Bulletin of Lviv State University of Life Safety https://journal.ldubgd.edu.ua/index.php/Visnuk <p>Thematic focus:<br>Management; <br>Ecology; <br>Computer Science and Information Technology; <br>Cybersecurity; <br>Chemical Technologies and Engineering; <br>Environmental Technologies; <br>Fire Security; <br>Civil Security;<br>Transport Technologies.</p> uk-UA <p>Copyrights CC-BY</p> [email protected] (Тетяна Мирославівна Войтович / Tetiana Voitovych) [email protected] (Марія Пилипівна Сорочич / Mariia Sorochych) Wed, 25 Dec 2024 00:00:00 +0200 OJS 3.1.0.1 http://blogs.law.harvard.edu/tech/rss 60 Титуьна сторінка https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2791 Вісник ЛДУБЖД ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2791 Tue, 31 Dec 2024 16:06:24 +0200 ЗМІСТ https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2792 Вісник ЛДУБЖД ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2792 Tue, 31 Dec 2024 16:19:40 +0200 THE ECOLOGICAL STATE FORECAST FOR THE TERRITORIES WITH CHEMICAL LIQUID WASTES ACCUMULATION OBJECTS BASED ON COGNITIVE MODELLING https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2763 <p><strong>Introduction</strong>. Today territorial ecological state evaluation is still the actual problem for objects of manufacturing waste storage and accumulation. The problem complexity is linked to information uncertainty of purified liquid waste components influence consequences in environment ecosystems.<br><strong>This ecological problem complex solution is proposed and is based on cognitive modeling of research system object </strong>«liquid wastes state – danger factors – environment ecosystems», determining synergetic realization conditions of ecological equilibrium of «cleaned liquid wastes – environment ecosystems safety» according to computer modeling experiment results in liquid wastes storage and utilization safety control software.<br>This will allow to avoid dangerous situations at natural anthropogenic territories by foreseeing essential negative influence factors upon the environment and prompt determining danger factors for decision making.<br><strong>Purpose.</strong> Complex problem-solving development for the territories with chemical liquid waste accumulation objects based on computer forecast of the situation with the cognitive model of the object «liquid waste state – danger factors – environment ecosystems» for worst-case situations prevention on the example of by-product coke plant functioning.<br><strong>Methods.</strong> Cognitive imitation modeling allows to deal with weakly structured systems, natural anthropogenic objects ambiguous conditions, and implement concepts that neutralize dangerous liquid waste components and influence the environment. Information software capabilities were used to implement analytical and forecast cognitive model advantages for complex system object monitoring.<br><strong>Results.</strong> A system of comprehensive research on the environmental situation at liquid waste management facilities has been developed, making it possible to identify important factors of stabilization processes and the danger of ecological balance in the environment. So it was proposed to take into account not only controlled systems but also their state changes and consider as the control object the complex system «wastes ® wastes and ecosystems components interaction ® ecosystem state». Acquired results of propositions' practical capabilities were implemented in example modeling and forecast of liquid waste states from phenol plant Toretsk city according to SPF Inkor and Co project.<br><strong>Conclusion.</strong> The complex safety evaluation system is proposed for the situation «liquid wastes state – environment ecosystems» for current and forecast control at cleaned liquid waste storage objects based on state cognitive maps for complex weakly structured systems. It will allow in time reaction at high danger objects and neutralize danger factors according to detected ecological misbalance processes in the environment. A complex control system for handling liquid waste storage and ecological systems states was developed due to software for complex monitoring.</p> T. V. Kozulia ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2763 Mon, 30 Dec 2024 11:36:08 +0200 ASSESSMENT OF THE ECOLOGICAL STATE OF SOILS OF THE URBAN ECOSYSTEM OF THE CITY OF HORODOK, LVIV REGION https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2764 <p><strong>Introduction.</strong> Soil pollution is a serious environmental problem of both large and small cities with a significant level of anthropogenic load. Constant processes of transformation of the urban environment, construction processes, development of industry, transport affect the properties of the soil due to the influx of pollutants. Performing a number of ecological functions, the soil ensures the stability of both individual biocenoses and the biosphere as a whole, therefore, the study and assessment of the ecological state of the soil cover in the urban environment is a relevant and important task.<br><strong>Purpose.</strong> The purpose of the work is to study and assess the quality of soils within the city of Horodok, Lviv region.<br><strong>Methods.</strong> Soil samples were selected using the "envelope" method and prepared for analysis in accordance with DSTU ISO 11464:2007. Measurement of the content of the studied elements in the soil was carried out using X-ray fluorescence analysis using the Elvax Light SDD analyzer. Assessment of the ecological state of the soils was carried out by comparing the actual values of the concentration of the studied samples with the MPC of the gross form and background concentrations (clarks) for the studied region, calculating the coefficient of concentration of the chemical element and the total indicator of soil pollution.<br><strong>Results.</strong> According to the results of the conducted research, it can be stated that the soils of the city of Horodok are subject to significant anthropogenic impact. The content of Mn, S and P significantly exceeds their average content in soils, and the concentrations of heavy metals are significantly higher than the background values for the studied region: Mn – up to 2.34 times, Sr – up to 2.36 times, Zr – up to 2.81 times, Сr – up to 3.44 times, Zn – up to 4.98 times, Fe – up to 6.83 times, Pb – up to 15.19 times, Cu – up to 18.87 times. In terms of the total pollution index, the soils near the bypass road, motorway Е40 (M-11) and the railway station Horodok-Lvivskyi experienced the greatest anthropogenic impact.<br><strong>Conclusion. </strong>The problem of soil pollution within urban agglomerations, active urbanization and technogenesis, industrial development and intensive development of transport infrastructure contribute to an increase in anthropogenic pressure on urban areas.</p> I. M. Kochmar, Kh. V. Levynska ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2764 Mon, 30 Dec 2024 12:18:28 +0200 THE IMPACT OF MILITARY ACTIONS ON WATER QUALITY IN RIVERS OF UKRAINE https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2765 <p><strong>Introduction.</strong> Military actions negatively affect the environment, in particular surface waters. Pollution is caused both by the ingress of equipment, weapons, explosives and explosion products into the water, and the ingress of various pollutants as a result of the destruction of facilities, treatment facilities, etc., as well as changes in production processes.<br><strong>Purpose.</strong> The purpose of the research is to compare the quality of surface waters in rivers located near the places of hostilities and in the rear areas of Ukraine according to monitoring data.<br><strong>Methods.</strong> The work uses statistical, comparative and analytical research methods.<br><strong>Results.</strong> The study was conducted based on water monitoring data for the Dnieper (Zaporizhzha) and Western Bug (Sokal) rivers. Analysis of the results of water monitoring by key quality indicators enables the identifying the influence between water quality indicators and the monitoring period - before the war and after its outbreak. Monthly monitoring data from 01.2021 to 10.2024 of the concentration of ammonium ions, BOD5, dissolved oxygen, nitrate ions, nitrite ions, sulfate ions, phosphate ions and chloride ions were analyzed.<br>Dependency graphs were constructed, the main statistical characteristics were calculated. The indicators were compared with the maximum permissible concentrations established by regulatory documents.<br>The presence, type and closeness of relationships were determined by the correlation coefficients between the corresponding quality indicators of both rivers for the entire research period, the period before the war and after its beginning. Correlation matrices were constructed between the water quality indicators of each river during these periods. Differences in the behavior of the indicators, their statistical characteristics, as well as correlation relationships were identified.<br><strong>Conclusion.</strong> According to the results of monitoring the quality of surface waters of the Dnieper River (Zaporozhye city) and the Western Bug (Sokal) before the start of the full-scale war and after its start, differences in quality indicators and their dynamics were revealed, which is due to military operations and the destruction of facilities with the entry of pollutants into the water, changes in the intensity of industrial and agricultural production associated with the war and internal migration of the population. Since the state of water is affected by various factors, including weather and climate conditions, no clear relationship can be found that describes these effects, but the impact of military operations is quite obvious.</p> A. D. Kuzyk, B. Ya. Boichuk, K. A. Korol, R. O. Dyrda ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2765 Mon, 30 Dec 2024 12:35:26 +0200 THE CURRENT HYDROCHEMICAL AND ECOLOGICAL STATE OF THE LOWER REACHES OF THE SINYUKHA RIVER https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2766 <p><strong>Problem statement</strong>. The issue of preserving and restoring the ecological state of rivers in the southern regions of Ukraine is always relevant. These areas are characterized by a significant permanent water shortage. The aggravation of the water supply problem has been sharply stimulated not only by military operations in the south of Ukraine but also by the climatic aspects of the record-hot summer of 2024. The Sinyukha River is one of the largest tributaries of the lower section of the Southern Bug and forms the entire water supply in its lower reaches. A characteristic feature of the river is its significant use in various areas of economic activity.<br><strong>The purpose of the study</strong> is to analyse and assess the current hydroecological state of the lower reaches of the Syniukha River.<br><strong>Research methods.</strong> The assessment of the ecological state of the Syniukha River was based on the analysis of continuous monitoring data on hydrological and hydrochemical indicators, as well as on the results of field surveys and laboratory tests during 2021-2024. The assessment was based on the approaches set out in the newly developed methodology for assigning a surface water body to one of the classes of ecological and chemical status of surface water bodies.