2023
Постійне посилання на фонд
Переглянути
Перегляд 2023 за Назва
Зараз показуємо 1 - 16 з 16
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Adjusting the parameters of machine learning algorithms to improve the speed and accuracy of traffic classification(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Astrakhantsev, Andrii A.; Globa, Larysa S.; Davydiuk, Andrii M.; Sushko, Oleksandra V.Educational and Research Institute of Telecommunication Systems Igor Sikorsky Kyiv Polytechnic Institute, Kyiv, Ukraine Background. Telecommunications developments lead to new mobile network technologies and especially 5G, which has only recently been launched, sixth generation of which is already under active development. The development of new technologies influence on both types of mobile traffic (V2V, IoT) and leads to the significant increase in the volume of existing traffic types. Currently, existing methods of traffic processing are not adapted to such changes, which may lead to a deterioration in the quality of service. Objective. The purpose of the paper is to analyze the effectiveness of machine learning algorithms to solve the task of traffic classification in mobile networks in real time. Methods. The method of solving the problem of increasing the efficiency of information processing is the introduction of new algorithms for traffic classification and prioritization. In this regard, the paper presents the urgent task of analyzing the effectiveness of machine learning algorithms to solve the task of traffic classification in mobile networks in real time. Results. Comparison indicated the best accuracy of the ANN algorithm that was achieved with the number of hidden layers of the network equal to 200. Also, the research results showed that different applications have different recognition accuracy, which does not depend on the total number of packets in the dataset. Conclusions. This proceeding solves the urgent problem of increasing the efficiency of the mobile communication system through the use of machine learning algorithms for traffic classification. In this regard, it can be concluded that the most promising is the application of algorithms based on ANN. In future the aspect of anomaly detection based on traffic classification and traffic pattern preparation should be investigated, as this process allows detecting attacks to network infrastructure and increase mobile network security.Документ Відкритий доступ Automated workflows for assessing the quality of functioning of scientific and educational institutions(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Novogrudska, Rina L.; Siemens, Eduard; Pidnebesnyy, Andrii V.; Shelest, Yegor V.Background. The effectiveness of functioning is a particularly important characteristic for organizations involved in the field of science and education, since the future level of state development and the life of its citizens depends on the quality of the services they provide. There are certain generally accepted principles of such organizations evaluation that is set by relevant normative documents. Nowadays important tasks are optimization and automatization of such processes. Objective. The aim of the paper is to propose and develop a workflow model for automating and optimizing the procedure for evaluating scientific and educational institutions. Methods. We use approaches to business process modelling and basic principles of workflow modelling, namely BPMN notation was chosen as the notation to model elements of workflows for assessing the quality of scientific and educational institutions functioning, and Camunda Modeler was used as the development environment. Results. Conceptual model of the work process for assessing the quality of scientific and educational institutions functioning was proposed, which made it possible to generalize and formalize such an assessment process. Developed using BPMN models of workflow were used to test proposed conceptual model and prove its effectiveness for automating the process of assessing the quality of scientific and educational institutions functioning. Conclusions. Mechanism of modelling the process of assessing the quality of scientific and educational institutions functioning proposed in the paper gave basis and means for such process optimization and automatization.Документ Відкритий доступ Building minimum spanning trees by limited number of nodes over triangulated set of initial nodes(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Romanuke, Vadim V.Background. The common purpose of modeling and using minimum spanning trees is to ensure efficient coverage. In many tasks of designing efficient telecommunication networks, the number of network nodes is usually limited. In terms of rational allocation, there are more possible locations than factually active tools to be settled to those locations. Objective. Given an initial set of planar nodes, the problem is to build a minimum spanning tree connecting a given number of the nodes, which can be less than the cardinality of the initial set. The root node is primarily assigned, but it can be changed if needed. Methods. To obtain a set of edges, a Delaunay triangulation is performed over the initial set of nodes. Distances between every pair of the nodes in respective edges are calculated. These distances being the lengths of the respective edges are used as graph weights, and a minimum spanning tree is built over this graph. Results. The problem always has a solution if the desired number of nodes (the number of available recipient nodes) is equal to the number of initially given nodes. If the desired number is lesser, the maximal edge length is found and the edges of the maximal length are excluded while the number of minimum spanning tree nodes is greater than the desired number of nodes. Conclusions. To build a minimum spanning tree by a limited number of nodes, it is suggested using the Delaunay triangulation and an iterative procedure in order to meet the desired number of nodes. Planar nodes of an initial set are triangulated, whereupon the edge lengths are used as weights of a graph. The iterations to reduce nodes are done only if there are redundant nodes. When failed, the root node must be changed before the desired number of nodes is changed.