inadequate monitoring under high load and complexity. Particular attention is given to technical and architectural measures for increasing system resilience: distributed architectures, server clustering, database replication, multichannel notification mechanisms, and automated incident response. The paper substantiates the implementation of intelligent event filtering, alarm correlation, and regular system health testing. A comprehensive architecture is proposed that incorporates AI algorithms, caching, failover, and adaptive message routing. Future research directions are outlined, including dynamic threshold adjustment using self-learning algorithms, studying the impact of human factors, and integration with cybersecurity tools. The proposed solutions significantly reduce the risk of critical failures, optimize response processes, increase monitoring efficiency, and establish a foundation for the stable development of corporate information systems.</p> I. Andrushchak S. Shmarovoz Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 37 42 10.36910/6775-2524-0560-2025-59-04 Technical implementation of server system migration processes and Wi-Fi network construction to ensure a modern enterprise IT infrastructure https://cit.lntu.edu.ua/index.php/cit/article/view/708 <p><span lang="UK">The article describes the process of transferring the information environment of the server infrastructure to a new hardware and software platform with the simultaneous deployment of a wireless Wi-Fi network within the enterprise. Particular attention is paid to the technical aspects of data migration, in particular, the complications that arise when working with RAID arrays and virtual machines, which are used to ensure reliability, scalability and isolation of services. An analysis of typical problems related to data integrity, configuration preservation, equipment compatibility and ensuring continuous operation during service migration is presented. Effective approaches to optimizing the migration process are proposed, including preliminary testing of the environment, backup, and the use of hybrid infrastructure at the transition stage. As a technical implementation, a server based on the Windows Server 2022 operating system was built, which provides centralized management of network and file services. To organize wireless access to the local network, a MikroTik hAP ac² router was used together with UniFi access points manufactured by Ubiquiti, which ensured stable coverage, flexible management of client connections, and a high level of protection of transmitted data.</span></p> N. Bahniuk К. Bortnyk Y. Fedorus V. Ozinovych Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 43 47 10.36910/6775-2524-0560-2025-59-05 Monitoring the location of LoRaWAN network clients using sensor IoT devices https://cit.lntu.edu.ua/index.php/cit/article/view/709 <p style="font-weight: 400;">The article presents the design of a location monitoring system for clients using sensor-based IoT devices built on LoRaWAN wireless technology. The proposed solution is intended for use in environments with limited power supply, no cellular coverage, and a need for continuous movement tracking. The system consists of a client device based on an ESP32 microcontroller equipped with a NEO-6M GPS module and an SX1278 LoRa transceiver. It transmits data including coordinates, movement speed, and rest duration. The operator module receives messages via the LoRaWAN network and displays real-time information on a LCD display. The number of operator modules is not limited. The software is developed in the Arduino IDE using the TinyGPSPlus, LoRa, and LiquidCrystal_I2C libraries. Here is defined data format for system scalability. A comparative analysis with ZigBee and GSM technologies shows LoRaWAN’s superior energy efficiency, coverage range, and communication stability. The solution is suitable for use in tourism, healthcare, occupational safety, sports, and transport. It improves group safety, supports real-time tracking, and enables rapid emergency response, contributing to intelligent monitoring systems. The given prototype allows scalable client data acquisition depending on the use case. The operator unit can also be extended to output data to other displays (e.g., OLED) or automate certain decision-making processes.</p> V. Baiev S. Puzyrov Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 48 53 10.36910/6775-2524-0560-2025-59-06 Using the mathematical program Maple to solve mathematical physics problems by numerical methods https://cit.lntu.edu.ua/index.php/cit/article/view/710 <p><span lang="UK">The paper considers the application of mathematical program Maple to solv</span><span lang="EN-US">e</span> <span lang="EN-US">mathematical physics problems</span><span lang="UK"> by numerical methods, such as </span><span lang="EN-US">a mixed boundary value problem for the string oscillation equation, the heat conduction equation and the Dirichlet problem for the Laplace equation</span><span lang="UK">. Although mixed boundary value problems have certain difficulties, there is a powerful arsenal of numerical methods and software tools that allow them to be solved. The example of the Maple software package shows not only obtaining a numerical solution, but also its visualization in the form of graphs and surfaces, which helps in understanding the behavior of the solution and the influence of various boundary conditions. Using Maple for numerical solution of mathematical physics problems allows computer science students and engineers to concentrate on the essence of the problem, they do not have to spend time on complex implementation of numerical algorithms. The writing of the numerical methods and conditions is quite clear, it is easy to change the equation parameters, initial/boundary conditions and mesh parameters for a quick study of the system behavior, the built-in algorithms are optimized and well-tested, which ensures the reliability of the calculations. The study of numerical methods involves their software implementation, which contributes to the development of programming skills, especially in the field of working with data sets, developing effective algorithms and optimizing the code. Specialists with a deep understanding of numerical methods are in demand in many industries, including IT companies, which is why when studying such methods we combine the use of the Maple mathematical package and software implementation in various programming languages</span></p> О. Brahinets Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 54 60 10.36910/6775-2524-0560-2025-59-07 Development of a .NET Application for Optimizing the System Partition of the Windows 11 operating system https://cit.lntu.edu.ua/index.php/cit/article/view/711 <p><span lang="UK">In modern Windows operating systems, the accumulation of temporary files, update backups, paging files, and restore points leads to significant disk space consumption. This is particularly critical for system partitions, where limited storage capacity can negatively impact the performance and stability of the OS. This paper examines the main mechanisms and methods for freeing up space on the system partition during the operation of Windows 1</span><span lang="EN-US">1</span><span lang="UK">. The study proposes an approach to automated cleaning of the Windows system partition through the development of a .NET application and accompanying scripts. It explores the main sources of system partition bloating, including paging files (pagefile.sys, swapfile.sys), update directories (WinSxS, SoftwareDistribution), shadow copies, browser caches, and log files. Standard Windows tools for managing disk space, such as “Disk Cleanup” (cleanmgr), PowerShell commands, etc., are analyzed. It was determined that none of the existing tools fully provide a safe and flexible method for cleaning the system partition. The scientific novelty of the research lies in a comprehensive approach to the analysis and automation of system partition cleanup in Windows. The proposed solution not only automates the process of removing unnecessary files but also enhances disk resource management efficiency, ultimately contributing to improved performance and stability of the operating system. Expected results include a reduction in occupied space on the system partition, which will contribute to enhanced OS performance and stability. Moreover, automation of this process simplifies the task for both advanced users and those without deep technical knowledge</span></p> L. Bulatetska