Systems and Technologies https://st.umsf.in.ua/index.php/journal University of Customs and Finance, Dnipro en-US Systems and Technologies 2521-6643 A COMPREHENSIVE IMPLEMENTATION ALGORITHM 2D TRANSFORMATION IN GRAPHIC WEB-EDITORS BASED ON THE METHODS OF AFFINE TRANSFORMATIONS https://st.umsf.in.ua/index.php/journal/article/view/153 <p>This article presents a complex algorithm for the optimized implementation of 2D transformations in graphic web editors based on the methods of affine transformations. The object of this study is the algorithms and methods of affine transformations for the implementation of 2D transformations in graphic web editors. The research is aimed at applying the principles of these transformations and their impact on graphic objects, as well as at finding effective solutions for their implementation. An analysis of the main existing algorithms and methods for implementing 2D transformations, such as the Bresenham and Wu algorithms for visualizing straight and curved lines, algorithms for filling areas using affine transformation methods, was carried out. Therefore, the issue of improving and simplifying algorithms and methods of affine transformations for implementing 2D transformations in graphic web editors is relevant and important for modern web design and development. The work considers the main algorithms of affine transformations that ensure the implementation of scaling, rotation, shift, skew functions and their interaction with graphic objects. The proposed algorithm includes the main advantages of implementing the above functions and allows you to create more efficient and high-quality graphic applications, providing at the same time greater functionality and productivity. Applying such an approach creates new opportunities for the development and use of new types of web editors in the field of web design. Based on the proposed algorithm, a web application has been developed that allows you to create various transformations and animations of figures on the plane. The results of the conducted testing confirm the effectiveness and possibility of applying the proposed approach in real projects for the development of graphic web editors for working with 2D transformations.</p> A. M. Pasichnyk T. Zh. Nadryhailo О. V. Andrieiev Copyright (c) 2024-12-17 2024-12-17 68 2 7 15 10.32782/2521-6643-2024-2-68.1 EXPLORING THE POTENTIAL OF UNITY FOR INTEGRATING GEOSPATIAL DATA IN 3D LANDSCAPE MODELING https://st.umsf.in.ua/index.php/journal/article/view/154 <p>This article explores the potential of the Unity platform for integrating geospatial data into the process of 3D landscape modeling. The study specifically focuses on the creation of realistic 3D landscape models using open-source geospatial data such as OpenStreetMap and MapBox. The research analyzes the main methods of integrating geospatial data into the Unity environment, identifies the advantages and disadvantages of different approaches, and examines the role of operating systems in supporting this process. To achieve the objectives of the study, several key tasks were undertaken: the selection and preliminary processing of geospatial data from open sources, the adaptation of these data to Unity specifications through processes such as data conversion and the normalization of elevation values, and the integration of the data into Unity using specialized tools like Terrain Tools and Mapbox SDK. The study emphasizes the importance of optimizing these processes to ensure that Unity operates efficiently, even when handling large datasets. Particular attention was given to the methods used for data processing and visualization to achieve high performance. Techniques such as Level of Detail (LOD) management, texture compression, and material optimization were employed, enabling Unity to maintain stable operation even on systems with limited resources. The research further explores how different operating systems can impact the performance and integration capabilities of Unity when managing large datasets. It was found that while Unity’s flexibility and robust toolset allow for effective geospatial data integration, the efficiency of the overall modeling process is significantly influenced by the performance of the operating system and the optimization of Unity’s settings for specific use cases. These findings highlight the necessity of carefully selecting both the software environment and the data processing methods to maximize the platform’s capabilities. The results demonstrate that Unity is a powerful tool for 3D visualization, providing flexibility and support for various data formats, enabling the creation of realistic and detailed landscape models Beyond its application in traditional fields such as architecture, urban planning, and geodesy, the study reveals that the optimized models can also be effectively used in developing immersive virtual environments for educational and training purposes. Such environments can leverage real geospatial data to provide users with a more authentic experience, which is particularly valuable in fields like disaster management, military training, and environmental simulation. Additionally, the study suggests that the methods developed could be applied in the creation of interactive applications that require the integration of real-world geographic data. The practical significance of the findings extends to various industries, including not only architecture, urban planning, and geodesy, but also the entertainment industry, particularly in game development and virtual reality applications where high performance and realism are critical. The study’s conclusions provide a solid foundation for future research aimed at optimizing the processes of data integration and enhancing the functionality of Unity for handling a wider range of geospatial data sources. Future research could also explore the potential of integrating real-time data streams into Unity models, allowing for dynamic updates to landscapes based on current environmental conditions or other changing variables. This approach could significantly enhance the realism and practical applicability of 3D models in various real-world scenarios, making Unity an even more valuable tool across different sectors.</p> O. F. Bulhakova Yu. V. Ulianovska V. A. Riabovolenko Copyright (c) 2024-12-17 2024-12-17 68 2 16 22 10.32782/2521-6643-2024-2-68.2 IMPROVING STRUCTURED TEXT RECOGNITION WITH YOLO NEURAL NETWORK https://st.umsf.in.ua/index.php/journal/article/view/155 <p>This paper explores improving structured text recognition by integrating the YOLO (You Only Look Once) neural network and OCR (Optical Character Recognition) technology. This work aims to explore ways to enhance the efficiency of structured text recognition through the integration of the YOLO model with OCR technology, as well as to develop an automated information system for detecting and subsequently recognizing text objects, which improves the overall efficiency of structured text processing. The developed system is a web application that enables users to upload invoices, store their data, and receive insights into expenses and client interactions. It includes a YOLOv10 neural network trained on a dataset of 500 invoice images, a REST API for user interaction, a user interface for invoice uploading, and a MySQL database to store information about users and their invoices. The authors propose a multithreaded architecture model that utilizes recurrent and two- and three-dimensional convolutional neural networks. The software, which implements algorithms for optical flow calculation and