<br><strong>Research results. </strong>The Sinyukha River is one of the largest tributaries of the lower section of the Southern Bug and forms the entire water supply in its lower reaches. Its geological and landscape specificity determines a fairly powerful year-round water content and a relatively satisfactory and seasonally stable hydrochemical state of the river. The salinity of river water and its structure are limited by the specificity of the rocks of the near-surface morpho-sculpture of the catchment, as well as by the perceptible level of surface runoff (runoff coefficient is more than 0.53). The latter is formed within the boundaries of the South-Dnieper Upland, the areas of which are characterized by the significant geochemical activity of solid, ionic, and colloidal runoff transfer. The assessment of the ecological status of the Synyukha River is based on the analysis of continuous monitoring data on hydrological and hydrochemical indicators, as well as the results of field surveys and laboratory tests during 2021-2024. The assessment was based on the approaches set out in the newly developed methodology for assigning a surface water body to one of the classes of ecological and chemical status of surface water bodies. The results of the analysis of the hydrochemical composition of the water show that the Syniukha River, compared to the Southern Bug, receives minimal pollution and its waters generally retain their natural hydrochemical structure and drinking value. The water quality in its lower reaches corresponds to the third class and directly depends on the volume and purity of inflows from the Forest-Steppe.<br><strong>Conclusions. </strong>The results of the water quality assessment obtained in the lower reaches of the river reflect the stressed ecological state of the entire Syniukha water network and its catchment, which is aggravated by the presence of specific chemicals. The results of the study can be used in the development of water protection measures and water management strategies in the lower Pobuzhzhia.</p> N. I. Magas ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2766 Mon, 30 Dec 2024 12:45:00 +0200 FEATURES OF WASTE MANAGEMENT IN MODERN CONDITIONS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2767 <p><strong>Introduction</strong> The generation of waste of various origins is one of the most challenging problems in the modern world, as it is inherent in enterprises of various economic sectors and accompanies daily human activities. Waste management challenges include the fact that some of it cannot currently be recycled and reused, but only disposed of in a not always safe manner. Huge volumes of waste are piled up at landfills, illegal dumps, and buried in the cavities of mines. Destructed components of such waste pollute the environment by entering groundwater, damaging soil cover, and polluting the air. The accumulation of such waste can lead to spontaneous fires and landslides, which negatively affects the health of people living nearby and worsens the state of the surrounding natural ecosystems. In the Ukrainian context, the above problems are exacerbated by the accumulation of destruction waste generated by the full-scale invasion of Ukraine by Russian troops. Therefore, it is important to establish a waste management system that takes into account international practices and the current situation in Ukraine caused by military operations.<br><strong>Purpose.</strong> To highlight the problems of the national waste management system in modern conditions and to outline the main areas of activity to overcome the existing challenges.<br><strong>Methods.</strong> The methods of analysis and statistical methods of research on open data on waste management and relevant regulatory support were used.<br><strong>Results.</strong> Statistical data on the main waste management operations in Ukraine in the period before the full-scale invasion, as well as on the destruction waste accumulated since February 24, 2022, were analysed and processed.<br>The author describes the consequences of the negative impact on the environment and economy of Ukraine due to the improper implementation of the waste management hierarchy.<br>The main groups of challenges in the field of waste management are identified, which are caused by the significant volumes of waste accumulated in Ukraine in recent years, as well as a significant increase in the amount of waste generated as a result of hostilities, attempts to radically reform the national waste management system in a short time and in the absence of necessary regulatory and methodological materials. Specific gaps in waste management were noted.<br>It is emphasized that the implementation of successful international practices and developed national strategies makes it possible to identify priority tasks for improving the waste management system.<br><strong>Conclusions</strong>. Taking into account the experience of best practices in waste management, implementation of advanced waste minimization technologies, optimization of processing operations and use of certain waste as secondary raw materials, formation of understanding of the role of products after their life cycle and transformation into waste, development of an effective regulatory framework with amendments to determine the status of destruction waste will contribute to the development of an effective national waste management system as a significant contribution to the sustainable development of Ukraine in the post-war period.</p> V. M. Storozhuk, B. Y. Kshyvetskyy, O. M. Mayevska, O. В. Ferents ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2767 Mon, 30 Dec 2024 14:30:20 +0200 INTEGRATION OF SMART SYSTEMS IN THE EDUCATIONAL ENVIRONMENT OF HIGHER EDUCATION INSTITUTIONS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2768 <p><strong>Introduction. </strong>This article addresses the integration of smart systems into the educational environment of higher education institutions, a relevant topic in the context of digital transformation and the adoption of modern technologies in the learning process. Contemporary smart systems are based on principles of artificial intelligence (AI), the Internet of Things (IoT), big data, and automation, enabling personalized learning trajectories, improving teaching efficiency, and fostering new forms of interaction between students and instructors. Implementing these technologies allows higher education institutions to adapt their educational processes to societal needs and enhance their quality. The main challenge in integrating smart technologies lies in the insufficient readiness of educational institutions for digital transformation. This is manifested through a lack of technical infrastructure, inadequate training of instructors, and financial limitations. Additionally, there are ethical concerns related to data privacy and the risks of over-dependence on technology, which may impact the quality of traditional teaching methods.<br><strong>Purpose. </strong>To analyze the key aspects of integrating smart systems into higher education, including the use of information and communication technologies to ensure personalized learning, exploring approaches to enhancing the accessibility&nbsp;of e-learning through the professional development of educators, and identifying solutions to existing challenges.<br><strong>Methods.</strong> The study employs methods of information collection, source analysis, observation, and examination of successful implementations of smart systems to compare and analyze the obtained data. Among these examples are the Ukrainian platform "E-school", which offers free electronic diaries and journals for educational institutions, and the "Classroom" project developed at Nagoya University—a flexible system for distance learning and scientific activity management. Additionally, the article presents an innovative mobile learning technology designed to train future software developers. This system utilizes a mobile application that enables students to complete programming tasks by organizing unstructured program code. The study also highlights adaptive learning platforms powered by artificial intelligence (e.g., Duolingo) and personalized learning models utilizing big data to enhance the individualization and effectiveness of the learning process.<br><strong>Results.</strong> The article presents the results of an analysis of the impact of smart systems on the educational&nbsp;process, highlighting aspects such as increased student engagement, convenience for educators, automation<br> of routine tasks, and accessibility of education regardless of location. Innovative mobile technologies,&nbsp;such as a specialized app for practical programming tasks, led to an increase in students' average scores<br> from 58.68 to 61.19, reflecting a 4.3% improvement. Similarly, the Duolingo platform contributed&nbsp;to an 18% improvement in student performance, enhancing their motivation through an adaptive approach.<br> Additionally, 89% of participants reported increased interest in learning thanks to the platform's&nbsp;adaptive features. Analytics systems, such as Google Analytics, optimized the educational process and&nbsp;improved teacher-student interaction by 15%. Data-driven predictive learning models (DDPLM)&nbsp;demonstrated a 20% increase in learning efficiency and a 30% reduction in learning time. These findings&nbsp;emphasize the importance of integrating modern technologies to personalize, automate, and enhance the&nbsp;quality of the educational process.<br><strong>Conclusions.</strong> The use of smart technologies in higher education will contribute to the development of practical competencies and the enhancement of digital literacy among educators and students. The research findings can be valuable for educational institution leaders, instructors, and developers of educational platforms seeking to improve the efficiency of the learning process through the implementation of innovative technologies. The presented examples of smart systems, including the "E-school" and "Classroom" platforms and the mobile technology for programming education <span style="text-decoration: line-through;">[17]</span>, demonstrate the potential of such solutions to improve the quality of education, develop students' practical skills, and automate routine tasks. There is a need for further research and development in the field of smart education, as well as the dissemination of best practices in higher education.</p> V. Ye. Dzen, Yu. Borzov, D. Ye. Dzen ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2768 Mon, 30 Dec 2024 00:00:00 +0200 ZERO TRUST CONCEPT: MODERN METHODS OF ENSURING CYBERSECURITY IN CORPORATE NETWORKS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2769 <p><strong>Introduction</strong>. The problem with modern corporate networks is the growing number of cyber threats that call into question the effectiveness of traditional security models. Standard security approaches based on internal network trust and perimeter protection solutions are losing relevance due to the proliferation of cloud services, remote work, and the use of personal devices. Consequently, traditional methods are vulnerable to modern attacks, allowing attackers to infiltrate the internal network undetected, thereby gaining unrestricted access to resources.<br><strong>Purpose</strong>. This article analyzes the zero trust (ZT, Zero Trust) concept to ensure cybersecurity in corporate networks. The authors aim to identify the most effective security methods that meet modern cybersecurity requirements, explore their implementation, and provide continuous monitoring and risk management in the face of growing cyber threats.