<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Independent Computing Resources to Manage and Monitor the Quality of Learning</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nadiia Pasieka</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nelly Lysenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandra Lysenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Sheketa</string-name>
          <email>vasylsheketa@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Pasieka</string-name>
          <email>pms.mykola@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariana Varvaruk</string-name>
          <email>varvaruk.mariana@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Tech. University of Oil &amp; Gas</institution>
          ,
          <addr-line>Ivano-Frankivsk, 76068</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vasyl Stefanyk Precarpathian National University</institution>
          ,
          <addr-line>Ivano-Frankivsk, 76000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The educational and methodological systems and methods aimed at enhancing the educational process are analyzed. These methods and techniques are designed to effectively solve problems, the quality and training of specialists on the basis of integrated methods, as well as improving the and implementing current trends. Based on these results, scientific research and practical research on the effectiveness of software application on independent computing structures showed many positive aspects, that is, this method has broad prospects for the construction of distributed information systems. The use of an independent computing structure allows the application software to be used around the clock without worrying about its working condition, since this task was outsourced to a third party when used. However, this way of organizing the management and monitoring of the educational process has its drawbacks, that is, the necessary level of protection of personal data on such independent platforms is not studied. Since the information database is located on an independent computing platform, the owner of the educational platform cannot guarantee the security of the process of external intervention. In addition, the use of information technology has been calculated and analyzed to prove and improve the model of enhancing the learning process, thereby improving the learning process and enhancing the quality of education. higher school, learning, quality of education, information technologies, management of higher MoMLeT+DS 2021: 3rd International Workshop on Modern Machine Learning Technologies and Data Science, June 5, 2021, Lviv-Shatsk, 0000−0002−1318−4895 (V. Sheketa); 0000−0002−3058−6650 (M. Pasieka); 0000-0002-9606-9146 (M. Varvaruk)</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        With the rapid development of information and communication technologies, the expansion of free
cloud services is becoming relevant to the application and introduction of the latest information services
in industrial use on the basis of common use of competitive technologies. Taking this into account,
there is an urgent need to outsource information and communication technologies – cloud services
(ITservices) in the development. [
        <xref ref-type="bibr" rid="ref17 ref2 ref8">2, 8, 17</xref>
        ] The concept of "IT-outsourcing" provides the transfer of any IT
process (program, function, work) or a certain part of a third party organization, which provides
professional IT-services on an independent computer platform, it supports the functioning of
information and reference, expert systems, information security databases and databases of enterprises,
storage and processing of significant amounts of data, provision of hardware resources. Outsourcing
Ukraine
EMAIL:
(N. Pasieka);
ORCID:
000-0002-4824-2370
(N.
      </p>
      <p>Pasieka);
(N.</p>
      <p>
        2021 Copyright for this paper by its authors.
solves the issue of reducing the financial and time costs of implementation, support and modernization
of IT-infrastructure. It ensures the convergence of information and communication media, namely, the
convergence of various electronic technologies to increase business requirements for stability and
availability of IT- services. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
      </p>
      <p>
        To develop a software system using cloud technologies, the development team must develop a
structural scheme that defines the main functional properties of the software system, their interrelation
and purpose. The functionality of a software system is understood as the components of the system
elements, devices, functional groups, functional links. Building a structural scheme, which is designed
to reflect the overall structure of the project (task in hand), is the development of its main blocks, nodes,
parts and formation of the main links between them. From the structural scheme of software
development of the system with the use of cloud technologies it should be clear how the system works
in the main modes of operation and how its parts interact. The designations of the structural scheme
elements can be chosen arbitrarily, though the generally accepted rules of scheme execution should be
observed as much as possible. [
        <xref ref-type="bibr" rid="ref13">13, 26</xref>
        ]
      </p>
      <p>Cloud computing is a free way to access external information and communication resources in the
form of various Internet services. The term “cloud computing” was proposed by Ramnath K. Chellappa,
who noted it as a computational paradigm in which the boundaries of computational elements will
depend on the economic feasibility, not only on technical limitations [25]. The appearance of the first
technology, which provided access to applications through the site, namely the software systems as a
service (Software as a Service [SaaS]).</p>
      <p>
        The urgency of development of distributed software systems on the basis of cloud technology lies
in the fact that the need for modern high-performance systems is constantly growing and the methods
of their correct development and algorithms of supporting computational work on independent
computing platforms at the peak moments of the load are very few. [
        <xref ref-type="bibr" rid="ref16 ref5 ref6">5, 6, 16</xref>
        ] The study focuses on the
most controversial modern challenges in the development of software systems based on cloud
technology, faced by architects of such systems, namely, the algorithms of moving the load between
the computing nodes and the architectures of software organization within the framework of business
logic of enterprises. The use of the proposed technique on independent computing platforms for the
development of fault-tolerant software systems based on cloud technology allows us to expand the
worldview approaches to the construction of productive mechanisms of distribution of computational
load between the nodes of the corresponding system. [
        <xref ref-type="bibr" rid="ref1 ref10 ref12 ref4 ref9">1, 4, 9, 10, 12</xref>
        ] Taking into account the
insufficient research of this subject area we understand that the successful algorithm of the mechanism
of transferring the computational load which promotes the effective modification of this resource within
the framework of the task in hand is the main criterion in the choice of program technologies by the
architect of program systems (Figure 1).
