<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Secure information system for international distance education</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oxana</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of international information security Institute of information sciences</orgName>
								<orgName type="institution">Moscow State Linguistic University</orgName>
								<address>
									<addrLine>38, Ostozhenka St</addrLine>
									<postCode>119034</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ekaterina</forename><forename type="middle">D</forename><surname>Romashkova</surname></persName>
							<email>e.d.romashkova@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Irina</forename><forename type="middle">A</forename><surname>Gudkova</surname></persName>
							<email>gudkova-ia@rudn.ru</email>
							<affiliation key="aff0">
								<orgName type="department">Department of international information security Institute of information sciences</orgName>
								<orgName type="institution">Moscow State Linguistic University</orgName>
								<address>
									<addrLine>38, Ostozhenka St</addrLine>
									<postCode>119034</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Department of Applied Probability and Informatics</orgName>
								<orgName type="institution">Peoples&apos; Friendship University of Russia</orgName>
								<address>
									<addrLine>6, Miklukho-Maklaya St</addrLine>
									<postCode>117198</postCode>
									<settlement>Moscow</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Conference Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems (ITTMM-2020)</orgName>
								<address>
									<addrLine>April 13-17</addrLine>
									<postCode>2020</postCode>
									<settlement>Moscow, Russian</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Secure information system for international distance education</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">438B5216746156D025207A3401A6EB4E</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T21:36+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>information security</term>
					<term>security assessment</term>
					<term>distance learning</term>
					<term>distance education</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This article analyses the problems related to distance education in native universities as well as problems encountered in the development and operation of information systems in general and distance education information systems for universities.</p><p>Modern higher education is subject to close merging of high-quality educational content and advanced educational information technologies. Distance learning enables studying in an individual educational trajectory with a convenient location, time and form. Network and international forms of training programs are taking particular significance and becoming widespread, especially at higher educational level.</p><p>Fundamentally new priorities are formed in the field of higher education and science: cross-cutting informatisation of management and scientific activities in educational organizations.</p><p>The increasing requirements to the volume, quality and pace of the educational process lead to the development of the distance and online learning in higher education, which is the most vital trend in the Russian educational system.</p><p>Purpose: Analysis of the usefulness of distance education, ways and means of its development and implementation, identification of problems and threats.</p><p>Scientific novelty: Presented an example of a model for a remote education information system based on threats, issues and risks.</p><p>The authors analysed the situation of distance education in Russian Federation, researched one of the distance education information systems and examined the threats of information systems and ways to prevent them.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Relevance: The processes of informatization affected the development of educational technical systems. The usage of modern telecommunication technologies in the educational process made it possible to make learning as accessible, open, mobile and relevant as possible, for a significant part of society.</p><p>At the same time the learning process itself contributes to the development of new services and accomodations, and to the enhanced managerial, communication and information capabilities in the course of the performance of its tasks. Distance education technologies improvements allow to develop and disseminate educational information with use of distribution technologies <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4]</ref>.</p><p>The introduction of computer systems in education has led to a review of all technological components of the learning process. The visualization of thoughts, information and knowledge is now the basis for distance education. However, stable and quality access to system's resources and providing of large number of users' access without overloading telecommunications channels used, remain a key challenge.</p><p>The authors' task is an implementation of the proposed algorithms and organizational models of distance training programs in higher education, and remote access information security and management <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8]</ref>.</p><p>The object of the study is the information processes within University's structural unit responsible for distance learning.</p><p>The subject of the study is the development process of the information system, which is designed for information distribution, processing and protection in distance training programs in higher education.