<br><strong>Methods</strong>. The research methods include a theoretical analysis of the NIST SP 800-207 standard, which governs&nbsp;ZT principles, and an analytical literature review. Additionally, a comparison between traditional perimeter-based&nbsp;security models and the Zero Trust model (ZTM, ZT Model) was conducted to identify key differences and advantages of both approaches.<br><strong>Results</strong>. The main research findings indicate that implementing ZTM provides more detailed access control, where each user and device undergoes authentication and authorization before accessing resources. With the principles of least privilege and dynamic access policies based on behavioral attributes and contextual information, the model significantly reduces the risk of unauthorized access, even in the event of an intruder’s presence within the network. The implementation of ZT architecture also involves technologies such as segmentation, multi-factor authentication (MFA), continuous access evaluation, and behavioral authentication, which collectively enhance corporate network security.&nbsp;<br><strong>The conclusions</strong> propose recommendations for integrating the ZTM into corporate networks to ensure flexible and adaptive protection. It is noted that transitioning to ZTM requires substantial investment, infrastructure modernization, and automated access control. Challenges related to performance due to the increased load on computational resources, the growing number of authorization requests, and recommendations for mitigating risks associated with scaling SaaS applications are also considered.</p> Т. І. Korobeinikova, І. М. Zhuravel, А. О. Bodak, D. V. Borodenko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2769 Mon, 30 Dec 2024 15:31:52 +0200 OVERVIEW OF THE ISSUES OF SECURE ACCESS TO WEB SERVERS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2770 <p><strong>Introduction</strong>. In the current context of the rapid development of information technologies, the issue of web application security is becoming increasingly relevant. Web applications that provide access to critical data and services are attractive targets for malicious actors. According to the Acunetix report, over 60% of web applications contain crucial vulnerabilities, such as SQL injections and cross-site scripting (XSS), which can lead to severe consequences, including the leakage of sensitive data and system damage. In this context, the article addresses the problems of protecting web applications from unauthorized access and ensuring the secure operation of web servers.<br><strong>Purpose</strong>. The research on the problem of protecting web applications from unauthorized access and ensuring the secure operation of web servers in the context of increasing complexity of cyber threats.<br><strong>Methods</strong>. The article employs methods of analysis and systematization of information aimed at studying the security of web applications. In particular, modern approaches to detecting vulnerabilities, such as SQL injections and XSS, are examined using security scanners and penetration testing. Special attention is given to the integration of security measures into the secure software development lifecycle, which allows minimizing risks during the creation and operation stages of web applications.<br><strong>Results</strong>. The research results demonstrate key vulnerabilities of web applications, particularly SQL injections and XSS, which threaten the security of access to web servers. The analysis showed that modern security scanners, such as Acunetix and Burp Suite, combined with penetration testing (pentesting), effectively identify these vulnerabilities. Implementing security measures into the secure software development lifecycle (Secure SDLC) significantly reduces risks in the early stages of development. Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) provide a comprehensive approach to protecting web servers. Additionally, the use of tools like SonarQube allows for the optimization of code and configuration analysis processes. The study also identified current trends, such as the application of machine learning for anomaly detection and the automation of security processes, which enhance the overall security level of web servers.<br><strong>Conclusion</strong>. The article's findings emphasize the necessity of a comprehensive approach to web application security, including technological solutions and organizational aspects. Based on the processed sources, recommendations include regular vulnerability testing, increasing developers' awareness of secure coding practices, and implementing access control mechanisms. Applying these measures will significantly reduce the risks associated with web system security and enhance user trust in online services.</p> N. V. Kravchuk, Т. І. Korobeinikova ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2770 Mon, 30 Dec 2024 15:41:34 +0200 LIDAR IMAGE IMPROVEMENT IN SMOKY ENVIRONMENTS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2772 <p><strong>Introduction</strong>. In smoky environments and low visibility, lidar depth mapping devices do not provide a high-quality image, as the environment weakens and scatters the laser beam that scans the space.&nbsp; Therefore, improving image quality is an urgent problem to be solved.<br><strong>Purpose</strong>. The aim of the work is to improve lidar images in a smoky space and in the absence of optical interference.<br><strong>Methods</strong>. Experimental studies the Intel RealSense L515 lidar was used. Intel RealSense SDK 2.0 and Python software were used for data processing.<br><strong>Results</strong>. The lidar image of an object in a smoky space is not clear enough. There are no individual pixels that form a complete picture of this object. To improve the image, a method based on the summation of successive frames of video images created as a result of scanning is proposed. This helps to supplement the missing pixels and get a better image of the object. The method was tested using the corresponding algorithm, the implementation of which on Python confirmed its effectiveness, despite its simplicity. The method is also effective in a non-smoky environment, if the object is not displayed clearly enough. Further steps in improving lidar images are outlined.<br><strong>Conclusion.</strong> The image obtained from the lidar in a smoky environment is of poor quality and needs to be improved. The image in a smoke-free environment has better quality, but it is also insufficient. For the case of stationary lidar and observation object, a method and algorithm for image improvement by summing consecutive image frames is proposed. Ways for further improvement of the lidar image are proposed.</p> O. A. Kuzyk, O. V. Prydatko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2772 Mon, 30 Dec 2024 19:30:27 +0200 MODERN METHODS AND PROBLEMS OF DIGITAL WATERMARKING OF AUDIO CONTENT https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2773 <p><strong>Introduction</strong><strong>.</strong> Digitalization of information has greatly simplified the process of creating, distributing, and sharing audio content. However, the increased availability of digital media has led to an increase in unauthorized copying and distribution of audio files, which violates intellectual property rights. Currently, various methods are used to protect audio content, including file encryption, digital rights management (DRM), digital watermarking technologies, authentication methods, etc. Digital watermarks stand out among these technologies due to their ability to provide content tracking and allow for the identification of file origin. These methods helps you to identify the owner and protect the content even when it is further distributed. However, despite the achievements, a number of unresolved issues remains. The most significant among them are: ensuring the resistance of watermarks to various types of audio processing and high-quality hiding of watermarks, which should be invisible to listeners and preserve sound quality. The need for more reliable and versatile content protection methods remains a hot topic for research and development today.&nbsp;<br><strong>Purpose. </strong>To investigate the current state of the digital watermarking of audio content, methods and technologies of the process of deep digital watermarking of audio content, to assess their level of quality, security and to outline promising areas of research in the field of digital watermarking of audio content.&nbsp;<br><strong>Methods. </strong>To achieve this goal, a combination of qualitative and quantitative research methods was used. Namely, scientific research methods, in particular, a systematic review and analysis of scientific articles, patents, industry reports on practical implementations of existing digital watermarking methods, methods for analyzing the security and resilience of watermarking methods, in particular, the DCT-MLP-LSB method, benchmarking tools (AudioMarkBench) to conduct a comparative analysis of the resilience and invisibility of watermarking methods based on their overall effectiveness, a method of comparing results and a method of synthesizing results.&nbsp;<br><strong>Results.&nbsp;</strong>Based on the conducted research, a comprehensive understanding of the current state of digital audio content marking is obtained, the main areas of application are considered, and promising areas of application of these technologies are highlighted. In particular, 7 main segments of digital watermarking for audio content have been identified: - authentication; - copyright; - broadcast verification; - audience measurement; - expertise; - data hiding; - communication. An analysis of the literature shows that by 2020, 80% of research in this area was conducted to watermark confidential information, and only 20% to process standard content. Today, research in these two segments is evenly distributed, and parity has almost been achieved. The rapid development of artificial intelligence algorithms causes a sharp increase in interest in watermarking standard content. The key aspects of the two main processes (embedding/extracting) of the watermarking system are investigated and schematized. The 4 key parameters that have the most significant impact on the performance of audio content watermarking systems are identified and considered: - security; - capacity; - reliability; - invisibility.<br>A study was conducted to evaluate the effectiveness of modern methods of digital audio content watermarking and identify gaps in existing research. Despite numerous studies in automatic sound classification, modern methods only partially reproduce human perception. As a result, these methods work well in some cases, but are practically unusable in others. We propose to replace the MLP (Multi-Layer Perceptron) model with the SVM (Support Vector Machine) model in the pipeline of the hybrid DCT-MLP-LSB algorithm in order to develop it. The main directions of promising research in the field of digital watermarking of audio content are identified.<br><strong>Conclusion</strong>. The conclusions of the article demonstrate the relevance of the research topic and outline a segment of unresolved problems in the field of audio content watermarking.</p> O. -S. І. Malets, О. О. Smotr, D. D. Peleshko, V. Pylypenko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2773 Mon, 30 Dec 2024 19:52:28 +0200 METHODS AND MODELS FOR THE DESIGN OF AUTOMATED VULNERABILITY DETECTION SYSTEMS IN WEB APPLICATIONS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2774 <p><strong>Introduction.