<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Moscow, Russian, April</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>for international distance education</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oxana N. Romashkova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ekaterina D. Romashkova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Irina A. Gudkova</string-name>
          <email>gudkova-ia@rudn.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>38</institution>
          ,
          <addr-line>Ostozhenka St., Moscow, 119034</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CEUR Workshop Proceedings</institution>
          ,
          <addr-line>CEUR-WS.org</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Applied Probability and Informatics, Peoples' Friendship University of Russia</institution>
          ,
          <addr-line>6, Miklukho-Maklaya St.</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Department of international information security Institute of information sciences, Moscow State Linguistic University</institution>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Moscow</institution>
          ,
          <addr-line>117198</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>1</volume>
      <fpage>3</fpage>
      <lpage>17</lpage>
      <abstract>
        <p>This article analyses the problems related to distance education in native universities as well as problems encountered in the development and operation of information systems in general and distance education information systems for universities. Modern higher education is subject to close merging of high-quality educational content and advanced educational information technologies. Distance learning enables studying in an individual educational trajectory with a convenient location, time and form. Network and international forms of training programs are taking particular significance and becoming widespread, especially at higher educational level.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>implementation, identification of problems and threats.</p>
      <p>Scientific novelty: Presented an example of a model for a remote education information system based
on threats, issues and risks.</p>
      <p>The authors analysed the situation of distance education in Russian Federation, researched one of
the distance education information systems and examined the threats of information systems and ways
to prevent them.
information security, security assessment, distance learning, distance education
Workshop on information technology and scientific computing in the framework of the X International Conference
(I. A. Gudkova)
(I. A. Gudkova)</p>
      <p>CEUR
Workshop
Proceedings
htp:/ceur-ws.org
IS N1613-073</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Relevance: The processes of informatization afected the development of educational technical
systems. The usage of modern telecommunication technologies in the educational process made
it possible to make learning as accessible, open, mobile and relevant as possible, for a significant
part of society.</p>
      <p>
        At the same time the learning process itself contributes to the development of new services and
accomodations, and to the enhanced managerial, communication and information capabilities in
the course of the performance of its tasks. Distance education technologies improvements allow
to develop and disseminate educational information with use of distribution technologies [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1, 2,
3, 4</xref>
        ].
      </p>
      <p>The introduction of computer systems in education has led to a review of all technological
components of the learning process. The visualization of thoughts, information and knowledge
is now the basis for distance education. However, stable and quality access to system’s
resources and providing of large number of users’ access without overloading telecommunications
channels used, remain a key challenge.</p>
      <p>
        The authors’ task is an implementation of the proposed algorithms and organizational models
of distance training programs in higher education, and remote access information security and
management [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8">5, 6, 7, 8</xref>
        ].
      </p>
      <p>The object of the study is the information processes within University’s structural unit
responsible for distance learning.</p>
      <p>The subject of the study is the development process of the information system, which is
designed for information distribution, processing and protection in distance training programs
in higher education.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Setting Goals</title>
      <p>
        The following tasks were solved to achieve the goal of scientific research :
• an information infrastructure and the state of information security of a university that
implements distance international educational programs have been analyzed;
• a model and information security system for international educational programs have
been developed;
• a study on the activities of the university structural units implementing international
educational programs has been carried out;
• requirements for the developed information system for international educational programs
were formulated;
• a prototype of the information distribution, processing and protection system for
international educational programs has been developed;
• a system of organizational, technical and technological measures for international
educational programs’ information security has been developed [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref9">9, 10, 11, 12</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Theoretical Research</title>
      <p>In the course of their activities educational institutions use various information systems to
process large amounts of data: the ones directly connected to the educational process as such
and diferent types of sensitive data as well, for example, students and employees information
(Figure 1).</p>
      <p>The process of distance learning includes theoretical training and practical work.</p>
      <p>Information technologies used in the process of distance learning organizing can be divided
into three groups:
• technologies providing educational information;
• technologies transferring educational information;
• technologies processing and storing educational information.</p>
      <sec id="sec-4-1">
        <title>Together they form distance learning technologies.</title>
        <p>The learning process is always based on the process of information transfer from the teacher
to the student.</p>
        <p>In an inherent traditional education model of full-time education, teacher (or professor) is the
interpreter of knowledge. In distance education, the interpreter is a student himself. Because of
that, educational information and its quality are subject to strict requirements.</p>
        <p>Educational information should be collected with usage of the distribution technologies.