Methods: System analysis, logical mathematical approach to assessing the level of difficulty of test
questions for an objective analysis of their complexity, analysis of publications on the topic,
comparison, generalization of cognitive and negative features of similar approaches and critical testing
of the proposed development, cluster analysis of test questions, reasoning based on precedents.
2. Practical deploying educational services on a cloud
management and monitoring the quality of learning
platform
to
      </p>
      <p>With the rapid development of information technologies, other models of provision and use of cloud
services on independent computing platforms were further developed (Figure 2) [31].
The evolutionary development of existing service models in particular:
• Hardware as a Service (HaaS) - hardware;
• Security as a Service (SECaaS) - providing security;
• Backend as a Service (BaaS) – “backend”;
• Recovery as a Service (RaaS) - recovery of programs and data;
• Data as a Service (DaaS) - data acquisition and processing;
• Logging as a Service (LaaS) - authorization and identification;
• Network as a Service (NaaS) - network technologies;
• Platform as a Service (PaaS) - computing platform;
• Desktop as a Service (DaaS) - desktop;
• Storage as a Service (STaaS) - storages and databases;
• API as a Service (APIaaS) - API (application programming interface).</p>
      <p>
        Some of the listed services provided by independent computing platforms are aimed at using a
limited number of specialists as developers and administrators, while others are successfully used by
consumers in a wide range of their activities. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]
      </p>
      <p>Development of software systems using cloud technologies refers not only to software modules, but
also to ensuring their effective delivery of the developed software module as a component of the
software system to interested users, and at the same time contains the stages of deployment and
maintenance of software modules. However, the service-oriented architecture does not consider how
the developed application should be delivered to the interested users or how independent providers of
computing services will efficiently manage the software modules during their execution. Cloud
computing on independent platforms can help SOSE deliver software modules efficiently by ensuring
that they can be easily deployed and maintained by cloud service providers through virtualization, using
a standardized interface for easy access by interested users and using software modules as part of a
developed cloud-based software system.</p>
      <p>Challenges for software development</p>
      <p>Today's paradigms in software development using independent computing platforms require
innovative approaches to providing efficient virtualization and interaction between the layers of SaaS,
PaaS and IaaS. The essence of this approach calls for a rethinking of urgent issues in software
engineering, but some of them are not new, and at the same time they require more serious attention in
the context of providing computing services on cloud platforms. We noted seven critical areas in the
development that create serious obstacles to the development of software modules using SOSE.</p>
      <p>Confidentiality and data integrity</p>
      <p>
        By using independent cloud computing platforms, interested users have limited control over the
processing and storage of data streams, i.e. on remote computing nodes owned and operated by various
cloud service providers. Since these data streams are not encrypted, there is a significant risk that cloud
service providers or malware may disclose or alter their content. While there are many methods to protect
your privacy, all of them cannot fully guarantee it, but when applying a certain model of protection to
cloud services and systems, you must remember that they are only designed to protect your data flows
from malicious attacks outside the system [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Cloud services and software on independent platforms
have different providers of these services within the virtual system.
