<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Quantum information technology on the Edge</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhiy O. Semerikov</string-name>
          <email>semerikov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tetiana A. Vakaliuk</string-name>
          <email>tetianavakaliuk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii M. Striuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii V. Morozov</string-name>
          <email>morozov@ztu.edu.ua</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Information Technologies and Learning Tools of the NAES of Ukraine</institution>
          ,
          <addr-line>9 M. Berlynskoho Str., Kyiv, 04060</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kryvyi Rih National University</institution>
          ,
          <addr-line>11 Vitalii Matusevych Str., Kryvyi Rih, 50027</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kryvyi Rih State Pedagogical University</institution>
          ,
          <addr-line>54 Gagarin Ave., Kryvyi Rih, 50086</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Educational Management</institution>
          ,
          <addr-line>52-A Sichovykh Striltsiv Str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Zhytomyr Polytechnic State University</institution>
          ,
          <addr-line>103 Chudnivsyka Str., Zhytomyr, 10005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <abstract>
        <p>This is an introductory text to a collection of selected papers from the Joint Workshop on the Quantum Information Technologies and Edge Computing (QuaInT &amp; doors 2021) which were held in Zhytomyr, Ukraine, on the April 11, 2021. It consists of short summaries of selected papers and some observations about the events. Quantum Information Technologies (QuaInT) is a peer-reviewed international workshop interdisciplinary between Computer Science, Physics and Mathematics, focusing on research advances and applications of quantum information science and technology. QuaInT topics of interest (inspired by [1, 2, 3, 4, 5, 6]): • Annealing-based computing • Cloud-based quantum computing • Quantum information science education</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Quantum Information Technologies</kwd>
        <kwd>Edge Computing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>• Quantum machine learning
• Quantum algorithms
• Quantum coding theory
• Quantum communication
• Quantum complexity theory
• Quantum computing models
• Quantum cryptography
• Quantum finance
• Quantum image processing
• Quantum information processing
• Quantum intelligent systems
• Quantum optimization
• Quantum programming
• Quantum software engineering
• Quantum simulation
• Quantum and probability logic</p>
      <sec id="sec-1-1">
        <title>The first part of this volume represents the</title>
        <p>
          proceedings of the Workshop on the Quantum
Information Technologies (QuaInT 2021), held
in Zhytomyr, Ukraine, on April 11, 2021
(figure 2). It comprises 1 contributed paper ([
          <xref ref-type="bibr" rid="ref7">7</xref>
          ])
that was carefully peer-reviewed and selected Figure 1: QuaInT 2021 logo
from 4 submissions (https://notso.easyscience.
education/quaint/2021/). Each submission was reviewed by at least 3, and on the average 3.25,
program committee members. The accepted paper present the state-of-the-art overview of
successful cases and provides guidelines for future research.
        </p>
        <sec id="sec-1-1-1">
          <title>1.2. QuaInT 2021 Program Committee</title>
          <p>• Gustavo Banegas, INRIA, France
• Wei Chen, University of Science and Technology of China, China
• Sebastian Feld, Delft University of Technology, Netherlands
1.3. doors 2021: At a glance
Peter the Great hacked through a
window to Europe. We use doors.</p>
          <p>Edge Computing Workshop (doors) is a peer-reviewed international Computer Science
workshop focusing on research advances and applications of edge computing, a process of building
a distributed system in which some applications, as well as computation and storage services,
are provided and managed by
(i) central clouds and smart devices, the edge of networks in small proximity to mobile
devices, sensors and end users, and
(ii) others are provided and managed by the center cloud and a set of small in-between
local clouds supporting IoT at the edge.</p>
          <p>The goal of doors is to bring together researchers and practitioners from academia and
industry working on edge computing to share their ideas, discuss research/work in progress, and
identify new/emerging trends in this important emerging area. The emergence of the
Internet of Things (IoT) and the demand for responsiveness, privacy, and situation-awareness are
pushing computing to the edge of the Internet. There are many challenges in the design,
implementation, and deployment of diferent aspects of edge computing: infrastructure, systems,
networking, algorithms, applications, etc. doors would like to open discussions in these areas.
