{"id":1064,"date":"2021-01-15T20:04:38","date_gmt":"2021-01-15T18:04:38","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1064"},"modified":"2021-03-23T12:51:23","modified_gmt":"2021-03-23T10:51:23","slug":"%d0%bf%d1%80%d0%be%d0%b3%d0%b7%d0%bd%d0%be%d0%b7%d1%83%d0%b2%d0%b0%d0%bd%d0%bd%d1%8f-%d1%80%d0%b8%d0%b7%d0%b8%d0%ba%d1%96%d0%b2-%d0%b7%d0%b0%d0%b2%d0%b0%d0%b4%d0%be%d1%81%d1%82%d1%96%d0%b9%d0%ba%d0%be","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1064","title":{"rendered":"\u041f\u0440\u043e\u0433\u0437\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0437\u0430\u0432\u0430\u0434\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0457 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456  \u0442\u0430 \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445"},"content":{"rendered":"<p style=\"text-align: center;\">\u041f\u0420\u041e\u0413\u0417\u041d\u041e\u0417\u0423\u0412\u0410\u041d\u041d\u042f \u0420\u0418\u0417\u0418\u041a\u0406\u0412 \u0417\u0410\u0412\u0410\u0414\u041e\u0421\u0422\u0406\u0419\u041a\u041e\u0407 \u041f\u0415\u0420\u0415\u0414\u0410\u0427\u0406\u00a0 \u0422\u0410 \u0417\u0410\u0425\u0418\u0421\u0422 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407 \u0412 \u0422\u0415\u041b\u0415\u041a\u041e\u041c\u0423\u041d\u0406\u041a\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425<\/p>\n<p style=\"text-align: center;\">DETERMINING RISKS OF PROFITABLE TRANSMISSION AND INFORMATION PROTECTION IN TELECOMMUNICATION SYSTEMS<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/43-3.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 264-268. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u042e.\u0412. \u0425\u041c\u0415\u041b\u042c\u041d\u0418\u0426\u042c\u041a\u0418\u0419<br \/>\n\u041e.\u0412. \u041e\u0413\u041d\u0404\u0412\u0418\u0419<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nYu.V. Khmelnytskyi<br \/>\nO.V. Ognjevyj<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-264-268\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-264-268<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 08. 01.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 14.02.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0442\u0430 \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0456\u0439 \u0434\u043b\u044f \u0440\u0430\u043d\u043d\u044c\u043e\u0433\u043e \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u0437\u0430\u0432\u0430\u0434\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0457 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445. \u0423 \u043f\u0440\u043e\u0446\u0435\u0441\u0456 \u0440\u043e\u0431\u043e\u0442\u0438\u00a0 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u044f\u043a\u0456\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457\u00a0 \u043c\u043e\u0436\u0435 \u0441\u0443\u0442\u0442\u0454\u0432\u043e \u0432\u043f\u043b\u0438\u043d\u0443\u0442\u0438 \u043d\u0430 \u043f\u0440\u043e\u043f\u0443\u0441\u043a\u043d\u0443 \u0437\u0434\u0430\u0442\u043d\u0456\u0441\u0442\u044c \u043e\u043a\u0440\u0435\u043c\u0438\u0445 \u043f\u043e\u0442\u043e\u043a\u0456\u0432 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0434\u0430\u043d\u0438\u0445 \u0447\u0438 \u0446\u0456\u043b\u0438\u0445 \u0434\u043e\u043c\u0435\u043d\u0456\u0432. \u041f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432 \u043f\u043e\u0442\u043e\u043a\u0430\u043c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454\u0442\u044c\u0441\u044f \u0437\u0430 \u043a\u0440\u0438\u0442\u0435\u0440\u0456\u0454\u043c \u044f\u043a\u043e\u0441\u0442\u0456 \u043e\u0431\u0441\u043b\u0443\u0433\u043e\u0432\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u0440\u0456\u0432\u043d\u043e\u043c\u0456\u0440\u043d\u043e\u0433\u043e \u0437\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432. \u041f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u044f\u043a\u043e\u0441\u0442\u0456 \u043e\u0431\u0441\u043b\u0443\u0433\u043e\u0432\u0443\u0432\u0430\u043d\u043d\u044f, \u0437\u0430\u0445\u0438\u0441\u0442\u00a0 \u0442\u0430 \u0444\u0443\u043d\u043a\u0446\u0456\u043e\u043d\u0443\u0432\u0430\u043d\u043d\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0454\u0442\u044c\u0441\u044f \u0456\u0437 \u0432\u0440\u0430\u0445\u0443\u0432\u0430\u043d\u043d\u044f\u043c \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u043f\u043e\u0442\u043e\u043a\u0443 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456, \u0449\u043e \u0434\u043e\u0441\u0438\u0442\u044c \u043e\u0431\u043c\u0435\u0436\u0443\u0454 \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0441\u0438\u0441\u0442\u0435\u043c\u0438. \u0417\u0430\u0441\u043e\u0431\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0437\u0430 \u043f\u0440\u043e\u0446\u0435\u0441\u043e\u043c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u043e\u043a\u0440\u0435\u043c\u0438\u0445 \u043f\u043e\u0442\u043e\u043a\u0456\u0432 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0434\u0430\u043d\u0438\u0445\u00a0 \u0432\u0456\u0434\u0441\u0443\u0442\u043d\u0456,\u00a0 \u0430 \u0442\u043e\u043c\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043d\u0435 \u0437\u043c\u043e\u0436\u0435 \u0433\u0430\u0440\u0430\u043d\u0442\u0443\u0432\u0430\u0442\u0438 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0438\u0439 \u0440\u0456\u0432\u0435\u043d\u044c \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f.\u00a0\u00a0 \u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u043d\u0430\u0434\u0430\u0441\u0442\u044c \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430\u043c \u043e\u0442\u0440\u0438\u043c\u0443\u0432\u0430\u0442\u0438 \u043f\u043e\u0441\u043b\u0443\u0433\u0438 \u0456\u0437 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e\u044e\u00a0 \u044f\u043a\u0456\u0441\u0442\u044e, \u0434\u043e\u0441\u0442\u043e\u0432\u0456\u0440\u043d\u0456\u0441\u0442\u044e \u0442\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043f\u043e\u0434\u043e\u043b\u0430\u0442\u0438 \u0432\u0438\u043d\u0438\u043a\u0430\u044e\u0447\u0456 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0438 \u0437\u0430\u0432\u0430\u0434\u043e\u0441\u0442\u0456\u0439\u043a\u043e\u0457 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u0438\u0437\u0438\u043a\u0456\u0432, \u0437\u0430\u0432\u0430\u0434\u043e\u0441\u0442\u0456\u0439\u043a\u0430 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0437\u0430\u0445\u0438\u0441\u0442 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u043c\u0435\u0440\u0435\u0436\u0435\u0432\u0438\u0439 \u043f\u043e\u0442\u0456\u043a, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0430 \u0431\u0435\u0437\u043f\u0435\u043a\u0430.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The paper proposes an up-to-date method and toolkit for early detection and forecasting of the risks of interference transmission, protection of information in telecommunication systems. In telecommunication systems, the quality of information transmission can significantly affect the bandwidth of individual data streams or entire domains. Transmission flow risk prediction is based on the criterion of quality of service and uniform load of network resources. Improving the quality of service, protection and operation of the system is carried out taking into account the classification of the transmission stream, which sufficiently limits the ability to control the telecommunications system.\u00a0 Most models of such networks do not take into account the characteristics of multiservice data flow, which leads to poor quality of service and increase the likelihood of blocking transmission channels. The lack of ability to differentiate the data flows of individual clients of the telecommunication system and the ability to take into account their quality requirements, leads to low efficiency of the routing channel, suboptimal distribution of system load, poor quality of service of high priority data streams. The application of new models and algorithms to ensure the functioning of the telecommunications system will allow the transmission of information streams, differentiating them by the sensitivity to mix the order of packet transmission and disconnect. There are no controls on the transmission process of individual data streams, and therefore the system will not be able to guarantee the required level of control. The research will allow users to receive services with the necessary quality, reliability and will help to overcome the emerging problems of interfering information transmission.