Scientific Papers of Donetsk National Technical University. Series: “Computer Engineering and Automation" https://ota-new.donntu.edu.ua/ <p><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">All-Ukrainian scientific collection <strong>"Scientific papers of Donetsk National Technical University.</strong></span></span> <span class="jCAhz ChMk0b"><span class="ryNqvb"><strong>Series: "Computer engineering and automation"</strong> is a scientific specialist publication of Ukraine, in which the results of scientific research in the field of technical sciences can be published.</span></span> <span class="jCAhz ChMk0b"><span class="ryNqvb">The collection publishes articles by scientists, graduate students, masters of higher education institutions, as well as practicing scientists and engineers of leading enterprises, which contain the results of theoretical and practical research and development according to <strong>thematic sections</strong>:</span></span> </span></p> <p><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">1. Automation of technological processes.</span></span> </span></p> <p><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">2. Information technologies and telecommunications.</span></span> </span></p> <p><span class="HwtZe" lang="en"><span class="jCAhz ChMk0b"><span class="ryNqvb">3. Information and measurement systems, electronic and microprocessor devices.</span></span></span></p> ДНВЗ ДонНТУ en-US Scientific Papers of Donetsk National Technical University. Series: “Computer Engineering and Automation" 2075-4272 ESTIMATION OF COUNTING BLOOM FILTER HARDWARE COSTS FOR FPGA-BASED CYBERSECURITY SYSTEMS https://ota-new.donntu.edu.ua/article/view/313785 <p><em>The objective of the study is to research possible solutions and ways of practical implementation regarding the organization of dynamic changing the list of patterns that are matched by the hardware (FPGA-based) Bloom filter in the signature cybersecurity systems, such as network intrusion detection systems, antiviruses, spam filters, etc. Changing the list of patterns means both adding and removing elements from the list of patterns that the signature system searches in the incoming data stream, in particular in the bodies of network traffic packets.</em></p> <p><em>To achieve the goal, the principles of construction and functioning of the Bloom filter, its advantages and disadvantages compared to other matching schemes in terms of known performance indicators are analyzed in the work. The modifications and variations proposed by developers to improve its characteristics during the entire period of use in computer network cybersecurity systems are considered. The features of the hardware implementation of the Bloom filter on the FPGAs are analyzed.</em></p> <p><em>The one of two discovered</em> <em>approaches to solve the problem of dynamic readjustment, that provides greater speed due to changing the hardware structure of the device, namely the Bloom filter with counters, is considered in the work. On the example of one of the hardware scheme modifications, the so-called simplified Bloom filter, a possible option for building its digital structure is considered. To increase the efficiency of the process of developing cybersecurity systems using this scheme, a hardware resource evaluation function has been created, which allows you to find the quantitative characteristics of the cost for synthesizing FPGA-based digital devices without performing the time-consuming procedure of full project compilation. A preliminary comparison of the obtained expression with the evaluation function for the scheme of the simplified Bloom filter without counters was carried out.</em></p> Serhii Hilgurt Copyright (c) 2024 Сергій Якович Гільгурт https://creativecommons.org/licenses/by-nc-nd/4.0 2024-11-01 2024-11-01 58 69 10.31474/2786-9024/v2i2(34).313785 DEVELOPMENT OF A CONTENT MANAGEMENT SYSTEM AND ITS CLOUD DEPLOYMENT https://ota-new.donntu.edu.ua/article/view/313761 <p>The aim of this work is to create a simple and easily adaptable content management system that can be seamlessly integrated into web or mobile applications and customized according to the specific needs of a particular project. One of its key advantages is its versatility and flexibility, allowing developers to quickly and effortlessly tailor the software solution to the requirements of specific industries or business processes.</p> <p>A comprehensive technical development process was carried out, resulting in the creation of software based on the use of the PHP programming language, the MySQL relational database, and the Amazon AWS cloud deployment environment. This combination of tools ensures high performance and reliability, which are critically important for modern applications. The work provides detailed explanations of the core methods and functions used for data processing and storage. All of the software code is available as open source.</p> <p>The scientific novelty of this work lies in the presentation of the material in an accessible format, significantly simplifying the implementation of content management tasks even for individuals without deep programming knowledge. This opens up new possibilities for interdisciplinary research and collaboration across various fields, particularly in computer science and other applied disciplines such as marketing, journalism, or education.</p> <p>From a practical standpoint, the presented materials allow for the deployment of a full-fledged content management system in the Amazon AWS cloud environment within a few hours. The software code, with appropriate modifications to implement different business logic, has been successfully integrated into several websites that are visited daily by thousands of users, demonstrating the effectiveness and stability of the proposed solution.</p> <p>The materials of this work can be useful for educating students of technical and economic specialties, as well as senior high school students.</p> Yakiv (Jacob) Baytelman Valerii Potsepaiev Copyright (c) 2024 Yakiv (Jacob) Baytelman, Valerii Potsepaiev https://creativecommons.org/licenses/by-nc-nd/4.0 2024-11-01 2024-11-01 14 31 10.31474/2786-9024/v2i2(34).313761 INFORMATION SYSTEM FOR RECORDING STUDENT ATTENDANCE https://ota-new.donntu.edu.ua/article/view/313763 <p>The article discusses the creation of an information system for recording student attendance, which allows optimising the process of recording attendance at classes. In today's educational system, where more and more educational institutions are switching to distance learning due to security challenges and the need to ensure flexibility in the learning process, traditional accounting methods such as paper logs are becoming inefficient. Storing paper logs and transferring information in physical form is difficult and inconvenient, especially in any learning format. They are also time-consuming, increase the risk of errors, and do not provide quick access to information or the ability to generate reports quickly.