      </p>
      <p>Reliability and availability of cloud platforms as services</p>
      <p>
        Stakeholders rely heavily on independent cloud service providers for business logic solutions. There
are growing concerns in the information space about how these information threats can affect the
reliability and availability of cloud platforms as a service - from the uncertain economic climate of
society as a whole, and of the service provider in particular, to natural and man-made disasters and
cyberattacks - can have a significant impact on the service, and therefore on the business, of the cloud
user. To minimize these information threats, independent cloud service users must test their data backup
plan, system reliability, disaster recovery and disaster recovery plans. To minimize these information
threats, independent cloud service users must verify their data backup plan, overall system reliability,
emergency exit and software system recovery plans, end-of-service support, and event history
documentation before deciding to use certain services. [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21, 28</xref>
        ] Today, a variety of cyberattacks are
an extremely critical threat. Independent cloud computing services and systems provide fast and flexible
computing resources to meet the business needs of interested users. For the business community, the
computing capabilities and resources of independent cloud service providers often seem unlimited, as
they are available at any time and in any volume. However, information-cyberattack software can also
buy significant amounts of cloud computing resources that enable them to launch more powerful
cyberattacks. Attackers have already used the Amazon EC2 and Google App Engine cloud computing
platforms. To solve this problem, both for the services themselves and for independent cloud service
providers, innovative and effective software tools are needed to monitor and detect harmful actions
against users, as well as to strictly authenticate users and control their access.
      </p>
      <p>Security in a multitasking cloud</p>
      <p>In the developed software systems with the use of cloud technologies on independent computing
platforms in a multifunctional device one copy of the software module runs on the server, which can
have several users or tenants at the same time. In the multilayer architecture the software system is
developed practically separates its information data and configuration, where each interested user works
with an individual sample of the virtual software module.</p>
      <p>Services and systems of cloud computing on independent computing platforms have a multi order,
because many interested users repeatedly use the software module and a set of hardware for processing
information flows. The main problem with cloud data flow protection platforms and developed software
systems is the vulnerability to cyberattacks. To provide the necessary level of protection, service
providers use a hypervisor that controls access between virtual machines and hardware and software.
However, some hardware and software tools, such as processor caches and graphics processors, are not
designed to provide strong insulation properties for multilayer architecture. Even virtual machine
hypervisors, which are provided by an independent cloud service provider, may have some flaws that
allow the virtual machine of one interested user to gain unauthorized control over other tasks and data
flows. More recently, cybercriminals have exploited multiple hypervisor vulnerabilities to affect other
users' computing operations or to gain unauthorized access to data sets. Therefore, addressing these
vulnerabilities requires innovative methods of developing software systems to provide multilayer
architectures for cloud-based services, such as virtual machine isolation and monitoring.</p>
      <p>Cloud risk profile</p>
      <p>Cloud-based software systems developed on independent computing platforms have limited access
to services and cloud computing, as well as information on internal system architecture, software module
versions, configuration, operations and related security practices of these service providers. This limited
access for interested users can increase usability, but it also has serious limitations for operational risk
management. Risk management in software engineering ensures that module developers initially identify
and analyse threats to the software module business process and use appropriate strategies to minimize
and control risks. Namely, how the failure to complete projects within the specified time schedules and
budget constraints, as well as not fully meet the requirements of interested users. Since software
developers using cloud technology lack information about the internal organization of the system under
the layer of virtual abstraction, they may not be able to conduct appropriate research on risk management.