<br \/>\n<strong>Key words:<\/strong> risk forecasting, noise transfer, information security, network flow, information security.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Babych V.D. Zavadostiikist kanaliv zviazku : navch. posibnyk \/\u00a0 V.D. Babych,\u00a0 O.D. Kuvshynov, O.P. Lezhniuk, S.P. Liventsev. \u2013 K. : KVIUZ, 2001. \u2013 150 s.<\/li>\n<li>Kazymyr V.V. Informatsiini osnovy pobudovy telekomunikatsiinykh merezh \/ V.V. Kazymyr, V.V. Lytvynov, S.M. Shkarlet, S.V. Zaitsev \/\/ Visnyk Chernihivskoho derzhavnoho tekhnol. universytetu. \u2013 Chernihiv : ChDTU, 2013. \u2013 340 s.<\/li>\n<li>Khmelnytskyi Yu.V. Zabezpechennia dostovirnosti peredachi informatsii ta servisnykh posluh dlia vysokoshvydkisnykh merezh pry zavadakh \/ Yu.V Khmelnytskyi, D.P. Yakovliev \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka. \u2013 K. : VIKNU, 2017. \u2013 Vyp. \u2116 57. \u2013 S. 111\u2013119.<\/li>\n<li>Khmelnytskyi Yu.V. Zabezpechennia virohidnoi peredachi informatsii pry vplyvi pereshkod v telekomunikatsiinykh merezhakh \/ Yu.V. Khmelnytskyi, H.B. Zhyrov, N.V. Kulpak \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka. \u2013 K. : VIKNU, 2018. \u2013 Vyp. \u2116 59. \u2013 S. 161\u2013170.<\/li>\n<li>Kryvutsa V.H. Upravlinnia telekomunikatsiiamy iz zastosuvanniam novitnikh tekhnolohii \/ V.H. Kryvutsa, V.K. Steklov, L.N. Berkman, B.Ia. Kostik, B.F. Oliinyk, S.M. Skliarenko \/\/ Pidruchnyk dlia VNZ. \u2013 K. : Tekhnika, 2007. \u2013 384 s.<\/li>\n<li>Khmelnytskyi Yu.V. Analiz modelei ta prohnozuvannia ryzykiv funktsionuvannia systemy upravlennia SDN arkhitektury\u00a0 \/ Yu.V. Khmelnytskyi, O.V. Sieliukov,\u00a0 D.M. Kovpa,\u00a0 O.S. Lisovetskni\u00a0 \/\/\u00a0 Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho nats. universytetu imeni Tarasa Shevchenka. \u2013 K. : VIKNU, 2019. \u2013 \u2116 64. \u2013 S. 113\u2013134.<\/li>\n<li>Khmelnytskyi Yu.V. Metody ta zasoby zabezpechennia zavadostiikoi peredachi informatsii v telekomunikatsiinykh merezhakh \/ Yu.V. Khmelnytskyi, O.A. Kablukov, L.O. Riaba, L.V. Solodieieva, A.O. Tkach \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho nats. universytetu imeni Tarasa Shevchenka. \u2013 K. : VIKNU, 2019. \u2013 \u2116 64. \u2013 S. 133\u2013144.<\/li>\n<li>Seliukov O.V. Zastosuvannia intelektualnykh tekhnolohii dlia pidvyshchennia yakosti roboty telekomunikatsiinykh merezh pry nevyznachenosti\u00a0 \/ O.V. Seliukov, Yu.V. Khmelnytskyi, I.V. Obertiuk, L.V. Solodieieva \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka. \u2013 K., 2017. \u2013 Vyp. 56. \u2013 S. 146\u2013153.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u041f\u0420\u041e\u0413\u0417\u041d\u041e\u0417\u0423\u0412\u0410\u041d\u041d\u042f \u0420\u0418\u0417\u0418\u041a\u0406\u0412 \u0417\u0410\u0412\u0410\u0414\u041e\u0421\u0422\u0406\u0419\u041a\u041e\u0407 \u041f\u0415\u0420\u0415\u0414\u0410\u0427\u0406\u00a0 \u0422\u0410 \u0417\u0410\u0425\u0418\u0421\u0422 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407 \u0412 \u0422\u0415\u041b\u0415\u041a\u041e\u041c\u0423\u041d\u0406\u041a\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 DETERMINING RISKS OF PROFITABLE TRANSMISSION AND INFORMATION PROTECTION IN TELECOMMUNICATION SYSTEMS \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 264-268. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281) \u0410\u0432\u0442\u043e\u0440\u0438: \u042e.\u0412. \u0425\u041c\u0415\u041b\u042c\u041d\u0418\u0426\u042c\u041a\u0418\u0419 \u041e.\u0412. \u041e\u0413\u041d\u0404\u0412\u0418\u0419 \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 Yu.V. Khmelnytskyi O.V. Ognjevyj Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-264-268 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 08. 01.2020 \u0440. \u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : 14.02.2020 \u0440. \u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[13],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1064"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1064"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1064\/revisions"}],"predecessor-version":[{"id":5160,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1064\/revisions\/5160"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}