frequency analysis of characters, is developed in Python using Ultralytics, Pytesseract, Python Image Library, and Flask libraries. HTML, CSS, and JavaScript are used for the user interface, and MySQL is the chosen database model. The system’s main feature is the integration of the YOLO and OCR models to ensure accurate and fast recognition of text objects in images. The system architecture follows the MVC (Model-View-Controller) pattern, where the model handles data and logic, the controller acts as an intermediary between the view and model, and the view displays data to users. Each component has its respective roles and functions, making the system well-structured and easy to modify. Additional service layers are used for business logic and routing, and Flask’s Blueprint tool organizes the application into smaller components and URL structures. Overall, the system is well-structured, ensuring efficient data handling and a userfriendly interface for seamless interaction. The analysis of text recognition results demonstrated high OCR accuracy, particularly with structured text, though some limitations were observed, such as disruptions in the original text structure. These drawbacks can be mitigated by combining the YOLO network with OCR technology. Integrating YOLO with OCR enhances the system’s text recognition efficiency, enabling more precise detection of text objects and their subsequent recognition. Despite these achievements, there is room for further improvement, specifically in refining object detection and text recognition algorithms to achieve even greater accuracy and processing speed.</p> A. Yu. Zinchenko V. V. Khaidurov Copyright (c) 2024-12-17 2024-12-17 68 2 23 31 10.32782/2521-6643-2024-2-68.3 CHALLENGES OF IOT INTEGRATION INTO COMPUTER NETWORKS https://st.umsf.in.ua/index.php/journal/article/view/156 <p>This article examines the results of a study on the integration of Internet of Things (IoT) technologies, which enables interconnection among physical devices and exchange data over networks without human intervention. The paper reviews several fundamental research articles covering various aspects of IoT, from its architecture to security challenges. An analysis of IoT integration research indicates the rapid evolution of this technology addressing multiple aspects ranging from architecture to security. Highlight the significance of developing standards, protocols, and technologies to ensure secure and efficient IoT integration across various fields, unlocking potential for future innovation and advancement. The research aims to analyze key challenges of IoT integration into computer networks and suggests potential solutions to overcome them. Objectives within this aim include providing an overview of the global network of internet-connected devices that exchange data and interact with each other, identifying the primary components and layers comprising its architecture, comparing network technologies in terms of scalability, and analyzing major cyber threats to IoT. Further goals include examining assessing the effect of different IoT system types on network bandwidth, detailing key protocols used by IoT devices, analyzing the benefits of Software-Defined Networking (SDN) for scalability issues, identifying key IoT protection methods, comparing bandwidth for different IoT systems, recommending energy-efficient technologies for autonomous IoT device operation, and comparing bandwidth and latency levels for various types of IoT networks. Data protection and IoT network security remain significant challenges due to the increased vulnerability to cyberattacks from a high number of connected devices. Modern encryption, authentication, and network segmentation methods are crucial for enhancing IoT system security. IoT integration into computer networks creates new opportunities for developing intelligent systems across various domains, from smart cities to industrial production. However, successful implementation requires addressing these challenges and applying appropriate solutions to overcome them.</p> A. V. Pohrebniak V. O. Yakovenko V. Yu. Klym T. Yu. Yakovenko Copyright (c) 2024-12-17 2024-12-17 68 2 32 38 10.32782/2521-6643-2024-2-68.4 RESEARCH OF PERSONAL IDENTIFICATION METHODS BY BIOMETRIC CHARACTERS https://st.umsf.in.ua/index.php/journal/article/view/157 <p>The article is devoted to the analysis of modern biometric identification technologies and their use in various areas, such as security, government and commercial organizations. The main goal of the research is a comprehensive study of various biometric methods, such as face recognition, fingerprints, iris, voice and other features, with further development of recommendations for their implementation. The paper provides an overview of modern biometric identification methods that are actively used in various industries. Algorithms for face recognition based on deep neural networks are considered, which provide high accuracy even in difficult conditions. In addition, fingerprint recognition methods are analyzed, which are widely used due to their availability and reliability. Iris and voice recognition have also been recognized for high accuracy and speed in specific conditions. The article examines assessments of the accuracy and effectiveness of biometric methods in various conditions of use. Important aspects are the quality of the input data (image or signal), lighting conditions, the presence of noise and other external factors that can affect the recognition results. The speed and computing costs of each method were also studied, which made it possible to compare their effectiveness. Part of the research focuses on applying machine learning and artificial intelligence techniques to improve the accuracy and speed of biometric recognition. The use of deep neural networks allows for significant improvements in accuracy, especially when working with large data sets. Machine learning also helps to adapt systems to different usage conditions, increasing their reliability and resistance to distortions. The article proposes a generalized mathematical model for choosing the optimal method of biometric identification. The model is based on a multi-criteria approach, which includes the assessment of such parameters as accuracy, speed, reliability, resistance to external influences and computational costs. This allows you to choose the most optimal method for specific applications. Based on the analysis, recommendations were formulated for the introduction of biometric systems. Recommendations for security, government structures and commercial organizations have been developed, including the use of facial recognition, fingerprints and combined biometric systems to improve efficiency and security. This research contributes to the development of biometric identification technologies, providing a basis for further implementation of effective solutions in various industries.