V. Bulatetskyi Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 61 67 Development of a multi-parameter multi-agent system for modeling the dynamics of the spread of infectious diseases https://cit.lntu.edu.ua/index.php/cit/article/view/712 <p><span lang="EN-US">This paper presents an approach to modeling the dynamics of infectious disease spread using a multiparametric multi-agent system that integrates both biological and social factors. The main goal of the research is to develop a flexible simulation model that enables the analysis of epidemiological processes in urban environments and the evaluation of various intervention strategies. Each agent in the model represents an individual with personalized characteristics, including health status, daily mobility, social activity, and behavioral patterns. The core infection dynamics are based on an adapted SIR model, integrated into the agent-based framework, allowing probabilistic transitions between susceptible, infected, and recovered states depending on the nature of agent interactions. The implementation was carried out using Java and the MASON simulation platform, which supports high-resolution and scalable agent-based modeling. To enable interactive spatial analysis, the visualization module was developed using JavaFX and the GeoFX library. This combination allows for the dynamic rendering of agent locations, health states, and the spatial-temporal progression of the infection. The visualization not only enhances interpretability but also serves as a real-time analytical tool for assessing the effectiveness of preventive measures and containment policies. Simulation results demonstrate the model’s capacity to reflect complex patterns of infection spread, including the impact of initial infection placement and social interaction networks. The developed system shows the practical potential of combining agent-based simulation with geospatial visualization for epidemiological forecasting and decision-making in public health management</span></p> К. Hazdiuk О. Sribnyi Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 68 75 10.36910/6775-2524-0560-2025-59-09 mental health, web technologies, emotional monitoring, digital psychotherapy, gamification, artificial intelligence https://cit.lntu.edu.ua/index.php/cit/article/view/713 <p><span lang="UK">The article discusses the relevance of using web technologies in the diagnosis, prevention, and support of mental health in the context of growing psycho-emotional stress, economic instability, and military actions that affect the psyche of the population. Particular emphasis is placed on the need to develop innovative digital solutions that can effectively adapt to the individual needs of different social groups, such as veterans, young people, teachers, internally displaced persons, and people with disabilities. The article describes modern approaches to the implementation of web technologies in the field of mental health, in particular the use of emotional design, gamification, adaptive interfaces, artificial intelligence, self-observation and self-reflection tools. Special attention is paid to issues of confidential information protection, personal data security, digital ethics, and transparency of algorithms that work with sensitive psychological states of users. The importance of web service accessibility for people with different abilities is considered. The article provides an overview of both international and Ukrainian digital initiatives, including mobile self-help applications, online platforms for therapeutic support, chatbots, emotional monitoring systems, and more. The need for an interdisciplinary approach that combines technical, psychological, and social components to create effective, ethical, and long-lasting solutions in the field of mental health is emphasized</span></p> V. Gergel V. Kosheliuk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-15 2025-06-15 59 76 81 10.36910/6775-2524-0560-2025-59-10 Software implementation of steganographic hiding of text information in a graphic file using the LSB method https://cit.lntu.edu.ua/index.php/cit/article/view/714 <p><span lang="EN-US">The paper presents the code of a training program for steganographic hiding of text information in graphic files. Hiding is implemented using the “least significant bit” (LSB) method in Python. The program can be used for both educational and practical purposes. The Pillow library was used to implement the program. This graphic library is not specialized for steganographic needs. A positive quality of the library is the ability to visualize the information hiding mechanism. This is interesting for educational purposes. Working within the Pillow library allows us to see the mechanism of information hiding at the bit level of individual graphics pixels at the level of a fairly concise program code. The program was tested with texts of different lengths and with graphic containers (photographs) of different types. The experiment showed the correct introduction of texts into a graphic file and the corresponding extraction of texts from these files. The study of empty and corresponding filled containers (photographs) did not reveal any differences and suspicions of text bookmarks. Analysis of photographs and manipulations with them at the level of individual bits also has educational value in the sense of revealing the method of fixing the corresponding physical signal. The latter gives an idea of the methods of encoding static images, the noise level, the magnitude of the useful physical signal and the sensitivity limits of human vision. The presented program code can be used both in cryptography classes and in practical programming</span></p> М. Holovin N. Holovina D. Huzachov Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 82 87 10.36910/6775-2524-0560-2025-59-11 The task of developing a software platform for a local automated centralized alert system https://cit.lntu.edu.ua/index.php/cit/article/view/715 <p><span lang="EN-US">The article explores the development of a modern software platform for a local automated centralized public warning system (LAPWS), which serves as a key component of civil protection infrastructure amid increasing risks of emergencies and wartime conditions. The study analyzes the current legal and regulatory framework in Ukraine, including the Concept for the modernization of the centralized public warning system, as well as foreign implementations such as Australia’s Emergency Alert, the U.S. Wireless Emergency Alerts (WEA), and the EU’s Reverse 112 systems. Based on this analysis, the article proposes a multi-level cloud-oriented platform architecture following the "cloud-edge" model, where critical services (scenario management, database operations, and event processing) are hosted in the cloud, while the direct delivery of alerts is handled by local edge gateways and end-user devices (electronic sirens, loudspeakers, and digital signage). The functional capabilities of the platform are described in detail: automated or manual initiation of alarm signals, multi-channel public alerting (via sirens, SMS, Cell Broadcast, TV, and the Internet), scenario-based operation, remote administration, real-time visualization of system status on a digital map, and hardware monitoring and testing. Particular attention is given to cybersecurity measures, including multi-level user authorization, activity logging, command encryption, and infrastructure redundancy. The platform supports integration with existing equipment and national systems through standardized protocols (NAPAPI, CAP) and envisions further development in areas such as AI-based threat prediction, integration with geographic information systems (GIS), mobile applications (including “Diia”), IoT support, blockchain-based audit trails, and inclusive interface design. The proposed solution significantly improves system reliability, scalability, and response time, aligns with international best practices, and offers a practical foundation for modernizing emergency alert systems at the community level</span></p> V. Hotovych V. Kartashov Y. Maksymyak L. Matiichuk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 88 96 10.36910/6775-2524-0560-2025-59-12 Innovative Vectors for the Development of Software for the Local Automated Centralized Notification System (LACNS) https://cit.lntu.edu.ua/index.php/cit/article/view/716 <p><span lang="UK">This paper conducts a systematic analysis of the potential development of software for the Local Automated Centralized Notification System (LACNS) through the implementation of modern digital technologies. The research is based on a review of scientific publications, technical documentation, and practical experience in the fields of notification systems, artificial intelligence, IoT, Smart City, mobile applications, and blockchain technologies.