Документ Відкритий доступ Comparison of optimization strategies and estimation techniques for radio network planning and optimization problems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Prokopets, Volodymyr A.; Globa, Larysa S.Background. Radio network planning is one of the main phases of the cellular network lifecycle, as it determines capital and operating costs and allows system performance evaluation at any given time. An accurate and comprehensive analysis of existing network statistics is necessary for proper cell planning during network expansion. These statistics are collected throughout the life cycle of the cellular network and usually have certain imperfections (heterogeneity of statistics, which have different densities in different parts of the search space, up to the presence of significant voids, etc.) The system describing the functioning of the radio network can be represented as a black box because its internal processes are too complex to be defined by mathematical functions. This determines the need to use appropriate tools. Objective. The purpose of the paper is to create a toolkit that allows finding the proper relationships between network parameters to define target values that will help to build an effective network plan in terms of performance and costs for its creation and operation. The tools should be able to work efficiently using the minimum set of available statistical data, as well as taking into account their imperfections. Methods. Mathematical estimation and optimization methods are used, namely Ordinary Least Squares, Ridge Regression, Lasso, Elastic-net, LARS lasso, Bayesian Ridge Regression, Automatic Relevance Determination, Stochastic gradient descent, Theil-Sen estimator, Huber Regression, Quantile regression, Polynomial regression. We consider 12 estimation methods in combination with two optimization strategies. Additionally, the method of partial analysis of the search space with different number of configurations is considered. Results. A software package using the Python programming language has been created, which contains a practical implementation of all the considered estimation and optimization methods, as well as tools for evaluating arbitrary configurations of the software package (benchmark) and visualizing the results. The best estimation method is Ordinary Least Squares for finding the optimal configuration of the statistical parameters of the 4G radio network to maximize the download speed. To obtain satisfactory results, it is enough to consider 25 initial and 250 estimated points - a larger number of points will not significantly increase prediction accuracy. Conclusions. The results indicate the possibility of using the created software package for radio network planning tasks. Further research is aimed at expanding the created software package's functionality and considering additional estimation methods and optimization strategies.Документ Відкритий доступ Continuation of academician V.M. Glushkov work on the development of modern information & communication technologies(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Ilchenko, Мykhaylo Yu.; Kravchuk, Serhiy O.; Uryvsky, Leonid O.Background. The distinguished contribution of Academician V.M. Glushkov to the theory and practice of automated control systems’ national-wide creation makes his achievements as the scientist and science organizer to be relevant and important. The world’s scientific community celebrates his 100th anniversary this year. Results. The significant achievements, prospective developments, recognized scientific schools of Igor Sikorsky Kyiv Polytechnic Institute in the most important areas of fundamental and applied scientific research in information technologies were noted. The leader of the current and advanced developments and achievements implementation in the information and telecommunication technology area in our university is ER ITS. That indicates the succession of generations, the proven foundation of the brilliant ideas’ implementation, that are bequeathed to us by Academician V.M. Glushkov.Документ Відкритий доступ Estimation of potential parameters for 5G mobile networks radiochannels(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Berezovsky, Igor M.; Noskov, Vyacheslav I.Background. Deploying of 5G mobile networks opens up wide opportunities for the development of IoT, high-speed access to Internet services, industrial automation, telemedicine and other modern services. Peak transmission rate, latency, and spectral efficiency are important indicators for network performance. These indicators are primarily determined by the 5G-NR radio subsystem, which is built using modern technologies such as OFDM, interference resistant LDPC coding and massive MIMO antenna systems. In addition, frames and time-frequency resource distribution in 5G-NR are improved for both Downlink and Uplink. All of these are described in various 3GPPP documents, but to evaluate these indicators, it is necessary to create an appropriate methodology and perform calculations. Objective. The purpose of the research is to create a methodology and estimate the potential values of peak transmission rate, latency and spectral efficiency of 5G-NR radio channels. Method. Analytical calculation methods based on recommendations and source data of 3GPP documents are used. Results. Analytical studies show that 5G-NR radio channels can potentially provide a peak transmission up to 37 Gbps, latency less than 0.5ms, and spectral efficiency up to 46 bps/Hz rate in the Downlink direction using 50 MHz FR1 frequency band, QAM256 modulation and MIMO 8 x 8-antenna system. Conclusions. The researched 5G-NR radio channels efficiency indicators meet current and future services requirements.