</p> S. V. Popereshnyak R. V. Kravchenko Yu. L. Novikov Copyright (c) 2024-12-17 2024-12-17 68 2 39 47 10.32782/2521-6643-2024-2-68.5 FUZZY SYSTEM FOR ANALYSIS OF BUSINESS RULES OF THE SUBJECT AREA DURING DATABASE CREATION https://st.umsf.in.ua/index.php/journal/article/view/158 <p>The object of research is the process of developing a fuzzy system for analysing business rules in database design, in particular, the use of fuzzy logic to process incomplete and uncertain data in modern business processes. The aim of the study is to develop a fuzzy system for analysing business rules of the subject area during database design; to develop the corresponding software using C# programming language, with the use of SQL databases to ensure adaptability and flexibility of the system when working with fuzzy data. The analytical review presents the results of the analysis of domestic and foreign literature on the use of fuzzy logic in database design, as well as existing methods of processing fuzzy and incomplete data in business systems. The review includes a comparison of different approaches to the use of fuzzy systems in the context of data management and database design. In the research part, a model of a fuzzy system for analysing and processing business rules is developed, methods for integrating fuzzy logic into the database design process are established, and the results of testing the system on real business scenarios are presented to assess its effectiveness in comparison with traditional approaches. The application part presents the results of software development using the C# programming language, which allows automating the process of analysing business rules and designing a database taking into account fuzzy and incomplete data, which increases the adaptability and accuracy of the system. As a result of the calculations, values are obtained that can be presented in the form of graphical results or specific numerical indicators indicating compliance with the specified criteria or parameters. The analysis of the results is carried out on the basis of comparing the obtained values with predefined limits and business rules. This allows you to identify anomalies or deviations from expected values, as well as determine how effectively the system works for each specific situation. For each resulting set, its validity and accuracy are checked. This may include: assessing the degree to which elements belong to a given category, determining the most significant factors affecting the result, comparing the obtained results with previous or control data to identify changes or trends.</p> O. D. Firsov O. V. Marischuk Copyright (c) 2024-12-17 2024-12-17 68 2 48 62 10.32782/2521-6643-2024-2-68.6 REMOTE CONTROL SYSTEM OF CRITICAL INFRASTRUCTURE OBJECTS https://st.umsf.in.ua/index.php/journal/article/view/159 <p>The article is devoted to the topical issue of providing remote control of critical infrastructure facilities in conditions of active hostilities when they are constantly exposed to missile strikes and attacks. The authors define the main task of maintaining the functionality of a remote object, excluding risks for the personnel that this object serves, and the stages of implementation and implementation of the system are given, not excluding the occurrence of emergency power outages and other emergencies. The paper considers the process of organizing remote control of automated objects using the Yggdrasil P2P network, as well as models, methods, and software for providing remote control of objects. It is taken into account that when applying Yggdrasil technology, each network node addresses another by its internal network IPv6 address, and the traffic between them passes through other nodes until it reaches the destination. Packet routing is based on the coordinates of the network tree distributed using hash tables (DHT) and routing tables at each node The article analyzes available ready-made remote control solutions, identifies their shortcomings, and proposes an algorithm for implementing remote control using the Yggdrasil network. It has been found that the following is appropriate in the system: the use of mobile phones with support for the RNDIS protocol; application of networks of mobile communication operators and special software on the client side. The authors, to simplify the installation and configuration of the Yggdrasil client on end devices running Windows operating systems, implemented the YggVPN configuration utility in the C programming language. The version of the remote control system proposed in the article is implemented and tested using the client/server software TigerVNC, which is used at staff workplaces, and the droidVNC-NG application, which is used for remote control of phones. Yggdrasil network tools and password protection of VNC servers ensure communication confidentiality and prevent unauthorized access to the object. Communication with the object is carried out via the Internet, thereby ensuring the mobility of remote operators and workplaces.</p> H. H. Kyrychek O. D. Pestov M. Yu. Tiahunova Copyright (c) 2024-12-17 2024-12-17 68 2 63 70 10.32782/2521-6643-2024-2-68.7 MOBILE ROBOT NAVIGATION BASED ON LASER RANGE-METRY METHODS https://st.umsf.in.ua/index.php/journal/article/view/160 <p>The article is devoted to solving the problem of finding people who are under the debris of destroyed buildings, which requires an urgent solution to ensure an effective rescue operation. The primary focus of this research is the development and refinement of a navigation system for a mobile rescue robot. This paper specifically explores localization techniques and methods for constructing a map of an unknown environment, which are crucial for the robot’s effective operation in complex and dynamic settings. The overarching goal of the study is to identify the most adaptable and precise navigation method that can effectively manage the movement of a mobile robot in environments characterized by unpredictable and shifting obstacles. To solve the tasks, modern methods of laser telemetry and SLAM methods (Simultaneous Localization and Mapping) are used in the work, which are used to accurately create a map of the territory and localize the robot on it. The research proposes an innovative algorithm for the navigation system of a mobile robot, which leverages laser telemetry to meticulously scan the surrounding area. It has been shown that scanning process is essential for real-time data acquisition, enabling the robot to make informed decisions regarding its movement. It is stated that, the proposed lidar-based navigation method is particularly advantageous as it facilitates the creation of a detailed spatial map, even in environments where the layout is not known in advance. This approach allows for the precise determination of the robot’s position within the mapped space, ensuring that the robot can navigate effectively and avoid potential hazards. It is proved that, the integration of these advanced techniques significantly enhances the robot’s ability to perform in search and rescue missions, where the accurate and timely localization of trapped individuals is of paramount importance.