Вітаємо!
Раді вітати Вас у електронному репозитарії Національного технічного університету «Харківський політехнічний інститут» (eNTUKhPIIR) ISSN 2409-5982
Репозитарій є одним з елементів інфраструктури відкритої науки НТУ «ХПІ» відповідно до Політик відкритої науки та відкритих освітніх ресурсів в Національному технічному університеті «Харківський політехнічний інститут».
Розміщуєте свої публікації та відкриті освітні ресурси (OER) у репозитарії eNTUKhPIIR, сприяйте підвищенню рейтингу університету
Кількість документів у репозитарії: 97248
Для включення публікацій до репозитарію необхідно:
- Ознайомитися з положенням про репозитарій НТУ «ХПІ»
- Заповнити форму для передачі матеріалів
Публікації, розміщенні самостійно автором, проходять обов’язкове рецензування.
З усіх питань стосовно електронного репозитарію Національного технічного університету «Харківський політехнічний інститут», звертайтеся:
заступник директора бібліотеки Олена Бреславець, e-mail: olena.breslavec@khpi.edu.ua

Розділи
Виберіть розділ, щоб переглянути його колекції.
- Колекція формується з 2023 р.
- Офіційний сайт http://ct-college.net
- http://vitv.kh.ua
- Офіційний сайт http://web.kpi.kharkov.ua/molnia
- Офіційний сайт http://library.kpi.kharkov.ua
- Науково-технічний журнал
- Офіційний сайт кафедри https://web.kpi.kharkov.ua/daz
Нові надходження
Тип елементу:Документ, Сучасні енергетичні рішення у сільськогосподарській техніці: гібридні, електричні та дизель-генераторні приводи(Національний технічний університет "Харківський політехнічний інститут", 2025) Олійник, Олександр Михайлович; Островерх, Олександр ОлеговичТип елементу:Документ, Multi-objective framework for end-device processing and offloading in industrial IoT(Національний технічний університет "Харківський політехнічний інститут", 2026) Malokhvii, Eduard; Kuchuk, Heorhii; Korobko, Andrii; Zhovnir, Nataliia; Oryshchenko, SerhiiThe paper develops an integrated theoretical and mathematical framework for information processing on resource-limited Industrial Internet of Things (IIoT) end devices operating within cloud–fog–edge architectures. The study is motivated by heterogeneous, nonstationary event streams whose direct transmission to upper tiers is often infeasible due to bandwidth scarcity, strict latency targets, and the energy and computational limitations of end devices. Consequently, the end device must execute sensing-driven preprocessing, manage finite-buffer queues, and regulate outgoing traffic while preserving the informativeness required for monitoring, control, and analytics. The proposed formalization treats the end device as an active decision node that shapes system dynamics by controlling local transformations and offloading decisions under time-varying resource conditions. A class- and priority-aware stream model captures heterogeneity in criticality and service requirements, while finite-buffer queueing dynamics represent delay and loss under bursty arrivals and constrained service capacity. The device state is described by a resource vector reflecting available CPU capacity, memory and buffer occupancy, channel quality and transmission rate, and energy-related limitations, enabling state-dependent admissibility conditions for local computation and communication. An operator-level processing chain systematizes the end-device reduction pipeline, including preprocessing, informativeness assessment, adaptive filtering, temporal and semantic aggregation, controlled compression, and compact feature formation. The chain produces structured, semantically annotated packets supporting lightweight local decision-making and selective offloading to fog or cloud tiers. A multi-criteria efficiency structure is specified to jointly account for latency, packet loss, energy expenditure, communication load, and informativeness preservation, thereby enabling Pareto-oriented synthesis of admissible adaptive policies. The research objective is to establish unified decision variables, constraints, and stability and feasibility conditions coupling queue behavior with resource limitations, providing an analytically traceable basis for subsequent method construction, parameter tuning, and scenario driven validation in realistic industrial environments. Unlike purely empirical benchmarking, the contribution is intentionally analytical: it consolidates fragmented models of local reduction and offloading, and exposes explicit operator definitions for reproducible analysis.