ScienceRise <p><strong>The aim of the journal </strong><strong>«</strong><strong>ScienceRise»</strong>&nbsp;is familiarization of the scientific community and the community of specialists in various fields of activity with new knowledge and data obtained by researchers in the following areas: Physical Sciences and Engineering, Health Sciences, Social Sciences.&nbsp;</p> <p>The multidisciplinarity of the journal, which includes 3 different scientific fields, is justified by the skeleton of the idea underlying the concept of the journal. This concept is presented as follows.&nbsp;<a href="/sciencerise/about#them">More</a><br><strong>JOURNAL HISTORY<br></strong>Since 2020, journal «ScienceRise» has been published in Estonia (Publishing House «Scientific Route OÜ»).</p> <p>From 2014 to 2019, journal «ScienceRise» was published by the <a href="" target="_blank" rel="noopener">РС ТЕСHNOLOGY СЕNTЕR</a>. All journal archives for this period are available in the open access by the <a href="/sciencerise/arch">link</a></p> Scientific Route OÜ en-US ScienceRise 2313-6286 <p>Our journal abides by the <a href="" target="_blank" rel="noopener">Creative Commons CC BY</a> copyright rights and permissions for open access journals.</p> <p>Authors, who are published in this journal, agree to the following conditions:</p> <p>1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a <a href="" target="_blank" rel="noopener">Creative Commons CC BY</a>, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.</p> <p>&nbsp;2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.</p> Development of a new type of household appliances – refrigerators with a heating chamber <p><strong>The object</strong> of this study is absorption-type refrigeration appliances, which allow to expand the functionality of household appliances without additional energy consumption.</p> <p><strong>Investigated problem: </strong>The aim of this study: firstly, due to the novelty of the proposed technique, it was necessary to show the real possibility of obtaining the temperature level required for technological processes (up to 70 °C); secondly, taking into account the experience gained in experimental studies, it was necessary to propose new designs for solving the problems of refrigeration and heat treatment of food products and raw materials in domestic conditions.</p> <p><strong>The main scientific results:</strong> It is shown that the development of devices that combine the functions of refrigeration storage and heat treatment of food products, semi-finished products and agricultural raw materials can become a promising area for energy saving in household appliances. In such household combined appliances, the heat released during the implementation of the refrigeration cycle is not immediately removed to the environment, but is transferred to a special heating chamber, while the temperature in the volume of the heating chamber is maintained higher than the air temperature in the room. The effect of energy saving is achieved by expanding the functionality of household appliances without attracting additional energy costs.</p> <p>The original designs of combined absorption-type household appliances are proposed, a description of their operation, advantages and disadvantages, and areas of application are given.</p> <p><strong>The area of practical use of the research results:</strong> In the course of experimental studies, it was shown that the introduction of an additional heating chamber into the structure of household absorption refrigerators, thermally connected with the lifting section by the dephlegmator of the absorption refrigeration unit, does not lead to an increase in energy consumption (according to the test results below than in the standard version by 5 %) and does not impair the performance of the cooling chambers.</p> <p><strong>The area of practical use of the research results:</strong> household energy-saving appliances.</p> <p><strong>Innovative technological product: </strong>the use of an evaporation-condensation cycle that provides highly efficient heat transfer at a distance of up to 1 meter from the heat dissipation zone of the refrigeration unit to the usable volume of the heating chamber of the household appliance.</p> Oleksandr Titlov Tetiana Hratii Copyright (c) 2023 Oleksandr Titlov, Tetiana Hratii 2023-02-28 2023-02-28 1 3 15 10.21303/2313-8416.2023.002856 Developing a methodological approach to assessing state information security <p><strong>The object of the research </strong>is the system of information security of the state.</p> <p><strong>Investigated problem</strong>: The experience of operations (combat operations) of recent years shows the growing role of information influence measures on the systems of collection, processing and transmission of special purpose information and decision-making officials.</p> <p>The specificity of measures to ensure the information security of the state is that, on the one hand, it is necessary to solve the task of collecting, processing and transmitting information, and on the other hand, it is necessary to counteract measures of information influence on the systems of collecting, processing and transmitting information and decision-making officials.