</strong> An analysis of scientific research on web application security highlights a significant shortage of high-quality software tools for detecting vulnerabilities in web applications. Existing tools often fail to identify all potential vulnerabilities, which increases the risk of successful attacks and underscores the need for improved security approaches. Common vulnerabilities in web applications include SQL injections, cross-site scripting (XSS), authentication and session management flaws, usage of vulnerable components, and weak security configurations. Developing automated tools to detect such vulnerabilities is therefore critical for mitigating these risks.<br><strong>Objective.</strong> This study aims to develop new or improve existing methods and tools for automated vulnerability detection in web applications to enhance their security. The research specifically focuses on the integration of static and dynamic analysis methods to improve the effectiveness of detecting potential threats. It seeks to establish a robust foundation for a comprehensive tool capable of addressing a wide range of vulnerabilities.<br><strong>Methods</strong>. This research employs information analysis to evaluate existing vulnerability scanning tools, systematic analysis to identify methods and approaches for detecting web application vulnerabilities, comparative analysis to assess the strengths and weaknesses of manual and automated testing, and systematic synthesis for the development of an automated vulnerability detection system.<br><strong>Results.</strong> To achieve the outlined objectives, information analysis was utilized to assess current tools, systematic analysis was conducted to explore detection methods, and comparative analysis was performed to identify the benefits and limitations of manual versus automated testing approaches. Automated testing emerged as significantly faster and more suitable for regular scans of large-scale web applications, while manual testing demonstrated an advantage in identifying complex logical vulnerabilities. The study developed foundational algorithms for automated testing, including those targeting SQL injections and XSS vulnerabilities, ensuring effective scanning and threat identification. These algorithms perform in-depth analysis of input data and server responses to recognize attack patterns.<br>A conceptual model for the operation of an automated scanning tool was proposed, emphasizing reliability and accuracy. The model encompasses multiple verification stages, such as code scanning, application behavior analysis, and server response evaluation. Static analysis is employed to examine code without execution, while dynamic analysis simulates real-world attacks during runtime. The integration of machine learning algorithms is incorporated to enhance accuracy and minimize false positives.<br><strong>Conclusion</strong>. The findings of this study underline the importance of automated systems in enhancing web application security. Combining manual and automated testing is recommended to achieve a comprehensive security framework. The proposed methods and the validated functionality of the developed tool ensure alignment with modern cybersecurity standards. The adoption of such a tool enables swift identification of vulnerabilities and the proactive implementation of mitigation measures, reducing the risk of exploitation. A holistic approach to web application security is essential to safeguard user confidentiality and reduce the likelihood of successful cyberattacks.</p> A. I. Ivanusa, R. L. Tkachuk, T. B. Brych, V. S. Balatska, A. M. Tkachenko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2774 Mon, 30 Dec 2024 20:13:44 +0200 METHODOLOGY FOR IMPROVING THE PROCESS OF PSEUDO-RANDOM SEQUENCES GENERATING https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2775 <p><strong>Introduction.</strong> The generation of pseudorandom sequences is a key mechanism that ensures data protection and the integrity of cryptographic systems in cybersecurity. Pseudorandom sequences are an essential component of many computer systems and programs that use randomness for a variety of purposes, from cryptography to simulations. However, there are some problems and challenges associated with the process of generating pseudorandom sequences that need attention and solutions. One of the key problems is the insufficient quality and security of pseudorandom sequences, which can lead to system vulnerabilities and insufficient stability of cryptographic protocols. Other problems include insufficient generation speed, limited resources available, and insufficient randomness in some cases. To address these issues, various ways to improve the pseudorandom sequence generation process, including optimizing speed and efficiency as well as increasing entropy and cryptoresistance must be considered.</p> <p><strong>Purpose.</strong> The purpose of the research is to explore and systematize the main ways to improve the process of generating pseudorandom sequences to ensure increased reliability and efficiency. The paper aims to review and analyze methods that include the implementation of more reliable algorithms, selection of optimal initial values, verification of compliance with standards, monitoring, and auditing of the generation system, as well as optimization of speed and performance. This will enable the development of a methodology that will enhance the quality of generated pseudorandom sequences.<br><strong>Results.</strong> А comprehensive methodology for improving the process of generating pseudorandom systems was developed during the research. This methodology covers several key aspects, including the generation of optimal algorithms, setting of initial values, sampling for compliance with international standards, and monitoring and auditing of system generation. The authors explored strategies for applying these methods, as well as their advantages for improving the pseudorandom number generation process. The characteristics of cryptographically robust algorithms such as Fortuna, Yarrow, Blum Blum Shub and ISAAC were analyzed. The results of the study emphasize the necessary comprehensive approach to improving the quality of generation of pseudorandom systems, which provides not only an increase in cryptoresistance but also ensures the high efficiency of the generators, as well as their compliance with current standards. The proposed methods and approaches can significantly facilitate the work of security system developers, cryptographic researchers and specialists dealing with the generation of pseudorandom sequences.<br><strong>Conclusion.</strong> A methodology for improving the process of generating pseudorandom sequences was proposed, which includes the use of better algorithms, the selection of optimal initial values, verification of compliance with standards, monitoring and auditing of the generation system, and optimization of speed and efficiency. These approaches allow for the high quality and reliability of pseudorandom sequences in various usage scenarios.</p> M. V. Kikh, E. A. Nyemkova ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2775 Mon, 30 Dec 2024 20:43:30 +0200 ANALYSIS OF MEANS OF PREVENTION OF LEAKAGE OF CONFIDENTIAL INFORMATION AT ENTERPRISES, ON THE EXAMPLE OF THE DLP SYSTEM https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2776 <p><strong>Introduction</strong>. In the conditions of digitization of the modern business environment, the issue of information security becomes critically important. Sensitive data such as financial information, personal customer data, and internal corporate documents are a valuable asset to any business. Leaks of such information may lead to serious consequences, including financial losses, reputational losses, fines from regulators, and even legal consequences. Modern threats to information security, such as cyber-attacks, phishing, and inadvertent leakage of data by employees and external contractors, only increase the risks.&nbsp;<br><strong>Purpose</strong>. The purpose of the research is to explore the features of DLP systems, which play a key role in ensuring information security at the enterprise, providing opportunities for monitoring, detecting, and protecting confidential information in real-time.&nbsp;<br><strong>Results.</strong> The article describes in detail the benefits of using DLP data leakage prevention systems in enterprises, which provide three main areas of IT security for an organization: personal data protection and compliance, intellectual property protection, and data visibility. The article describes and shows the areas and data flows that DLP systems are aimed at. These include all outgoing traffic, such as HTTP, SMTP, etc. The article describes the two groups into which DLP systems are divided: gateway and node. A comparative description of some DLP systems on the market is given. The methods of data flow analysis to identify confidential information of an enterprise used by modern DLP systems are described in detail. The stages of DLP systems implementation are presented. The features of the American Symantec DLP system are described in more detail on the example of a real enterprise.<br><strong>Conclusion.</strong> Data Loss Prevention (DLP) systems play an important role in modern enterprise information security. They offer a holistic approach to protecting confidential information, including asset protection, regulatory compliance, risk mitigation, and improving security culture. Data leakage prevention systems are becoming an integral part of an enterprise's information security strategy.</p> O. I. Polotai, А. О. Puzyr ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2776 Mon, 30 Dec 2024 20:53:10 +0200 EVOLUTION OF FORESTRY LAND USE DEVELOPMENT AND RESTORATION OF SHELTERBELTS IN COMMUNITIES https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2777 <p><strong>Problem.</strong> As a result of hostilities, the ecological state of the territories deteriorated. Forest shelterbelts, as the main component of the agrolandscape of the steppe and forest-steppe of Ukraine, have suffered environmental damage. There is a need for preserving forest shelterbelts and the need to involve communities and the public in works on afforestation and restoration of territories, on preserving the productivity of agricultural landscapes, and protecting soils from wind and water erosion.<br><strong>Purpose.</strong> To investigate the evolution and state of development of land use under forest belts and to propose directions and mechanisms of conservation, protection, restoration of forest shelterbelts in Ukraine.<br><strong>The results.