<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Development of Intelligent Information Technology of Computer Processing of Pedagogical Tests Open Tasks Based on Machine Learning Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Arina Herasymova</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Chumachenko</string-name>
          <email>dichumachenko@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Padalko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lutsk National Technical University</institution>
          ,
          <addr-line>Lutsk</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aerospace University “Kharkiv Aviation Institute”</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Recently, such teaching methods as distance learning, e-learning and self-study have been actively developed. The widespread adoption of the Internet in all aspects of information technology has also affected the organization of the learning process. Now computer courses are very popular, which are electronic textbooks and provide for independent study. They are being replaced by distance and online learning. Concerning, this paper presents the current development of methods for computer processing of open tasks to conduct an effective analysis of the learning of educational material. Purpose of work was to analyze the methods and approaches used for computer processing of natural language, as well as tools to solve the problem of identifying test messages. The subject of research was mathematical models and methods of computer processing of natural language.</p>
      </abstract>
      <kwd-group>
        <kwd>Machine learning</kwd>
        <kwd>Supervised learning</kwd>
        <kwd>Artificial neural network</kwd>
        <kwd>Word embedding</kwd>
        <kwd>Linear classifier</kwd>
        <kwd>Gradient descent</kwd>
        <kwd>Softmax</kwd>
        <kwd>Maximum likelihood estimation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1.1</p>
    </sec>
    <sec id="sec-2">
      <title>Relevance of Work</title>
      <p>
        The world pandemic of the new coronavirus has changed the usual way of life and
approaches to education [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Over the past few months, the number of students affected
by the closure of schools and universities in 138 countries has nearly quadrupled to
reach 1.37 billion. This means that over 3 out of 4 children and young people around
the world are not able to attend educational institutions. The closure of educational
institutions also affected nearly 60.2 million teachers [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        However, the pandemic only accelerated the process of digitalization of the
educational process, and trends in the transition of training to online have been observed for
several years [
        <xref ref-type="bibr" rid="ref3 ref4">3-4</xref>
        ]. And now trends of digitalization not only in organization of
educational process, but in Public Health [
        <xref ref-type="bibr" rid="ref5 ref6">5-6</xref>
        ], medical diagnostics [
        <xref ref-type="bibr" rid="ref7 ref8">7-8</xref>
        ], security [
        <xref ref-type="bibr" rid="ref10 ref9">9-10</xref>
        ],
retail [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], financial branch [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] and other spheres of human being are developed with
high speed.
      </p>
      <p>
        One of the integral parts of the existence of mankind is the creation, transfer of
accumulated knowledge and skills, that is, the transfer of information. Recently, such
teaching methods as distance learning, e-learning and self-study have been actively
developed [
        <xref ref-type="bibr" rid="ref13 ref14">13-14</xref>
        ]. The widespread adoption of the Internet in all aspects of information
technology has also affected the organization of the learning process and effective
human resource management [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15-17</xref>
        ].
      </p>
      <p>
        Now computer courses are very popular, they represent electronic textbooks and
provide independent study, but they are being replaced by distance and online learning
[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. In the process of education, the interaction between the teacher and the student is
very important, the teacher needs to understand how well the student understands,
assimilates the material [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        Traditional methods of remote control of knowledge use closed types of test tasks,
based on the usual calculation of the correct answers, and this does not always correctly
reflect the student’s knowledge [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In this regard, this paper presents the current
development of methods for computer processing of open tasks to conduct an effective
analysis of the learning of educational material.
1.2
      </p>
    </sec>
    <sec id="sec-3">
      <title>Aims and Objectives</title>
      <p>The aim of the research is to analyze the methods and approaches used for computer
processing of natural language, as well as tools to solve the problem of identifying test
messages, and to build intelligent information technology for open tasks processing.</p>
      <p>
        For tasks of this type, machine learning approach is usually used [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Artificial
neural network (ANN) is a mathematical model, as well as its software or hardware
implementation, built on the principle of organization and functioning of biological neural
networks - networks of nerve cells of a living organism [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>Learning ability is one of the main advantages of neural networks over traditional
algorithms. Technically, training consists in finding the coefficients of connections
between neurons. In the learning process, the neural network is able to identify complex
relationships between input and output, as well as perform generalization. This means
that if training is successful, the network will be able to return the correct result based
on data that were not in the training sample, as well as incomplete and / or “noisy”,
partially distorted data.</p>
      <p>
        Artificial neural networks are used to solve various classes of problems, such as:
decision making and management, clustering, forecasting, approximation, data
compression, data analysis, optimization [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. In order for them to form a result from raw
data, artificial networks must go through the following stages of solving problems:
− data collection for training;
− preparation and normalization of data;
− experimental selection of training parameters;
− own training;
− verification of the adequacy of training;
− parameter adjustments, final training.