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Setting Goals</head><p>The following tasks were solved to achieve the goal of scientific research:</p><p>• an information infrastructure and the state of information security of a university that implements distance international educational programs have been analyzed; • a model and information security system for international educational programs have been developed; • a study on the activities of the university structural units implementing international educational programs has been carried out; • requirements for the developed information system for international educational programs were formulated; • a prototype of the information distribution, processing and protection system for international educational programs has been developed; • a system of organizational, technical and technological measures for international educational programs' information security has been developed <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Theoretical Research</head><p>In the course of their activities educational institutions use various information systems to process large amounts of data: the ones directly connected to the educational process as such and different types of sensitive data as well, for example, students and employees information (Figure <ref type="figure" target="#fig_0">1</ref>). The process of distance learning includes theoretical training and practical work. Information technologies used in the process of distance learning organizing can be divided into three groups:</p><p>• technologies providing educational information; • technologies transferring educational information; • technologies processing and storing educational information.</p><p>Together they form distance learning technologies. The learning process is always based on the process of information transfer from the teacher to the student.</p><p>In an inherent traditional education model of full-time education, teacher (or professor) is the interpreter of knowledge. In distance education, the interpreter is a student himself. Because of that, educational information and its quality are subject to strict requirements.</p><p>Educational information should be collected with usage of the distribution technologies. Furthermore, educational information's distribution should provide students with remote access without the network load increasing.</p><p>Educational technologies in the technical field are characterized by the forward-looking nature of the development. For example, the introduction of computer technologies led to revised components of the learning process. Visualization of thoughts, information and knowledge become the basis for distance education <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b16">17]</ref>.</p><p>Educational technologies used in distance education include:</p><p>• video lectures;</p><p>• interactive lectures and laboratory work;</p><p>• electronic textbooks;</p><p>• computer training and testing systems;</p><p>• simulation models and computer simulators;</p><p>• remote consultations and tests;</p><p>• video conferencing.</p><p>It is important in the educational process that the use of information technology helps to achieve educational goals. Learning outcomes depends on the quality of courses' development and provision.</p><p>The main role played by IT technologies in distance education is ensuring educational dialogue.</p><p>Communication technologies can be divided into two types -on-line and off-line. The first ones provide a real-time information exchange. Received messages are stored on the recipient's computer when using off-line technologies. The user can view them using special programs at a convenient time. Unlike full-time study where the dialogue is conducted only in real time (on-line), in distance education it might take place in delayed mode (off-line).</p><p>Network distance learning technologies could be particularly valuable in the joint degrees programs organization as they allow to implement the principle of educational recourses distribution.</p><p>Distance learning programs in higher education institutions are implemented in a specialized unit -the Institute of Distance Education. The Institute of Distance Education is an independent structural unit of the university, and report directly to the rector and vice-rector for academic affairs.</p><p>In general, the main tasks of the Institute of Distance Education are:</p><p>• distance education organizational and methodological support;</p><p>• university distance learning system software and hardware support, and its development;</p><p>• educational process organization and support;</p><p>• providing services for the distance education introduction.</p><p>To perform the above tasks, the Institute of Distance Education was entrusted with the following functions:</p><p>• provision of distance learning services; • provision of services for the introduction of new courses in the university distance education system; • provision of teacher training for distance education technologies.</p><p>Departments related to the Institute of Distance Education, as well as positions whose activities need automation, are shown in Figure <ref type="figure" target="#fig_1">2</ref>.</p><p>It is necessary to have a good understanding of the organization of work within the Institute to develop a prototype of a current distance education information system. For this purpose, it is necessary to develop corresponding algorithms of interaction in BPMN notation. According to this notation, the process interaction diagram displays the main events, actions, and logical connections in the business process control flow. This notation is characterized by such components as: the start of a process; current events; notifications; rules; the end of a process. The interaction algorithm of the process "Organize work within the institute" is shown in Figure <ref type="figure" target="#fig_2">3</ref>. In figure <ref type="figure" target="#fig_2">3</ref> following main elements of the business process are shown:</p><p>• data warehouse -elements of a future information system database (tables, list of equipment, curriculum, etc.); • start and end events;</p><p>• processes and tasks; • data objects -future forms of the information system client part prototypes (guidelines, plans of activities).