Furthermore, educational information’s distribution should provide students with remote access
without the network load increasing.</p>
        <p>
          Educational technologies in the technical field are characterized by the forward-looking nature
of the development. For example, the introduction of computer technologies led to revised
components of the learning process. Visualization of thoughts, information and knowledge
become the basis for distance education [
          <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16 ref17">13, 14, 15, 16, 17</xref>
          ].
        </p>
        <p>Educational technologies used in distance education include:
• video lectures;
• interactive lectures and laboratory work;
• electronic textbooks;
• computer training and testing systems;
• simulation models and computer simulators;
• remote consultations and tests;
• video conferencing.</p>
        <p>It is important in the educational process that the use of information technology helps to
achieve educational goals. Learning outcomes depends on the quality of courses’ development
and provision.</p>
        <p>The main role played by IT technologies in distance education is ensuring educational
dialogue.</p>
        <p>Communication technologies can be divided into two types — on-line and of-line. The first
ones provide a real-time information exchange. Received messages are stored on the recipient’s
computer when using of-line technologies. The user can view them using special programs at
a convenient time. Unlike full-time study where the dialogue is conducted only in real time
(on-line), in distance education it might take place in delayed mode (of-line).</p>
        <p>Network distance learning technologies could be particularly valuable in the joint degrees
programs organization as they allow to implement the principle of educational recourses
distribution.</p>
        <p>Distance learning programs in higher education institutions are implemented in a specialized
unit – the Institute of Distance Education. The Institute of Distance Education is an independent
structural unit of the university, and report directly to the rector and vice-rector for academic
afairs.</p>
        <p>In general, the main tasks of the Institute of Distance Education are:
• distance education organizational and methodological support;
• university distance learning system software and hardware support, and its development;
• educational process organization and support;
• providing services for the distance education introduction.</p>
        <p>To perform the above tasks, the Institute of Distance Education was entrusted with the
following functions:
• provision of distance learning services;
• provision of services for the introduction of new courses in the university distance
education system;
• provision of teacher training for distance education technologies.</p>
        <p>Departments related to the Institute of Distance Education, as well as positions whose
activities need automation, are shown in Figure 2.</p>
        <p>It is necessary to have a good understanding of the organization of work within the Institute
to develop a prototype of a current distance education information system. For this purpose, it
is necessary to develop corresponding algorithms of interaction in BPMN notation. According
to this notation, the process interaction diagram displays the main events, actions, and
logical connections in the business process control flow. This notation is characterized by such
components as: the start of a process; current events; notifications; rules; the end of a process.</p>
        <p>The interaction algorithm of the process “Organize work within the institute” is shown in
Figure 3.
In figure 3 following main elements of the business process are shown:
• data warehouse — elements of a future information system database (tables, list of
equipment, curriculum, etc.);
• start and end events;
• processes and tasks;
• data objects — future forms of the information system client part prototypes (guidelines,
plans of activities).</p>
        <p>Below is an example of one of information system created for one of the institutes of distance
education. This system involves collaboration with all types of data listed above (Figure 4).</p>
        <p>The “Monitor Students’ Level of Knowledge” tab of distance education information system
is shown in Figure 4. This information system automates the following Institute of Distance
Education’s processes:</p>
      </sec>
      <sec id="sec-4-2">
        <title>1. “Organize work in the Institute of Distance Education”. 2. “Create distance learning tools”. 3. “Manage the databases”. 4. “Organize courses”, etc.</title>
        <p>Modern tools for distance learning organizing used by the Institutes of Distance Education
can most often be divided into the following groups:
• Learning Management Systems;
• Content Management Systems;
• Authorial Software Products;
• Learning Content Management Systems.</p>
        <p>The authorial software products provide the lecturer with the opportunity to develop
educational content based on visual programming: it would be suficient to just add the necessary
information. Components of educational content in the form of text fragments, illustrations or
video are placed on the screen using manipulators. Content management systems allow creating
and managing file directories of various types. Such distance education system is a database with
a keyword search that allows a lecturer or methodologist to perform a quick search. Content
management systems are especially applicable in cases where a large team of specialists is
working on the courses creation and needs to use the same fragments of training materials in
diferent training courses. This reduces the time spent on training programs development. Such
distance education systems are ideal for web sites, educational programs and materials portals
development.</p>
        <p>Learning management systems provide the student with ample opportunities for creating an
efective learning process, and provide learning process’ manager with tools for creating training
programs, monitoring, generating reports on learning outcomes, and organizing various options
of communication between students and lecturers.</p>
        <p>There are also learning content management systems (LCMS). Their basic diference from
learning management systems is that they are aimed at managing the training programs’
content and not directly at the educational process. Also they are intended to be used by
training programs’ developers, specialists in methodological support to courses, and heads of
educational institutions.</p>
        <p>The basis of learning content management system is the concept of representing an education
content as a set of permanently engaged learning objects with certain attributes of usage.