</span> <span lang="UK">Based on the conducted research, five innovative directions for modernizing LACNS software have been identified: Application of artificial intelligence (AI) and machine learning to enhance notification intelligence: Integration of the system with Smart City infrastructure;&nbsp; Use of the Internet of Things (IoT) as a network of trigger sensors; Development of mobile applications and open APIs to expand notification channels; Implementation of blockchain technology to improve reliability and transparency. For the first time, a comprehensive interdisciplinary approach to the development of LACNS software has been considered, covering AI, IoT, Smart City, mobile technologies, and blockchain. The LACNS software should be developed as an adaptive platform for the digital transformation of communities, capable of self-learning, automatic response, and secure interaction with other systems. State incentives for innovation-regulatory, financial, and organizational-are necessary for implementing these directions in civil protection practices.</span></p> V. Gotovych Yu. Maksymyak L. Matiychuk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 97 106 10.36910/6775-2524-0560-2025-59-13 Information system for forming a social profile of an individual using OSINT technologies https://cit.lntu.edu.ua/index.php/cit/article/view/717 <p><span lang="EN-US">The growth of the volume of data available in online sources creates new opportunities in various fields of activity and contributes to the identification of patterns, trends and knowledge, which is the basis for development. The article presents the developed information system for forming a social profile of an individual thanks to OSINT technology, which provides a comprehensive approach to collecting, processing and protecting data from the popular Telegram messenger. The use of the WTelegramClient library made it possible to provide a reliable and convenient way of interacting with the Telegram API for the effective collection of various types of data, including text messages, media files and web links. To ensure confidentiality and security of data, several levels of protection have been implemented. The SSL cryptographic protocol is used for data encryption, which provides a secure communication channel between the client and the server. The messenger's own MTProto protocol guarantees secure data transmission within Telegram. The MSSQL database is used to store data, which also supports a secure connection, authentication/authorization, and data encryption. The interface, created based on Angular and spartan.ng, is intuitive, allows easy visualization and analysis of collected data, provides access to all the functionalities of the developed system. In general, the information system for forming a social profile of a person provides convenient and effective work with large amounts of information, giving users the opportunity to work with confidential information in a secure environment</span></p> M. Derkach R. Kondratenko V. Barbaruk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 107 112 10.36910/6775-2524-0560-2025-59-14 Method of Bitcoin transaction output consolidation using spending simulation https://cit.lntu.edu.ua/index.php/cit/article/view/718 <p><span lang="UK">In the Bitcoin protocol, each transaction consumes transaction outputs – records that associate a specific amount of bitcoin with a particular owner – via transaction inputs, which are references to existing outputs, and creates new outputs with new amounts and owners, thus reflecting an act of ownership transfer. Users who frequently receive payments accumulate a large number of small unspent outputs, which increases costs of future transactions, decreases performance of wallet software, and threatens financial privacy. In order to reduce the number of outputs, users perform consolidation operations that merge many small outputs into a larger one. However, such transactions or their cascades are easily identifiable in the transaction graph, which allows linking the outputs involved in a single consolidation operation and thus deteriorates the user's financial privacy. This paper proposes a method of multi-step output consolidation through simulated natural spending. It uses simulating transactions with multiple inputs and two outputs which resemble typical payments with a target output and a change output. The proposed method iteratively reduces the set of user’s unspent outputs to a certain target size without creating obvious patterns in the transaction graph. Cost analysis demonstrates that even when the user sacrifices efficiency in favor of minimizing the size of linked output groups, the total cost of multi-step consolidation increases only by a factor of 2-4 compared to simple consolidation. The article also outlines future research directions, including the identification of transaction graph patterns that may indicate the use of complex multi-step consolidation schemes, as well as patterns of reverse operations of splitting outputs into smaller parts, which may indicate illegal activities</span></p> Yu. Zhykin М. Onai Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 113 119 10.36910/6775-2524-0560-2025-59-15 WPF client-server application for ensuring operational interaction with databases https://cit.lntu.edu.ua/index.php/cit/article/view/719 <p><span lang="EN-US">The article describes the implementation of an interactive WPF client-server application for ensuring the planning of production processes (machines as production units on the line) in industry. The task of operational interaction with databases is solved. The server part is responsible for storing, processing, and providing data, while the client part is responsible for displaying and interacting with the user. The client-server application is designed to store and present detailed information about production order plan records in the production planning system, aggregating a large amount of data related to each specific task. The data is presented in the form of a formatted table with headings of plan categories and execution statuses. The interactivity of selecting individual row elements and updating visual data in real time is implemented. A UML class diagram of the client-server application structure is presented, namely a set of classes and their attributes, fields, properties, methods, and events. Class objects can notify other application components, including user interface elements, about changes to their property values, which is key to WPF's data binding mechanisms. Providing quick access to up-to-date data allows you to make informed decisions and perform work tasks efficiently</span></p> N. Zdolbitska А. Zdolbitskyi B. Heiko Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 120 125 10.36910/6775-2524-0560-2025-59-16 Real-time dynamic hand gesture recognition system on edge devices https://cit.lntu.edu.ua/index.php/cit/article/view/720 <p><span lang="EN-US">This paper presents a novel real-time dynamic hand gesture recognition system designed for efficient interaction with smart devices and touchless interfaces, with a focus on edge devices. The proposed system integrates Google Mediapipe for hand pose detection, which is lightweight enough to run on mobile devices, with a modified version of the DD-Net architecture, optimized for online classification of gestures using 2D and 3D data. Key innovations include the introduction of an auxiliary classification head to address class imbalance and an attention mechanism to improve the recognition of partially observed gestures. The system is evaluated on the NVGesture and SHREC22 datasets, achieving an accuracy of 0.784 and 0.924, respectively, surpassing previous benchmarks. Experimental results demonstrate the high efficiency of the proposed approach in real-time gesture recognition tasks, particularly on mobile platforms. It is shown that the use of 3D data and an attention mechanism significantly improves recognition accuracy, especially for complex and partially visible gestures. The proposed system can be used in a wide range of applications, including virtual and augmented reality systems, robotics, and touchless interfaces on edge devices</span></p> І. Kazymyra V. Tsapiv Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 