</p><p>Below is an example of one of information system created for one of the institutes of distance education. This system involves collaboration with all types of data listed above (Figure <ref type="figure" target="#fig_3">4</ref>). The authorial software products provide the lecturer with the opportunity to develop educational content based on visual programming: it would be sufficient to just add the necessary information. Components of educational content in the form of text fragments, illustrations or video are placed on the screen using manipulators. Content management systems allow creating and managing file directories of various types. Such distance education system is a database with a keyword search that allows a lecturer or methodologist to perform a quick search. Content management systems are especially applicable in cases where a large team of specialists is working on the courses creation and needs to use the same fragments of training materials in different training courses. This reduces the time spent on training programs development. Such distance education systems are ideal for web sites, educational programs and materials portals development.</p><p>Learning management systems provide the student with ample opportunities for creating an effective learning process, and provide learning process' manager with tools for creating training programs, monitoring, generating reports on learning outcomes, and organizing various options of communication between students and lecturers.</p><p>There are also learning content management systems (LCMS). Their basic difference from learning management systems is that they are aimed at managing the training programs' content and not directly at the educational process. Also they are intended to be used by training programs' developers, specialists in methodological support to courses, and heads of educational institutions.</p><p>The basis of learning content management system is the concept of representing an education content as a set of permanently engaged learning objects with certain attributes of usage. However, it is becoming increasingly difficult to draw a clear-cut line between two classes of systems. This is due to most of manufacturers of learning content management systems, which are using general learning management functionality. Many of the modern solutions of the category of learning management systems are similarly implementing the key features of educational content management.</p><p>However, it must be noted that any information systems, which are a technological base of distance learning systems, could be targets for various external and internal security threats, both malicious and accidental. That might impair not only distance learning process but also higher education institution functioning in general. In the conditions of increasing number of cybercrime, this factor entails need for organizing of the information security system <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b20">21]</ref>. Therefore, the scope of such security system is set not only by the university decision but also by the requirements of the information security regulating institutions, such as The Federal Service for Technical and Export Control of Russia, The Federal Security Service of the Russian Federation, The Federal Service for Supervision of Communications, Information Technology and Mass Media, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Overview of System Security Assessment Methods</head><p>At present, there are numerous methods of information systems' assessing and protection. However, more generally they are universal and do not take into account the specificity of narrowly targeted systems and their use. In this regard the problem of ensuring the information security in the systems, which implement support for distance learning programs in higher education institutions, is of great importance nowadays. The solution to this problem is particularly important for international education programs, such as joint degrees programs and internships.</p><p>The overall picture of how risks affect the organization is shown in Figure <ref type="figure" target="#fig_4">5</ref>. To date the main threats to the university information security are:</p><p>• malicious software (∼ 30%);</p><p>• human errors (∼ 20%);</p><p>• equipment failure (∼ 15%);</p><p>• information system penetration (∼ 5%);</p><p>• software failure (∼ 5%).</p><p>An information security of educational organizations should be constantly improved due to the permanent risk of information leaking. This process should be continuous and should involve improved methods and ways of information security systems improvement, continuous monitoring, system's weaknesses and potential information leakage channels identification. Continual improvement of such systems is strongly linked to the creation of new ways to gain an unauthorized access to a confidential and sensitive information.</p><p>The role of information security in the organizational system of safety measures is determined by the timeliness and accuracy of managerial decisions, taking into account available resources, information safeguards, and current laws and regulations.</p><p>Information security should serve as an integrated system in which all components are designed to prevent possible leakage of confidential information, and to protect information carriers from an authorized access. Thus, all of this ensures confidentiality, integrity and availability of information in dealing with it.</p><p>To date there are various information safeguards. These are legal, economic, technical, and organizational methods. Development of regulations and departmental regulations for ensuring information security refers to legal methods of information security.</p><p>Organizational, and organizational and technical methods may include:</p><p>• information security system development and improvement;</p><p>• information protection facilities development, improvement and usage, and facilities performance monitor; • dangerous to information, information resources, information systems hardware and software identification; • user's activity monitor; • information security monitoring system development.</p><p>The technical methods of information security ensuring may include:</p><p>• installation of security hardware and software ensuring protection from an authorized access, actions causing damaging impact on information system, destruction and distortion of information, unintended regular operation modifications; • identification of malicious hardware and software posing risk to means of processing and transferring information; • monitoring of technical means of transferring information, providing prevention of information leakage through technical channels; • technical supervision of technical measures' for information security effective functioning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Economic methods include:</head><p>• introduction of the information security policy and its funding determining; • information systems improvement.