However, it is becoming increasingly dificult to draw a clear-cut line between two classes
of systems. This is due to most of manufacturers of learning content management systems,
which are using general learning management functionality. Many of the modern solutions of
the category of learning management systems are similarly implementing the key features of
educational content management.</p>
        <p>
          However, it must be noted that any information systems, which are a technological base of
distance learning systems, could be targets for various external and internal security threats,
both malicious and accidental. That might impair not only distance learning process but also
higher education institution functioning in general. In the conditions of increasing number of
cybercrime, this factor entails need for organizing of the information security system [
          <xref ref-type="bibr" rid="ref18 ref19 ref20 ref21">18, 19,
20, 21</xref>
          ]. Therefore, the scope of such security system is set not only by the university decision
but also by the requirements of the information security regulating institutions, such as The
Federal Service for Technical and Export Control of Russia, The Federal Security Service of
the Russian Federation, The Federal Service for Supervision of Communications, Information
Technology and Mass Media, etc.
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Overview of System Security Assessment Methods</title>
      <p>At present, there are numerous methods of information systems’ assessing and protection.
However, more generally they are universal and do not take into account the specificity of
narrowly targeted systems and their use. In this regard the problem of ensuring the information
security in the systems, which implement support for distance learning programs in higher
education institutions, is of great importance nowadays. The solution to this problem is
particularly important for international education programs, such as joint degrees programs
and internships.</p>
      <p>The overall picture of how risks afect the organization is shown in Figure 5.</p>
      <p>To date the main threats to the university information security are:
• malicious software ( ∼ 30%);
• human errors (∼ 20%);
• equipment failure (∼ 15%);
• information system penetration (∼ 5%);
• software failure ( ∼ 5%).</p>
      <p>An information security of educational organizations should be constantly improved due
to the permanent risk of information leaking. This process should be continuous and should
involve improved methods and ways of information security systems improvement, continuous
monitoring, system’s weaknesses and potential information leakage channels identification.
Continual improvement of such systems is strongly linked to the creation of new ways to gain
an unauthorized access to a confidential and sensitive information.</p>
      <p>The role of information security in the organizational system of safety measures is determined
by the timeliness and accuracy of managerial decisions, taking into account available resources,
information safeguards, and current laws and regulations.</p>
      <p>Information security should serve as an integrated system in which all components are
designed to prevent possible leakage of confidential information, and to protect information
carriers from an authorized access. Thus, all of this ensures confidentiality, integrity and
availability of information in dealing with it.</p>
      <p>To date there are various information safeguards. These are legal, economic, technical, and
organizational methods. Development of regulations and departmental regulations for ensuring
information security refers to legal methods of information security.</p>
      <p>Organizational, and organizational and technical methods may include:
• information security system development and improvement;
• information protection facilities development, improvement and usage, and facilities
performance monitor;
• dangerous to information, information resources, information systems hardware and
software identification;
• user’s activity monitor;
• information security monitoring system development.</p>
      <p>The technical methods of information security ensuring may include:
• installation of security hardware and software ensuring protection from an authorized
access, actions causing damaging impact on information system, destruction and distortion
of information, unintended regular operation modifications;
• identification of malicious hardware and software posing risk to means of processing and
transferring information;
• monitoring of technical means of transferring information, providing prevention of
information leakage through technical channels;
• technical supervision of technical measures’ for information security efective functioning.</p>
      <sec id="sec-5-1">
        <title>Economic methods include:</title>
        <p>• introduction of the information security policy and its funding determining;
• information systems improvement.</p>
        <p>Modern information security is provided by the following methods:
• cryptographic information protection;
• information management, both in a local networks and in communication channels;
• monitoring and tamper detection;
• ensuring information and software integrity;
• introduction of enhanced means of restoring information security;
• equipment and magnetic media physical protection and accounting;
• formation of special information security services.</p>
        <p>Namely, the use of cryptographic methods help to address the electronic information
protection challenges. However, modern methods of cryptographic transformation retain an initial
productivity of automated data-processing systems.</p>
        <p>Usage of cryptography is the most efective way to ensure information confidentiality,