126 135 10.36910/6775-2524-0560-2025-59-17 Development of the Object-Oriented Java Library for Interaction with the WooCommerce E-Commerce Platform https://cit.lntu.edu.ua/index.php/cit/article/view/721 <p><span lang="EN-US">A class model was designed and a Java library was developed based on it with tools for working with entities of the popular e-commerce platform WooCommerce, including products, customers, and orders. The advantages of the developed library are increased type safety at the compilation level, achieved by using enumerations and object types for model class attributes, as opposed to working with strings when organizing interaction with direct use of WooCommerce REST API requests. The designed model uses the tools of the Project Lombok software library to reduce boilerplate code, restrict access to class attributes in accordance with the WooCommerce REST API documentation, and define object "builder" methods with the ability to flexibly initialize their properties. The Gson library tools implemented custom serialization-deserialization of some WooCommerce object attributes to more convenient and secure data types for programming. The OkHttp library was used to organize requests with authorization support. The proposed library is open source and available on GitHub. Its use can be useful in organizing the interaction of Java software systems with online stores on the WooCommerce platform</span></p> H. Kolomoiets Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 136 142 10.36910/6775-2524-0560-2025-59-18 Methods of organizing sorting in ordered lists in software systems https://cit.lntu.edu.ua/index.php/cit/article/view/722 <p><span lang="EN-US">In modern software systems, particularly in web applications, task management systems, content management platforms, and other structured data environments, the correct organization of item order in ordered lists plays a critical role. The most common method for storing such structures involves relational databases, where maintaining item order requires additional attention. The primary approaches include the use of a separate numeric field (order index) or the construction of linked structures, in which each record contains a reference to the previous or next item. However, as the number of elements grows, updating these values efficiently becomes a challenge, especially when items are repositioned within the list.</span> <span lang="EN-US">This creates the need for a thorough analysis of modern approaches to organizing and maintaining list order, particularly methods for optimizing sorting values by incorporating reserved space between adjacent indices. Such approach helps to avoid frequent re-indexing operations when positions change, which in turn improves performance and reduces database load. Among alternative solutions, horizontal expansion of ordering values, such as the use of fractional or lexicographic formats, deserves particular attention. Additionally, the advantages and disadvantages of using linked lists compared to traditional sorting by order values are examined. To compare the approaches, an evaluation is conducted based on accuracy and performance, implementation efficiency, and a possibility of scaling lists</span></p> V. Kosheliuk V. Tymchuk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 143 147 10.36910/6775-2524-0560-2025-59-19 Automated Testing of a Faculty Website Using Cypress JS and Integration with the BDD Framework Cucumber https://cit.lntu.edu.ua/index.php/cit/article/view/723 <p><span lang="uk">The article explores the methodology of Behavior Driven Development (BDD) in the context of end-to-end testing of web applications using the Cypress framework. It discusses the essence of this methodology and the key advantages of its application in test automation. In particular, the article highlights how the integration of Cypress with BDD allows the creation of tests that reflect real user scenarios using natural language. Special attention is given to the use of Cucumber, which enables writing test scenarios in the Gherkin format. This significantly improves communication between developers, testers, and business stakeholders, as it ensures a shared understanding of requirements and test scenarios written in a language that is clear to everyone. The article also justifies why the use of Cypress in combination with BDD ensures high testing efficiency for web applications, reducing the risk of errors and improving the quality of the final product</span></p> І. Krasnokutska О. Dutchak Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 148 153 10.36910/6775-2524-0560-2025-59-20 An analysis of existing software solutions in the field of message processing. Apache Kafka and RabbitMQ message brokers https://cit.lntu.edu.ua/index.php/cit/article/view/724 <p><span lang="EN-US">This article examines the capabilities of the Apache Kafka and RabbitMQ message brokers in the context of message processing. The analysis considers not only the basic message handling functionalities of each broker but also explores the broader range of features provided by this category of software. A detailed comparison of the fundamental architectural approaches underlying each broker is presented, highlighting their respective advantages and limitations. Furthermore, the study addresses the brokers' abilities in terms of scalability, integration with external systems, and traffic encryption mechanisms. The brokers’ approaches to handling exceptional situations are also evaluated, recognizing that in the contemporary landscape, such capabilities are increasingly regarded as de facto requirements for the development of modern software systems. The conducted analysis offers valuable insights for software architects and developers, aiding them in selecting effective design strategies for both the creation of new solutions and the enhancement of existing systems. In addition, the paper demonstrates the practical application of the most commonly used features of both brokers. This is intended to assist developers unfamiliar with these technologies in quickly adapting and beginning to work with the software efficiently</span></p> А. Kruhlyk D. Moroz Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 154 167 10.36910/6775-2524-0560-2025-59-21 The Classification Structure of Methods for Large-Scale Graph Visualization https://cit.lntu.edu.ua/index.php/cit/article/view/725 <p><span lang="EN-US">The article addresses the current challenge of large-scale graph visualization, which is accompanied by issues such as difficult visual perception due to the high number of vertices and edges, the complexity of interpreting visual representations, and the low efficiency of existing methods. The study analyzes existing visualization methods and concludes that there is no strict hierarchical classification, which complicates their systematization, selection, and identification of promising research directions. The goal of this research is to develop the classification structure for existing large-scale graph visualization methods. Based on an analysis of recent studies and publications, three main categories of methods solving key visualization tasks are identified: vertex and edge coordinate assignment methods (including force-directed, spectral, genetic, and graph neural network-based methods), large graph processing methods (covering graph modification, subgraph sampling, hierarchy creation, parallel computing, and machine learning methods), and graph visual representation optimization methods (including edge crossing minimization, vertex distance maximization, and adaptive cooling methods). The proposed classification structure details each of these categories into subcategories, considering differences in approaches to solving various aspects of large-scale graph visualization. The developed structure systematizes existing knowledge and provides a foundation for further comprehensive method classification, facilitating informed method selection based on the input graph and identifying directions for developing new, more efficient large-scale graph visualization methods</span></p> D. Lyman Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 168 175 10.36910/6775-2524-0560-2025-59-22 Analysis of MCTS search tree shape control using "depth-width" kind criteria https://cit.lntu.edu.ua/index.php/cit/article/view/726 <p><span lang="EN-US">This article examines the verification and analysis of ability of the MCTS-TSC (Monte-Carlo Tree Search with Tree Shape Control) improving technique, which was developed by the