{"id":12489,"date":"2022-05-13T12:09:23","date_gmt":"2022-05-13T09:09:23","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=12489"},"modified":"2022-06-07T01:34:12","modified_gmt":"2022-06-06T22:34:12","slug":"doslidzhennya-statystychnoyi-stijkosti-ta-shvydkisnyh-harakterystyk-zaproponovanoyi-funkcziyi-geshuvannya-udoskonalenogo-modulya-kryptografichnogo-zahystu-v-informaczijno-komunikaczijnyh-systemah","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=12489","title":{"rendered":"\u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u043e\u0457 \u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0442\u0430 \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u043d\u0438\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u0457 \u0433\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0443\u043b\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u0414\u041e\u0421\u041b\u0406\u0414\u0416\u0415\u041d\u041d\u042f \u0421\u0422\u0410\u0422\u0418\u0421\u0422\u0418\u0427\u041d\u041e\u0407 \u0421\u0422\u0406\u0419\u041a\u041e\u0421\u0422\u0406 \u0422\u0410 \u0428\u0412\u0418\u0414\u041a\u0406\u0421\u041d\u0418\u0425 \u0425\u0410\u0420\u0410\u041a\u0422\u0415\u0420\u0418\u0421\u0422\u0418\u041a \u0417\u0410\u041f\u0420\u041e\u041f\u041e\u041d\u041e\u0412\u0410\u041d\u041e\u0407 \u0424\u0423\u041d\u041a\u0426\u0406\u0407 \u0413\u0415\u0428\u0423\u0412\u0410\u041d\u041d\u042f \u0423\u0414\u041e\u0421\u041a\u041e\u041d\u0410\u041b\u0415\u041d\u041e\u0413\u041e \u041c\u041e\u0414\u0423\u041b\u042f \u041a\u0420\u0418\u041f\u0422\u041e\u0413\u0420\u0410\u0424\u0406\u0427\u041d\u041e\u0413\u041e \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0412 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e-\u041a\u041e\u041c\u0423\u041d\u0406\u041a\u0410\u0426\u0406\u0419\u041d\u0418\u0425 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425<\/p>\n<p style=\"text-align: center;\">STUDY OF STATISTICAL STABILITY AND FAST CHARACTERISTICS OF THE PROPOSED HASHING FUNCTION OF THE IMPROVED CRYPTOGRAPHIC MODULE IN INFORMATION AND COMMUNICATION SYSTEMS<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438:\u00a04<\/strong><strong>6<\/strong><strong>-5<\/strong><strong>2<\/strong><strong>. \u041d\u043e\u043c\u0435\u0440: \u21162, 2022 (307)\u00a0\u00a0<a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2022\/05\/vknu-ts-2022-n2-307-46-52.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a> <\/strong><br \/>\n<strong>\u00a0\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0421\u041c\u0406\u0420\u041d\u041e\u0412\u0410 \u0422.\u0412.<br \/>\n\u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: <a href=\"https:\/\/orcid.org\/0000-0001-6896-0612\">0000-0001-6896-0612<\/a><br \/>\ne-mail: <a href=\"sm.tetyana@gmail.com\">sm.tetyana@gmail.com<\/a><br \/>\n\u042f\u041a\u0418\u041c\u0415\u041d\u041a\u041e \u041d.\u041c.<br \/>\n\u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: <a href=\"https:\/\/orcid.org\/0000-0002-4498-0093\">0000-0002-4498-0093<\/a><br \/>\ne-mail: <a href=\"yakimenko_n_m@ukr.net\">yakimenko_n_m@ukr.net<\/a><br \/>\n\u0421\u041c\u0406\u0420\u041d\u041e\u0412 \u041e.\u0410.<br \/>\n\u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: <a href=\"https:\/\/orcid.org\/0000-0001-9543-874X\">0000-0001-9543-874X<\/a><br \/>\ne-mail: <a href=\"dr.SmirnovOA@gmail.com\">dr.SmirnovOA@gmail.com<\/a><br \/>\n\u041f\u041e\u041b\u0406\u0429\u0423\u041a \u041b.\u0406.<br \/>\n\u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: <a href=\"https:\/\/orcid.org\/0000-0001-5093-1581\">0000-0001-5093-1581<\/a><br \/>\ne-mail: <a href=\"pli_80@ukr.net\">pli_80@ukr.net<\/a><br \/>\n\u0421\u041c\u0406\u0420\u041d\u041e\u0412 \u0421.\u0410.