</p> <p>Thus, the relevance of developing an information system for recording student attendance lies in the need to implement modern digital solutions that allow for easy and convenient record-keeping regardless of the learning format. This solution helps to facilitate administrative processes, improve their accuracy and provide teachers and administration with quick access to data.</p> <p>To implement the system, we chose the IntelliJ IDEA integrated development environment and the Java programming language, which provides cross-platform compatibility and easy integration with various operating systems. The article also describes the system architecture, covering the main components, including the graphical user interface and the database.</p> <p>The practical significance of the work is to create an effective and convenient tool that can significantly facilitate the process of attendance accounting, improve data accuracy and reduce the time for information processing. The system supports the function of automatic generation of reports, which allows you to quickly receive information on student attendance for any period, simplifying the work of teachers and administration. In addition, the system can be easily integrated with other educational platforms, making it a flexible and versatile solution for various educational institutions.</p> Alina Rozhko Iaroslav Dorohyi Hanna Telychko Copyright (c) 2024 Alina Rozhko, Iaroslav Dorohyi, Hanna Telychko https://creativecommons.org/licenses/by-nc-nd/4.0 2024-11-01 2024-11-01 32 38 10.31474/2786-9024/v2i2(34).313763 COMPARATIVE ANALYSIS OF MODELS FOR FAKE NEWS DETECTION AND CLASSIFICATION USING GRU https://ota-new.donntu.edu.ua/article/view/313834 <p>The article presents a comparative analysis of models for detecting and classifying fake news using GRU (gated recurrent unit), a modern neural network architecture that serves as an alternative to LSTM. The aim of the study is to evaluate the efficiency of the GRU model in comparison with other popular natural language processing (NLP) models, such as BERT, RoBERTa, and LSTM, in the context of identifying fake news. The relevance of the topic is driven by the need for accurate and timely detection of disinformation in today’s information space, which significantly impacts societal processes and decision-making.</p> <p>The research methodology is based on a comparative analysis using specific criteria. GRU, as a recurrent neural network, has a simpler architecture compared to LSTM, making it less resource-intensive while maintaining the ability to process long sequences of text. The main focus is on comparing the performance of GRU with other models in tasks related to fake news detection and classification, taking into account contextual processing capabilities.</p> <p>The results of the comparative analysis show that GRU delivers competitive performance in terms of accuracy and training speed compared to LSTM and transformer-based models (BERT, RoBERTa), especially in resource-constrained environments. GRU proves effective when handling large volumes of text and analyzing complex contextual relationships. Due to its simpler architecture, GRU is a promising model for implementation in real-time fake news monitoring and detection systems.</p> <p>The scientific novelty of the article lies in the exploration of GRU’s effectiveness compared to other NLP models for text classification tasks, which can improve disinformation identification processes. The practical significance of the study is that the results can serve as recommendations for selecting a specific class of models to solve various tasks when developing systems for combating fake news in different domains, including media, social networks, and analytical centers.</p> Vitalii Kovalenko Iaroslav Dorohyi Katerina Doroshenko Copyright (c) 2024 Ярослав Дорогий https://creativecommons.org/licenses/by-nc-nd/4.0 2024-11-01 2024-11-01 39 57 10.31474/2786-9024/v2i2(34).313834 RESEARCH OF THE EFFICIENCY OF NETWORKED CONTROL SYSTEMS https://ota-new.donntu.edu.ua/article/view/301762 <p>The purpose of this work is determined by the need for a detailed study and analysis of possible problems and shortcomings that arise or may arise when creating networked control systems (NCS). Each of the identified negative factors has its own influence and arises in different situations, has its own characteristics and different nature of behavior and origin. Since a detailed study of the operation of networked control systems is usually accompanied by the process of modeling such a system, for the adequacy and accuracy of the modeling process, it is necessary to create the correct apparatus that takes these indicators into account.</p> <p>The analyzed information from various sources and the reviewed materials made it possible to create an idea of ​​the main types and types of negative factors and shortcomings accompanying the operation of networked control systems. This approach allows for a faster and more focused response to the cause of possible delays in the operation of network control systems, which are caused by certain limitations. Considering that the indicators of speed and accuracy in the operation of control systems are one of the key ones, it would be fair to consider that the intention to improve the situation with the negative influence of such factors is an appropriate and necessary way. Since NCS is a complex system that contains elements of different levels, the very essence of the identified problems was also determined, i.e. not only the reasons for the appearance and occurrence of these factors were clarified, but also what they are, what they influence and to which it can lead to consequences in certain situations and under different conditions.</p> <p>Taking into account the possible presence of such negative factors in networked control systems, it seems logical to try to determine approaches and methods that can be used to reduce or neutralize this or that limitation in various possible conditions. Understanding the possibility of the presence of negative factors and imperfections in the operation of networked control systems, we have the opportunity to play ahead and lay elements during the design and construction of such a system that will improve the performance of the system. In relation to these approaches, information is also provided on the conditions in which they can be applied.</p> <p><strong><em>Keywords</em></strong><em>: networked control systems, modeling, NCS, control, stability of operation.</em></p> Ivan Chystyk Viktoriya Voropayeva Copyright (c) 2024 Ivan Chystyk, Viktoriya Voropayeva https://creativecommons.org/licenses/by-nc-nd/4.0 2024-11-01 2024-11-01 4 13 10.31474/2786-9024/v2i2(34).301762