authors earlier, to perform such control. The principle of controlling the shape of the search tree in the MCTS-TSC technique is based on the application of DW (Depth-Width) criteria of the "depth-width" kind. The ability of the MCTS-TSC to control and correct the shape of the search tree during its construction was tested on multiple games of Connect Four played by players which used both the standard Monte Carlo tree search technique called MCTS-UCT (Monte-Carlo Tree Search with Upper Confidence bounds applied to Trees) and the MCTS-TSC technique with control of the tree shape. In order to compare the search tree construction process by the standard MCTS-UCT technique and the MCTS-TSC tree shape control technique, trees were obtained after performing the same number of iterations of the search process and with different setting values parameters of the DW kind criteria for controlling the shape of trees during their construction. After that, statistics of the constructed search trees shape were collected and comparative analysis of the constructed search trees shapes and differences in the process of their construction by both search techniques was performed. The approbation and analysis of the shape of the built search trees showed that the MCTS-TSC technique of tree search by controlling the shape of the&nbsp; tree based on setting certain parameters of the formulas of the "depth-width" kind criteria, without changing the general asymmetric principle of building the search tree, allows you to direct the process of this construction to a wider and shallow tree shape, or to a narrower and deeper shape. The obtained results confirm the ability of the MCTS-TSC technique to control the shape of the MCTS search tree using depth-width criteria</span></p> Oleksii Marchenko Oleksandr Marchenko Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 176 182 10.36910/6775-2524-0560-2025-59-23 Analysis of the ability of artificial intelligence tools to generate student-style code and detect such generated code https://cit.lntu.edu.ua/index.php/cit/article/view/727 <p><span lang="EN-US">It is known that artificial intelligence tools (AIT) can generate program code in different styles: the general style, the styles of other AITs, the teacher's style, the style of a professional developer, etc. But if a first-year student provides code for a task that was generated using an AIT in some such professional style then the teacher can easily determine the non-independency of performing such work. The article studies the possibility of AITs to generate code in the "first-year student" style and the ability of AITs to determine that this code was generated using an AIT, and was not actually written by a first-year student. The aim of the article is to investigate how easily a first-year student can mask the use of AITs when writing programs in C language for educational tasks in the disciplines of the</span> <span lang="EN-US">first-year study. This study was conducted for the code generated in the student's style by the latest free versions of three AITs, which are currently among the most popular and most used by students: ChatGPT, Copilot, and Gemini. As a result of the study, it was found that the AITs ChatGPT, Copilot can mask their code as the student's code quite well, while the AIT ​​Gemini did not cope with this task. In any case, this applies to programs written in C language for tasks of initial complexity of the first year of study. The conclusions summarize the results of the study and make recommendations to teachers regarding the use of the studied AITs. The following are noted as areas for further research. Since the power of AI is developing explosively quickly, it seems appropriate to repeat the research of this article again in a year or two. Another direction can be proposed to conduct a similar study using other programming languages, as well as when performing tasks in other disciplines and/or of greater complexity</span></p> Oleksandr Marchenko Oleksii Marchenko Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 183 193 10.36910/6775-2524-0560-2025-59-24 Network sockets based on aliases with remote address transfer https://cit.lntu.edu.ua/index.php/cit/article/view/728 <p><span lang="EN-US">Today, the arsenal of IPv4 network addresses is exhausted, but many user nodes still use them to communicate using traditional Internet protocols. Along with this, there is a large-scale network address transfer (NAT) technology (LSN), designed to include IPv4 addresses in the network, even in case of their full occupancy. Although the LSN mechanism has advantages, it also has negative effects, which in specific conditions causes the inaccessibility of server applications to the global network, causing their work to slow down or block. To circumvent such situations, a network socket library based on aliases is proposed in the article, designed for the server applications operation and their communication based on automated directory distribution. The library integrates a NAT bypass mechanism using program functions and automated catalog distribution. The paper also describes the elements and conditions to use the developed software for automated catalogue distribution of socket library for the purpose of network applications communication in the Linux operating system</span></p> V. Melnyk N. Bahniuk О. Royko S. Kizym Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 194 204 10.36910/6775-2524-0560-2025-59-25 The intelligent component of automated candidate selection based on their polyfactor portraits of human-machine interaction objects' perception subjectivization https://cit.lntu.edu.ua/index.php/cit/article/view/729 <p><span lang="EN-US">This research is devoted to solving the scientific and applied problem of automating the selection of relevant candidates for human-machine interaction teams taking into account their polyfactor portraits, which is part of the cluster of issues related to the scientific and applied problems of human-machine interaction automation and intellectualization.</span> <span lang="EN-US">A corresponding specialized intelligent component of automated candidate selection based on their polyfactor portraits of human-machine interaction objects' perception subjectivization has been developed, which ensures possibility of solving the declared scientific and applied problem.</span> <span lang="EN-US">A basic mathematical model of the declared component has been developed, which provides the possibility of modeling the researched processes of intelligent selection of candidates for human-machine interaction teams in an automated mode.</span> <span lang="EN-US">A corresponding specialized algorithm for automating the selection of candidates for human-machine interaction teams has been developed, which provides the possibility of further software implementation of the proposed component, and computer modeling of the researched processes of intelligent selection of candidates for human-machine interaction teams in an automated mode.</span><span lang="EN-US">A practical approbation of the developed component has been carried out on the example of solving an experimental applied practical task of selecting new candidates to form a reserve group for an existing software product support team (as an example of one of the most common variants of the researched human-machine interaction).