doors topics of interest are opened to:
• algorithms and techniques for machine learning and AI at the edge
• cellular infrastructure for edge computing
• distributed ledger technology and blockchain at the edge
• edge computing infrastructure and edge-enabled applications
• edge-based data storage and databases
• edge-optimized heterogeneous architectures
• fault-tolerance in edge computing
• fog computing models and applications
• geo-distributed analytics and indexing on edge nodes
• hardware architectures for edge computing and devices
• innovative applications at the edge
• interoperability and collaboration between edge and cloud computing
• monitoring, management, and diagnosis in edge computing
• processing of IoT data at network edges
• programming models and toolkits for edge computing
• resource management and Quality of Service for edge computing
• security and privacy in edge computing</p>
          <p>
            The second part of this volume represents the
proceedings of the Edge Computing Workshop
(doors 2021), held in Zhytomyr, Ukraine, on April
11, 2021 (figure 4). It comprises 7 contributed
papers ([
            <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8, 9, 10, 11, 12, 13, 14</xref>
            ]) that were
carefully peer-reviewed and selected from 14 submis- Figure 3: doors 2021 logo
sions (https://notso.easyscience.education/doors/
2021/). Each submission was reviewed by at least 3, and on the average 3.2, program
committee members. The accepted papers present the state-of-the-art overview of successful cases
and provides guidelines for future research.
          </p>
        </sec>
        <sec id="sec-1-1-2">
          <title>1.4. doors 2021 Program Committees</title>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>Program Committee:</title>
        <p>• Mehdi Ammi, University of Paris 8, France
• Aleksandr Cariow, West Pomeranian University of Technology, Poland
• Olena Glazunova, National University of Life and Environmental Sciences of Ukraine,</p>
        <p>Ukraine
• Attila Kertesz, University of Szeged, Hungary
• Dmitry Korzun, Petrozavodsk State University, Institute of Mathematics and Information</p>
        <p>Technology, Russia
• Vyacheslav Kryzhanivskyy, R&amp;D Seco Tools AB, Sweden
• Nagender Kumar, University of Hyderabad, India
• Gyu Myoung Lee, Liverpool John Moores University, United Kingdom
• Taras Maksymyuk, Lviv Polytechnic National University, Ukraine
• Franco Milano, University of Florence, Italy
• Bongkyo Moon, Dongguk University, Korea
• Leonardo Mostarda, University of Camerino, Italy
• Djamel Eddine Saidouni, MISC Laboratory, University Constantine 2 – Abdelhamid Mehri,</p>
        <p>Algeria
• Gwen Salaun, University Grenoble Alpes, France
• Serhiy Semerikov, Kryvyi Rih State Pedagogical University, Ukraine
• Pedro Valderas, Universitat Politècnica de València, Spain
• Xianzhi Wang, University of Technology Sydney, Australia
• Michael Wei, VMware Research, USA
• Eiko Yoneki, University of Cambridge, United Kingdom
• Pamela Zave, Princeton University, USA
Additional reviewers:
• Abhineet Anand, Chitkara University, India
• Dmitry Antoniuk, Zhytomyr Polytechnic State University, Ukraine
• Josef Cernohorsky, Technical university of Liberec, Czech Republic
• Lubomir Dimitrov, Technical University-Sofia, Bulgaria
• Mahmud Hossain, The University of Alabama at Birmingham, US
• Valerii Kontsedailo, Inner Circle, Netherlands
• Nadiia Lobanchykova, Zhytomyr Polytechnic State University, Ukraine
• Mykhailo Medvediev, ADA University, Azerbaijan
• Andrii Morozov, Zhytomyr Polytechnic State University, Ukraine
• Tetiana Nikitchuk, Zhytomyr Polytechnic State University, Ukraine
• Shadi Noghabi, Microsoft Research, Redmond, WA, USA
• Igor Puleko, Zhytomyr Polytechnic State University, Ukraine
• Etibar Seyidzade, Baku Engineering University, Azerbaijan
• Andrii Striuk, Kryvyi Rih National University, Ukraine
• Inna Suhoniak, Zhytomyr Polytechnic State University, Ukraine
• Tetiana Vakaliuk, Zhytomyr Polytechnic State University, Ukraine
• Tetiana Voloshyna, National University of Life and Environmental Sciences of Ukraine,</p>
        <p>Ukraine
• Volodymyr Voytenko, Athabasca University, Canada
• Valentyn Yanchuk, Zhytomyr Polytechnic State University, Ukraine
Organizing Committee:
• Nadiia Lobanchykova, Zhytomyr Polytechnic State University, Ukraine
• Andrii Morozov, Zhytomyr Polytechnic State University, Ukraine
• Serhiy Semerikov, Kryvyi Rih State Pedagogical University, Ukraine
• Andrii Striuk, Kryvyi Rih National University, Ukraine
• Tetiana Vakaliuk, Zhytomyr Polytechnic State University, Ukraine</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Articles overview</title>
    </sec>
    <sec id="sec-3">
      <title>3. QuaInT 2021 Article overview</title>
      <p>
        Kamil Khadiev (figure 5) in the article [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] consider online algorithms as a request-answer game.