</p> <p>Given this, information attacks have become a real threat and are one of the priority problems of national security and risk management. Information security covers all security measures that can be taken to protect against these impacts. A significant increase in the complexity and intensity of information attacks in recent years has forced most developed countries to strengthen their defenses and adopt national information security strategies.</p> <p><strong>The area of practical use of the research results:</strong> It is advisable to use the proposed scientific results when conducting research and development works on the creation of intelligent systems for collecting, processing and analyzing information about the state of information security of the state, and developing requirements for hardware and software of this type of systems.</p> <p><strong>Field of application</strong>: software, information systems, decision support systems.</p> Halyna Andriishena Roman Chunakov Mykola Zaitsev Andrii Shyshatskyi Copyright (c) 2023 Halyna Andriishena, Roman Chunakov, Mykola Zaitsev, Andrii Shyshatskyi 2023-02-28 2023-02-28 1 16 23 10.21303/2313-8416.2023.002826 The concept of building security of the network with elements of the semiotic approach <p><strong>The object of research:</strong> First, to identify and discuss the security problems of cyber-physical systems associated with the emergence of qualitatively new technologies and qualitatively new affordable artificial intelligence software. Secondly, building the concept of the security structure of a cyber-physical system based on the Zero Trust Security approach. Creation of a new secure load transfer structure based on the semiotic approach.</p> <p><strong>Investigated problem:</strong> Information system security problems continue to cause significant costs and damage to organizations. Sustainability requires comprehensive and integrated security platforms that reach customers, whether they work at headquarters, in a branch office, or individually from random touchpoints.</p> <p><strong>The main scientific results:</strong> the concept of a structured protection system with the Zero Trust Security approach has been developed. The structure of the semiotic analysis of the segmentation of the transmitted load on the blocks is proposed. Blocks by signs are subjected to individual analysis. According to the features, the blocks are transformed by the selected representation into an object/groups of objects. Groups for transmission in the load are tagged, have different coding severity (depth), depending on the risk assessment. Groups are transmitted through the network in different ways (paths) – VPN (different ESP), unencrypted tunnel, open access, etc.</p> <p>This solution improves the throughput of malicious load analysis prior to transmission. The performance overhead for encoding/decoding the load and encapsulating/de-encapsulating during transmission is reduced. The transmission bandwidth is increased.</p> <p><strong>The area of practical use of the research results:</strong> businesses requiring secure access to on-premise resources and mission-critical cloud environments. Organizations using employees in distributed networks. Specialists in the deployment and analysis of the protection of cyber-physical systems.</p> <p><strong>Innovative technological product:</strong> The semiotic security concept extends the zero-trust security model, which focuses on protecting network traffic within and between organizations. This concept uses load traffic segmentation, which combines an advanced analysis and transfer load transformation framework.</p> <p>This concept provides for integration with other cybersecurity technologies such as endpoint discovery and response (EDR) and security information and event management (SIEM) to provide a more comprehensive security solution.</p> <p>This solution improves the throughput of malicious load analysis prior to transmission. Reduced performance resources for encode/decode load and encapsulate/deencapsulate in transit.</p> <p><strong>Scope of the innovative technological product:</strong> this concept can be applied to enterprises that already have some elements of zero trust in their corporate infrastructure, but cannot strictly control the state of the requested assets, are limited in implementing security policies for certain classes of users. This deployment model can also be applied to enterprises that use cloud services for individual business processes.</p> <p>It can be useful for researchers and administrators in the development of corporate cybersecurity plans, which uses the concepts of zero-trust and covers relationships between components, workflow planning, and access policies.