Документ Відкритий доступ Implementation of technology for improving the quality of segmentation of medical images by software adjustment of convolutional neural network hyperparameters(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Prochukhan, Dmytro V.Background. The scientists have built effective convolutional neural networks in their research, but the issue of optimal setting of the hyperparameters of these neural networks remains insufficiently researched. Hyperparameters affect model selection. They have the greatest impact on the number and size of hidden layers. Effective selection of hyperparameters improves the speed and quality of the learning algorithm. It is also necessary to pay attention to the fact that the hyperparameters of the convolutional neural network are interconnected. That is why it is very difficult to manually select the effective values of hyperparameters, which will ensure the maximum efficiency of the convolutional neural network. It is necessary to automate the process of selecting hyperparameters, to implement a software mechanism for setting hyperparameters of a convolutional neural network. The author has successfully implemented the specified task. Objective. The purpose of the paper is to develop a technology for selecting hyperparameters of a convolutional neural network to improve the quality of segmentation of medical images. Methods. Selection of a convolutional neural network model that will enable effective segmentation of medical images, modification of the Keras Tuner library by developing an additional function, use of convolutional neural network optimization methods and hyperparameters, compilation of the constructed model and its settings, selection of the model with the best hyperparameters. Results. A comparative analysis of U-Net and FCN-32 convolutional neural networks was carried out. U-Net was selected as the tuning network due to its higher quality and accuracy of image segmentation. Modified the Keras Tuner library by developing an additional function for tuning hyperparameters. To optimize hyperparameters, the use of the Hyperband method is justified. The optimal number of epochs was selected - 20. In the process of setting hyperparameters, the best model with an accuracy index of 0.9665 was selected. The hyperparameter start_neurons is set to 80, the hyperparameter net_depth is 5, the activation function is Mish, the hyperparameter dropout is set to False, and the hyperparameter bn_after_act is set to True. Conclusions. The convolutional neural network U-Net, which is configured with the specified parameters, has a significant potential in solving the problems of segmentation of medical images. The prospect of further research is the use of a modified network for the diagnosis of symptoms of the coronavirus disease COVID-19, pneumonia, cancer and other complex medical diseases.Документ Відкритий доступ Indicators of information features for recognising the state of sources and objects of telecommunication networks and systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Аnatolii Ilnytskyi; Tsukanov OlegBackground. The majority of modern procedures for the recognition of radio sources and objects are based on the use of binary and multivalued logic, which have low specific features. The essence of the issues is to compare a priori knowledge and a posteriori data coming from the surveillance means and to make a decision on the recognition of a radio emission object. A priori knowledge and a posteriori data are formed both before and during the recognition process on the basis of sets of information features or information signatures. At the same time, when constructing an integral indicator for determining the affiliation and status of sources and objects, it is necessary to know the weighting coefficients of information features, the determination of which is a rather difficult task. Therefore, the issue of determining the weighting coefficients that characterise information features remains an urgent task in the field of statistical radio engineering. Objective. The purpose of the paper is to select and substantiate a simple and effective method for calculating the weighting coefficients of information features for the implementation of the methodology for recognising radio sources and objects. Methods. Decision-making on the value of the weighting coefficients of information features of the recognition objects belonging to a certain class is based on the results of calculations using one of the three Fishburne formulae, which, in comparison with the known methods of expert assessments, are very simple and understandable, do not require any additional research and complex calculations. Results. The procedure is proposed and an example of using the Fishburne method (three formulae) in calculating the value of the weighting coefficients of information features for recognising sources and objects of radio monitoring is considered. Conclusions. Comparison of the method of calculating the weighting coefficients using Fishburne's formulae with other known methods of expert assessments shows that there is no need to interview experts and process their analysis results; there are no restrictive implementation conditions; it is easy to take into account additional information about the indicators, if necessary; no software implementation with a complex search algorithm is required; it is easy to make any changes as additional information indicators.