To solve this problem, software developers should turn to independent cloud service providers and
consider three steps:
 partial or full disclosure of software design and infrastructure information;
 Disclosure of relevant logs and data such as network intrusion logs, anomaly logs and security
logs;
 Disclosure of security policy details and enforcement mechanisms.</p>
      <p>Taking a professional look at these steps will not completely eliminate the risk, but the information
obtained will provide much more effective business risk management.</p>
      <p>Monitoring the quality of cloud service delivery</p>
      <p>Independent providers of cloud platforms as services and management of various QoS software
requirements are extremely difficult to manage, as numerous software module developers dynamically
create services in networks to form several computing workflows, and different cloud technology
providers with different methods and policies manage services in different ways. As a result, the QoS
functions of all cloud services are closely linked and there are trade-offs between them.</p>
      <p>
        Thus, the functions responsible for the bandwidth and latency of a particular service rely on the
distribution of information resources of the developed software system during the execution of the
module. Often, a single server hosts multiple services that compete for CPU time, memory and server
bandwidth. In addition, service compositions, the status of server resources, workflow priorities and QoS
requirements usually change dynamically during cloud computing. So, meeting QoS requirements for
multiple computing processes requires effective methods of adaptive allocation of system resources for
each cloud service. Managing multiple QoS properties for such developed software, services and cloud
computing systems requires situational awareness, context analysis and QoS assessment, as well as
optimal hardware and software resource allocation. [
        <xref ref-type="bibr" rid="ref18 ref22">18, 22</xref>
        ]
      </p>
      <p>Internet Things as Cloud Services Delivery Systems</p>
      <p>
        When developing software systems using cloud technology, the main criterion is the network,
because users or software systems are located on different hardware devices, namely: desktops, laptops,
smartphones, tablets and personal computers, that is, they can access network services at any time and
in any place with the help of standard protocols of information exchange. Since identity theft and service
theft are major threats, mobile services and computing providers in independent cloud platforms require
rigorous software development techniques to provide unrestricted access to computing data services. [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
Cloud platform legislation
      </p>
      <p>Users who use cloud computing services and systems on independent platforms do not know the
exact physical and geographical location of their data because they have often processed and stored data
in undefined locations, both domestic and foreign. However, legally, each territory has a different
legislative jurisdiction, and independent cloud service providers in foreign countries cannot always
guarantee compliance with regulatory and legal requirements. This can be, for example, protection of
privacy, backup of information data or the provision of audits and the like. Thus, independent cloud
service providers may not be prepared to take responsibility for security incidents, failure to comply with
data backup requirements, and the provision of audits. They may also not be able to protect intellectual
property according to compliance standards.</p>
      <p>While computing services and cloud computing have great potential, there are some criticisms of
meeting the increasing demands for dynamic development and use of software modules, and the full
realization of this potential requires a change in the structure of software development.
3. Practical deploying educational services on a cloud platform to management
and monitoring the quality of learning</p>
      <sec id="sec-1-1">
        <title>3.1. Information support of the learning process and its management</title>
        <p>The problem of effective or assured functioning of integrated systems of organizational and production
direction is related to both technological components and the ability of personnel to make decisions. That
is, the level of professional training of operators of different authority ranks is one of the decisive criteria
for the functioning of the integrated hierarchical information management system of a higher educational
institution.</p>
        <p>The professional level of pedagogical and production personnel is based on the knowledge base obtained
in school, so it is developed on the basis of subject-oriented theoretical knowledge obtained in higher
education and in the process of special training or mobile trainings. As practice of work of the personnel in
various conditions (extreme, marginal) shows, not all cope with technological tasks for a number of reasons
(physiological, mental, cognitive), that is such workers in extreme conditions cannot effectively use the
acquired knowledge given some features of thinking or behavior [33, 36, 38].</p>
        <p>The analysis showed that for an effective management strategy it is necessary to consider, in addition to
technological requirements, the ability of administrative personnel to make decisions in different situations
[32, 37]. This ability is closely related to intelligence, psychology, professional training, the level of mental
and intellectual stability and way of thinking in making decisions with appropriate information support.</p>
        <p>Types of thinking in terms of levels of cognition (sensory and rational) can be reflected in the following
order:
 philosophical theoretical thinking at the verbal-logical level;
 generation of ideas and hypotheses regarding problem-solving schemes;
 visual (figurative) thinking - action thinking, in which the solution of problems is carried out by real
transformation of the situation in the target with the observation of the motor act;
 visual-imaginative thinking - is associated with the representation of situations and their changes as
a result of activity, taking into account the acting factors and completing the various characteristics
of objects;
 analytical (logical) thinking, its dynamics and structuring are determined by the hierarchy of levels
of goal orientation, a real assessment of the situation, effective purposeful search for a scheme of
problem solving;
 heuristic as an egocentric disoriented inner thinking of a person.</p>
        <p>Thus, information support for the learning and management process of the university is a process of
determining the strategic content, search, collection, processing and presentation of necessary information
in an informative form. The use of information technology ensures the intensification of the learning
process and provides an opportunity to improve the effectiveness of the educational level of the specialist
[29].</p>
      </sec>
      <sec id="sec-1-2">
        <title>3.2. Software service of the learning management process</title>
        <p>
          To prove the effectiveness of using computer services on independent computing platforms to monitor
and manage the learning process we deploy a specialized software application whose work is shown in
(Figure 3-6). This specialized computer application can be used both for students (trainees) and teachers
[
          <xref ref-type="bibr" rid="ref19">19, 30</xref>
          ]. It allows you to interactively select from an information database only the information you need
at the moment.