</strong> Nowadays, there is no information on the state of forest shelterbelts in Ukraine, and during the land reform, this important component of the functioning of agro-landscapes was left out of the legislators’ attention. The institutional uncertainty of the status of forest shelterbelts, some of which remain without care and protection, has led to deterioration and partial destruction. The problems deepened as a result of military environmental aggression. The lack of an owner in the forest shelterbelts has turned into a critical problem of the state scale.Short terms of tenure of the heads of executive bodies and local self-government entail unpromising management, rare cases of granting permits for cutting trees of forest shelterbelts and other forest protection plantations for the needs of heating and construction. In Ukraine, forest shelterbelts have been planted on an area of 440,000 hectares, which by design protect 13 million hectares of arable land, but actually protect 30 million hectares of Ukrainian arable land.The creation of protective forest plantations on lands unsuitable for agriculture by planting forests was not carried out during the last four years (2018 - 2021). In 2017, 65.0 hectares of forest were planted in this way, 38.5% more than in the previous year; in 2016 – 40.0 hectares, in 2015 - 47.0 hectares.According to the Poltava Regional Military Administration in 2023, new green areas were created in the region at the level of the previous year, namely 52.0 hectares (in 2022 – 65.0 hectares, in 2020 – 71.0 hectares, in 2019 – 66.2 ha, in 2018 – 1.8 ha). The area of green areas care also remained at the level of the previous year - 10897.0 ha,&nbsp;(2022 - 10897.0 ha, 2021 - 10897.0 ha, 2019 - 10543.0 ha, 2018 - 10495.0 ha).Forest shelterbelts are an important element of the modern agricultural landscape, which plays one of the main roles in the modern agrosphere. After all, this is a unique type of plantations, which stand out due to their linear structure in the form of narrow strips and form the modern landscape of the Ukrainian Steppe and Forest Steppe.<br><strong>Сonclusions.</strong> The issue of consolidation, redistribution and rational use of land under forest belts and allocation of new areas for forest reclamation, taking into account the unsatisfactory condition of forest belts, part of which died in the combat zone, the existing small land and the absence of permanent land users require the regulation and adoption of forest improvement measures at the state level with the adoption of proposed relevant normative legal acts and state programs.Only the mobilization of communities and society will provide for restoration of protective forest plantations and carry out the revitalization of forest shelterbelts and ensure the standards of afforestation of the steppes and forest-steppe of Ukraine.</p> G. I. Sharyi, T. S. Odaryuk, S. Y. Shara ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2777 Tue, 31 Dec 2024 09:58:18 +0200 ANALYSIS OF ELECTRIC VEHICLES IGNITION CAUSE https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2778 <p><strong>Introduction. </strong>A common element for all existing vehicles on alternative energy sources is the presence, as the main energy source, of a lithium-ion battery cell (LIB). Numerous studies have already repeatedly shown and proven that it is LIB that can pose the main danger for the user. Even an insignificantly small LIB can lead to a rather significant danger to a person's health and life. Despite numerous improvements and enhancements by the manufacturers of the respective vehicles, the percentage and number of cases of such electric vehicles catching fire is gradually increasing.<br><strong>The purpose and objectives of the study.</strong> The purpose of the work is to determine and assess the main causes of fires in electric vehicles. To achieve the goal, an analysis of publications and reports of scientific institutions on cases of electric vehicle fires was carried out, and the obtained statistical indicators of electric vehicle fires were summarized with further analytical processing and determination of the most common causes of electric vehicle fires.<br><strong>Methods. </strong>The research uses analytical and comparative methods of statistical data assessment, taking into account the logical processes of interaction and correlation of data.<br><strong>Results. </strong>The relevant statistical indicators of fires show that in the matter of determining and investigating the causes of fires in electric vehicles, there is a significant need to carry out detailed fire reports and pay special attention to the burning of the battery directly. The conducted analysis of the combustion statistics of electric vehicles and other types of electric transport where LIB is used made it possible to testify that the combustion statistics of electric vehicles require detailed study and constant management by the control bodies or relevant organizations. Only a small number of countries in the world keep proper records and detailed analyses of such fires.<br><strong>Conclusions. </strong>Taking into account the available statistical indicators, it can be stated that the main reason for the burning of electric vehicles, and in particular the battery, is the participation of the vehicle in road accidents, about 30%. In second place can be considered the burning of cars due to charging, about 18%. At the same time, a significant part of the causes of fires remains unknown, more than 32%.</p> O. V. Lazarenko, M. V. Poberezhnyk ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2778 Tue, 31 Dec 2024 10:07:40 +0200 CASE OF THE APPLICATION OF HIERARCHY ANALYSIS AND FUZZY DEMATEL METHODS FOR SELECTING A FIRE AND RESCUE VEHICLE TO PERFORM ASSIGNED TASKS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2779 <p><strong>The purpose of</strong> <strong>the study</strong> is to develop a process for determining the main groups and basic indicators for a reasonable choice of fire and rescue vehicle (FRV) in accordance with the operating conditions.<br><strong>Materials and Methods.</strong> The methods of hierarchy analysis and fuzzy Decision Making Trial and Evaluation Laboratory (hereinafter - fuzzy Dematel) were used to select the main groups and basic indicators of fire and rescue vehicles.<br><strong>Results. </strong>A process for a well-founded determination of the main groups and basic indicators of a fire and rescue vehicle has been developed; the process consists of eight steps, in particular: selection of experts; formation of a catalog of indicators that characterize operating conditions; identification of the main groups of indicators; an approach to ranking alternatives taking into account weighting factors; identification by experts of "cause-and-effect" relationships among the set of vehicle indicators to highlight the most influential - basic ones. A feature of the proposed approach is the combination of the analysis method of hierarchies for determining the main groups of indicators with the fuzzy Dematel method for determining basic indicators from the main groups. This allows for a well-founded management decision on the selection of indicators for a fire truck based on the determination of basic indicators, which facilitates and reduces the duration of the process of selecting any fire and rescue equipment.<br><strong>The scientific novelty</strong> is the combination of hierarchy analysis and fuzzy Dematel methods for selecting the main groups and basic indicators of fire and technical equipment, giving a possibility to rank the groups of indicators with the identification of weighting coefficients and determine the main groups of indicators and basic indicators of fire and technical equipment based on their cause-and-effect relationships.<br><strong>Practical value.</strong> Five main groups of indicators have been identified, seven of which are basic for the selection of fire and technical equipment for the purpose of its use or purchase on the example of a fire and rescue vehicle in accordance with the conditions of an emergency.</p> V. А. Tsopa, O. V. Deryugin, S. І. Cheberyachko, N. S. Sushko, О. V. Stanislavchuk ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2779 Tue, 31 Dec 2024 10:42:39 +0200 INFORMATION ANALYSIS OF CRITICAL INFRASTRUCTURE PROTECTION SYSTEMS DURING MARTIAL LAW https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2780 <p>The main theme of the article is the protection of Ukraine’s critical infrastructure under martial law conditions. The work focuses on a comprehensive analysis of current threats, including military, technological, natural, and cyber threats. Special attention is given to the modernization and improvement of protective measures for infrastructure, which has become a target due to its significance for economic and social stability. This study addresses the urgent need to ensure the reliable operation of critical infrastructure, which has become a priority due to the unprecedented increase in attacks and the technical vulnerability of many facilities.<br>The article aims to analyze organizational, technical, and other solutions to minimize the risk of accidents at vital facilities, such as energy installations, during armed conflicts.<br><strong>Research methods. </strong>The research methods include risk analysis based on data on infrastructure damage from missile and drone strikes. A comparative analysis of international and domestic experiences in critical infrastructure protection, especially considering operations under martial law, was also conducted.<br><strong>Research results. </strong>The authors outline a set of measures to strengthen protection, including the implementation of modern monitoring and risk management techniques to minimize the damage from potential disasters caused by both natural and anthropogenic factors. These protective measures for critical infrastructure and energy facilities in Ukraine are summarized and presented in the form of block diagrams.<br>Therefore, modernizing Ukraine’s critical infrastructure and employing the latest protective measures are essential steps in reducing the country's vulnerability to external and internal threats. This research establishes a background for further scientific and practical solutions in the field of critical infrastructure protection, which is a national priority amid modern challenges and risks.</p> A. P. Havrys, V. V. Filippova, N. Yu. Tur ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2780 Tue, 31 Dec 2024 10:53:27 +0200 METHODOLOGY FOR ANALYZING THREATS OF EMERGENCY SITUATIONS AT CRITICAL INFRASTRUCTURE OBJECTS IN THE TRANSPORT SECTOR (BASED ON THE EXAMPLE OF A GAS STATION) https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2781 <p><strong>Introduction.</strong> Ukraine is in a state of crisis in the development of the transport industry. The main reasons for this are military operations in Ukraine, systemic underfunding, insufficient maintenance of infrastructure and transport. This not only complicates the performance of socio-economic functions, but also threatens the national security of Ukraine. In this regard, there is a need to develop a methodology for assessing the risks of emergency situations for critical infrastructure facilities (CRI).<br><strong>Purpose</strong>. Development of a methodology for assessing the risks of dangerous events at the Ukrnafta gas station that affect the safety and stability of the critical infrastructure facility.<br><strong>Results.</strong> In this paper, a methodology for assessing the risks of emergency situations for critical infrastructure facilities was developed and its validation was carried out using the example of a gas station. The methodology for analyzing threats of emergency situations at critical infrastructure facilities includes a comprehensive approach to risk assessment and threat management. The purpose of this technique is to identify potential threats, assess the probability of their occurrence, and also develop strategies to minimize the consequences. An approach to the identification and assessment of risks of the critical infrastructure of the transport sector is proposed and implemented, which reveals potential vulnerabilities of the object to various threats, taking into account possible cascading effects. This makes it possible to obtain probabilistic assessments of the development of events under certain scenarios for critical infrastructure objects and rationally approach the development and implementation of priority measures.