</p> O. V. Streltsov М. А. Hrynyov V. Yu. Skalozub D. M. Buyukli Copyright (c) 2024-12-17 2024-12-17 68 2 71 77 10.32782/2521-6643-2024-2-68.8 MATHEMATICAL APPROACH TO IMPROVING THE PERFORMANCE OF THE PROGRAMMED IMPLEMENTATION OF THE SM4 CRYPTOALGORITHM https://st.umsf.in.ua/index.php/journal/article/view/161 <p>The paper proposes a mathematical approach to optimizing an encryption algorithm. The article is devoted to improving the performance of computing algorithms, which is one of the important areas of scientific research. SM4 to improve the performance of the algorithm. SM4 is a fairly common algorithm that is still in use today. At the moment, there are a large number of hardware and software implementations in which, using the features of the architecture or programming language, it is possible to ensure high performance of the algorithm. Symmetric cryptographic algorithms have a fairly high performance compared to asymmetric ones. Symmetric algorithms are used to encrypt messages or large files. Simple stages of the algorithms can be reduced to simple operations. This approach is described in the Ukrainian standard for symmetric stream encryption DSTU 8845:2019 (the Stream algorithm). Its peculiarity lies in the fact that the stages of the algorithm, nonlinear substitution performed using the cyclic shift operation, multiplication of the polynomial term by the field element, are simplified to a simple replacement from pre-calculated tables of constants. The article reveals that, as a result of this optimization, Strumok allows to form pseudorandom sequences with a speed of more than 10 Gbps. Today, the SM4 block encryption algorithm is widely used in the LibreSSL library, which is responsible for establishing a secure network connection according to the SSL/TLS protocol, and is part of the Libgcrypt cryptographic library, which is developed by GNU Projects. It was found that despite its widespread use, the algorithm itself does not have the optimization paths that Strumok has. The article optimizes the mathematical apparatus of SM4, which uses the peculiarity of the cyclic shift operation and reduces the calculation action to a direct replacement from the tables of constants, as was done in the national algorithm Strumok. The article proves that the optimization of the algorithm is a reduction of computational operations to direct replacement from the tables of constants. The article describes how the tables of constants are formed, as it was done in the national algorithm Strumok. The article determines that the software implementation of the basic and optimized algorithms showed that the execution time of the optimized SM4 decreased by about 2.69 times, which means a positive impact of optimization on the algorithm’s performance. The speedup was tested for different sizes of incoming messages.</p> G. L. Kozina Yu. V. Savchenko V. O. Voskoboinyk D. I. Prokopovich-Tkachenko V. V. Katsiuba Copyright (c) 2024-12-17 2024-12-17 68 2 78 85 10.32782/2521-6643-2024-2-68.9 EMERGENT-ADAPTIVE METHOD OF ASSESSING THE IMPACT OF THE POST-QUANTUM ENVIRONMENT ON THE INFORMATION SECURITY OF THE STATE https://st.umsf.in.ua/index.php/journal/article/view/162 <p>The article proposes an emergent-adaptive method for assessing the impact of the post-quantum environment on the state’s information security, based on the principles of self-organization and synergy. The method aims to ensure effective responses to threats associated with the development of quantum computing, which may compromise existing cryptographic protocols such as RSA and ECC. The critical role of artificial intelligence in analyzing, forecasting, and dynamically adapting defensive systems is highlighted. During attack modeling, simulations are conducted to evaluate the impact of quantum computing on cryptographic systems, specifically assessing the resilience of key protocols against attacks by Shor’s and Grover’s algorithms. At the adaptation stage, quantum-resistant cryptographic solutions such as lattice-based algorithms, code-based schemes, and hash functions are implemented, and their effectiveness is monitored. This is followed by a threat analysis that focuses on exploring the capabilities of quantum computing to break current cryptographic systems. The next step is a vulnerability assessment that identifies the cryptographic algorithms used, such as RSA and ECC, and analyzes their resistance to quantum attacks. This is followed by an analysis of critical points and communication protocols, which includes assessing the resistance of protocols such as TLS/SSL, IPsec, VPN to possible quantum attacks. The next stage is attack simulation, which involves modeling quantum attacks to assess the likelihood of their success. The final stage is the development of post-quantum security solutions, which includes the selection and implementation of new cryptographic algorithms that are resistant to quantum attacks and their integration into existing systems. All stages are interconnected and ensure the dynamic adaptation of the system to new challenges. It has been proven that the proposed approach enhances the resilience of information systems to new threats by integrating classical and post-quantum protocols. Particular attention is given to the synergy of various security components, enabling the creation of adaptive and self-organized systems. Prospects for further research include the development of emergent models, the integration of post-quantum solutions into state information systems, and the adoption of an interdisciplinary approach to cybersecurity.</p> D. I. Prokopovych-Tkachenko Copyright (c) 2024-12-17 2024-12-17 68 2 86 94 10.32782/2521-6643-2024-2-68.10 CYBER RESILIENCE: GLOBAL THREATS AND NATIONAL CYBER DEFENSE STRATEGIES https://st.umsf.in.ua/index.php/journal/article/view/163 <p>The widespread use of information technologies leads to numerous crimes and the emergence of new types of threats based on the use of various means, methods and elements of influence on human consciousness. The formation of a single global information space has enabled everyone to access information from different parts of the world. Remote management of business, management of personal assets, conducting transactions, provides criminals with new means of interfering with personal data of citizens in order to obtain them. The purpose of the article is to study the global information space, which has become a limitless place and tool for crime. Information and communication systems have become the main instrument of crime. The use of illegal technical means, creation of viruses, spam, phishing attacks and other means have enabled cybercriminals to gain access to confidential information, databases, restricted information, payment cards, bank accounts and automated management systems in order to steal and take possession of data, resulting in various forms of fraud. The theft of personal data and commercial information to seize the funds of bank customers, deliberate damage and corruption of information systems and communications is a small list of malicious actions of modern fraudsters that cause losses to enterprises, institutions, organizations and individuals. The use of various attacks on Internet resources with the help of rapidly developing modern information technologies has become the basis for cybercriminals to cause damage and losses to the country’s critical infrastructure. It has been established that in times of war, the number of cybercrimes has increased many times and is being committed to destabilize the state, cause damage, disable equipment, technology, communications and communications. Hacker attacks can gain control over personal data, databases of large enterprises and institutions, and become a threat to data leakage and network damage.