<br \/>\n\u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0442\u0435\u0445\u043d\u0456\u0447\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID ID: 0000-0002-7649-7442<br \/>\ne-mail: <a href=\"smirnov.ser.81@gmail.com\">smirnov.ser.81@gmail.com<\/a><br \/>\nTETIANA SMIRNOVA, NATALIIA YAKYMENKO, OLEKSII SMIRNOV,<br \/>\nLIUDMYLA POLISHCHUK, SERHII SMIRNOV<br \/>\nCentral Ukrainian National Technical University<br \/>\n<strong>\u00a0DOI:<\/strong>\u00a0<a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2022-307-2-46-52\">https:\/\/www.doi.org\/10.31891\/2307-5732-2022-307-2-46-52<\/a><\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0423 \u0440\u043e\u0431\u043e\u0442\u0456 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u043e\u0457 \u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0442\u0430 \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u043d\u0438\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u0457 \u0433\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0443\u043b\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u044f\u043a\u0438\u0439 \u0437\u0430 \u0440\u0430\u0445\u0443\u043d\u043e\u043a \u0444\u0456\u043a\u0441\u0443\u0432\u0430\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u043f\u0440\u043e \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0442\u043e\u0440 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430, \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0442\u043e\u0440 \u0441\u0435\u0441\u0456\u0457, \u0447\u0430\u0441 \u0432\u0456\u0434\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044f, \u0434\u043e\u0432\u0436\u0438\u043d\u0443 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u0439\u043e\u0433\u043e \u043f\u043e\u0440\u044f\u0434\u043a\u043e\u0432\u0438\u0439 \u043d\u043e\u043c\u0435\u0440, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u043d\u043e\u0432\u043e\u0457 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u0438 \u0444\u043e\u0440\u043c\u0443\u0432\u0430\u043d\u043d\u044f \u0441\u0435\u0430\u043d\u0441\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f, \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0438\u0442\u0438 \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u0456\u0441\u0442\u044c \u0456 \u0446\u0456\u043b\u0456\u0441\u043d\u0456\u0441\u0442\u044c \u0434\u0430\u043d\u0438\u0445 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0430\u043c\u0438. \u041e\u0431\u2019\u0454\u043a\u0442\u043e\u043c \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0454 \u043f\u0440\u043e\u0446\u0435\u0441 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u043a\u043e\u043d\u0444\u0456\u0434\u0435\u043d\u0446\u0456\u0439\u043d\u043e\u0441\u0442\u0456 \u0434\u0430\u043d\u0438\u0445 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0430\u043c\u0438 \u043d\u0430 \u0431\u0430\u0437\u0456 \u0445\u043c\u0430\u0440\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439. \u041f\u0440\u0435\u0434\u043c\u0435\u0442\u043e\u043c \u0454 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u043e\u0457 \u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0442\u0430 \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u043d\u0438\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u0457 \u0433\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0443\u043b\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445. \u041c\u0435\u0442\u043e\u044e \u0434\u0430\u043d\u043e\u0457 \u0440\u043e\u0431\u043e\u0442\u0438 \u0454 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u043e\u0457 \u0441\u0442\u0456\u0439\u043a\u043e\u0441\u0442\u0456 \u0442\u0430 \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u043d\u0438\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u0457 \u0433\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043e\u0433\u043e \u043c\u043e\u0434\u0443\u043b\u044f \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0430\u043c\u0438 \u043d\u0430 \u0431\u0430\u0437\u0456 \u0445\u043c\u0430\u0440\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439. \u0414\u043b\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0446\u044c\u043e\u0433\u043e \u043c\u043e\u0434\u0443\u043b\u044f \u0432\u0430\u0436\u043b\u0438\u0432\u0438\u043c \u0454 \u0432\u0438\u0431\u0456\u0440 \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0442\u0456\u0439\u043a\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u0433\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0456\u0437\u0430\u0446\u0456\u044f \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430. \u0423 \u044f\u043a\u043e\u0441\u0442\u0456 \u0444\u0443\u043d\u043a\u0446\u0456\u0439 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u0433\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u043c\u043e\u0436\u0443\u0442\u044c \u0431\u0443\u0442\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u0456 \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438, \u0441\u0442\u0456\u0439\u043a\u0456 \u0434\u043e \u043b\u0456\u043d\u0456\u0439\u043d\u043e\u0433\u043e, \u0434\u0438\u0444\u0435\u0440\u0435\u043d\u0446\u0456\u0430\u043b\u044c\u043d\u043e\u0433\u043e, \u0430\u043b\u0433\u0435\u0431\u0440\u0430\u0457\u0447\u043d\u043e\u0433\u043e, \u043a\u0432\u0430\u043d\u0442\u043e\u0432\u043e\u0433\u043e \u0442\u0430 \u0456\u043d\u0448\u0438\u0445 \u0432\u0456\u0434\u043e\u043c\u0438\u0445 \u0432\u0438\u0434\u0456\u0432 \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u0443. \u041f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u0435\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u0435 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f, \u0449\u043e \u043f\u0456\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u043e \u043a\u0440\u0438\u043f\u0442\u043e\u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044c \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u043e\u0433\u043e \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0443 \u0434\u043e \u043b\u0456\u043d\u0456\u0439\u043d\u043e\u0433\u043e \u0442\u0430 \u0434\u0438\u0444\u0435\u0440\u0435\u043d\u0446\u0456\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u0442\u0430 \u0434\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e \u0432\u0438\u0437\u043d\u0430\u0447\u0438\u0442\u0438, \u0449\u043e \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u0442\u044c \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0457 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0434\u0430\u043d\u0438\u0445 \u0443\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u0438\u043c \u043c\u0435\u0442\u043e\u0434\u043e\u043c \u0437 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f\u043c \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u043e\u0457 \u0444\u0443\u043d\u043a\u0446\u0456\u0457 \u0448\u0438\u0444\u0440\u0443\u0432\u0430\u043d\u043d\u044f \u0454 \u0443 1,98 \u0440\u0430\u0437\u0456\u0432 \u0432\u0438\u0449\u043e\u044e \u0443 \u043f\u043e\u0440\u0456\u0432\u043d\u044f\u043d\u043d\u0456 \u0437 \u0430\u043d\u0430\u043b\u043e\u0433\u0430\u043c\u0438, \u0430 \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u0442\u044c \u0433\u0435\u043d\u0435\u0440\u0443\u0432\u0430\u043d\u043d\u044f \u043a\u043b\u044e\u0447\u0456\u0432 \u0454 \u0432\u0438\u0449\u043e\u044e \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e \u0443 1,17 \u0440\u0430\u0437\u0456\u0432 \u0432 \u043f\u043e\u0440\u0456\u0432\u043d\u044f\u043d\u043d\u0456 \u0437 \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c\u0438, \u0449\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c\u0441\u044f \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u0432 \u043e\u0431\u0440\u0430\u043d\u043e\u043c\u0443 \u043f\u0440\u043e\u0442\u043e\u0442\u0438\u043f\u0456.