4. Logical and mathematical model for assessing the level of difficulty of test
tasks to enhance the learning process
        </p>
        <p>Let the test consist of m different tasks, and n students perform the test. Denote by xi,j, j the numerical
score of the success of the j-th task and the i-th student. If the j-th student performed j-th task, then xi,j = 1
to 100 points for the task. Test results in the form of a matrix of results x, which has size [n] [m], are shown
in Table 1: where - i = 1, n - number of students who participated in the test; j = 1, m - number of questions
posed to students.
 0 = ln(  /  ),  =  ,  .
 0 = lm(  /  ),  =  ,  .</p>
        <p />
        <p>By calculating   = ∑ =1</p>
        <p>(the proportion of correct answers of the i-th student for all test items and
knowledge level (that is, the initial score of the knowledge level i-th student in the logit scale):
  = 1 −   – the proportion of incorrect answers), you can determine the initial logit of each student's
By calculating   = ∑ =1</p>
        <p>(the proportion of correct answers of all students in the group to the j-th
task and   = 1 −   – the proportion of incorrect answers), we can determine the initial logit of task
difficulty (that is, the initial estimate of the level of difficulty of the j-th task on the logit scale):</p>
        <p>This stage of parameter estimation is the initial one. After its completion each of the parameters will be
expressed in an interval scale, but with different values of the mean and different standard deviations. At
the next stage we translate the value of  0 and   0 into one interval scale, having previously calculated the
average value of the initial logits of students' knowledge level:</p>
        <p>And the standard deviation V of the distribution of the initial values of the parameter:</p>
        <p>=  0 + ⋯ +   0,
 = √  =1( 0 −  )</p>
        <p>∑
2
We get the formula for calculating the logit complexity of the j-th problem:

 =  +  ∗   0,
 = 1,  ;
(1)
(2)
(3)
(4)
(5)
Similarly, calculating:</p>
        <p>This estimation of the parameter   makes it possible to assess the level of difficulty of all tasks,
regardless of the level of students' proficiency.</p>
        <p>Given the values obtained, we can determine the level of students' knowledge by the difficulty level of
the test tasks. If   −   – is a negative value and large in modulo, then the task difficulty is too hard for a
student with the level of knowledge   and it will not be useful for assessing the level of knowledge   of
the i-th student. If this difference is positive and large modulo, then the problem is too easy, the student
learned the question a long time ago. If   −   so, then the probability that the student will complete the
task correctly is 0.5.</p>
        <p>After estimating the values of   −   in the logit scale, calculate the probability  ( )of different
students completing the jth test item correctly:
(6)
(7)
(8)
(9)
(10)
Where
  ( ) =</p>
        <p>1,7∗( −  )
1 +  1,7∗( −  )</p>
        <p>= ( 1,  2, … ,   ).</p>
        <p>The probability of   correctly completing j-th the test assignment is a rising function of the variable   .
Obviously, the higher a student's level of knowledge, the greater the probability that he or she will correctly
complete j-th the test task.</p>
        <p>By introducing the conditional probability   of different students correctly completing j-th the task, we
can proceed to construct a curve: j-th test task (Figure 8).</p>
        <p>The characteristic curve j-th of the test task shows the relationship between the values of the independent
variable  and the values   . The inflection point of the curve: corresponds to the value 
=   , and at
this  =   point equals 0.5. Thus, a student with a level of knowledge corresponding to the difficulty of
j-th test item will answer it correctly with probability 0.5.</p>
        <p>For students with a level of knowledge much higher than   , the probability of a correct answer to this
task approaches unity. If, however, the value of  is placed far enough away from the value  =   and to
the left of the inflection point, then the probability of correctly completing the j-th task will approach zero.</p>
        <p>The characteristic curves corresponding to tasks of different difficulty levels do not overlap. An increase
in the difficulty of the j-th test item by the constant C (C&gt; 0) will cause the characteristic curve to shift to
the right. With the previous probability, the student with proficiency level  +  will answer this problem.