2
2.1
      </p>
      <sec id="sec-3-1">
        <title>Natural Language Computer Processing Methods</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Vector Representations of Words.</title>
      <p>
        To teach word selection without pre-marked data, we first need to solve several
problems [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]:
− create data tuples in the format [input word, source word], each word is
represented as a lifelong vector of length n, where the i value is encoded by one at the
i position and zeros at all the others;
− create a model that receives one-hot vectors on input and output;
− determine the loss function; predicts the right word to optimize the model;
− determine the quality of the model, making sure that similar words have similar
vector representations.
      </p>
      <p>Take this example: The cat pushed the glass off the table. The data we need will
come out as in figure 1. Each bracket denotes a single context window. The blue field
indicates the input one-hot vector (target word), the red field indicates the output
onehot vector (any word in the context window except for the target word, the so-called
context word). Two data elements come out from one context window (there are two
neighboring ones per target word).</p>
      <p>
        Embedding layer stores the vectors of all words in the dictionary, where the number of
words x is the dimension of the space of the compressed vector representation of words
[
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. This embedding size is a custom parameter. The larger it is, the better the model
(but after reaching a certain embedding size you will not get a big performance boost).
This giant matrix is initialized randomly (like a neural network) and is configured bit
by bit during the optimization process (fig. 2).
After training the model, we can only save the embedding layer on the disk, after which
we can use vectors with saved semantics at any time. The full algorithm looks like in
figure 3.
Linear classifier is a way to solve classification problems, when a decision is made on
the basis of a linear operator on the input data [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The class of problems that can be
solved using linear classifiers, respectively, have the property of linear separability.
      </p>
      <p>Let the vector  ⃗ from real numbers be input, and at the output of the classifier, the
exponent Y is calculated by the formula:
 =  (⃗⃗⃗ ·  ⃗ + ⃗ ) =  (∑    +   ),

(1)
where ⃗⃗⃗ is the real vector of weights, ⃗ is regularization coefficient, which does not
allow parameters to go beyond reasonable limits (through retraining),  is the scalar
product transformation function.</p>
      <p>The values of the weights of the vector ⃗⃗⃗ are determined during machine learning
on prepared samples. The function  is usually a simple threshold function that
separates one class of objects from another. In more complex cases, the function  has the
meaning of the probability of a solution.</p>
      <p>The linear classification operation for two classes can be imagined as the reflection
of objects in multidimensional space onto a hyperplane, in which those objects that fall
on one side divides the lines, belong to the first class («yes»), and the objects on the
other side - to the second class («no»).</p>
      <p>Linear classifier is used when it is important to carry out fast calculations with high
speed. It works well when the input vector x ⃗ is sparse. Linear classifiers can work
well in multidimensional space, for example, to classify documents according to the
word-birth matrix. In such cases, objects are considered to be well regularized.
2.3</p>
    </sec>
    <sec id="sec-5">
      <title>Gradient Descent</title>
      <sec id="sec-5-1">
        <title>Let the objective function have the form:</title>
      </sec>
      <sec id="sec-5-2">
        <title>And the optimization task is defined as follows:</title>
        <p>( ⃗ ) ∶</p>
        <p>→ ℝ
 ( ⃗ ) ∶ min  ( )</p>
        <p>⃗</p>
        <p>In the case when you need to find the maximum, instead of  ( ⃗ ), − ( ⃗ ) is used.
The main idea of the method is to go in the direction of the steepest descent, and this
direction is given by the anti-gradient - ∇ :</p>
        <p>⃗ [ +1] =  ⃗ [ ] −  ⃗[ ]∇ ( ⃗ [ ])
where λ ⃗ ^ [j] sets the gradient descent speed and can be selected:
− constant (in this case, the method may diverge);
− descending in the process of gradient descent;
− guarantees quick descent.</p>
        <p>To find the minimum of  ( ⃗ ) we get:
 [ ] = 
 [ ] = 
To find the maximum of  ( ⃗ ) we get:
Gradient Descent Algorithm:


 ( ⃗ [ +1]) = 
 ( ⃗ [ +1]) = 


 ( ⃗ [ ] −  ∇ ( ⃗ [ ]))
 ( ⃗ [ ] +  ∇ ( ⃗ [ ]))
1. set the initial approximation and calculation accuracy  ⃗ 0,  ;
2. calculate  ⃗ [ +1] according to the formula 4 and і  [ ] according to the formula 5.