<br \/>\n\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430: \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0430 \u0441\u0442\u0456\u0439\u043a\u0456\u0441\u0442\u044c, \u0448\u0432\u0438\u0434\u043a\u0456\u0441\u043d\u0456 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a\u0438, \u0444\u0443\u043d\u043a\u0446\u0456\u044f \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f, \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0438\u0439 \u0437\u0430\u0445\u0438\u0441\u0442, \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430.<\/p>\n<p style=\"text-align: center;\"><strong>\u00a0\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u00a0\u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The study of statistical stability and speed characteristics of the proposed hashing function of the advanced module of cryptographic protection of information, which by recording information about the user ID, session ID, sending time, message length and its serial number, as well as using a new session key for encryption , allows to ensure the confidentiality and integrity of data in information and communication systems management processes. The object of research is the process of ensuring the confidentiality of data in information and communication systems management systems based on cloud technologies. The subject is the study of statistical stability and speed characteristics of the proposed hashing function of the advanced module of cryptographic protection in information and communication systems. The purpose of this work is to study the statistical stability and speed characteristics of the proposed hashing function of the advanced module of cryptographic protection in information and communication systems for process control based on cloud technologies. To use this module effectively, it is important to choose crypto-resistant encryption and hashing methods, as well as secret key synchronization. Cryptoalgorithms resistant to linear, differential, algebraic, quantum and other known types of cryptanalysis can be used as encryption and hashing functions. An experimental study was conducted, which confirmed the crypto-resistance of the advanced algorithm to linear and differential cryptanalysis and determined that the speed of cryptographic data processing by the advanced method using the developed encryption function is 1.98 times higher than analogues, and the key generation speed 1.17 times compared to the generators used in particular in the selected prototype.<br \/>\n<strong>Keywords:<\/strong>\u00a0 statistical stability, speed characteristics, hashing function, cryptographic protection, information and communication system.<\/p>\n<p style=\"text-align: center;\"><strong>\u041b\u0456\u0442\u0435\u0440\u0430\u0442\u0443\u0440\u0430<\/strong><\/p>\n<ol>\n<li>https:\/\/www.kmu.gov.ua\/news\/vid-kiberataki-14-sichnya-postrazhdali-22-derzhavnih-organi-derzhspeczvyazku<\/li>\n<li>https:\/\/www.kmu.gov.ua\/news\/shchodo-kiberataki-na-sajti-vijskovih-struktur-ta-derzhavnih-bankiv<\/li>\n<li>Oppliger, Cryptography 101: <em>From Theory to Practice, <\/em>Artech, 2021.<\/li>\n<li>Job J, Naresh V and K. Chandrasekaran, \u201cA modified secure version of the Telegram protocol (MTProto)\u201d, 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2015, pp. 1-6,<\/li>\n<li>Dion van Dam, Analysing the Signal Protocol. A manual and automated analysis of the Signal Protocol, 21 August 2019, 61 p.<\/li>\n<li>TLS and SRTP for Skype Connect Technical Datasheet, 2011, 8 p.<\/li>\n<li>Wu, \u201cA Chaos-Based Hash Function\u201d, 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015, pp. 1-4,<\/li>\n<li>Gnatyuk S., Kinzeryavyy V., Kyrychenko K., Yubuzova Kh., Aleksander M., Odarchenko R. Secure Hash Function Constructing for Future Communication Systems and Networks, <em>Advances in Intelligent Systems and Computing,<\/em> 902, pp. 561-569, 2020.