integrity and availability. Cryptographic methods combined with technical and organizational
methods provide with protection against a wide range of possible threats.</p>
        <p>There are poor performance of the traditional security mechanisms and the backlog in the
implementation of advanced methods of protection due to large data flows existence within
educational institutions. In this regard, applications of the advances of cryptography call for
special attention.</p>
        <p>Thus, an employee responsible for the systems’ security may seek guidance from standard
GOST R ISO/IEC 27002-2012 for system’s security self-assessment. According to that standard,
it is recommended to carry out periodic conformity checks of the current level of security,
required level, security policy, and technical requirements. However, the standard does not
mention recommended methods for an implementation of checkups. Generally, an assessment
procedure is performed by various interviewing techniques. This method is carried out in the
following main stages:
• using questionnaires based on the requirements of the standard;
• formation of knowledge base of scientific experts in line with the requirements and the
recommendations of the standard;
• formulating the guidelines for analysis of the replies to the questionnaires.</p>
        <p>The application of the standardized approach only would allow to get a fast security
assessment and to receive recommendations for a system being studied quite rapidly. However, the
main drawback of such an approach is that the implementation of the recommendations received
is nearly always dificult, if not impossible, because the standard does not take into account
information collected by the system itself in its functioning. For that reason, in addition to the
standard’s requirements, specific features of the system, information assets and statistics on
the threats to information security or information security incidents, collected in the system’s
functioning, is also to be considered.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion</title>
      <p>
        Using the approaches described above is accessible in the development of new information
security systems, as well as in examining security systems, which already exist in higher
education institutions, including whose providing distance education technologies [
        <xref ref-type="bibr" rid="ref22">22, 23</xref>
        ].
acteristics on digital information transmission quality, in: IEEE International Symposium
on Industrial Electronics Proceedings of the IEEE International Symposium on
Industrial Electronics, ISIE’96. Part 1 (of 2). sponsors: IEEE, Warsaw University of Technology.
      </p>
      <p>Warsaw, Poland, 1996, pp. 311–313.
[23] L. A. Ponomareva, V. L. Kodanev, S. V. Chiskidov, Model of management of process of
development of competences in educational organizations, in: New information
technologies in scientific research materials of the XXII all-Russian scientific-technical conference
of students, young scientists and specialists. Ryazan state radio engineering University,
2017, pp. 20–22. URL: https://elibrary.ru/item.asp?id=30521104.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Orlov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zenyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Samuylov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Moltchanov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Samouylov</surname>
          </string-name>
          ,
          <article-title>Time-dependent sir modeling for d2d communications in indoor deployments</article-title>
          ,
          <source>in: Proceedings - 31st European Conference on Modelling and Simulation, ECMS</source>
          <year>2017</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>726</fpage>
          -
          <lpage>731</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Gudkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. E.</given-names>
            <surname>Samoylov</surname>
          </string-name>
          ,
          <article-title>Determination of the range of the guaranteed radio communication in wireless telecommunication networks of ieee 802.11 standard with the use of ping program</article-title>
          ,
          <source>in: CEUR Workshop Proceedings 8. ”ITTMM 2018 - Proceedings of the Selected Papers of the 8th International Conference ”Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”</source>
          , volume
          <volume>2177</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>59</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2177</volume>
          /#paper-08-1060.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. P.</given-names>
            <surname>Vasilyuk</surname>
          </string-name>
          ,
          <article-title>Application of information technology for the analysis of the rating of university</article-title>
          ,
          <source>in: CEUR Workshop Proceedings 8. ”ITTMM 2018 - Proceedings of the Selected Papers of the 8th International Conference ”Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”</source>
          , volume
          <volume>2177</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>53</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2177</volume>
          /#paper-07-1010.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Golosov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Mosyagin</surname>
          </string-name>
          ,
          <string-name>
            <surname>V. I. Gorelov</surname>
          </string-name>
          ,
          <article-title>Method of efective management of competence development processes in educational environments, Modern science: actual problems of theory and practice</article-title>
          .