Документ Відкритий доступ Internet of things data transfer method using neural network autoencoder(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Siemens, Eduard; Kurdecha, Vasyl V.; Ushakov, Serhii M.Background. The number of devices in the Internet of Things is constantly increasing. At the same time, the number of solutions on the market for such technologies is growing. Statistics confirm that these factors lead to an increase in data transfer volumes. This raises the number of resources spent on data transmission. The growing trend in the number of users of the Internet of Things technology leads to the emergence of the problem of a rapid increase in the data transmitted by the network. Objective. The purpose of the paper is to improve the process of data transmission in the Internet of Things by modifying the neural network autoencoder to reduce network resources use. Methods. Analysis of publications dedicated to Internet of things data transmission. Integration of existing data coding solutions based on a neural network autoencoder in the process of transmitting data from the Internet of things. Results. The neural network autoencoder has been improved by using an algorithm that additionally includes an arithmetic encoder and further training a new model on the output of a full-fledged autoencoder. Conclusions. The process of data transmission in the Internet of Things network has been modified by improving the neural network autoencoder by using the training of a smaller neural network on the initial data of the main autoencoder, which has reduced the amount of data transmitted and, accordingly, reduced the use of network resources.Документ Відкритий доступ Minimizing high-frequency switching losses in wideband gan hemts for flyback converters(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Arseniuk, Dmytro O.; Zinkovskyi, Yuriy F.Background. In the realm of pulse power supplies, flyback converters play a pivotal role in efficient voltage conversion and providing electrical isolation. Typically, these converters utilize silicon transistors. However, they encounter several issues that hinder their energy efficiency and operational stability. A primary concern is the increase in switching losses at high frequencies. This is attributed to the lower switching speed and higher on-state resistance characteristic of silicon transistors. Such inefficiency leads to substantial power dissipation, thereby reducing overall efficiency. Additionally, the heat generated from these losses necessitates complex temperature control systems, increasing operational burden and affecting the reliability and longevity of the converters. Furthermore, the operational frequency of these converters is limited. While operating at higher frequencies is beneficial for reducing the size of passive components, it exacerbates the problems of switching losses and heat dissipation in silicon transistors. Objective. This article aims to conduct a comprehensive study and optimization of flyback converters based on High Electron Mobility Transistors (HEMT) made of Gallium Nitride (GaN), focusing on minimizing losses in high-frequency switching. The study delves into the intrinsic properties of GaN HEMTs, highlighting their superior characteristics compared to traditional silicon counterparts, and emphasizes the circuit design methods for minimizing losses and their features. Method. The research involved a detailed analysis of the switching losses of GaN HEMTs under high-frequency switching conditions. Using computer simulation models, the study examines the impact of various parameters, such as currents and voltages on the GaN transistor, power dissipation, and the output characteristics of the device with different circuit topologies on the performance and efficiency of switching. Results. The results provide insights into the optimization strategies of topology, particularly the use of transistor gate drivers and snubber circuits, which are crucial for enhancing the overall efficiency and reliability of flyback converters. Conclusions. The article offers an in-depth analysis into optimizing high-frequency flyback converters using GaN HEMTs, providing valuable guidance for devices requiring compact power sources, such as in small aircraft systems and telecommunications networks.Документ Відкритий доступ Optimizing hard qos and security with disjoint path routing(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Lemeshko, Oleksandr V.; Yeremenko, Oleksandra S.; Yevdokymenko, Maryna O.; Sleiman, BatoulThe combination of secure routing and hard QoS is a worthwhile topic that involves designing and implementing network protocols and systems that can provide high performance and robust protection for data flow due to shared goals. Secure QoS routing over disjoint paths is a challenging problem that requires balancing the trade-off between network security and bandwidth guarantees. Objective. This article investigates a mathematical model that can address secure QoS routing by formulating it as an optimization problem with a linear objective function and linear or bilinear constraints. The objective function aims to minimize the paths compromise probability, while the constraints ensure that the total bandwidth of the paths meets the QoS requirements. Methods. We use computer simulation of hard QoS and security with disjoint path routing. Also we use mathematical programming methods in order to describe secure QoS routing. Results. The article presents a numerical study of the model using different scenarios and parameters. The results show that the model can effectively provide secure QoS routing over disjoint paths with a high bandwidth guarantee level and a low compromise probability. The work analyses the sensitivity of the solutions to the QoS requirements and reveals that there is usually some margin in the bandwidth provision. Conclusions. The proposed model is a promising tool for secure QoS routing over disjoint paths in various network environments.