<\/li>\n<li>Rajeshwaran and K. Anil Kumar, \u201cCellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function\u201d, <em>2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT),<\/em> 2019, pp. 1-6,<\/li>\n<li>Iavich M., Iashvili G., Gnatyuk S., Tolbatov A., Mirtskhulava L. Efficient and Secure Digital Signature Scheme for Post Quantum Epoch, <em>Communications in Computer and Information Science,<\/em> 1486, pp.\u00a0185-193, 2021.<\/li>\n<li>Gnatyuk S., Iavich M., Kinzeryavyy V., Okhrimenko T., Burmak Y., Goncharenko I. Improved secure stream cipher for cloud computing, <em>CEUR Workshop Proceedings,<\/em>2732, pp.\u00a0183-197, 2020.<\/li>\n<li>Gnatyuk S., Akhmetov B., Kozlovskyi V., Kinzeryavyy V., Aleksander M., Prysiazhnyi D. New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis, <em>Advances in Intelligent Systems and Computing, <\/em> 1126, pp.\u00a093-104, 2020.<\/li>\n<li>Kuznetsov, I. Horkovenko, O. Maliy, N. Goncharov, T. Kuznetsova and N.\u00a0Kovalenko, \u201cNon-Binary Cryptographic Functions for Symmetric Ciphers\u201d, 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&amp;T), 2020, pp. 567-572, doi: 10.1109\/PICST51311.2020.9467982.<\/li>\n<li>Jintcharadze and M. Iavich, \u201cHybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems\u201d, <em>2020 IEEE East-West Design &amp; Test Symposium (EWDTS),<\/em> 2020, pp. 1-5, doi: 10.1109\/EWDTS50664.2020.9224901.<\/li>\n<li>R. Lee, J. S. Teh, N. Jamil, J. L. S. Yan and J. Chen, \u201cLightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes\u201d, in <em>IEEE Access,<\/em> vol. 9, pp. 134052-134064, 2021, doi: 10.1109\/ACCESS.2021.3116468.<\/li>\n<li>\u0421\u043c\u0456\u0440\u043d\u043e\u0432\u0430 \u0422.\u0412., \u0413\u043d\u0430\u0442\u044e\u043a \u0421.\u041e., \u0411\u0435\u0440\u0434\u0438\u0431\u0430\u0454\u0432 \u0420.\u0428., \u0411\u0443\u0440\u043c\u0430\u043a \u042e.\u0410., \u041e\u0441\u043f\u0430\u043d\u043e\u0432\u0430 \u0414.\u041c., \u00ab\u0423\u0434\u043e\u0441\u043a\u043e\u043d\u0430\u043b\u0435\u043d\u0438\u0439 \u043c\u043e\u0434\u0443\u043b\u044c \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0456\u0447\u043d\u043e\u0433\u043e \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0441\u0443\u0447\u0430\u0441\u043d\u0438\u0445 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0442\u0430 \u043c\u0435\u0440\u0435\u0436\u0430\u0445\u00bb. <em>\u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430: \u043e\u0441\u0432\u0456\u0442\u0430, \u043d\u0430\u0443\u043a\u0430, \u0442\u0435\u0445\u043d\u0456\u043a\u0430<\/em>. \u2116\u00a02(14). \u0421.\u00a0176-185. 2021.<\/li>\n<li>\u0421\u043c\u0456\u0440\u043d\u043e\u0432\u0430 \u0422.\u0412., \u041f\u043e\u043b\u0456\u0449\u0443\u043a \u041b.\u0406., \u0421\u043c\u0456\u0440\u043d\u043e\u0432 \u041e.\u0410., \u0411\u0443\u0440\u0430\u0432\u0447\u0435\u043d\u043a\u043e \u041a.\u041e., \u041c\u0430\u043a\u0435\u0432\u043d\u0456\u043d \u0410.\u041e., \u00ab\u0414\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0445\u043c\u0430\u0440\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u044f\u043a \u0441\u0435\u0440\u0432\u0456\u0441\u0456\u0432\u00bb, <em>\u041a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0430: \u043e\u0441\u0432\u0456\u0442\u0430, \u043d\u0430\u0443\u043a\u0430, \u0442\u0435\u0445\u043d\u0456\u043a\u0430<\/em>. \u2116\u00a03(7). \u0421. 43-62. 2020.<\/li>\n<li>\u0421\u043c\u0456\u0440\u043d\u043e\u0432\u0430 \u0422.\u0412., \u0421\u043e\u043b\u043e\u0432\u0438\u0445 \u0404.\u041a., \u0421\u043c\u0456\u0440\u043d\u043e\u0432 \u041e.\u0410., \u0414\u0440\u0454\u0454\u0432 \u041e.\u041c., \u00ab\u041f\u043e\u0431\u0443\u0434\u043e\u0432\u0430 \u0445\u043c\u0430\u0440\u043d\u0438\u0445 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0439 \u043e\u043f\u0442\u0438\u043c\u0456\u0437\u0430\u0446\u0456\u0457 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0432\u0456\u0434\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u0435\u043d\u043d\u044f \u043f\u043e\u0432\u0435\u0440\u0445\u043e\u043d\u044c \u0434\u0435\u0442\u0430\u043b\u0435\u0439\u00bb, <em>\u0426\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0443\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u043d\u0430\u0443\u043a\u043e\u0432\u0438\u0439 \u0432\u0456\u0441\u043d\u0438\u043a. \u0422\u0435\u0445\u043d\u0456\u0447\u043d\u0456 \u043d\u0430\u0443\u043a\u0438.