</span> <span lang="EN-US">An analysis of potential areas of further research(es) has been performed regarding the possible development, improvement, and practical application of the developed component (of automated candidate selection based on their polyfactor portraits of human-machine interaction objects' perception subjectivization), both in the context of scientific-and-applied as well as the practical-applied tasks related to the issues of human-machine interaction automation and intellectualization, as well as in general</span></p> А. Pukach V. Teslyuk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 205 212 10.36910/6775-2524-0560-2025-59-26 UML-analysis and development of an information system for warehouse accounting of auto parts https://cit.lntu.edu.ua/index.php/cit/article/view/730 <p><span lang="EN-US">The work is devoted to the development of an information system «Management of a warehouse with auto parts» using the Unified Modeling Language (UML). The study analyzed the functional capabilities of the system using the main UML diagrams: use case diagrams, class diagrams, sequence diagrams and activity diagrams. These diagrams reflect the interaction of users with the system, data structure, sequence of processes and business logic of inventory management. Five key actors (manager, administrator, client, supplier, logistician) and their roles in the system were identified. The developed model contributes to the automation of warehouse operations, optimization of inventory management and increasing the efficiency of logistics processes. The results of the work can be applied to improve warehouse logistics and service quality in the auto parts trade, especially in the context of economic and logistical challenges in Ukraine</span></p> L. Samchuk Y. Povstiana N. Huliіeva Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 213 220 10.36910/6775-2524-0560-2025-59-27 Comparative analysis of mapping services for integrating interactive maps in web development https://cit.lntu.edu.ua/index.php/cit/article/view/731 <p><span lang="UK">This article explores key mapping services for integrating interactive maps in web development, focusing on Google Maps, Mapbox, and solutions based on OpenStreetMap. The relevance of the study stems from the need to select an optimal tool for spatial data visualization, as a poor choice can lead to increased costs, limited functionality, and development complications. It was found that the main challenge for developers lies in choosing between feature-rich commercial platforms and more flexible, lower-cost solutions that require additional technical skills to implement. The aim of the research is to conduct a comparative analysis of Google Maps, Mapbox, and OpenStreetMap. The study employs methods of comparative evaluation based on functionality, pricing models, licensing conditions, and ease of integration. The integration process of each service is demonstrated through practical code examples with visualized outputs. The results show that Google Maps and Mapbox offer out-of-the-box solutions with broad functionality, while OpenStreetMap provides maximum flexibility and is free of charge, though often reliant on the integration of third-party tools, some of which may be paid. The conclusion emphasizes that there is no universal solution the optimal choice depends on project priorities: Google Maps is suitable for applications requiring a wide range of integrated features, Mapbox is best for projects with high customization needs, and OpenStreetMap is ideal for low-budget solutions demanding flexibility</span></p> А. Sverstiuk S. Huzovatyi Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 221 227 10.36910/6775-2524-0560-2025-59-28 Mathematical modeling of electrocardiogram signal amplitude variability for information technology analysis of their morphological and rhythmic characteristics https://cit.lntu.edu.ua/index.php/cit/article/view/732 <p><span lang="EN-US">The article presents mathematical modeling of amplitude variability of electrocardiographic signals (ECS) as an essential component of information technology for analyzing morphological and rhythmic features of cardiac signals. A mathematical model of the amplitude variability function <em>V<sub>k</sub>(m)</em> has been developed, enabling quantitative evaluation of amplitude changes in characteristic ECS waves (P, Q, R, S, T) between consecutive cardiac cycles. A comprehensive method for processing amplitude variability has been proposed, including the calculation of mean value, standard deviation, coefficient of variation, range of values, and amplitude instability index. A comparative analysis of amplitude variability indicators in healthy patients and patients with extrasystole revealed significant differences in the range of amplitude variability (on average 12 to 40 times higher in pathological cases). The normal distribution of amplitude variability function indicators has been confirmed, ensuring the reliability of parametric analysis methods within the information technology framework. The architecture of information technology with a module for calculating amplitude variability indicators has been proposed, enabling the detection of hidden patterns and anomalies, as well as creating prerequisites for developing predictive algorithms for diagnosing cardiovascular pathologies based on the dynamics of ECS amplitude variability</span></p> А. Sverstiuk L. Mosiy Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 228 240 10.36910/6775-2524-0560-2025-59-29 Forming Controlled Zones in Local Wireless Computer Networks https://cit.lntu.edu.ua/index.php/cit/article/view/733 <p><span lang="EN-US">The formation of controlled security zones (Controlled Access Area according to CNSSI 4009-2015) in local wireless computer networks based on Wi-Fi technology is investigated. The problem's urgency, caused by the need to protect against unauthorized access, is considered. The methods (physical, software) for forming CPs were analyzed, and the characteristics of these methods and the means of their implementation are highlighted. Special attention has been paid to the analysis of the feasibility of using WPA3 to replace outdated security protocols (WPA, WPA2), as well as its advantages in combating various types of attacks. In the context of technology development, the promising capabilities of the future WPA4 standard, according to the latest IEEE research, were examined. It will strengthen protection mechanisms through artificial intelligence. Also, protocol WPA4 considers potential threats from quantum systems and contains a database of attacks of various types for active countermeasures. The use of a combined method of CTA formation, including physical (directional antennas, jammers) and software (network segmentation using VLAN, implementation of WIDS monitoring), is substantiated. The importance and usefulness of training personnel in the principles of security as a method of protection have been emphasized. The research results have emphasized the need and possibility of implementing these methods when deploying a modern network environment</span></p> Ye. Ukhan І. Zhuravska Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 241 246 10.36910/6775-2524-0560-2025-59-30 Methods and tools for developing a web interface to control hardware modules of Arduino within an internet of things system https://cit.lntu.edu.ua/index.php/cit/article/view/734 <p><span lang="UK">The active proliferation of Internet of Things (IoT) technologies and the widespread use of Arduino based hardware modules across numerous domains—from home automation to industrial solutions—have created an urgent need for developing intuitive and functional means of interacting with such systems. A web interface is the key component that provides convenient monitoring, data collection, and remote control of IoT devices. In this article, we present a comprehensive analysis of modern methods and toolsets designed for developing web interfaces aimed at controlling Arduino hardware modules within IoT systems. We examine in detail the design stages, including the selection of optimal architectural patterns, efficient communication protocols (such as HTTP, MQTT, and WebSockets), and up-to-date technology stacks for frontend development (e.g., React, Vue, Angular) and backend development (Node.js, Python/Flask/Django). Special attention is paid to the specifics of integrating web interfaces with Arduino microcontrollers, the analysis of popular libraries and software platforms (for example, Arduino IoT Cloud and Blynk), and approaches to ensuring secure data transmission. The article also highlights the main challenges and offers recommendations for choosing tools to create scalable and reliable web solutions for Arduino-compatible IoT projects.