</p><p>Modern information security is provided by the following methods:</p><p>• cryptographic information protection; • information management, both in a local networks and in communication channels; • monitoring and tamper detection; • ensuring information and software integrity; • introduction of enhanced means of restoring information security; • equipment and magnetic media physical protection and accounting; • formation of special information security services.</p><p>Namely, the use of cryptographic methods help to address the electronic information protection challenges. However, modern methods of cryptographic transformation retain an initial productivity of automated data-processing systems.</p><p>Usage of cryptography is the most effective way to ensure information confidentiality, integrity and availability. Cryptographic methods combined with technical and organizational methods provide with protection against a wide range of possible threats.</p><p>There are poor performance of the traditional security mechanisms and the backlog in the implementation of advanced methods of protection due to large data flows existence within educational institutions. In this regard, applications of the advances of cryptography call for special attention.</p><p>Thus, an employee responsible for the systems' security may seek guidance from standard GOST R ISO/IEC 27002-2012 for system's security self-assessment. According to that standard, it is recommended to carry out periodic conformity checks of the current level of security, required level, security policy, and technical requirements. However, the standard does not mention recommended methods for an implementation of checkups. Generally, an assessment procedure is performed by various interviewing techniques. This method is carried out in the following main stages:</p><p>• using questionnaires based on the requirements of the standard; • formation of knowledge base of scientific experts in line with the requirements and the recommendations of the standard; • formulating the guidelines for analysis of the replies to the questionnaires.</p><p>The application of the standardized approach only would allow to get a fast security assessment and to receive recommendations for a system being studied quite rapidly. However, the main drawback of such an approach is that the implementation of the recommendations received is nearly always difficult, if not impossible, because the standard does not take into account information collected by the system itself in its functioning. For that reason, in addition to the standard's requirements, specific features of the system, information assets and statistics on the threats to information security or information security incidents, collected in the system's functioning, is also to be considered.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>Using the approaches described above is accessible in the development of new information security systems, as well as in examining security systems, which already exist in higher education institutions, including whose providing distance education technologies <ref type="bibr" target="#b21">[22,</ref><ref type="bibr" target="#b22">23]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Interaction scheme of the process "Conduct classes"</figDesc><graphic coords="3,89.29,174.19,416.70,178.88" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Distance education Institute organization structure</figDesc><graphic coords="5,130.96,136.75,333.36,177.79" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The interaction algorithm of the process "Organize work within the institute"</figDesc><graphic coords="5,89.29,392.93,416.70,181.11" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: The interaction algorithm of the process "Organize work within the institute"</figDesc><graphic coords="6,120.54,174.08,354.19,251.45" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Security risks</figDesc><graphic coords="8,110.13,163.89,375.05,287.54" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Orcid 0000-0002-1646-8527 (O. N. Romashkova); 0000-0002-6451-6554 (E. D. Romashkova); 0000-0002-1594-427X (I. A. Gudkova)</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Time-dependent sir modeling for d2d communications in indoor deployments</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Orlov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zenyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Samuylov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Moltchanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Andreev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gaidamaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Samouylov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings -31st European Conference on Modelling and Simulation</title>
				<meeting>-31st European Conference on Modelling and Simulation</meeting>
		<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="726" to="731" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Determination of the range of the guaranteed radio communication in wireless telecommunication networks of ieee 802.11 standard with the use of ping program</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">A</forename><surname>Gudkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">E</forename><surname>Samoylov</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2177/#paper-08-1060" />
	</analytic>
	<monogr>
		<title level="m">ITTMM 2018 -Proceedings of the Selected Papers of the 8th International Conference &quot;Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2177</biblScope>