An adversary that generates input requests, and an online algorithm answers. Author consider
a generalized version of the game that has a bufer of limited size. The adversary loads data
to the bufer, and the algorithm has random access to elements of the bufer. Author consider
quantum and classical (deterministic or randomized) algorithms for the model. Kamil Khadiev
provide a specific problem (The Most Frequent Keyword Problem) and a quantum algorithm
that works better than any classical (deterministic or randomized) algorithm in terms of
competitive ratio. At the same time, for the problem, classical online algorithms in the standard
model are equivalent to the classical algorithms in the request-answer game with bufer model.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. doors 2021 Articles overview</title>
      <p>
        The development and efective application of Fog Computing technologies require the most
complex tasks related to the management and processing of huge data sets, including the tasks
of rational construction of low-level networks that ensure the functioning of end devices within
the IoT concept. The article “Graph model of Fog Computing system” [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] authored by Andriy
V. Ryabko, Oksana V. Zaika, Roman P. Kukharchuk and Tetiana A. Vakaliuk (figure 6) describes
the use of graph theory methods to solve such problems. The proposed graph model can
provide the ability to determine the basic properties of systems, networks, and network devices
within the concept of Fog Computing, the optimal characteristics, and ways to maintain them
in working condition. This paper shows how to plot graphs, and then customize the display to
add labels or highlighting to the graph nodes and edges of pseudo-random task graphs which
can be used for evaluating Mobile Cloud, Fog and Edge computing systems. The graphs are
described and visualized in Matlab code. Each task has an amount of computational work to
perform, expressed in Megacycles per second. Each edge has an amount of data to transfer
between tasks, expressed in kilobits or kilobytes of data. The set can be used by researchers
to evaluate cloud/fog/edge computing systems and computational ofloading algorithms. The
task graphs can be used in single-user systems, where one mobile device accesses a remote
server, or in multi user systems, where many users access a remote server through a wireless
channel.
      </p>
      <p>
        Tetiana M. Nikitchuk, Tetiana A. Vakaliuk, Oksana A. Chernysh (figure 7), Oksana L.
Korenivska, Liudmyla A. Martseva and Viacheslav V. Osadchyi in the article “Architecture for
edge devices for diagnostics of students’ physical condition” [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] investigates the possibility of
technical realization of hardware complex. It presupposes the use of sensors of registration of
a photoplethysmographic curve, which describes a pulse wave and defines the parameters of
students’ cardiovascular system functional state. The method of photoplethysmography allows
the use of non-contact sensors. Therefore, there is no artery compression, which eliminates
circulatory disorders and allows the use of calculations to determine the saturation of oxygen
by the pulse wave. It is recommended to use several optocouplers connected in series, parallel
or parallel-series in a chain, with control of their mode of operation from the intensity of the
received pulse wave signal depending on human body constitution. The edge device hardware
is a part of the IoT system, which also includes another edge device, which instantly transmits
data to the database on the edge server for the data further processing and storage.
      </p>
      <p>
        The concept of the Internet of Things is increasingly defining the development of
communication networks both now and in the future. The largest application of the IoT concept is
wireless touch networks (WTN). Due to the potentially widespread use of WTN in all areas
of human life, they are also called pervasive sensory networks. WTN belongs to the class of
self-organizing networks, for which the construction principles, routing protocols, quality of
service parameters, trafic models, and characteristics are significantly modified compared to
traditional infrastructure networks, etc. The features of the application of dynamic routing
protocols for the construction of a self-organizing network of autonomous IoT systems are
considered. Anastasia D. Sverdlova (figure 8), Artur O. Zaporozhets, Ihor V. Bohachev,
Oleksandr O. Popov, Anna V. Iatsyshyn, Andrii V. Iatsyshyn, Valeriia O. Kovach, Volodymyr O.
Artemchuk and Nataliia M. Hrushchynska in the article “Self-organizing network topology
for autonomous IoT systems” [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] provides an overview of the main methods for calculating
the topology of self-organizing networks. A review of known dynamic routing protocols for
mobile radio networks is given, the advantages and disadvantages of proactive and reactive
approaches are shown.