</p> L. V. Rybalchenko O. A. Haborets D. I. Prokopovych-Tkachenko Copyright (c) 2024-12-17 2024-12-17 68 2 95 101 10.32782/2521-6643-2024-2-68.11 FRONT-END SECURITY ARCHITECTURE: PROTECTION OF USER DATA AND PRIVACY https://st.umsf.in.ua/index.php/journal/article/view/164 <p>Investigation of this topic is relevant in light of the significant increase in the frequency and scale of cyber-attacks that affect various industries and organisations. The purpose of this study is to analyse existing data protection methods at the Front-end, which are able to effectively protect the confidentiality of user data in the face of modern cyber threats. Among the methods used, the analytical method, synthesis, classification, statistical and other methods should be noted. The study identified serious risks associated with storing confidential data on the client side. In particular, the use of cookies and local storage turned out to be vulnerable points that pose potential threats to data security. An analysis of existing web applications revealed the presence of cross-site scripting (XSS) vulnerabilities, which became a route for the introduction of malicious scripts. It was revealed that the generation and use of unique cross-site request forgery (CSRF) tokens for each request play a key role in preventing cross-site request forgery. The implementation of Governance as Code (GaC) technology has demonstrated potential for automating compliance with established architectural and security standards, thereby reinforcing front-end defenses against cyber threats. The findings emphasise the importance of educating end users on the basic principles of network security. The study highlights the importance of developers’ active involvement in Front-end security. Thus, a comprehensive overview of the Front-end security architecture with a focus on protecting user data and ensuring privacy is provided. The practical significance of the study lies in the provision of specific recommendations and practical solutions to improve Front-end security in web applications and represents a valuable set of tools and approaches that can be applied by developers and engineers to strengthen the security of web applications. The addition of Governance as Code technology introduces an innovative layer of automated security enforcement that is particularly suited to addressing emerging cybersecurity challenges in real-time.</p> A. S. Chechet M. V. Chernykh Ia. S. Panasiuk I. I. Abdullin Copyright (c) 2024-12-17 2024-12-17 68 2 102 111 10.32782/2521-6643-2024-2-68.12 IOT IN CONTAINER SHIPPING INDUSTRY: APPLICATIONS AND EXAMPLES OF SOLUTIONS https://st.umsf.in.ua/index.php/journal/article/view/165 <p>The study analyzes the participation of technologies related to the development of the Internet of Things (IoT) network concept in the intermodal container transportation system. Since the beginning of the XXI century, IoT-related technologies have been dynamically spreading in almost all areas of international business, and this has changed the understanding of cargo owners about the quality of transportation services, among other things. Since transparency in monitoring the location of high-value goods is extremely important for transport companies, cargo owners, and all other stakeholders, and the intermodal transportation system is extremely complex due to the number and diversity of communications, the need to use IoT is obvious. As analysts predict that the introduction of IoT technologies in containerization will become widespread in the coming years, a study to assess the level of research on the introduction of such technologies and implementation in the practical activities of transport enterprises is relevant. The aim of the proposed review is to determine the degree of IoT implementation in the container transportation industry, areas of research on the topic, and identify factors that may impede the predicted rapid development of IoT in containerization. The proposed study includes an analysis of scientific publications related to the use of the Internet of Things in the field of international container transportation, identifies the main priority areas of such publications, establishes the areas of current implementation of IoT technology and determines the prospects for its use. Since the solutions that can potentially be obtained with the help of IoT are quite heterogeneous, the literature analysis is organized by grouping such publications into the following areas: container monitoring and tracking, enhancing supply chain transparency and visibility, optimization of operational efficiency, security and risk management, environmental impact and sustainability, challenges and barriers. The paper provides examples of online platforms and applications currently offered by major container operators that are related to this technology.</p> O. L. Drozhzhyn Copyright (c) 2024-12-17 2024-12-17 68 2 112 120 10.32782/2521-6643-2024-2-68.13 STATISTIKAL ASSESSMENT OF INDIVIDUAL QUALIFICATIONS OF CUSTOMS INSPECTORS IN THE PROCESSING CUSTOMS DECLARATIONS BASED ON THE HARINGTON DESIRABILITY FUNCTION https://st.umsf.in.ua/index.php/journal/article/view/166 <p>This study utilizes statistical data on processed customs documents to develop an econometric model of the number of processed customs documents using correlation-regression analysis methods and Microsoft Excel tools. This study will be useful for customs affairs considering that modeling is a necessary tool which assists in identifying and analyzing the essential characteristics for a country’s foreign trade. Modeling is a crucial tool in customs affairs, as it helps to identify and analyze essential characteristics for the country’s foreign trade. Modeling is particularly important for the State Customs Service of Ukraine, as it allows to study the foreign trade processes without direct experimentation. Today the main aim of Ukraine’s state policy in the field of customs affairs is supporting and developing the national economy and integrating it into the global economy. To protect the national interests of Ukraine, it is necessary to continuously monitor and regulate foreign trade operations. The Cabinet of Ministers of Ukraine has approved a list of documents required for customs control and clearance of goods and vehicles crossing the customs border of Ukraine. The State Customs Service of Ukraine constantly collects, stores, processes, analyzes, protects, and disseminates official statistical information on goods moving across the customs border of Ukraine which are used in this article to conduct research. Key elements of high-quality analysis and forecasting include proper problem formulation, the appropriate selection and application of mathematical apparatus, and adherence to the methodology of conducting statistical research. During this study the special attention was given to determining the reliability of the obtained results and validating the adequacy of the constructed regression model. This, in turn, allows more accurate forecasting of the volume of processed customs documents in the upcoming year. The results obtained serve as an important tool for managing customs policy and planning the volume of Ukraine’s internal and external trade for the next period. This enables more efficient resource allocation, development of growth strategies, and optimization of customs procedures, which will facilitate Ukraine’s further integration into the global economic system.