3. check the stop condition:</p>
        <p>if
then j=j+1going to step 2;
otherwise  ⃗ =  ⃗ [ +1] is a solution.</p>
        <p>| ⃗ [ +1] −  ⃗ [ ]| &gt;  ,
| ( ⃗ [ +1]) −  ( ⃗ [ ])| &gt; 
(2)
(3)
(4)
(5)
(6)
(7)
2.4</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Softmax</title>
      <p>
        Softmax [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] is a generalization of the logistic function for the multidimensional case.
The function converts a vector  of dimension  into a vector σ of the same dimension,
where each coordinate σ
      </p>
      <p>
        of the resulting vector is represented by a real number in the
interval [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] and the sum of the coordinates is 1.
      </p>
      <p>The coordinates σ
 are calculated as follows:
σ(z)  = 

 
∑ =1</p>
      <p>=    −</p>
      <p>The Softmax function is used in machine learning for classification problems when
the number of possible classes is more than two (for two classes a logistic function is
used). The coordinates σ</p>
      <p>of the resulting vector are interpreted as the probabilities that
the object belongs to class  . The column vector  is calculated as follows:
where  is the column vector of features of an object of dimension 
× 1,   is
transposed matrix of weighting coefficients of features, has dimension 
×  ,  is a column
(8)
(9)
vector with limit values of dimension 
is the number of features of the objects.</p>
      <p>Typically, Softmax is used for the last layer of deep neural networks for
classification tasks. To train the neural network, cross entropy is used as an option for losses.</p>
      <p>× 1,  is the number of classes of objects, 
2.5</p>
    </sec>
    <sec id="sec-7">
      <title>Maximum Likelihood Method</title>
      <p>The maximum likelihood method (also known as highest probability method) [28-29]
in mathematical statistics is a method for estimating an unknown parameter by
maximizing the likelihood function. It is based on the assumption that all information about
the statistical sample is contained in this function. Maximum likelihood assessment is
a popular statistical method that is used to create a statistical model based on data and
provide an estimate of model parameters.</p>
      <p>Let us have a sample  1, … ,   according to the distribution   , where  ∈ Θ is an
unknown parameter. Let  ( | ) ∶ Θ → ℝ be the likelihood function, where  ∈ ℝ.
Point estimate - called the maximum likelihood estimate of the parameter  .
 ̂МП =  ̂МП( 1, … ,   ) = arg max  ( 1, … ,   | )
 ∈Θ
(10)</p>
      <p>Thus, the maximum likelihood estimate is an estimate that maximizes the likelihood
function for a fixed sample implementation.
3
3.1</p>
      <sec id="sec-7-1">
        <title>Implementation and Results</title>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Development with TensorFlow Library</title>
      <p>TensorFlow [30] is an open machine learning software library developed by Google to
solve the problems of building and training a neural network to automatically detect
and classify images, achieving the quality of human perception.</p>
      <p>The library allows developers to quickly and easily get started with deep learning in
the cloud. The platform has wide industry support and has become a common research
solution for deep learning and application development, especially in areas such as
machine vision, natural language understanding, and speech translation.</p>
      <p>TensorFlow comes with a complete set of visualization tools that simplify
understanding, tuning and optimizing applications. Thanks to the support of various styles
(from images and audio to histograms and graphs) you can quickly and easily create
large deep neural networks.
3.2</p>
    </sec>
    <sec id="sec-9">
      <title>Result of Development</title>
      <p>While the system is learning, we need to check how well the network works in terms
of accuracy. We do this with a test suite, taken from testing data, so it does not have
duplication with training data.</p>
      <p>Using validation sets based on testing data allows you to better understand how well
the network can generalize what it is studying and apply it to other contexts. If we check
the training data, the network may be oversaturated - in other words, finding out specific
examples and remembering the answers to them does not help the network answer new
questions.</p>
      <p>After a little workout, let's take a look inside and see what answers we get from the
network. In the diagrams below, we visualize the attention for each of the episodes
(rows) for all sentences (columns) in our context. Darker colors pay more attention to
this sentence on this episode. (fig. 4).</p>
      <p>You should see a change in attention between at least two episodes for each question,
but sometimes the attention will be answered within one and sometimes it will take all
four episodes. If the attention turns out to be empty, it can be saturated and pay attention
to everything at once.</p>
      <sec id="sec-9-1">
        <title>Conclusions</title>
        <p>The information presented in this work may form the basis for further development and
improvement of the intelligent information technology of tasks processing for open
tests. According to the developed models, a software product was created for further
practical use. Within this research theoretical material on natural language processing
was analyzed.</p>
        <p>The following steps are used to solve the neural network training problems: data
collection for training, preparation and normalization of data, experimental selection of
training parameters, own training, validation of training, adjustment of parameters,
final training.</p>
        <p>The software was implemented in Python and the TensorFlow library was used. A
neural network-based quality control system was created using a closed domain.