      </p>
      <p>
        Edge computing is an extension of cloud computing where physical servers are deployed
closer to the users in order to reduce latency. Edge data centers face the challenge of serving
a continuously increasing number of applications with a reduced capacity compared to
traditional data center. Tania Lorido-Botran (figure 9) and Muhammad Khurram Bhatti in the article
“ImpalaE: Towards an optimal policy for eficient resource management at the edge” [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
introduces ImpalaE, an agent based on Deep Reinforcement Learning that aims at optimizing
the resource usage in edge data centers. First, it proposes modeling the problem as a Markov
Decision Process, with two optimization objectives: reducing the number of physical servers
used and maximize number of applications placed in the data center. Second, it introduces
an agent based on Proximal Policy Optimization, for finding the optimal consolidation policy,
and an asynchronous architecture with multiple workers-shared learner that enables for faster
convergence, even with reduced amount of data. We show the potential in a simulated edge
data center scenario with diferent VM sizes based on Microsoft Azure real traces, considering
CPU, memory, disk and network requirements. Experiments show that ImpalaE efectively
increases the number of VMs that can be placed per episode and that it quickly converges to an
optimal policy.
      </p>
      <p>Nadiia M. Lobanchykova (figure 10), Ihor A. Pilkevych and Oleksandr Korchenko in the
article “Analysis of attacks on components of IoT systems and cybersecurity technologies”
[12] presents the results of IoT analysis, methods and ways of their protection, prospects of
using edge computing to minimize trafic transmission, decentralization of decision-making
systems, and information protection. A detailed analysis of attacks on IoT system components
was carried out and protection recommendations were developed.</p>
      <p>Taras A. Uzdenov (figure 11) in the article “Task scheduling in Desktop GRID by FSA method:
a practical example” [13] considers a new approach to solving the problem of dispatching task
lfows, the complexity of which is known, for GRID-systems with inalienable resources, the
performance of which can be determined. A method based on this approach has been developed.
The eficiency of the proposed method is compared with the well-known and widely used in
various projects method FCFS. A feature of this method is the simplicity of implementation.
An example of a simple practical problem that can be solved using the proposed method is
described in this paper.</p>
      <p>Volodymyr Kvasnikov (figure 12), Mariia Kataieva and Victor Kobylyansky in the article
“Analysis of metrological support of nano-measurements” [14] analyzes the existing methods
and means of measuring objects in the nanometer range and develops their classification based
on the main principles of use. The main parameters on which each described method is based
are considered and the conditions for their most efective application are determined. It is
proved that the chemical and electrical sets of properties of the nanomaterial can change when
the particle size decreases to the nanometer size, which requires the inclusion of additional
chemical and electrical tests in existing methods. Based on the analysis, it was determined that
the most functional and universal in solving a wide range of problems is the method of
scanning probe microscopy. The classification of existing methods of scanning probe microscopy
based on the nature of their applications is developed. The main information parameters on
which each described method is based are considered, and the conditions of their most efective
application are determined. To increase the accuracy of nanomeasurements, a methodology
based on the principle of integration of information provided by diferent methods has been
developed. The use of the diferential-digital method is proposed, which includes the use of
an additional information parameter in the mathematical model. An algorithm for including
additional (a priory) information in the conditions for measuring the nanostructures has been
developed, which leads the problem to the correct one according to the method of the control
link, which characterizes the deviation of the parameters of measuring nanoobjects from their
nominal values. It is proved that increasing the number of measurement methods used in the
metrological analysis of nanoobjects will increase the reliability and accuracy of measurement
results, and each method will provide additional information parameters to create a
computerized method of calculating the control link. The main condition for correct comparison of the
result is knowledge of the specific parameters on which each method is based.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The Joint Workshop on the Quantum Information Technologies and Edge Computing (QuaInT
&amp; doors 2021) was organized by Kryvyi Rih National University (with support of the rector
Mykola I. Stupnik) and Zhytomyr Polytechnic State University (with support of the rector
Viktor V. Ievdokymov) in collaboration with Kryvyi Rih State Pedagogical University (with
support of the rector Yaroslav V. Shramko), Institute of Information Technologies and Learning
Tools of the NAES of Ukraine (with support of the director Valeriy Yu. Bykov) and University of
Educational Management (with support of the vice-rector for research and digitalization Oleg
M. Spirin).</p>
      <p>We are thankful to all the authors who submitted papers and the delegates for their
participation and their interest in QuaInT &amp; doors as a platform to share their ideas and innovation.
Also, we are also thankful to all the program committee members for providing continuous
guidance and eforts taken by peer reviewers contributed to improve the quality of papers
provided constructive critical comments, improvements and corrections to the authors are
gratefully appreciated for their contribution to the success of the workshop.