<\/em> \u2116\u00a01(32). \u0441. 184-194, 2019.<\/li>\n<li>\u0421\u043c\u0456\u0440\u043d\u043e\u0432\u0430, \u0422.\u0412., \u0421\u043c\u0456\u0440\u043d\u043e\u0432, \u0421.\u0410., \u041c\u0438\u043d\u0430\u0439\u043b\u0435\u043d\u043a\u043e, \u0420.\u041c., \u0414\u043e\u0440\u0435\u043d\u0441\u044c\u043a\u0438\u0439, \u041e.\u041f., \u0421\u0438\u0441\u043e\u0454\u043d\u043a\u043e \u0421.\u0412. \u00ab\u0425\u043c\u0430\u0440\u043d\u0430 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u043e\u0432\u0430\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0456\u043d\u0442\u0435\u043b\u0435\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0457 \u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0438 \u043f\u0440\u0438\u0439\u043d\u044f\u0442\u0442\u044f \u0440\u0456\u0448\u0435\u043d\u044c \u0434\u043b\u044f \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0456\u0432\u00bb. <em>\u0412\u0456\u0441\u043d\u0438\u043a \u0427\u0435\u0440\u043a\u0430\u0441\u044c\u043a\u043e\u0433\u043e \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u043e\u0433\u043e \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443. \u0422\u0435\u0445\u043d\u0456\u0447\u043d\u0456 \u043d\u0430\u0443\u043a\u0438. <\/em>\u21164, 2020, \u0421. 84-92.<\/li>\n<li>\u0421\u043c\u0456\u0440\u043d\u043e\u0432\u0430 \u0422.\u0412., \u0411\u0443\u0440\u0430\u0432\u0447\u0435\u043d\u043a\u043e \u041a.\u041e., \u041a\u0440\u0430\u0432\u0447\u0435\u043d\u043a\u043e \u0421.\u0421., \u0413\u043e\u0440\u0431\u043e\u0432 \u0412.\u041e., \u0421\u043c\u0456\u0440\u043d\u043e\u0432\u00a0\u041e.\u0410. \u00ab\u0425\u043c\u0430\u0440\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043f\u0456\u0434\u0442\u0440\u0438\u043c\u043a\u0438 \u043f\u0440\u0438\u0439\u043d\u044f\u0442\u0442\u044f \u0440\u0456\u0448\u0435\u043d\u044c \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0432\u0456\u0434\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u043f\u043e\u0432\u0435\u0440\u0445\u043e\u043d\u044c \u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0456\u0439 \u0456 \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u043c\u0430\u0448\u0438\u043d\u00bb. <em>\u0421\u0443\u0447\u0430\u0441\u043d\u0456 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438<\/em>. 2021. \u0422.\u00a05, \u2116\u00a04. \u0421. 79-95.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>https:\/\/www.kmu.gov.ua\/news\/vid-kiberataki-14-sichnya-postrazhdali-22-derzhavnih-organi-derzhspeczvyazku<\/li>\n<li>https:\/\/www.kmu.gov.ua\/news\/shchodo-kiberataki-na-sajti-vijskovih-struktur-ta-derzhavnih-bankiv<\/li>\n<li>Oppliger, Cryptography 101: From Theory to Practice, Artech, 2021.<\/li>\n<li>Job J, Naresh V and K. Chandrasekaran, \u201cA modified secure version of the Telegram protocol (MTProto)\u201d, 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2015, pp. 1-6,<\/li>\n<li>Dion van Dam, Analysing the Signal Protocol. A manual and automated analysis of the Signal Protocol, 21 August 2019, 61 p.<\/li>\n<li>TLS and SRTP for Skype Connect Technical Datasheet, 2011, 8 p.<\/li>\n<li>Wu, \u201cA Chaos-Based Hash Function\u201d, 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015, pp. 1-4,<\/li>\n<li>Gnatyuk S., Kinzeryavyy V., Kyrychenko K., Yubuzova Kh., Aleksander M., Odarchenko R. Secure Hash Function Constructing for Future Communication Systems and Networks, Advances in Intelligent Systems and Computing, Vol. 902, pp. 561-569, 2020.