Документ Відкритий доступ Possibilities of improving the voice services quality in 5G networks(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Vetoshko, Ivan P.; Kravchuk, Serhii O.Educational and Research Institute of Telecommunication Systems Igor Sikorsky Kyiv Polytechnic Institute, Kyiv, Ukraine Background. The introduction of fifth-generation (5G) networks creates new opportunities for fast and continuous data exchange, but there are still some problems with the quality of voice services in such networks. With the rapid development of technology and the further spread of 5G, there is a need to understand the impact of key aspects of 5G on voice quality. This requires research that can systematically analyse the features of 5G networks that affect the quality of voice services. Objective. Identification of ways to improve the quality of voice services in 5G networks. Assessment of key indicators of voice service quality in 5G networks. Determination of the best option for the gradual transition to the Standalone mode and the use of VoNR technology in the fifth generation networks. Methods. Analysis of factors affecting the quality of voice services in fifth-generation networks. Analysis of well-known publications on the implementation of 5G networks. Comparison of the implementation of Non-Standalone and Standalone modes in the 5G network. Testing of the modern EVS codec, which provides an opportunity to improve the customer experience. Results. Confirmation that 5G networks can significantly improve the quality of voice services compared to previous mobile communication technologies such as 4G and 3G. Certain factors that may affect the quality of voice services and require additional attention when planning and deploying 5G networks are identified. The optimal steps for the transition to the Standalone mode and the use of VoNR technology in fifth-generation networks are determined. The main differences in the QoS architecture between LTE and 5G are identified, and the purpose of DRB flows for separating traffic types and services is established. Conclusions. It has been confirmed that 5G networks can significantly improve the quality of voice services compared to previous technologies such as 4G and 3G. This is possible due to the broadband capabilities of 5G networks, improved data transmission, low latency, the use of an advanced EVS codec and reduced response time. However, certain factors, such as network coverage, optimisation level and traffic characteristics, can affect the quality of voice services and require additional attention when planning and deploying 5G networks. The QoS management architecture consists of QoS flows, which allow separating packet assignment to flows (managed by the CN) from the assignment of DRB flows (managed by the RAN). As 5G networks are being rolled out gradually, it is important to properly integrate the 5G domain into the existing telecoms provider's network. The transition from Non-Standalone to Dual connectivity is a necessary step for the implementation of VoNR technology in Standalone mode. Using the modern EVS codec allows not only improving the customer experience, but also introducing new voice services.Документ Відкритий доступ Pruning minimum spanning trees and cutting longest edges to connect a given number of nodes by minimizing total edge length(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Romanuke, Vadim V.Background. Whereas in many tasks of designing efficient telecommunication networks, the number of network nodes is limited, the initial choice of nodes is wider. There are more possible locations than factually active tools to be settled to those locations to further satisfy consumers. This induces an available node constraint problem. Objective. Given an initial set of planar nodes, the problem is to build a minimum spanning tree connecting a given number of the nodes, which is less than the cardinality of the initial set. Therefore, the available node constraint problem aims at building an optimally minimum spanning tree to connect a given number of planar nodes being less than an initial number of nodes by minimizing the tree length. Methods. The initial set of nodes is triangulated. This gives a set of edges, whose lengths are calculated and used as graph weights. A minimum spanning tree is built over this graph. The desired number of nodes is reached by pruning the minimum spanning tree connecting the initial number of nodes, where free edges whose weights are the largest are iteratively removed from the tree. The other approach, the cutting method, removes longest edges off the initial minimum spanning tree, regardless of whether they are free or not. Results. Unlike the pruning method, the method of cutting longest edges may result in a minimum spanning tree connecting fewer nodes than the desired number. However, the cutting method often outputs a shorter tree, especially when the edge length varies much. Besides, the cutting method is slower due to it iteratively rebuilds a minimum spanning tree. Conclusions. The problem is initially solved by the pruning method. Then the cutting method is used and its solution is compared to the solution by the pruning method. The best tree is shorter. A tradeoff for the nodes and tree length is possible.