</p> V. V. Lebid Yu. A. Meish N. V. Kopiak Copyright (c) 2024-12-17 2024-12-17 68 2 121 129 10.32782/2521-6643-2024-2-68.14 ANALYSIS OF ORGANIZING THE DELIVERY OF HUMANITARIAN AID IN CRISIS SITUATIONS https://st.umsf.in.ua/index.php/journal/article/view/167 <p>The article is devoted to analyzing humanitarian logistics in Ukraine, which has developed significantly since 2014 and increased, in particular, during the full-scale invasion of 2022. Humanitarian logistics have become critical to supporting both the military and civilians affected by the conflict. The authors research the impact of various aspects of humanitarian aid, including economic factors such as reduced exports and a drop in the gross domestic product (GDP), on the volume and efficiency of humanitarian aid delivery. In particular, the impact of the closure of large metallurgical enterprises on the country’s economy is analyzed. The activities of such charitable organizations as “Come Back Alive” and “Volunteering and Help Center” were reviewed, which carry out mass transportation of humanitarian goods and provide support to both military and civilian persons. These organizations play a key role in providing the population with necessary resources, such as medicine, food, hygiene products, clothing, etc. They also actively collaborate with international partners and volunteer groups to coordinate aid and improve logistics processes. Data on the amount of support provided by category (hygiene, medicine, food, etc.) are also considered. The article provides an analysis of the logistics routes used for the delivery of goods, taking into account various factors such as the safety of the routes, the efficiency of the transportation process, and the speed of delivery. The importance of flexibility and adaptability of logistics systems in the conditions of continued martial law is highlighted. The research emphasizes the importance of cluster analysis and clustering methodologies for effective decision-making in the field of humanitarian logistics. The article also includes references to legislative acts and portals that regulate and support humanitarian aid in Ukraine. These resources provide a legal basis for the activities of charities and provide important information for donors and volunteers. They contribute to the transparency and accountability of the aid delivery process, which is critical for maintaining trust on the part of the international community and the population of Ukraine.</p> H. I. Nesterenko M. I. Muzykin S. I. Bibik O. H. Strelko A. O. Aleksieieva Copyright (c) 2024-12-17 2024-12-17 68 2 130 139 10.32782/2521-6643-2024-2-68.15 MODERN METHODS OF REMOTE DATA PROCESSING https://st.umsf.in.ua/index.php/journal/article/view/168 <p>Remote sensing is the modern technique of obtaining information about the objects by data collected from special apparatus that are not physically in contact with the objects being studied. Remote sensing provides information about objects at the surface of the Earth based on analysis of electromagnetic radiation reflected or emitted from these objects. Modern methods and technologies of remote sensing of the Earth make it possible to distinguish different objects at the surface of the Earth, to analyze these objects and changes, make predictive assessments. This technique is applied for numerous fields, such as: geology, ecology, geophysics, geography, hydrology, oceanography, meteorology. Remote-sensing application involves two distinct processes: data acquisition and data processing. One of the most difficult data processing procedures is the classification procedure. Classification is based on that fact, that different objects have a different spectral reflectance. Classification procedure is defined as the process of categorizing all pixels in an image to obtain land cover map. There are different classification approaches that have been developed and widely applied for solution of various tasks, such as maximum likelihood method, minimum distance method, parallelepiped classification, Support vector machines (SVM). It were analyzed main advantages and disadvantages of these methods. It also was noted, that many classification approaches can not process vague and conflicting information. It was proposed to apply the Dempster-Shafer evidence theory and Yager’s combination rule for classification of ambiguous and contradictory data from different spectral bands. The application of Dempster-Shafer evidence theory arises from the necessity to overcome some limitations of Probability Theory. It was also considered a formula of Yager’s combination rule in this work. It was noted, that Yager’s combination rule can quickly and easy process information. It was considered the numerical example, where Dempster-Shafer evidence theory and Yager’s combination rule were applied for classification in this paper. It was noted, that choice of classification method depends of specific task. Described methods for aerospace image processing can be applied in different actual ecological, agriculture and practical tasks.</p> S. I. Alpert Copyright (c) 2024-12-17 2024-12-17 68 2 140 146 10.32782/2521-6643-2024-2-68.16 PECULIARITIES OF THE DEVELOPMENT OF GASTRONOMIC TOURISM IN GEORGIA https://st.umsf.in.ua/index.php/journal/article/view/169 <p>The article examines the essence of gastronomic tourism and its structure, considers its various definitions developed by foreign and domestic scholars. Gastronomic tourism is one of the types of excursion and educational tourism that was formed at the end of the 20th century. This is a relatively new but extremely interesting direction of the tourism business, which is actively developing, allowing travellers to learn about the cuisine of different countries and ethnic groups. The research uses the methods of structural-logical and semantic analysis (to clarify the terminology and conceptual apparatus of gastronomic tourism); system analysis (to assess the current state and prerequisites for the development of GT in Georgia), statistical method (to assess the place of GT in the tourist industry of Georgia), graphic method (for visual presentation of statistical data). The formation and development of gastronomic tourism in the world, its importance for the formation of the image of the territory are analysed. It is determined that gastronomic tourism is an integral part of all tours, and gastronomy has the potential to increase the attractiveness of the tourist product and tourist destination in general. It is proved that creating a favourable image of a country through the prism of national cuisine is a successful marketing ploy that helps attract tourists. It is intended, on the one hand, for tourists seeking knowledge and experience of new cultures, and, on the other hand, it provides additional value to the brands of tourist destinations. The influence of international (the World Food Travel Association and others) and national gastronomic tourism organisations on its development is characterised. The place of gastronomic tourism in the tourism industry of Georgia and the prospects for its development are analysed. It is proved that the culinary and wine sectors of Georgia play an important role. Thus, the contribution of the "Food and beverage service activities" sector in recent years has been approximately 20% in the GDP structure of the tourism industry. The analysis of the Georgian tourism sector has shown that gastronomic tourism in Georgia has significant potential to contribute to the development of new quality tourism products and experience. For its part, the National Tourism Administration of Georgia is doing its utmost to promote gastronomic tourism both nationally and internationally.