Тип елементу:Документ, The evolution of intrusion detection systems: a comprehensive review of modern datasets, deep learning approaches, and architectural challenges(Національний технічний університет "Харківський політехнічний інститут", 2026) Poltoratskyi, Vadym; Gavrylenko, SvitlanaIntrusion Detection Systems (IDS) remain a critical component of cybersecurity. They are rapidly evolving to counter increasingly complex threats across various environments, such as the Internet of Things (IoT), the Industrial Internet of Things (IIoT), vehicular networks, and critical infrastructure. The objective of this work is a comprehensive analysis of the evolution of Intrusion Detection Systems (IDS) from 2020 to 2025. Grounded in contemporary research, it examines the integration of Machine Learning (ML), Deep Learning (DL), Federated Learning (FL), and novel hybrid techniques into IDS, summarizing advancements in their operational capabilities. Key trends include a significant shift toward deep learning architectures - specifically Transformers and Vision Transformers (ViT) - for enhanced pattern recognition. Additionally, the adoption of Federated Learning and fog computing-based systems is observed, aiming to preserve privacy and address challenges related to data decentralization and non-independent and identically distributed (Non-IID) data. Furthermore, there is growing emphasis on Explainable AI (XAI), attack lifecycle-based datasets, and model robustness against adversarial attacks. The results obtained. The review proposes a comprehensive multi-criteria classification of systems, enabling a thorough description and comparison of various solutions. The paper critically evaluates contemporary input datasets and conducts a comparative efficiency analysis of different intrusion detection methodologies. Analysis indicates that although algorithms achieve accuracy exceeding 98% on benchmark datasets, several critical challenges remain unresolved. These include class imbalance, the capability to detect novel and unknown threats, scalability in real-world operational environments, and ethical privacy concerns. Conclusions. This study addresses gaps in previous reviews by highlighting the lack of unified datasets, the need for model validation in real-world environments, and adaptive protection against zero-day attacks and encrypted traffic. It proposes a roadmap for the development of more robust, decentralized, and interpretable IDS.Тип елементу:Документ, Нові рішення в області передачі електричної енергії (опори повітряних ліній)(Odesa Military Academy, 2022) Барбашов, Ігор Володимирович; Алабова, В. Ю.; Фунтаков, В. Д.Тип елементу:Документ, Evaluation of alternative solutions for the effective structure of the cyber security system in critical information infrastructures by the hierarchical analysis method(Національний технічний університет "Харківський політехнічний інститут", 2026) Gasimov, Vagif; Mammadov, Jabir; Islamov, Islam; Hashimov, ElshanThe subject matter of this article is the evaluation of alternative solutions for ensuring cyber security of critical information infrastructures and the selection of a more effective solution. The goal of the study is to create a cybersecurity system with an effective structure for critical information infrastructures. The tasks to be solved include determining the methods, tools, and measures to be included in the system. For this purpose, the hierarchical analysis method was used, and first of all, the decomposition of the problem was given and the corresponding hierarchical structure was compiled. On the basis of expert evaluations for each level of the hierarchical structure, pairwise comparison matrices of alternatives and priorities were constructed and their priority vectors were calculated sequentially. Taking into account the main priorities vector (Confidentiality, Integrity, Availability, Manageability), the degrees of importance of information protection measures (methods and means) were calculated and sorted according to the pairwise preference relations of alternative solutions obtained from the synthesis of the intermediate priorities vector (Physical Security, Network Security, Data Security, Application Security, Access Security). As a result of such a ranking, it is possible to determine which security measures should be given more importance to ensure the cyber security of critical information infrastructures. Conclusion. Thus,based on the hierarchical analysis method, it is possible to quantitatively evaluate alternative solutions for ensuring cyber security of critical information infrastructures, which allows for easy ranking of these solutions by degree of importance. As a result, an effective decision can be made about which methods are more important to include in the cyber security system, and which are relatively less important. The corresponding calculations and analyses were performed on the example of special purpose organizations based on a generalized hierarchical scheme of the cyber security system of critical infrastructures. Thus, the information infrastructure of one of the organizations producing special equipment was taken as the object of the study. According to the obtained results, it was determined that among the methods, means and measures of security, cryptographic and steganographic methods of data protection for this type of organization have higher degrees of importance than others.