Документ Відкритий доступ Source identification methodology in radio monitoring objects using multi-meaning(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Ilnytskyi, Anatoliy I.; Tsukanov, Oleg F.Background. With the constant development of radio-electronic equipment and telecommunication technologies and the appearance of new technical means of various purposes, including dual meaning, which already have and operate with new “non-traditional” information features. The specified circumstances require the improvement of their radio monitoring and countermeasure systems, from the point of view of the development of highly effective intelligent systems that ensure the collection, processing, accumulation and use of the received monitoring information for decision-making on a real-time scale. Objective. Increasing the effectiveness of radio monitoring of radio radiation sources is carried out by decomposing their informational features into static and dynamic ones with further formalization of the observation and decision-making process. Methods. The decision on whether the source of radio radiation belongs to one or another class is made on the basis of a preliminary calculation of information feature estimates for all possible sets of features and the use of multi-valued logic functions to make a decision. The preliminary calculation makes it possible to increase the speed of the algorithm and make a decision about whether the object of recognition belongs to one or another class by calculating the value of only one function, and recalculating the estimates of static and dynamic information features only when the descriptions of classes of radio radiation sources are changed. Results. The proposed technique makes it possible to significantly expand the classes of classes of sources and objects of radio monitoring and will ensure an increase in the speed and reliability and efficiency of the recognition process as a whole. Conclusions. Deciding whether a source of radio radiation belongs to one or another class through the use of multi-valued logic functions allows increasing the efficiency of the radio monitoring system and significantly expand the class of monitoring sources.Документ Відкритий доступ The program for assessing the connectivity of nodes of wireless episodic networks under the condition of using UAVS(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Sushyn, Ihor O.; Lysenko, Olexandr I.; Valuiskyi, Stanislav V.Background. Based on analytical mathematical models, the duration of connectivity of mobile subscribers (nodes) (MS) of a wireless episodic network (WEN, consisting of MS and UAV) was investigated in conditions of direct radio visibility and considering the relaying. Objective. The purpose of the work is to find methodological approaches to ensure the connectivity of WSN nodes, which is a necessary condition for obtaining information from WSN in the absence of communication infrastructure. Methods. Simulation modelling based on MAPLE 14 software package and analytical calculation methods are used. Results. It is shown that the duration of connectivity is directly proportional to the size of the coverage area and inversely proportional to the movement speed of nodes. The mobility nature (scenario) of nodes also affects the duration of connectivity. The simulation of the nodes' movement was carried out under 4 scenarios: "march", "incoherent", "random wandering in the field" and "random wandering in the city". The largest values of the connectivity duration correspond to the third scenario, and the smallest - to the second (with a fixed radius of the coverage area and the movement speed of nodes). Thus, the average connectivity duration of the UAV-pedestrian connection in the event of an "incoherent" will be about 36 minutes, and the UAV-car connection - about 5 minutes. Conclusions. The system and functional parameters of the networks, which were obtained as a result of the research, will form the basis of the initial data and limitations of the mathematical model, and will also make it possible to determine the initial placement of the UAV network at the planning stage.Документ Відкритий доступ Two-factor authentication protocol in access control systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2023) Strelkovskaya, Irina V.; Onatskiy, Oleksiy V.; Yona, Larysa G.International Humanitarian University, Odesa, Ukraine Background. To ensure the protection of the biometric access control system used in unsecured communication channels, it is necessary to exclude the storage and transfer, transfer of biometric data as well as sequences generated on their basis. The paper proposes a cryptographic protocol of two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and the private key of the user. Objective. The aim of the article is to develop a cryptographic protocol for zero-knowledge two-factor authentication based on elliptic curves using biometric data and the user’s private key, which allows increasing cryptographic strength and reducing the duration of the authentication process. Methods. The process of implementing zero-knowledge proof protocols is as follows: one user (proofer) can convince another user (verifier) that he has some secret without disclosing the secret itself. Results. A cryptographic protocol for two-factor authentication with zero-knowledge over the extended field GF(2m) of elliptic curves using user biometric data is proposed, which significantly reduces the size of the protocol parameters and increases cryptographic strength (computational complexity of the breaking). There is no leakage of private key information and biometric data of the user during the execution of the zero-knowledge proof protocol. Conclusions. The implementation of a cryptographic protocol with zero-knowledge proof two-factor authentication based on elliptic curves allows significantly reducing the size of protocol parameters and increasing the cryptographic strength (computational complexity of the breaking).