<br><strong>Conclusions</strong>. On the basis of the developed methodology, threats at the Ukrnafta gas station were investigated, a quantitative assessment of the probability of their occurrence was carried out, possible consequences were analyzed, and threats were prioritized. Thanks to this approach, it is possible to evaluate the effectiveness of response measures in various scenarios of the development of events, which significantly reduces the overall level of probability of dangerous events<strong>.</strong></p> N. M. Kichata, O. V. Tretyakov, B. D. Khalmuradov, M. S. Pukha ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2781 Tue, 31 Dec 2024 11:13:55 +0200 THE ROLE OF THE EUROPEAN UNION CIVIL PROTECTION MECHANISM IN ELIMINATION OF LARGE-SCALE NATURAL AND TECHNOLOGICAL DISASTERS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2782 <p>From 2017 to 2023, the International Centre for Chemical Safety and Security (ICCSS) launched a series of projects aimed at enhancing civil protection and crisis management systems in Ukraine. Joining the EU Civil Protection Mechanism is an important step for Ukraine on its way to deepening European integration. The decisive test of the capabilities of State Emergency Service of Ukraine is the ongoing military aggression by Russia.<br>Disasters, both natural and man-made, know no national boundaries and can strike several countries at the same time, often unexpectedly. In recent years, Europe has witnessed a surge in various types of emergencies, ranging from epidemics, floods, storms, forest fires, earthquakes, and man-made disasters. Emergency events test the response capacities of individual countries and emphasize the need for collective action and cooperation, especially in an era of complex security challenges and the growing impact of climate change.<br><strong>Purpose of the Article.</strong> To examine the structure and guiding principles of the Union Civil Protection Mechanism (UCPM). To explore the technological tools, platforms, resources, and capabilities used by the Emergency Response Coordination Centre (ERCC) in its operations. A key component of the UCPM's operations is fostering the development of a collaborative network focused on knowledge exchange, capacity building, and disaster response training. The UCPM provides member states with a platform for exchanging experiences and innovative approaches to risk reduction, enabling them to learn from each other and implement successful strategies.</p> M. S. Koval, R. T. Ratushniy, O. Y. Pazen, D. I. Andrukhiv ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2782 Tue, 31 Dec 2024 11:47:09 +0200 OVERVIEW OF APPROACHES TO CROSS-BORDER PROJECT MANAGEMENT IN THE SECURITY SECTOR https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2783 <p><strong>Introduction.</strong> Cross-border cooperation is a key area of international cooperation that contributes to solving common problems, developing regions and strengthening partnership relations between neighboring countries. For Ukraine, given the current challenges and the European vector of development, this type of cooperation is of particular importance. This form of cooperation helps to strengthen interaction between regions, contributing to their economic growth, introducing innovations and raising the standard of living to average European standards. The processes of European integration have created favorable conditions for effective interaction with EU countries, participation in grant programs and implementation of joint projects. Particular attention has been paid to security initiatives, which have become priorities in many cross-border programs. Such cooperation allows Ukraine to actively integrate into the European environment, developing regions and solving current problems, and it has also created the need to develop new approaches to managing cross-border security projects.<br><strong>Goal.</strong> Research on modern project management methodologies to become the basis for developing approaches to managing cross-border security projects.<br><strong>Research methods.</strong> The research used the methods of systems analysis, project management, systems approach, abstract-logical and comparative-historical to justify the need to apply project management methodology in implementing cross-border projects on security.<br><strong>The results.</strong> The study of international territorial cooperation, one of the types of which is cross-border, project management methodologies and the analysis of scientific publications in this field indicate that there is a lack of comprehensive research in the direction of managing cross-border projects in the field of security. Therefore, a review of approaches to managing cross-border projects in the field of security is an urgent task. Cross-border cooperation in the field of security and rescue operations is an important area of international interaction, which ensures the integration of efforts to solve common challenges. Neighborhood programs and cross-border initiatives act as unique mechanisms for such cooperation. They provide not only sources of funding for the implementation of large-scale projects, but also create a platform for the implementation of modern approaches in the field of security, emergency response and improvement of professional standards. Cross-border cooperation programs are of key importance for the development of infrastructure and improving the operational capabilities of rescue services. Often, local budgets are unable to finance the purchase of expensive equipment or the implementation of infrastructure projects. Thanks to financial support from cross-border programs, it is possible not only to solve these tasks, but also to integrate European standards into the work of security services and rescue units. The introduction of European approaches to planning, threat prevention and response is of particular importance. This contributes to reducing risks in border regions and increasing the level of safety of residents. Such programs allow improving the quality of response to emergencies, which is critically important in the context of global challenges, including climate change, natural disasters and man-made accidents. The study reviewed the legislative norms governing cross-border cooperation in the field of security. Particular attention is paid to international project management standards, which are an effective tool for ensuring high-quality and timely implementation of projects. The application of international standards in cross-border projects helps to minimize risks and ensures effective resource management. This allows projects to adapt to limited funding and other challenges associated with the implementation of multilateral initiatives. One of the successful examples of cross-border cooperation is the Interreg NEXT Poland-Ukraine 2021-2027 program. This initiative provides unique opportunities for joint work in the field of security and rescue operations. The program is aimed at creating cooperation mechanisms that allow for the implementation of large-scale projects taking into account the interests of both countries. Within the framework of this program, infrastructure projects aimed at improving the work of rescue services are being implemented. Thanks to the funding, it was possible to purchase modern equipment, including rescue vehicles, fire and rescue equipment, as well as means for eliminating the consequences of emergencies. In addition, training centers were created where both professional rescuers and volunteers are trained. The program also provides for the development of joint strategies for responding to emergency events. This includes the creation of a single information platform for coordinating actions, which allows for a prompt response to challenges, exchange data and develop plans for joint activities. Cross-border cooperation in the field of security and rescue operations is an important tool for the integration and development of border regions. Thanks to programs such as Interreg NEXT, it has been possible to implement significant infrastructure projects, introduce modern technologies and improve the level of security. The success of these programs demonstrates the need for their further development, which will ensure the sustainable development of the regions, integration into the European space and improving the quality of life of residents.<br><strong>Conclusions.</strong> This study is devoted to the analysis of approaches to the management of cross-border projects in the field of security, in particular, ways of their implementation within the framework of the current legislation on international territorial cooperation. International project management standards are considered, which provide effective tools for high-quality planning and problem solving. The application of these standards in cross-border projects allows them to be implemented in a timely and effective manner, even in conditions of limited resources. Cross-border projects are analyzed, in particular within the framework of the Interreg NEXT Poland - Ukraine 2021-2027 program, which contributed to cooperation in the field of security and rescue operations. Thanks to these projects, important infrastructure initiatives were implemented and expensive equipment was purchased, the financing of which was not possible from local budgets.</p> Kh. I. Avdieyeva, D. S. Kobylkin ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2783 Tue, 31 Dec 2024 12:02:09 +0200 FUTUROLOGICAL PRINCIPLES OF INFRASTRUCTURE PROJECT MANAGEMENT UNDER MARTIAL LAW https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2784 <p><strong>The problem</strong><strong>.</strong> &nbsp;Management of infrastructure facilities under martial law is a key task of the state, which requires additional planning, coordination and effective use of resources. This article, based on an updated retrospective and futurological analysis, as well as best practices in project management, reveals innovative trends in the management of infrastructure projects under martial law.<br><strong>Purpose.</strong> The purpose of the article is a comprehensive study of the theoretical foundations, development methods and practical aspects of infrastructure project management under martial law.<br><strong>Research methods</strong><strong>.</strong> Considering the theoretical foundations of managing complex infrastructure projects, taking into account the global and domestic experience of implementing such projects, it is necessary to pay attention to such research methods as network planning methods, the Walker-Kelly method (later called the critical path method or CPM), the method of analysis and evaluation (review) of programs PERT (Program Evaluation and Review Technique).<br><strong>Results. </strong>Forecasting the main trends of project implementation is the basis for the socio-economic and environmental assessment of large-scale infrastructure projects. Moreover, the assessment of the financial viability of the project directly depends on the accuracy of such forecasts. Futurological assessments arising from the accuracy of the forecasted demand in the transport sector, which covers the volume of transportation, transport distribution and distribution between modes of transport, prove that demand forecasting, as well as price forecasting, despite all the scientific progress in territory modeling, is the main source of uncertainty and risk in the assessment of large-scale projects. However, as far as the growth of cost is concerned, there is a pattern between these and other large projects - this is a tendency to significantly underestimate costs in the process of preliminary project assessment. We come to the same conclusion by studying the data of a large number of large-scale transport infrastructure projects and other types of projects. This is mainly due to the complexity of infrastructure project management processes, the complexity of the final project product and the huge number of poorly formalized phases of the life cycle of the project.