</span></p> О. Miskevych І. Shulhach Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 247 252 10.36910/6775-2524-0560-2025-59-31 Features of creating web applications using C# ASP .NET CORE MVC https://cit.lntu.edu.ua/index.php/cit/article/view/735 <p><span lang="EN-US">The article discusses the features of using the ASP.NET Core MVC platform on the example of developing a web application in the form of a pharmacy customer information system. The strengths and weaknesses of this platform are analyzed. Pharmacy customers are primarily interested in information about the availability of the necessary drugs, new drug arrivals, current promotional offers and much more. In addition, it is important for the client to be able to obtain the necessary information online and in a short time. And here you cannot do without a reliable, effective and fast web resource. However, in many cases, a web application can be quite simple and limited to providing several functions: user registration, payment processing, report generation. This is due to the fact that most pharmacies are small enterprises with limited financial capabilities. Therefore, it will be beyond the power of such an enterprise to develop and operate its own database. The question immediately arises of how to get around this problem. That is, what should be the platform for developing its own information system. In our opinion, a good solution is the ASP.NET Core MVC platform, on the basis of which the web application proposed in the article is developed. If only because it allows you to create a fully functional customer information system without using a database, while at the same time allowing you to store information in JSON file format</span></p> P. Pekh В. Yankovsky Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 253 257 10.36910/6775-2524-0560-2024-57-32 Features of modern technology for C# Blazor Server for web applications development. creating web applications using C# BLAZOR SERVER https://cit.lntu.edu.ua/index.php/cit/article/view/736 <p><span lang="EN-US">The article examines the features of using the C# Blazor Server platform using the example of developing a web service for job search.</span> <span lang="EN-US">Probably, no one disputes the statement that a convenient and fast web service for job search is equally needed, on the one hand, by those who are looking for a job, and on the other hand, by those who offer this job. Therefore, the development of simple and fast web services of this direction is and will be an urgent task in the future. What is the main difficulty here? In our opinion, this is the optimal choice of the platform by means of which the web service should be created. Based on the fact that to solve the tasks that arise in the process of job search, one cannot do without developing and using databases containing information about both clients and employers, the advantage is on the side of platforms that provide such functionality. C# Blazor Server belongs to such platforms.As for the main advantage of the C# Blazor Server platform, the researchers focus on the fact that all the code is executed on the server, and the client only receives updates via SignalR. This allows the client to avoid downloading a large amount of .NET runtime. At the same time, the requirements for the browser are reduced, since the service works even on medium-power devices. In addition, the service is quickly started without delays in loading and compiling WebAssembly</span></p> P. Pekh О. Yanchar Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 258 264 10.36910/6775-2524-0560-2025-59-33 High-Performance Computing for Machine Learning and Artificial Intelligence in Brain-Computer Interfaces with Big Data https://cit.lntu.edu.ua/index.php/cit/article/view/737 <p><span lang="EN-GB">The article explores approaches to optimizing the processing of big data of EEG signals in BCI by combining dimensionality reduction methods and HPC. The relevance of the problem is due to the fact that modern BCIs generate large datasets of signals, the processing of which in real time often creates a critical load on hardware and software resources. The aim of the work is to establish an optimal balance between classification accuracy, model robustness, and data processing time using various dimensionality reduction methods – PCA, ICA, LDA – in combination with the MLP classifier and the Dask library for parallel calculations. A series of experiments was conducted by varying the number of components for each decomposition. It was found that when using PCA with n_components=0.999 or LDA with n_components=13, the accuracy and f1_weighted remain practically the same as in the model without dimensionality reduction, but the processing time is reduced by 1.5-4 times, depending on the settings. The use of fewer components allows for even higher performance, but is accompanied by a noticeable decrease in accuracy, which is critical for neuroengineering and rehabilitation tasks. The use of Dask for organizing parallel calculations made it possible to effectively scale experiments and avoid excessive load on individual system nodes. A comparative analysis of the accuracy, robustness, f1_weighted, roc_auc_ovr_weighted metrics and execution time showed that the optimal settings of matrix layouts allow preserving key information in the signal without significant loss of classification quality. The developed approach has proven its effectiveness for tasks where resource limitations are combined with requirements for stability and accuracy of the system in real-time mode. The practical value of the results lies in the possibility of adapting the proposed pipeline for a wide range of biomedical and engineering applications, where speed, reliability, and robustness of brain signal processing are critical</span></p> I. Stefanyshyn О. Pastukh Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 265 275 10.36910/6775-2524-0560-2025-59-34 Multi-Dimensional Resource Evaluation in Blockchain https://cit.lntu.edu.ua/index.php/cit/article/view/738 <p><span lang="EN-US">The traditional gas-based metering model used in Ethereum and similar blockchain platforms simplifies execution cost estimation but fails to capture the comprehensive complexity of smart contract workloads. This paper introduces a novel multidimensional resource metering framework, designed to separately quantify computational load (based on floating-point operations- FLOPs), memory access, and execution latency. The study effectively demonstrates the framework's capability across various tasks, including compute-intensive processes, in-memory data handling, and high-latency tasks through detailed conceptual modelling of matrix multiplication operations. The proposed model advocates for fairer, hardware-based metering strategies, fostering more precise resource optimisation, and aligns well with contemporary trends such as multidimensional gas pricing in Layer-2 scaling solutions. Additionally, this framework offers critical insights into constructing theoretical and practical models for blockchain resource metering, significantly enhancing accuracy in cost attribution. Experimental validation using representative computational workloads, such as matrix multiplications, highlights distinct performance metrics- FLOPs, memory bandwidth, and latency- and contrasts these findings with traditional single-dimensional gas metrics. Ultimately, this research provides a robust foundation for a more equitable and efficient computational resource evaluation in blockchain systems, paving the way for better system scalability, optimisation, and sustainable economic models for future blockchain applications</span></p> O. Khoshaba Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 276 284 10.36910/6775-2524-0560-2025-59-35 Analysis of Vibroacoustic Signals for Diagnosing the Technical Condition of Electromechanical Equipment https://cit.lntu.edu.ua/index.php/cit/article/view/739 <p><span lang="EN-US">The article considers methodological and applied aspects of the analysis of vibroacoustic signals used to diagnose the technical condition of electromechanical equipment. The main attention is paid to functional diagnosing as a component of the technical condition management system of facilities. It is shown that the efficiency of defect detection largely depends on the ability to isolate and analyze different types of vibrational signals: periodic, random, and shock. The possibilities of spectral analysis of low-frequency vibrations for rotary machines, as well as the features of the application of high-frequency analysis for the diagnosing rolling bearings and reciprocating systems, are separately analyzed. SPM and acoustic emission methods are considered, which provide a high level of sensitivity to microdefects. The diagnosing difficulties in the mid-frequency range are described, which are due to the complex structure of oscillatory processes and a large number of resonances. The importance of using statistical methods for analyzing random vibrations is emphasized, in particular, calculating mean square values, asymmetry and kurtosis coefficients, as well as determining threshold values of diagnostic parameters. The prospects of wavelet analysis and automated digital signal processing methods for increasing the reliability of diagnostics are indicated. The results obtained can be used in the development of automated systems for monitoring and maintaining the technical condition of equipment based on the actual condition.