			<biblScope unit="page" from="54" to="59" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings 8</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Application of information technology for the analysis of the rating of university</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">V</forename><surname>Gaidamaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Vasilyuk</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2177/#paper-07-1010" />
	</analytic>
	<monogr>
		<title level="m">ITTMM 2018 -Proceedings of the Selected Papers of the 8th International Conference &quot;Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2177</biblScope>
			<biblScope unit="page" from="46" to="53" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings 8</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Method of effective management of competence development processes in educational environments, Modern science: actual problems of theory and practice</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Golosov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Mosyagin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">I</forename><surname>Gorelov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Series: natural and technical</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="48" to="53" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Method of computer aided formation of organic compound descriptors for quantitative structureproperty relationships</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Kumskov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Smolenskii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Mityushev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Zefirov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">News of the Academy of Sciences. Chemical series</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page">1391</biblScope>
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Fuzzy classification and fast rules for refusal in the qsar problem</title>
		<author>
			<persName><forename type="first">E</forename><surname>Prokhorov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Permyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kumskov</surname></persName>
		</author>
		<idno type="DOI">10.1134/S105466181102091X</idno>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition and Image Analysis</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="542" to="544" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Estimation of activation energies of thermal decomposition of nitro compounds based on structural descriptors</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Kumskov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Peshkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">I</forename><surname>Rezchikova</surname></persName>
		</author>
		<idno type="DOI">10.1007/BF01457760</idno>
	</analytic>
	<monogr>
		<title level="j">Russian Chemical Bulletin</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="1840" to="1843" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The application of a fluid-based model for the analysis of the distribution time of a file among users in peer-to-peer network</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bobrikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Gaidamaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Romashkova</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2064/paper06.pdf" />
	</analytic>
	<monogr>
		<title level="m">Selected Papers of the II International Scientific Conference &quot;Convergent Cognitive Information Technologies</title>
				<imprint>
			<publisher>Convergent</publisher>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="volume">2064</biblScope>
			<biblScope unit="page" from="55" to="61" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Fuzzy classification and fast rejection rules in the structure-property problem</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">I</forename><surname>Prokhorov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Permyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Kumskov</surname></persName>
		</author>
		<idno type="DOI">10.1134/S1054661813010100</idno>
	</analytic>
	<monogr>
		<title level="j">Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="130" to="138" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Fuzzy Predicting Models in &quot;Structure -Property&quot; Problem</title>
		<author>
			<persName><forename type="first">E</forename><surname>Prokhorov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Permyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kumskov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Workshop on Soft Computing Applications and Knowledge Discovery (SCAKD 2011)</title>
				<meeting>the International Workshop on Soft Computing Applications and Knowledge Discovery (SCAKD 2011)<address><addrLine>Moscow, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011-06-25">June 25, 2011. 2011</date>
			<biblScope unit="page" from="89" to="93" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Influence of russian, spanish and vietnamese speech characteristics on digital information transmission quality</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Gorelov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Symposium on Industrial Electronics Proceedings of the IEEE International Symposium on Industrial Electronics, ISIE&apos;96. Part 1</title>
				<meeting><address><addrLine>Warsaw, Poland</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="311" to="313" />
		</imprint>
		<respStmt>
			<orgName>Warsaw University of Technology</orgName>
		</respStmt>
	</monogr>
	<note>(of 2</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Application 22-34 of information technology for the analysis of the rating of university</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">V</forename><surname>Gaidamaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Vasilyuk</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2177/#paper-07-1010" />
	</analytic>
	<monogr>
		<title level="m">ITTMM 2018 -Proceedings of the Selected Papers of the 8th International Conference &quot;Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">2177</biblScope>