</p> Z. V. Boyko N. A. Horozhankina M. V. Korneyev H. V. Shcholokova S. O. Umanska Copyright (c) 2024-12-17 2024-12-17 68 2 147 154 10.32782/2521-6643-2024-2-68.17 FEATURES OF MANAGEMENT OF OPERATIONAL ACTIVITIES OF RESTAURANT ENTERPRISES https://st.umsf.in.ua/index.php/journal/article/view/170 <p>The article reveals the essence of managing the operational activities of a restaurant business enterprise. The functions of production management at the restaurant business enterprise were considered. The condition and evaluation of the operational efficiency of the restaurant enterprise was analyzed. The main indicators characterizing the production capacity of the operating system at the enterprises of the restaurant industry were established. Indicators that increase the efficiency of the use of production facilities and indicators that characterize the organizational and technical level of production are systematized. Production efficiency indicators were formed into general groups. On the basis of the research, it was found that different both foreign and domestic scientists form certain groups of indicators in their scientific research. It has been proven that operational management requires measurement indicators of such factors as: product quality; innovations; costs; speed of processes; flexibility. The main factors affecting the level of satisfaction of the needs of consumers of restaurant products are considered. The directions for improving the features and a comprehensive approach to the effectiveness of management of the operational activities of the restaurant business have been defined and substantiated. On the basis of this study, it was determined that it is appropriate to accept the profitability of the enterprise's operational activity as the largest generalizing indicator of the efficiency of the enterprise's operational activity. The essence of managing the operational activities of a restaurant is to ensure the effective functioning of all aspects of the business related to its daily activities. The main aspects of this management include: processes and operations; product and service quality; HR; financial management; risk and security management; strategic planning and business development. These aspects help to ensure efficient and stable operation of the restaurant, ensuring that customer needs are met, costs are optimized and business goals are achieved.</p> M. M. Kucher N. F. Stebliuk S. O. Haponenko М. Yu. Razinkova K. O. Papsuy Copyright (c) 2024-12-17 2024-12-17 68 2 155 160 10.32782/2521-6643-2024-2-68.18 HOSTELLING AT GLOBAL AND NATIONAL LEVELS https://st.umsf.in.ua/index.php/journal/article/view/171 <p>The current state of the global hostel market is characterized. It has been established that the global hostel market reached USD 4.1 billion in 2022. The leader in the hostel market is the Asia–Pacific region, which is experiencing active recovery in international tourism following the COVID–19 pandemic. The European region ranks second, followed by the Americas. It has been determined that the largest share of hostel guests consists of individuals aged 25 to 34. The TOP–5 hostel networks in the world as of 2022 were: a&amp;o Hostels, Zostel, Meininger, St Christopher’s Inns, and Nomads World. The current state of hostelling in Ukraine is analyzed. It has been established that at the present stage, under the conditions of Russian aggression in Ukraine, official statistics do not reflect the actual number of hostel establishments. The review of the hostel base was conducted based on online booking websites. Hotelmix offers guests hostels in 20 cities of Ukraine, totaling 272 hostels. The largest number of hostels is located in Kyiv (39.3% of the total number of available hostels), followed by Lviv (20%) and Odesa in third place (7.4%). Booking.com offers guests 275 hostels in various regions of Ukraine. It was found that not all hostels are listed on official online booking platforms. A SWOT–analysis of hostel businesses was conducted. Positive changes in the hostel market require joint actions from government bodies and hostel operators. Combined efforts from both sides will ensure measures at the national level to improve hostel operations and advance the hostel industry to a new stage of development, while simultaneously preventing the influence of negative factors arising from the weaknesses in hostel operations (lack of service quality standards, the mass emergence of economy–class hotels in the market, insufficient information on hostel services, lack of legislative regulation for hostel operations) and threats (oversaturation of the market with hostel services, travelers' changing preferences toward more comfortable accommodations, the growth of the 2–3 star hotel segment, which offers an alternative to hostels, lack of government support, and a decrease in investment flows).</p> N. A. Horozhankina M. V. Korneyev K. M. Horb Ye. S. Tretyak Copyright (c) 2024-12-18 2024-12-18 68 2 161 167 10.32782/2521-6643-2024-2-68.19 ANALYSIS OF COMPETITIVENESS OF ENTERPRISES IN THE RESTAURANT SERVICES MARKET https://st.umsf.in.ua/index.php/journal/article/view/172 <p>The article conducts a comparative analysis and evaluation of the market positions of restaurant enterprises to identify key areas for their development and ways to increase their competitiveness in the food service market. The main goal of this article is to analyze the competitiveness and assess the development potential of restaurant enterprises in the Dnipropetrovsk region, justifying ways to improve their market positions. The study analyzes the current restaurant services market and identifies key development directions, including the growth of demand for healthy food, technological progress, the development of gastronomic tourism, social media, and information technologies. A comparative graph-analytical method for determining competitiveness and ranking restaurant enterprises is formulated, consisting of operations such as forming criteria parameters and establishing their weights, selecting competitors, determining ranking characteristics, calculating competitiveness indicators and overall enterprise ranking, identifying leaders and outsiders, building a competitiveness matrix and zone, and determining the radius of the leaders' circle. Based on the results of the graph-analytical analysis, the indicators for evaluating the potential of the studied enterprises in the restaurant services market of the Dnipropetrovsk region were calculated according to defined criteria parameters, as well as their level of competitiveness. Using the obtained indicators, a matrix and a graph of the competitive positions of the establishments were built. By determining the placement range of each food enterprise in the competitive field zone, their positions were characterized as follows: the "Silver" restaurant is in the zone of untapped potential; the "Magnum" restaurant is closest to the leader in the attack waiting zone; the "Oasis" restaurant is in the leaders' zone, and the "Kvitan" restaurant is in the outsiders' zone. Based on the evaluation results of the "Kvitan" enterprise, proposals for improving its activities and strengthening its competitive positions were formulated, including: improving the atmosphere, increasing comfort and service quality, enhancing staff qualifications, and greening the restaurant's territory.