          <source>Series: natural and technical 9</source>
          (
          <year>2017</year>
          )
          <fpage>48</fpage>
          -
          <lpage>53</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Kumskov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Smolenskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. F.</given-names>
            <surname>Mityushev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Zefirov</surname>
          </string-name>
          ,
          <article-title>Method of computer aided formation of organic compound descriptors for quantitative structureproperty relationships</article-title>
          ,
          <source>News of the Academy of Sciences. Chemical series 8</source>
          (
          <year>1994</year>
          )
          <fpage>1391</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Prokhorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          , E. Permyakov,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kumskov</surname>
          </string-name>
          ,
          <article-title>Fuzzy classification and fast rules for refusal in the qsar problem</article-title>
          ,
          <source>Pattern Recognition and Image Analysis</source>
          <volume>21</volume>
          (
          <year>2011</year>
          )
          <fpage>542</fpage>
          -
          <lpage>544</lpage>
          .
          <source>doi:1 0 . 1 1 3 4 / S 1 0</source>
          <volume>5 4 6 6 1 8 1 1 0 2 0 9 1 X .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Kumskov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Peshkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <surname>K. I. Rezchikova</surname>
          </string-name>
          ,
          <article-title>Estimation of activation energies of thermal decomposition of nitro compounds based on structural descriptors</article-title>
          ,
          <source>Russian Chemical Bulletin</source>
          <volume>45</volume>
          (
          <year>1996</year>
          )
          <fpage>1840</fpage>
          -
          <lpage>1843</lpage>
          .
          <source>doi:1 0 . 1 0 0 7 / B F 0 1</source>
          <volume>4 5 7 7 6 0 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bobrikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Romashkova,</surname>
          </string-name>
          <article-title>The application of a fluid-based model for the analysis of the distribution time of a file among users in peer-to-peer network</article-title>
          ,
          <source>in: Selected Papers of the II International Scientific Conference ”Convergent Cognitive Information Technologies” (Convergent</source>
          <year>2017</year>
          ).
          <source>CEUR Workshop Proceedings</source>
          , volume
          <year>2064</year>
          ,
          <year>2017</year>
          , pp.
          <fpage>55</fpage>
          -
          <lpage>61</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-2064/paper06.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E. I.</given-names>
            <surname>Prokhorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Permyakov</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. I. Kumskov</surname>
          </string-name>
          ,
          <article-title>Fuzzy classification and fast rejection rules in the structure-property problem</article-title>
          ,
          <source>Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications</source>
          <volume>23</volume>
          (
          <year>2013</year>
          )
          <fpage>130</fpage>
          -
          <lpage>138</lpage>
          .
          <source>doi:1 0 . 1 1 3 4 / S 1 0</source>
          <volume>5 4 6 6 1 8 1 3 0 1 0 1 0 0 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Prokhorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          , E. Permyakov,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kumskov</surname>
          </string-name>
          , Fuzzy Predicting Models in ”Structure - Property” Problem, in
          <source>: Proceedings of the International Workshop on Soft Computing Applications and Knowledge Discovery (SCAKD</source>
          <year>2011</year>
          ), Moscow, Russia, June 25,
          <year>2011</year>
          .,
          <year>2011</year>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <article-title>Influence of russian, spanish and vietnamese speech characteristics on digital information transmission quality</article-title>
          ,
          <source>in: IEEE International Symposium on Industrial Electronics Proceedings of the IEEE International Symposium on Industrial Electronics, ISIE'96. Part 1 (of 2)</source>
          . sponsors: IEEE, Warsaw University of Technology. Warsaw, Poland,
          <year>1996</year>
          , pp.