</span></p> Н. Dymova Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 285 293 10.36910/6775-2524-0560-2025-59-36 Adaptive Frequency Planning Model in Decentralized FMCW Radar Networks with Channel Conflict Awareness https://cit.lntu.edu.ua/index.php/cit/article/view/741 <p><span lang="EN-US">The article addresses the problem of interference-free frequency planning in multi-user FMCW radars, taking into account mutual interference between signals. Analytical conditions are proposed to prevent the overlapping of chirp signals in the time-frequency domain, and an optimization problem is formulated to minimize the occupied spectrum under constraints on allowable frequencies and transmission time slots. Particular attention is given to modeling the chirp frequency slope as a key parameter that determines the level of mutual interference. For the first time, a priority-weighted frequency function approach is proposed, allowing adaptive spectrum allocation based on current traffic conditions, signal types, or external constraints. A multi-objective optimization model for the cost function is developed, simultaneously considering frequency preference, conflict level, and spectral accuracy. The study justifies the use of spectral monitoring and local decision-making for decentralized systems. This approach paves the way for the development of more intelligent and self-configuring FMCW systems capable of adapting to environmental changes without centralized coordination. The obtained results can be applied to develop adaptive planning algorithms in autonomous transport systems, intelligent sensor networks, and next-generation cognitive radio systems.</span></p> N. Yakymchuk V. Tkachuk Ою Redka Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 294 302 10.36910/6775-2524-0560-2025-59-37 Justification of the Efficiency of Time Segment Permutation in a Multilevel Optimization Method for Signal Ensembles https://cit.lntu.edu.ua/index.php/cit/article/view/742 <p><span lang="EN-US">The article proposes a multilevel method for optimizing the duration of time segments in signal ensembles. The method is based on a combination of gradient descent and the Levenberg–Marquardt algorithm, providing adaptive tuning of signal processing parameters considering mutual correlation structure and energy characteristics. Within the framework of the proposed approach, two permutation strategies for time segments were experimentally analyzed: a random permutation method (which disregards correlation structure) and the “nearest neighbor” method (which aims to minimize mutual correlation between adjacent segments). Experimental modeling was performed on five types of quasi-orthogonal sequences (M-sequences, Kasami, Gold, Fibonacci, and exponential sequences).</span> <span lang="EN-US">The results demonstrate that the </span><span lang="UK">«</span><span lang="EN-US">nearest neighbor</span><span lang="UK">»</span><span lang="EN-US"> method yields superior performance in terms of mutual correlation and ensemble properties of signals compared to the random permutation approach. In particular, the method achieved a reduction in the variance of the mutual correlation function by up to 22% and an improvement in ensemble characteristics within the range of 8–12%. Signal visualization after permutation confirms a more ordered structure and reduced local amplitude fluctuations. These findings support the rationale for using an adaptive permutation mechanism as one of the essential stages in the formation of signal ensembles with improved correlation properties. Future research directions include extending the optimization model to account for nonlinear channel distortions and integrating the algorithm into cognitive radio systems with dynamic spectrum management</span></p> О. Veklych О. Drobyk Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 303 312 10.36910/6775-2524-0560-2025-59-38 Method of localized signal reconstruction in dynamic environments based on modified Volterra series https://cit.lntu.edu.ua/index.php/cit/article/view/743 <p><span lang="EN-US">The paper presents a comprehensive study and development of an adaptive method for signal reconstruction in dynamic environments. The proposed method is based on the use of modified Volterra series with temporal constraints, where the contribution of kernels is limited by local time windows defined using a smoothing Gaussian function. This approach overcomes the limitations of traditional spectral methods, which, due to the smoothing effect, are unable to accurately reproduce transient or impulsive features of the signal. To detect critical areas of the signal, an instability indicator is introduced, enabling selective activation of the time-limited model only in unstable zones. In stable regions of the signal, reconstruction is carried out using a frequency model, ensuring efficient use of computational resources. Experimental results show an increase in the local coherence coefficient (ALC) in the range of 10–14%, depending on the spatial localization of critical points and the intensity of temporal signal changes, as well as a decrease in the mean squared error (MSE) by 12–18% compared to traditional frequency-based reconstruction methods. The obtained results confirm the effectiveness of the proposed method for signal processing in cognitive telecommunications systems under complex noise conditions</span></p> K. Perets О. Zhuchenko Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 313 321 10.36910/6775-2524-0560-2025-59-39 Formation of professional competencies of information technology education students during internships with IT companies: experience and challenges https://cit.lntu.edu.ua/index.php/cit/article/view/744 <p><span lang="uk">The article examines the features of the formation of professional competencies of students in the field of information technology in the process of studying specialized disciplines and completing various types of internships. The features of conducting educational internships using the latest approaches to organizing interaction with an orientation to professional digital tools and technologies and using the opportunities of informal education are outlined. The experience of organizing industrial internships with the involvement of IT companies is characterized. The advantages of such interaction between educational institutions and representatives of the IT industry are analyzed, in particular in the context of developing practical skills, adapting to modern labor market requirements and introducing relevant technologies into the educational process. The main challenges that arise when organizing such a form of cooperation are identified, including mismatch of participants' expectations, different levels of student training, limited resources of IT companies for mentoring, etc</span></p> N. Stiahlyk N. Yermakova Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-16 2025-06-16 59 322 329 10.36910/6775-2524-0560-2025-59-40 A method of multicriteria data stream distribution in telecommunication networks based on an evolutionary approach https://cit.lntu.edu.ua/index.php/cit/article/view/745 <p><span lang="EN-US">The article presents a method of multicriteria decision-making for the distribution of data streams in telecommunication systems, developed on the basis of the modified genetic algorithm NSGA-III. The proposed model takes into account the dynamic nature of the load, resource constraints, the possibility of delegating tasks between clusters, and predicting peak traffic surges. The problem is formalized as a generalized scheduling problem with a set of criteria, including minimizing the use of node resources, load balancing, and reducing the number of delegated streams. The architecture of the system with the logic of stream processing and interaction of cluster coordinators is described. The developed algorithm includes adaptive updating of reference directions, hybrid ranking taking into account the probability of overload, and dynamic adjustment of the mutation rate according to the predicted load. The effectiveness of the proposed approach is confirmed by calculating the fitness function and analyzing the resulting Pareto fronts. It is substantiated that the method allows maintaining high flexibility and accuracy of data stream (load) distribution in the variable environment of telecommunication networks</span></p> I. Syvolovskyi О. Komar Copyright (c) 2025 COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION 2025-06-24 2025-06-24 59 230 239 10.36910/6775-2524-0560-2025-59-41