28. Mashtalir, V.P., Shlyakhov, V.V., Yakovlev, S.V.: Group structures on quotient sets in
classification problems. In: Cybernetics and Systems Analysis, Vol. 50, №4, pp. 507-518
(2014).
29. Mashtalir, V.P., Yakovlev, S.V.: Point-set methods of clusterization of standard information.</p>
        <p>In: Cybernetics and Systems Analysis, Vol. 37, №3, pp. 295-307 (2001).
30. Zeng, Z., Gong, Q., Zhang, J.: CNN Model Design of Gesture Recognition Based on
Tensorflow Framework. 2019 IEEE 3rd Information Technology, Networking, Electronic and
Automation Control Conference (ITNEC), Chengdu, China, pp. 1062-1067. (2020).</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Choi</surname>
            ,
            <given-names>K.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heilemann</surname>
            ,
            <given-names>M.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fauer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mead</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Second</given-names>
            <surname>Pandemic</surname>
          </string-name>
          <article-title>: Mental Health Spillover From the Novel Coronavirus (COVID-19)</article-title>
          ,
          <source>Journal of American Psychiatric Nurses Association</source>
          ,
          <volume>1078390320919803</volume>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Plancher</surname>
            ,
            <given-names>K.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shanmugam</surname>
            ,
            <given-names>J.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petterson</surname>
            ,
            <given-names>S.C.</given-names>
          </string-name>
          :
          <article-title>The Changing Face of Orthopedic Education: Searching for the New Reality After COVID-19</article-title>
          . Arthroscopy,
          <source>Sports Medicine and Rehabilitation</source>
          ,
          <volume>10</volume>
          .1016/j.asmr.
          <year>2020</year>
          .
          <volume>04</volume>
          .007 (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balitskii</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Makarova</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Railian</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Intelligent expert system of knowledge examination of medical staff regarding infections associated with the provision of medical care</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,Vol.
          <volume>2386</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>321</fpage>
          -
          <lpage>330</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Llamas</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et. al.:
          <article-title>Engineering education in Spain: Seven years with the Bologna Process: First results</article-title>
          ,
          <source>2018 IEEE Global Engineering Education Conference (EDUCON)</source>
          , Tenerife, pp.
          <fpage>1775</fpage>
          -
          <lpage>1780</lpage>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Polyvianna</surname>
          </string-name>
          ,
          <string-name>
            <surname>Yu.</surname>
          </string-name>
          , et. al.:
          <source>Computer Aided System of Time Series Analysis Methods for Forecasting the Epidemics Outbreaks</source>
          ,
          <source>2019 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</source>
          , pp.
          <fpage>7</fpage>
          .
          <fpage>1</fpage>
          -
          <issue>7</issue>
          .4 (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Intelligent Agent-Based Simulation of HIV Epidemic Process</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>1020</volume>
          , с.
          <fpage>175</fpage>
          -
          <lpage>188</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Meniailov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , et. al:
          <article-title>Using the K-means method for diagnosing cancer stage using the Pandas library</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2386</volume>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>116</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Bazilevych</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , et.al.:
          <article-title>Determining the Probability of Heart Disease using Data Mining Methods</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2488</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Intelligent Simulation of Network Worm Propagation using the Code Red as an Example</article-title>
          .
          <source>Telecommunications and Radio Engineering</source>
          , Vol.
          <volume>78</volume>
          ,
          <string-name>
            <surname>Iss</surname>
          </string-name>
          . 5, pp.
          <fpage>443</fpage>
          -
          <lpage>464</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Chumachenko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovlev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <source>On Intelligent Agent-Based Simulation of Network Worms Propagation. 2019 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</source>
          , pp.
          <fpage>3</fpage>
          .
          <fpage>11</fpage>
          -
          <lpage>3</lpage>
          .13 (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Piletskiy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , et. al.:
          <article-title>Development and Analysis of Intelligent Recommendation System Using Machine Learning Approach</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          , vol.