<br>Best practices in project management in the field of infrastructure projects, when each country together with its closest neighbors is engaged in promoting this new phenomenon in the European political area will be useful for Ukraine in implementing post-war recovery and renovation programs for infrastructure facilities.<br>Managing infrastructure projects during martial law is a complex task that requires final planning, coordination and effective use of resources. Strategies for optimizing time and budget parameters, such as strategic planning, creating reserves, cooperation with government and military organizations, effective cost management and ensuring security of supply, are key to the successful implementation of infrastructure projects. During the wartime it requires an integrated approach and the use of modern technologies and methods. An important component of success is not only the study of theory, but also the practical use of acquired knowledge in real situations.<br><strong>Conclusion. </strong>The scientific problem of managing large-scale infrastructure projects is considered, in particular in an unfavorable project environment (wartime). A retrospective analysis of large-scale infrastructure projects of a global scale is carried out, in particular, the main problems of implementing such projects are highlighted, namely: overspending of planned budgets, high risks and under-return of profits by investment funds. A typical model of the life cycle of infrastructure projects with critically important stages, in particular investment phases, is presented. A futurological forecast of the main trends in the implementation of infrastructure projects is developed with an emphasis on post-war recovery programs and renovation of critical infrastructure facilities in Ukraine.</p> S. V. Zakharchyshyn, O. B. Zachko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2784 Tue, 31 Dec 2024 12:11:32 +0200 STAKEHOLDER-ORIENTED CONFLICT MANAGEMENT TECHNOLOGIES IN PROJECTS OF CREATING AND DEVELOPING A NETWORK OF MEDICAL INSTITUTIONS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2785 <p><strong>Introduction.</strong> Based on the analysis, it was found that there is a need to develop tools for managing conflicts between stakeholders in projects for the creation and development of medical facilities. These projects are characterized by complex relationships between government agencies, medical staff, NGOs, patients, and investors, that have their own interests, contradicting each other. The main scientific and applied challenge is the lack of a structured approach to reconciling the interests of stakeholders, high level of conflict, lack of transparency in decision-making processes, and insufficient use of quantitative methods for assessing management effectiveness. The lack of tools for managing conflicts leads to delays in project implementation, inefficient use of resources, and dissatisfaction of stakeholders.<br><strong>Purpose.</strong> To substantiate the structure of the process of managing conflicts between stakeholders in projects for the creation and development of medical institutions, which will allow timely alignment of the interests of project stakeholders, reduce the level of conflicts, and ensure effective project implementation, taking into account the specifics of the medical sector.<br><strong>Methods.</strong> The study uses a systematic approach, which includes an analysis of scientific research on project management and conflicts in the medical field. Based on the methods of classification and generalization, the main indicators of the effectiveness of conflict management are identified, and approaches to planning and implementing conflict management processes are summarized. To analyze the relationships between the indicators, correlation analysis, construction of dependency graphs, and regression analysis was used. The practical part of the study is based on the example of projects of medical institutions in Lviv region, for which a quantitative assessment of the effectiveness of managing conflicts between stakeholders was carried out.<br><strong>Results.</strong> The main stakeholders of projects for the creation and development of medical institutions are identified. Seven main types of stakeholders were identified. Based on the analysis of their interests and contradictions, the structure of the process of managing contradictions and conflicts was substantiated, which consists of five management operations providing analysis of stakeholder interests, identification of potential contradictions and conflicts, planning of the process of managing contradictions and conflicts, implementation of the plan for managing contradictions and conflicts and determining the effectiveness of the process of managing contradictions and conflicts. The proposed structure enables reconciliation of the interests of stakeholders, reduce the number and level of conflicts, and ensure the effective implementation of projects for the creation and development of medical institutions. For the practical implementation of the substantiated process, the author quantifies eight indicators that provide an objective assessment of the effectiveness of managing conflicts between stakeholders in projects for the creation and development of medical institutions and the validity of decision-making. Based on the use of the developed toolkit, a quantitative assessment of medical projects implemented in the Lviv region was carried out. It was found that the conflict index of the projects ranged from 2.0 to 2.5, the level of risks - from 15% to 40%, the consolidated efficiency index - from 0.5 to 0.826, and the level of goal achievement - from 66.6% to 83.3%. The highest performance indicators were achieved in the outpatient clinic opening project, which indicates the effectiveness of stakeholder alignment.<br><strong>Conclusions and proposals.</strong> The obtained results indicate that the proposed structure of the conflict management process is an effective tool for aligning the interests of stakeholders and ensuring the successful implementation of projects for the creation and development of medical institutions. Implementation of this process structure will reduce the number of contradictions and the level of conflicts between stakeholders, optimize the use of resources, and increase their satisfaction. Further research is needed to integrate modern information technologies, such as artificial intelligence and intelligent decision support systems, into the process of managing stakeholder conflicts in healthcare facility creation and development projects.</p> О. M. Malanchuk, А. M. Tryhuba, R. Ya. Sholudko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2785 Tue, 31 Dec 2024 12:26:48 +0200 JUSTIFICATION FOR THE DIGITALIZATION OF HR PROCESSES IN CIVIL DEFENSE UNITS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2787 <p><strong>Introduction. </strong>In today's environment, a particular problematic issue for an HR specialist in security-oriented systems is the time spent on communication and consultations with staff. A significant amount of time spent on personal and group consultations reduces the overall efficiency of the HR department to perform their duties. This is especially true for government agencies, where an HR specialist may receive numerous requests for support and advice, which creates an excessive workload and impedes from focusing on strategic tasks. With regard to the constant changes in the rules and regulations governing the professional activities of personnel, this paper provides a research based on the calculation of the ratio of HR specialists to the number of personnel, as well as the calculation of labor intensity, production and productivity of HR managers of the civil protection service with a large staff structure.<br><strong>Purpose.</strong> The aim of digitizing HR processes in the civil protection service is to increase the efficiency of human resource management by automating routine and repetitive procedures, ensuring transparency, quick access to information and supporting professional development of staff. This involves the creation of a single digital platform for recording, analyzing and optimizing human resources, reducing bureaucratic burden, minimizing errors and improving communication, which will contribute to the preparedness and effectiveness of the civil protection service.&nbsp;<br><strong>Methods</strong>. The paper applies statistical methods for calculating the qualitative use of working time of HR managers of the civil protection service.<br><strong>Results.</strong> The factors influencing the ratio of the number of personnel management specialists and civil defense personnel are analyzed. The ratio of the number of personnel to the number of employees who manage and control the total number of employees in the organization is calculated. The influence of several main areas of mathematical models, including the calculation of labor intensity, productivity, daily and annual output, which can be useful for HR management in civil protection and help to work more efficiently and effectively, is presented.<br><strong>Conclusions.</strong> Digitalization of HR processes is of significant practical value for the SES. It ensures automated communication between personnel, prompt access to HR data, minimizes the influence of the human factor in processing HR documents, and reduces paperwork. Automation will ensure the HR department's readiness to crisis situations; in emergency, digital systems provide quick access to information on personnel, increase the efficiency and effectiveness of the civil protection service. Summarizing the ratio of HR specialists to the number of employees, we conclude that this indicator is valuable, as it gives an idea of the level of HR support available in the civil protection service bodies and units.</p> Kh. S. Matkivska, O. B. Zachko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2787 Tue, 31 Dec 2024 12:42:05 +0200 THE GENESIS OF LOGISTICS PROJECT MANAGEMENT UNDER MARTIAL LAW: FROM CONCEPTUAL TO INTELLECTUAL MODELS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2793 <p><strong>Problem</strong>. Managing logistics projects during martial law for security-oriented organizations is a key task that requires careful planning, coordination and effective use of resources. The quality of logistics processes determines not only the timeliness of goods delivery and cost optimization, but also the overall competitiveness of enterprises, complex organizational and technical regional systems.<br><strong>Purpose</strong>. Comprehensive study of the theoretical foundations, methods of development and practical aspects of implementing intelligent models of logistics project management.<br><strong>Research methods.