<\/li>\n<li>Rajeshwaran and K. Anil Kumar, \u201cCellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function\u201d, 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2019, pp. 1-6,<\/li>\n<li>Iavich M., Iashvili G., Gnatyuk S., Tolbatov A., Mirtskhulava L. Efficient and Secure Digital Signature Scheme for Post Quantum Epoch, Communications in Computer and Information Science, Vol. 1486, pp. 185-193, 2021.<\/li>\n<li>Gnatyuk S., Iavich M., Kinzeryavyy V., Okhrimenko T., Burmak Y., Goncharenko I. Improved secure stream cipher for cloud computing, CEUR Workshop Proceedings, Vol. 2732, pp. 183-197, 2020.<\/li>\n<li>Gnatyuk S., Akhmetov B., Kozlovskyi V., Kinzeryavyy V., Aleksander M., Prysiazhnyi D. New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis, Advances in Intelligent Systems and Computing, Vol. 1126, pp. 93-104, 2020.<\/li>\n<li>Kuznetsov, I. Horkovenko, O. Maliy, N. Goncharov, T. Kuznetsova and N. Kovalenko, \u201cNon-Binary Cryptographic Functions for Symmetric Ciphers\u201d, 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&amp;T), 2020, pp. 567-572, doi: 10.1109\/PICST51311.2020.9467982.<\/li>\n<li>Jintcharadze and M. Iavich, \u201cHybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems\u201d, 2020 IEEE East-West Design &amp; Test Symposium (EWDTS), 2020, pp. 1-5, doi: 10.1109\/EWDTS50664.2020.9224901.<\/li>\n<li>R. Lee, J. S. Teh, N. Jamil, J. L. S. Yan and J. Chen, \u201cLightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes\u201d, in IEEE Access, vol. 9, pp. 134052-134064, 2021, doi: 10.1109\/ACCESS.2021.3116468.<\/li>\n<li>Smirnova T.V., Gnatiuk S.O., Berdybaev R.S., Burmak Y.A., Ospanova D.M., \u00abUdoskonalenyi modul kryptohrafichnoho zakhystu informatsii v suchasnykh informatsiino-komunikatsiinykh systemakh ta merezhakh\u00bb [Advanced module of cryptographic protection of information in modern information and communication systems and networks]. Cybersecurity: education, science, technology. \u2116 2 (14). Pp. 176-185. 2021<\/li>\n<li>Smirnova T.V., Polishchuk L.I., Smirnov O.A., Buravchenko K.O., Makevnin A.O., \u00abDoslidzhennia khmarnykh tekhnolohii yak servisiv\u00bb [Research of cloud technologies as services], Cybersecurity: education, science, technology. \u2116 3 (7). Pp. 43-62. 2020<\/li>\n<li>Smirnova T.V., Solovykh E.K., Smirnov O.A., Dreev O.M., \u00abPobudova khmarnykh informatsiinykh tekhnolohii optymizatsii tekhnolohichnoho protsesu vidnovlennia ta zmitsnennia poverkhon detalei\u00bb[Construction of cloud information technologies to optimize the technological process of restoration and strengthening of surfaces of parts], Central Ukrainian Scientific Bulletin. Technical sciences. \u2116 1 (32). pp. 184-194, 2019<\/li>\n<li>Smirnova, T.V., Smirnov, S.A., Minailenko, R.M., Dorensky, O.P., Sysoenko S.V. \u00abKhmarna avtomatyzovana systema intelektualnoi pidtrymky pryiniattia rishen dlia tekhnolohichnykh protsesiv\u00bb. [Cloud automated system of intelligent decision support for technological processes]. Bulletin of Cherkasy State Technological University. Technical sciences. \u21164, 2020, pp. 84-92.<\/li>\n<li>Smirnova T.V., Buravchenko K.O., Kravchenko S.S., Gorbov V.O., Smirnov O.A. \u00abKhmarna systema pidtrymky pryiniattia rishen tekhnolohichnoho protsesu vidnovlennia poverkhon konstruktsii i detalei mashyn\u00bb. [Cloud system to support decision-making of the technological process of restoration of surfaces of structures and machine parts]. Modern information systems. 2021. T. 5, \u2116 4. S. 79-95.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[65],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/12489"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12489"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/12489\/revisions"}],"predecessor-version":[{"id":12592,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/12489\/revisions\/12592"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}