          <volume>1113</volume>
          , pp.
          <fpage>186</fpage>
          -
          <lpage>197</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bazilevych</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          et al.:
          <article-title>Stochastic modelling of cash flow for personal insurance fund using the cloud data storage</article-title>
          .
          <source>International Journal of Computing</source>
          , vol.
          <volume>17</volume>
          ,
          <issue>iss</issue>
          . 3, pp.
          <fpage>153</fpage>
          -
          <lpage>162</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Tretinjak</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          :
          <article-title>Moving teaching from blackboard to the learning management system - Helping absent students learn from home</article-title>
          .
          <source>2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)</source>
          , Opatija, pp.
          <fpage>0500</fpage>
          -
          <lpage>0502</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Hidayat</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wardoyo</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Azhari</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Educational Data Mining (EDM) as a Model for Students' Evaluation in Learning Environment</article-title>
          .
          <source>2018 Third International Conference on Informatics and Computing (ICIC)</source>
          , Palembang, Indonesia, pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Dotsenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , et. al.:
          <article-title>Project-oriented management of adaptive teams' formation resources in multi-project environment</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2353</volume>
          , pp.
          <fpage>911</fpage>
          -
          <lpage>923</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dotsenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , et. al.:
          <article-title>Management of critical competencies in a multi-project environment</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2387</volume>
          , pp.
          <fpage>495</fpage>
          -
          <lpage>500</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Dotsenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , et. al.:
          <article-title>Modeling of the process of critical competencies management in the multi-project environment</article-title>
          .
          <source>2019 IEEE 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2019 - Proceedings</source>
          , vol.
          <volume>3</volume>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>93</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , et. al.:
          <source>Effectiveness of Dual-Screen e-Learning Material Studying in 360-Degree VR Environment</source>
          .
          <source>2019 International Symposium on Educational Technology (ISET)</source>
          ,
          <source>Hradec Kralove, Czech Republic</source>
          , pp.
          <fpage>65</fpage>
          -
          <lpage>69</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <given-names>Joseph</given-names>
            <surname>Maria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Thirupathi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Rajendran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Velumani</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Technologies, Challenges and Tools for Digital Learning</article-title>
          .
          <source>2019 IEEE Tenth International Conference on Technology for Education (T4E)</source>
          , Goa, India, pp.
          <fpage>268</fpage>
          -
          <lpage>269</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Soto</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , et. al.:
          <article-title>Digital Educational Resources to Motivate Environmental Education in Rural Schools</article-title>
          .
          <source>2019 XIV Latin American Conference on Learning Technologies (LACLO)</source>
          ,
          <source>San Jose Del Cabo, Mexico</source>
          , pp.
          <fpage>265</fpage>
          -
          <lpage>271</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , et. al.:
          <article-title>Learning Student Networks via Feature Embedding</article-title>
          .
          <source>IEEE Transactions on Neural Networks and Learning Systems</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Aracena</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demongeot</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goles</surname>
          </string-name>
          , E.:
          <article-title>Positive and negative circuits in discrete neural networks</article-title>
          .
          <source>IEEE Transactions on Neural Networks</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>83</lpage>
          . (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Somasundaram</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gobinath</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          :
          <article-title>Current Trends on Deep Learning Models for Brain Tumor Segmentation</article-title>
          and
          <string-name>
            <surname>Detection - A Review</surname>
          </string-name>
          .
          <source>2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon)</source>
          , Faridabad, India, pp.
          <fpage>217</fpage>
          -
          <lpage>221</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Hains</surname>
            ,
            <given-names>G.J.D.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khmelevsky</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tachon</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>From natural language to graph queries</article-title>
          .
          <source>2019 IEEE Canadian Conference of Electrical and Computer</source>
          Engineering (CCECE), Edmonton, AB, Canada, pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>Research on the Optimizing Method of Question Answering System in Natural Language Processing</article-title>
          .
          <source>2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS)</source>
          , Jishou, China, pp.
          <fpage>251</fpage>
          -
          <lpage>254</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Saeed</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , et. al.:
          <article-title>Comparative Analysis of Classifiers for EMG Signals</article-title>
          .
          <source>2019 IEEE Canadian Conference of Electrical and Computer</source>
          Engineering (CCECE), Edmonton, AB, Canada, pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Rao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Feng</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Regularization and Iterative Initialization of Softmax for Fast Training of Convolutional Neural Networks</article-title>
          .
          <source>2019 International Joint Conference on Neural Networks (IJCNN)</source>
          , Budapest, Hungary, pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>