</p> O. I. Yudina N. O. Nebaba O. V. Sabirov Ye. L. Saihak K. O. Altunin Copyright (c) 2024-12-18 2024-12-18 68 2 168 175 10.32782/2521-6643-2024-2-68.20 TRENDS IN THE DEVELOPMENT OF THE RESTAURANT SERVICES MARKET: METHODS OF DETERMINATION AND CHARACTERISTICS https://st.umsf.in.ua/index.php/journal/article/view/173 <p>Methodical approaches to determining the current state and development trends of the restaurant services market which serve as a toolkit for forecasting future dynamic changes in the industry and planning measures for the adaptation of enterprises to the new conditions of the organization of their activities are considered in the article. The purpose of this article is the study of modern trends in the development of the restaurant services market and the formation of methodical approaches to their determination. In this study, based on the analysis of the external environment of restaurant establishments, the main methods for determining the current state of the catering services market are established, which include the methods of analyzing market stability, consumer preferences, competitive environment, and segmentation. With the help of the formed methodological toolkit, the following is carried out: survey of consumers; study of new popular dishes, recipes, technologies and trends in the industry; analysis of menus, concepts, price policy; forecasting future directions of industry development. The use of these methods allows: to determine the features of demand, supply and market equilibrium; evaluate and characterize changes in consumer needs; establish competitive advantages and disadvantages in the operation of the enterprise; determine the target audience according to established criteria. Based on the mentioned approaches and methods, the main trends affecting the development of the restaurant services market were identified and characterized. Thus, it was proven that the key directions of the development of the restaurant services market are the growing popularity of healthy food, the development of social media and information technologies, technological progress, and the development of gastronomic tourism. Certain methods are used as a tool for determining trends in the development of the industry, which provide the ability to adapt restaurant enterprises to dynamic changes in the service market. They include: marketing research methods, analysis of trends in the gastronomic industry, observation of competitors, cooperation with specialists and experts, analysis of changes in consumer demand. With the help of these methods, the main trends in the development of the restaurant business were determined, namely: economic, gastronomic, technological innovations, macroeconomic and demographic factors. These trends characterize the demand for restaurant services, the development of the restaurant business, digital development, changing consumption habits and the state of the consumer market.</p> O. I. Yudina N. O. Nebaba M. V. Korneyev O. V. Vyshnikina K. O. Altunin Copyright (c) 2024-12-18 2024-12-18 68 2 176 181 10.32782/2521-6643-2024-2-68.21 STANDARDIZATION IN THE FIELD OF HOSPITALITY – THE NEED FOR MODERNITY AND THE FACTOR OF ATTRACTING FOREIGN INVESTMENTS https://st.umsf.in.ua/index.php/journal/article/view/174 <p>The article is devoted to problems in the field of hospitality – competitiveness, investment attractiveness, which are associated with an insufficient level of sustainability, lack of guarantees and non-compliance with world-class standards. The authors of the study considered standardization and certification systems of various levels, which today are an integral part of the activities of hospitality market participants. The article presents the main trends of the hotel and restaurant business market: active recovery of demand for hospitality services, combination of work on vacation («leisure' stays»), hyperpersonalization of demand, health care, which require additional efforts and funds from industry participants. An indisputable confirmation of the quality of services and management at the enterprise is compliance with standards and norms, the indicators of which are aimed at achieving the goals of sustainable development, the enterprise, the industry, the region and the country as a whole. The article examines the features of the ESRS, IFRS S1 and IFRS S2 standards, a set of Hotel Sustainability Basics indicators, GSTC industry criteria, and ISO standards. Standards that have been working for several decades remain relevant. They control quality in various areas. New problems contribute to the creation of new standards. The IFRS S1 and IFRS S2 standards, which were released just last year, aim to keep companies on track to meet the Sustainable Development Goals. The standards are designed to create trust and confidence in the activities of enterprises, to help find a common language regarding the impact of climate risks between investors and businesses. The authors present the main problematic points of standardization processes for the Ukrainian hospitality market and further prospects for the development of the industry. It is emphasized that compliance with standards of different levels and directions by hospitality establishments not only provides guarantees to consumers when making a decision to purchase a service, but also acts as a guarantor of stability and perspective for investors who decide to invest in new hotel and restaurant business projects. Such steps will help the fastest recovery and sustainable development of domestic enterprises in the field of hospitality. Domestic enterprises will be able to confidently compete in the global hospitality market.</p> N. H. Yakovlieva-Melnyk V. V. Dzhyndzhoian Copyright (c) 2024-12-18 2024-12-18 68 2 182 189 10.32782/2521-6643-2024-2-68.22 INTEGRATED APPROACH TO ENERGY EFFICIENCY IN DESIGN AND CONSTRUCTION OF HOTEL AND RESTAURANT BUSINESS OBJECTS https://st.umsf.in.ua/index.php/journal/article/view/175 <p>The article examines the impact of architectural solutions on the energy efficiency of hotel and restaurant business facilities. Particular attention is paid to the choice of materials, buildings orientation, constructive solutions, ventilation and lighting systems, and the integration of renewable energy sources. The analysis of modern architectural approaches that help reduce energy consumption and ensure the sustainability of the hotel and restaurant business is presented. The results of the study emphasize the importance of integrating energy-efficient technologies in the early stages of design and during the operation of buildings. The paper considers the main architectural aspects that affect the energy efficiency of hotels and restaurants and provides examples of modern solutions that allow for achieving high energy efficiency indicators. The purpose of this study is to investigate the impact of architectural solutions in the design and construction of hotel and restaurant business establishments on their energy efficiency. Based on this, its objectives are as follows: to characterize the impact of external factors of the location area of the establishment and its orientation relative to the cardinal points; to identify constructive opportunities to reduce heat loss; to analyze ventilation and air conditioning systems; to provide examples of the use of renewable energy sources; to prove the benefits of building management system automation; to determine the role of lighting system quality in improving energy efficiency; to analyze the use of environmentally friendly materials; to characterize modern energy-saving technologies and innovative materials; to analyze the impact of energy efficiency on business profitability. Investments in energy-efficient technologies are often perceived as additional costs that are not always a business priority. However, the long-term perspective shows the opposite: energy efficiency can have a significant impact on the profitability of hotels and restaurants. Energy-efficient buildings are becoming more attractive to guests who are increasingly paying attention to environmental aspects when choosing a place to stay or eat. The marketing advantage provided by energy efficiency certificates or participation in sustainability programs can be a significant factor in competing in the market. It is also worth noting that energy efficiency investments often have a short payback period. Due to reduced energy costs, such projects can pay off in 3-7 years, after which the company begins to receive a net profit from the saved funds.</p> A. V. Pogrebnyak M. M. Kucher O. V. Sabirov A. V. Grytsenko H. К. Zinchenko Copyright (c) 2024-12-18 2024-12-18 68 2 190 196 10.32782/2521-6643-2024-2-68.23