[12] N. M. Lobanchykova, I. A. Pilkevych, O. Korchenko, Analysis of attacks on components
of IoT systems and cybersecurity technologies, CEUR Workshop Proceedings (2021, in
press) 83–96.
[13] T. A. Uzdenov, Task scheduling in Desktop GRID by FSA method: a practical example,</p>
      <p>CEUR Workshop Proceedings (2021, in press) 97–109.
[14] V. Kvasnikov, M. Kataieva, V. Kobylyansky, Analysis of metrological support of
nanomeasurements, CEUR Workshop Proceedings (2021, in press) 110–120.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Solovev</surname>
          </string-name>
          ,
          <article-title>Atomic particle delocalisation efect in disordered media, physica status solidi (a) 83 (</article-title>
          <year>1984</year>
          )
          <fpage>553</fpage>
          -
          <lpage>559</lpage>
          . doi:
          <volume>10</volume>
          .1002/pssa.2210830216.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Lehka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shokaliuk</surname>
          </string-name>
          ,
          <article-title>Quantum programming is a promising direction of IT development</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2292</volume>
          (
          <year>2018</year>
          )
          <fpage>76</fpage>
          -
          <lpage>82</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Belinskiy</surname>
          </string-name>
          ,
          <article-title>Complex systems theory and crashes of cryptocurrency market</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          <volume>1007</volume>
          (
          <year>2019</year>
          )
          <fpage>276</fpage>
          -
          <lpage>297</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -13929-2_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bielinskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Serdyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Solovieva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          , L. Pichl, Econophysics of sustainability indices,
          <source>CEUR Workshop Proceedings</source>
          <volume>2713</volume>
          (
          <year>2020</year>
          )
          <fpage>372</fpage>
          -
          <lpage>392</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Zahorodko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Modlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Kalinichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Selivanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Quantum enhanced machine learning: An overview</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2832</volume>
          (
          <year>2020</year>
          )
          <fpage>94</fpage>
          -
          <lpage>103</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2832</volume>
          /paper13.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Zahorodko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Shalatska</surname>
          </string-name>
          ,
          <article-title>Comparisons of performance between quantum-enhanced and classical machine learning algorithms on the IBM quantum experience</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          <year>1840</year>
          (
          <year>2021</year>
          )
          <article-title>012021</article-title>
          . URL: https://doi.org/10.1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1840</year>
          /1/012021. doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1840</year>
          /1/012021.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Khadiev</surname>
          </string-name>
          ,
          <article-title>Quantum request-answer game with bufer model for online algorithms</article-title>
          .
          <source>application for The Most Frequent Keyword Problem, CEUR Workshop Proceedings</source>
          (
          <year>2021</year>
          , in press)
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Ryabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <article-title>Graph model of Fog Computing system</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2021</year>
          , in press)
          <fpage>28</fpage>
          -
          <lpage>44</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Nikitchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Chernysh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. L.</given-names>
            <surname>Korenivska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Martseva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Osadchyi</surname>
          </string-name>
          ,
          <article-title>Architecture for edge devices for diagnostics of students' physical condition</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2021</year>
          , in press)
          <fpage>45</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>A. D. Sverdlova</surname>
            ,
            <given-names>A. O.</given-names>
          </string-name>
          <string-name>
            <surname>Zaporozhets</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          <string-name>
            <surname>Bohachev</surname>
            ,
            <given-names>O. O.</given-names>
          </string-name>
          <string-name>
            <surname>Popov</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          <string-name>
            <surname>Iatsyshyn</surname>
            ,
            <given-names>A. V.</given-names>
          </string-name>
          <string-name>
            <surname>Iatsyshyn</surname>
            ,
            <given-names>V. O.</given-names>
          </string-name>
          <string-name>
            <surname>Kovach</surname>
            ,
            <given-names>V. O.</given-names>
          </string-name>
          <string-name>
            <surname>Artemchuk</surname>
            ,
            <given-names>N. M.</given-names>
          </string-name>
          <string-name>
            <surname>Hrushchynska</surname>
          </string-name>
          ,
          <article-title>Self-organizing network topology for autonomous IoT systems</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2021</year>
          , in press)
          <fpage>57</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Lorido-Botran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Bhatti</surname>
          </string-name>
          ,
          <article-title>ImpalaE: Towards an optimal policy for eficient resource management at the edge</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2021</year>
          , in press)
          <fpage>71</fpage>
          -
          <lpage>82</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>