          <fpage>311</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Gaidamaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. P.</given-names>
            <surname>Vasilyuk</surname>
          </string-name>
          ,
          <article-title>Application of information technology for the analysis of the rating of university</article-title>
          ,
          <source>in: CEUR Workshop Proceedings 8. ”ITTMM 2018 - Proceedings of the Selected Papers of the 8th International Conference ”Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”</source>
          , volume
          <volume>2177</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>53</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2177</volume>
          /#paper-07-1010.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. P.</given-names>
            <surname>Vasilyuk</surname>
          </string-name>
          ,
          <article-title>The process of automating the rating of russian universities</article-title>
          ,
          <source>in: CEUR Workshop Proceedings 9. ”ITTMM 2019 - Proceedings of the Selected Papers of the 8th International Conference ”Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”</source>
          , volume
          <volume>2407</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>117</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2407</volume>
          /paper-12-121.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Kazanskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Lukova</surname>
          </string-name>
          ,
          <article-title>Communication quality assessment in speech packet transmission networks with random service interrupts</article-title>
          ,
          <source>Automatic Control and Computer Sciences</source>
          <volume>27</volume>
          (
          <year>1993</year>
          )
          <fpage>62</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Chiskidov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <article-title>Instrumental implementation of the educational process model to improve the rating of the universities</article-title>
          ,
          <source>in: CEUR Workshop Proceedings 9. ”ITTMM 2019 - Proceedings of the Selected Papers of the 8th International Conference ”Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”</source>
          , volume
          <volume>2407</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>92</fpage>
          -
          <lpage>101</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2407</volume>
          /paper-10-120.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. N.</given-names>
            <surname>Pavlicheva</surname>
          </string-name>
          ,
          <article-title>Resource management in distance and mobile education systems</article-title>
          ,
          <source>in: CEUR Workshop Proceedings 9. ”ITTMM 2019 - Proceedings of the Selected Papers of the 8th International Conference ”Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”</source>
          , volume
          <volume>2407</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>102</fpage>
          -
          <lpage>108</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2407</volume>
          /paper-11-119.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Kodanev</surname>
          </string-name>
          ,
          <article-title>Development module of the corporate information system ”educational environment of the university” based on cloud technologies, in: Computer science: problems, methodology, technology the collection of materials of XVII international scientific conference: in 5 t</article-title>
          .,
          <year>2017</year>
          , pp.
          <fpage>393</fpage>
          -
          <lpage>398</lpage>
          . URL: https://elibrary.ru/item. asp?id=
          <fpage>28952199</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Kapterev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <article-title>Challenges for russian ecosystem of higher education for on board communications</article-title>
          ,
          <source>in: 2019 Systems of Signals Generating and Processing in the Field of on Board Communications</source>
          , volume
          <volume>1</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>227</fpage>
          -
          <lpage>232</lpage>
          .
          <source>doi:1 0 . 1 1 0 9 / S O S G . 2 0</source>
          <volume>1 9 . 8 7 0 6 7 1 9 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Golosov</surname>
          </string-name>
          ,
          <article-title>Development of a mathematical model of the educational process at the university to improve the quality of education, Fundamental research (</article-title>
          <year>2017</year>
          )
          <fpage>77</fpage>
          -
          <lpage>81</lpage>
          . URL: https://elibrary.ru/item.asp?id=
          <fpage>28800201</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>E. N.</given-names>
            <surname>Pavlicheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <article-title>Model of functioning of information system for institute of distance education of specialists of onboard communications</article-title>
          ,
          <source>in: 2019 Systems of Signals Generating and Processing in the Field of on Board Communications</source>
          , volume
          <volume>1</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>382</fpage>
          -
          <lpage>386</lpage>
          .
          <source>doi:1 0 . 1 1 0 9 / S O S G . 2 0</source>
          <volume>1 9 . 8 7 0 6 7 8 3 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <article-title>Model of educational process in high school using petri nets, Modern information technologies</article-title>
          and
          <source>IT education 13</source>
          (
          <year>2017</year>
          )
          <fpage>131</fpage>
          -
          <lpage>139</lpage>
          . URL: http: //sitito.cs.msu.ru/index.php/SITITO/article/view/244.
          <source>doi:1 0 . 2 5 5 5 9 / S I T I T O . 2 0 1 7 . 2 . 2 4 4 .</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G. V.</given-names>
            <surname>Gorelov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. N.</given-names>
            <surname>Romashkova</surname>
          </string-name>
          ,
          <article-title>Influence of russian, spanish and vietnamese speech char-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>