			<biblScope unit="page" from="46" to="53" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings 8</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The process of automating the rating of russian universities</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Vasilyuk</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2407/paper-12-121.pdf" />
	</analytic>
	<monogr>
		<title level="m">ITTMM 2019 -Proceedings of the Selected Papers of the 8th International Conference &quot;Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2407</biblScope>
			<biblScope unit="page" from="109" to="117" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings 9</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Communication quality assessment in speech packet transmission networks with random service interrupts</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Gorelov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Kazanskii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Lukova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatic Control and Computer Sciences</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page">62</biblScope>
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Instrumental implementation of the educational process model to improve the rating of the universities</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Chiskidov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2407/paper-10-120.pdf" />
	</analytic>
	<monogr>
		<title level="m">ITTMM 2019 -Proceedings of the Selected Papers of the 8th International Conference &quot;Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2407</biblScope>
			<biblScope unit="page" from="92" to="101" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings 9</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Resource management in distance and mobile education systems</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Pavlicheva</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2407/paper-11-119.pdf" />
	</analytic>
	<monogr>
		<title level="m">ITTMM 2019 -Proceedings of the Selected Papers of the 8th International Conference &quot;Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2407</biblScope>
			<biblScope unit="page" from="102" to="108" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings 9</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Development module of the corporate information system &quot;educational environment of the university&quot; based on cloud technologies</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Kodanev</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=28952199" />
	</analytic>
	<monogr>
		<title level="m">Computer science: problems, methodology, technology the collection of materials of XVII international scientific conference: in 5 t</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="393" to="398" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Challenges for russian ecosystem of higher education for on board communications</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Kapterev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<idno type="DOI">10.1109/SOSG.2019.8706719</idno>
	</analytic>
	<monogr>
		<title level="m">Systems of Signals Generating and Processing in the Field of on Board Communications</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="227" to="232" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Development of a mathematical model of the educational process at the university to improve the quality of education</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Golosov</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=28800201" />
	</analytic>
	<monogr>
		<title level="j">Fundamental research</title>
		<imprint>
			<biblScope unit="page" from="77" to="81" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Model of functioning of information system for institute of distance education of specialists of onboard communications</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">N</forename><surname>Pavlicheva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<idno type="DOI">10.1109/SOSG.2019.8706783</idno>
	</analytic>
	<monogr>
		<title level="m">Systems of Signals Generating and Processing in the Field of on Board Communications</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="382" to="386" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Model of educational process in high school using petri nets</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<idno type="DOI">10.25559/SITITO.2017.2.244</idno>
		<ptr target="http://sitito.cs.msu.ru/index.php/SITITO/article/view/244.doi:10.25559/SITITO.2017.2.244" />
	</analytic>
	<monogr>
		<title level="j">Modern information technologies and IT education</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="131" to="139" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Influence of russian, spanish and vietnamese speech char-22-34 acteristics on digital information transmission quality</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Gorelov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Romashkova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Symposium on Industrial Electronics Proceedings of the IEEE International Symposium on Industrial Electronics, ISIE&apos;96. Part 1</title>
				<meeting><address><addrLine>Warsaw, Poland</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1996">1996</date>
			<biblScope unit="page" from="311" to="313" />
		</imprint>
		<respStmt>
			<orgName>Warsaw University of Technology</orgName>
		</respStmt>
	</monogr>
	<note>(of 2</note>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ponomareva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Kodanev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Chiskidov</surname></persName>
		</author>
		<ptr target="https://elibrary.ru/item.asp?id=30521104" />
		<title level="m">New information technologies in scientific research materials of the XXII all-Russian scientific-technical conference of students, young scientists and specialists</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="20" to="22" />
		</imprint>
		<respStmt>
			<orgName>Ryazan state radio engineering University</orgName>
		</respStmt>
	</monogr>
	<note>Model of management of process of development of competences in educational organizations</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