</p> Serhii Yevseiev Maksym Tolkachov Darshan Shetty Vladyslav Khvostenko Anna Strelnikova Stanislav Milevskyi Sergii Golovashych Copyright (c) 2023 Serhii Yevseiev, Maksym Tolkachov, Darshan Shetty, Vladyslav Khvostenko, Anna Strelnikova, Stanislav Milevskyi, Sergii Golovashych 2023-02-28 2023-02-28 1 24 34 10.21303/2313-8416.2023.002828 Trends in the development of the processing of melons and gourds <p>The review of equipment for processing and technology of processing melons and gourds is given. Primary processing of gourds has not been industrialized in the CIS countries and abroad until recent years. Theoretical prerequisites for the creation of products based on melon are presented, the issues of rational use of melon for the production of long-term storage products are highlighted. The main physical-mechanical and rheological properties of pumpkin, melon and watermelon fruits are given. The proposed options for equipment and technological lines for the processing of watermelon, melon, pumpkin fruits are presented. The technologies for processing the fruits of watermelon and melon are described.</p> <p><strong>The object of research:</strong> Melons and gourds, namely processing technology</p> <p><strong>Investigated problem:</strong> Imperfect technologies for processing melon fruits.</p> <p><strong>The main scientific results:</strong>&nbsp;systematization of data on the problem of processing melon fruits for food in order to choose a rational way to improve processing technologies.</p> <p><strong>The area of practical use of the research results:</strong> The bottom line is the developed technologies</p> <p><strong>Innovative technological product:</strong> technology for processing gourds.</p> <p><strong>Scope of the technological innovative product:</strong> food industry (Food production).</p> Mariam Alimardanova Dinara Tlevlessova Laila Syzdykova Abdieva Karlygash Yelena Petrenko Alexandra Brindyukova Copyright (c) 2023 Mariam Alimardanova, Dinara Tlevlessova, Laila Syzdykova, Abdieva Karlygash, Yelena Petrenko, Alexandra Brindyukova 2023-02-28 2023-02-28 1 35 47 10.21303/2313-8416.2023.002870 Development of technology for the production of sweet products based on melon fruit <p>Object of research: the process of creating a technology for the preparation of sweet products using locally produced melon fruits.</p> <p>Investigated goal: Development of technology for the production of sweet products from gourds on a natural basis using local unsold raw materials.</p> <p>Main scientific results: possible ways of using unsold melon fruits in the food industry were identified, a solution to the problem of overproduction of melons and gourds in the country was proposed. The original technologies for the production of sweet products made on the basis of the fruits of gourds have been compiled and worked out. the evaluation of the nutritional value of finished products was carried out.</p> <p>Area of practical use of research results: small and medium-sized farms for the production of melon fruits.</p> <p>Innovative technological product: technology for the production of sweet products, which allows organizing the industrial processing of the unsold volume of gourds.</p> <p><strong>Scope of the innovative technological product:</strong> agricultural and food industry in the field of melons processing, small and medium enterprises for the production of melons, confectionery production.</p> Mariam Alimardanova Dinara Tlevlessova Elena Petrenko Alexandra Brindyukova Copyright (c) 2023 Mariam Alimardanova, Dinara Tlevlessova, Elena Petrenko, Alexandra Brindyukova 2023-02-28 2023-02-28 1 48 54 10.21303/2313-8416.2023.002871 Ukrainian dual use export control evolution: historical pickles <p><strong>A prime object</strong> of this effort was to evaluate the premises of appearance and historical evolution of export control and transfer of dual use (DU) technologies emerged in Ukraine after 1991.</p> <p><strong>Investigated problem:</strong> Liquidation of Soviet's monopoly on foreign trade in 1990s, a change in relations between the state and commodity producers, and a massive entry of unprepared exporters chasing maximum profits into the world market could not be envisaged in a full swing at that time by young and unexperienced Ukrainian export control system. The paper looks into Ukrainian DU technology transfer (TT) through a prism of historical premises. Those premises have been formed and are still found standing amongst technology offeror/end user and other TT players. Needless to say, that a technology transfer is a complicated, multi-leveled and multi-players process being impacted and followed with few factors and historically pre-set conditions that constrain its success or failure at the end. The development of DU technologies continues in a quagmire of conflicting interests, the ongoing war in Ukraine, national security and export control rationales.</p> <p>For the time being, debates on Ukrainian DU technologies and their misuse so far lack creativity and rather blurred; political and diplomatic initiatives came finally to nowhere trying to find turnkey solutions, all this is quite a challenge nowadays.</p> <p><strong>The results of this analytical endeavor</strong> make a further solid floor for further debates in terms of politics, legislation and export control</p> Egor Kartuzov Copyright (c) 2023 Egor Kartuzov 2023-02-28 2023-02-28 1 55 64 10.21303/2313-8416.2023.002859