</strong> While considering the theoretical foundations of intelligent models, it is necessary to pay attention to the definitions and basic principles of artificial intelligence, machine learning, decision support systems and optimization algorithms. It is important to understand how these technologies interact with each other and contribute to improving management processes in logistics.<br><strong>Results.</strong> The article considers strategies for optimizing time and budget parameters of logistics management during martial law for security-oriented organizations based on intelligent modeling and best practices. A SWOT analysis of the balanced scorecard system of logistics projects under martial law was conducted, which showed the main opportunities, strengths, threats and weaknesses of logistics projects. A structural diagram of a decision support system (DSS) in logistics projects is presented, the key components of which are a logistics model database, an OLAP pattern analysis module and data mining tools.<br><strong>Conclusions.</strong> The implementation of intelligent models in logistics requires a comprehensive approach and attention to several key aspects. One of them is the need for proper training and high-quality data for the effective operation of the models. It is also important to take into account organizational, managerial and ethical aspects when implementing new technologies. Intelligent models can play a key role in optimizing logistics processes under martial law, helping in inventory management, demand forecasting and planning delivery routes. They also allow to reduce costs, increase service quality and improve customer satisfaction.</p> R. I. Mytsko, O. B. Zachko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2793 Tue, 31 Dec 2024 00:00:00 +0200 IMPLEMENTATION MODELS OF SYNCRETIC METHODOLOGY IN THE ORGANIZATIONAL CONTEXT OF PROJECT-ORIENTED ORGANIZATIONS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2794 <p>The article is devoted to the analysis of syncretic methodology implementation models in the organizational context of project-oriented organizations participating in infrastructure restoration projects. The models and methods of the leading standards that can be used in the researched type of projects, as well as relevant scientific studies, were analyzed. Four classes of models for introducing syncretic methodology into the activity of a project-oriented organization have been identified: models for training staff of a project-oriented organization; models for the selection of stellarator projects for their implementation as anchors in the implementation of syncretic project management methodology; implementation models of the syncretic methodology implementation project against the background of the implementation of the pilot project-stellarator; models of formation of the syncretic methodology knowledge base based on the results of the implementation of the stellarator project. Each given class of models is analyzed, a set of models is proposed for each such class. It is proposed to use trainings, consulting, coaching, training on real cases,&nbsp;self-study during the implementation of the stellarator project as training models. A proposed list of study topics is presented. Six recommended models and methods of selecting stellarator projects have been identified - expert evaluation method, creative methods, selection according to the dominant criterion, selection according to several criteria (relevant criteria are proposed), collegial decision of the authorized body, involvement of a consultant. Business process description models and calendar-network models are proposed among the implementation models of the syncretic methodology implementation project against the background of the implementation of the pilot project-stellarator. A high-level model of two-project coordinated implementation is proposed, given and described. Four models of syncretic methodology knowledge base formation are described, including: personalized data storage, relational database, Big Data models and methods, artificial intelligence models and methods. A generalized SWOT analysis of the proposed approach was also conducted. Prospects for further research in the chosen direction are outlined.</p> S. Bushuyev, A. Ivko ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2794 Tue, 31 Dec 2024 00:00:00 +0200 ALGORITHM FOR DETERMINING STRUCTURAL AND MODE IDENTIFIERS OF ROAD TRANSPORTATION ROUTES BASED ON NOT COMPLETELY ORDERED DATABASES https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2795 <p>The measure of the average speed of a vehicle on a route naturally combines, in a so-called consolidated form, information (data) both on the structure of the route and on the speed capacities of the vehicle along its individual sections. However, when studying and organizing transportation processes, it would be very convenient to operate with data on the structural features of routes and their speed potentials separately. Of course, this would greatly facilitate the accumulation and analysis of “transport data,” but the price would be, of course, only an approximate reflection of transport situations. The purpose of the study is to find a practical algorithm for estimating the average speed of a vehicle on a route with an artificial division of characteristic parameters into structural and speed parameters. Hypothetically, this can be accomplished by so called “measuring” through inequalities.<br>The harmonic mean of the speeds on individual sections of the route, weighted by the lengths of these sections, is crucial for estimating the speed of cargo movement along the route and determining the vehicle's performance. In the case of a pendulum route, this is an elementary harmonic mean.<br>Using classical inequalities, it is possible to find meaningful bounds on the values of the actual harmonic mean velocity, which are expressed through elementary averages of individual path and individual speed parameters. Such averages are corrected for the characteristic parameters of the route - road and speed.<br>As part of computational operations, the true harmonic mean speed can be replaced by a geometric mean or an appropriate combination of elementary averages, relying on the effect of regressing the data to the true mean.</p> L. P. Hashchuk, P. М. Hashchuk, I. R. Vayda ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2795 Tue, 31 Dec 2024 00:00:00 +0200 IMPACT OF STREET PARKING ON TRAFFIC FLOW DELAYS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2796 <p><strong>Problem.</strong> The conducted analysis showed that parking along city streets in central areas often complicates the movement of public transport and specialized vehicles. Parked cars reduce the capacity of the road network by 20-40%, which slows down traffic and increases the likelihood of accidents. With the increase in the number of cars in Ukraine, the issue of organizing parking spaces is becoming increasingly acute, as the growth in the number of cars complicates the arrangement of new parking areas.<br>In order to increase the efficiency of the transport network, it is necessary to implement new organizational measures that will contribute to increasing the capacity of the street-road network in places with active parking. Special attention should be focused on intersections, where parking limits visibility and reduces traffic intensity. Areas where entry and exit from parking lots are also important.<br><strong>The purpose of the research is</strong> to model the impact of street parking on traffic flow delays in the area between intersections.<br><strong>Research methods.</strong> The use of street parking lots plays an important role in solving the problem of car parking in cities. However, their main drawback is the negative impact on the capacity of the road network. Therefore, the key criterion for evaluating this type of parking is determining its impact on throughput.<br>Capacity is affected by many factors: road conditions, composition of traffic flow, weather conditions, psychophysiological characteristics of drivers, etc. Changing these parameters can significantly influence throughput at different times of the day, month, season, or year.<br>Estimating the impact of street parking on the capacity of the road network requires an approach that takes into account different patterns of car placement on the roadway. The decrease in throughput is caused by a decrease in the speed of traffic flow, which is an important characteristic of traffic and significantly affects the efficiency of using the street network.<br>To model the impact of street parking on traffic delays, it is necessary to take into account such parameters as the time and frequency of the arrival of cars, the duration of their parking, the length of the queue, and the capacity of the parking lot. It is also important to pay attention to the cost of parking, information about the occupancy of the parking lot, and public transport routes. Since most of these parameters are random, simulation modeling is an effective tool for prediction.<br><strong>The main results of the study.</strong> Areas of the central part of Lviv with heavy traffic were chosen for the study, where cars are parked in different ways near the roadway. The analysis was carried out using the PTV Vissim software environment. The reasons affecting the speed of traffic and the capacity of the streets due to the presence of parking have been studied. A simulation model was created that made it possible to evaluate the operation of areas with and without permitted parking, as well as the impact of parking duration on the average flow speed and delay. The results showed that to increase the capacity and speed of transport when designing parallel street parking lots, it is necessary to set limits on the duration of parking. The average traffic delay is the lowest for parking durations of 900 s and 1800 s, being 6.34 and 6.45 s/car, respectively. This indicates that with a longer parking time, drivers have more opportunities to exit without obstruction, which helps to reduce delays in the traffic flow. The biggest delay is observed with a parking duration of 300 s in the right lane, where it reaches 9.43 s/car. This is probably due to the frequent stops of cars, giving way to those leaving the parking lot. Such delays can increase the total travel time on a certain section of the road, which negatively affects the efficiency of traffic flow and creates additional inconvenience for drivers. Taking these indicators into account is important when planning parking zones to optimize traffic and reduce delays.<br><strong>Conclusions and specific proposals of the authors</strong>. The results of modeling the impact of on-street parking on traffic flow delays, carried out using the PTV VISSIM software, show that when designing on-street parking parallel to the pavement, it is advisable to set limits on the duration of parking. This will help to increase the capacity of the road network and increase the average speed of vehicles. The establishment of such restrictions will also minimize traffic delays, which will positively affect the overall efficiency of traffic flow and reduce the level of congestion, especially during peak hours.</p> O. M. Hrytsun, I. V. Pasnak ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2796 Tue, 31 Dec 2024 00:00:00 +0200 INFORMATION ABOUT THE AUTHORS https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2797 Відомості про авторів ##submission.copyrightStatement## http://creativecommons.org/licenses/by/4.0 https://journal.ldubgd.edu.ua/index.php/Visnuk/article/view/2797 Tue, 31 Dec 2024 00:00:00 +0200