Since  −  = ( +  )− ( +  ), the value of the function   ( ) does not change. So, if a difficult
problem is taken, the student whose level of proficiency changes by the same constant as the level of
difficulty of the problem will answer it with the same probability.</p>
        <p>The fundamental difference of testing system based on adaptive tests is that the assessment of students'
knowledge level does not depend on the difficulty of the test, that is, it is objective. Assessment of students'
knowledge level can be effectively used to solve problems of optimization of the educational process
evaluation of the effectiveness of innovative technology, monitoring, intelligence of students and teachers.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Conclusion</title>
      <p>The analysis of educational and methodological systems and methods to improve the educational
process aimed at effective solution of the problems of competence, quality of training specialists was
carried out. Based on the results obtained, a scientific and practical study of the effectiveness of software
application on independent computing structures was conducted, which showed a number of positive
points, namely: this approach to the construction of distributed information systems has significant
prospects for the future. The use of independent computing structures makes it possible to use application
software around the clock without worrying about its working condition, because this task is transferred to
third parties during such use. However, this approach to organizing the management and monitoring of the
educational process has its disadvantages, namely: the required level of personal data protection on such
independent platforms has not yet been investigated. Since the information database is located on an
independent computing platform, the owner of the educational platform cannot guarantee security with
respect to external intervention processes. In addition, a computational analysis in terms of the use of
information technology was conducted, which resulted in the justification and improvement of the test
analysis model, which improved the learning process and the quality of education. The application of the
method of analysis to improve the educational process on the basis of information technology was
substantiated. The use of information and communication technologies provides intensification of specialist
training, as a result of which the objectives are achieved, that is, the maximum amount of professional
training for the minimum possible time of processing educational material.
[24] Pasyeka M., Sheketa V., Pasieka N., Chupakhina S. and Dronyuk, I. (2019). “System analysis of caching
requests on network computing nodes.” 3rd International Conference on Advanced Information and
Communications Technologies, AICT2019 - Proceedings, pp. 216-222, doi:10.1109/AIACT.2019.8847909
[25] Pasyeka M., Sviridova T. and Kozak I. “Mathematical model of adaptive knowledge testing”. 5th
International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH 2009,
pp. 96-97.
[26] Pasyeka N., Mykhailyshyn H. and Pasyeka M., “Development Algorithmic Model for optimization of
Distributed Fault-Tolerant Web-Systems,” 2018 International Scientific-Practical Conference Problems of
Infocommunications. Science and Technology (PIC S&amp;T), Kharkiv, Ukraine, 2018, pp. 663-669, doi:
10.1109/INFOCOMMST.2018.8632160.
[27] S. G. Temesio Vizoso, “Open educational resources in an individualized education plan,” 2019 14th Iberian
Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, 2019, pp. 1-3, doi:
10.23919/CISTI.2019.8760670.
[28] S. M. Bhalerao and M. Dalal, “Improved social network aided personalized spam filtering approach using
RBF neural network,” 2017 International Conference on Intelligent Computing and Control (I2C2),
Coimbatore, 2017, pp. 1-5, doi: 10.1109/I2C2.2017.8321938.
[29] S. Papadimitriou, K. Chrysafiadi and M. Virvou, “Evaluating the use of fuzzy logic in an educational game
for offering adaptation,” 2019 International Conference on Computer, Information and Telecommunication
Systems (CITS), Beijing, China, 2019, pp. 1-5, doi: 10.1109/CITS.2019.8862064.
[30] Shepard M.E., Sastre E.A., Davidson M.A. et al, “Use of individualized learning plans among fourth-year
sub-interns in pediatrics and internal medicine.” Med Teach. 2012. pp.316-324
[31] Sikora L., Lysa N., Fedyna B., Durnyak B., Martsyshyn R. and Miyushkovych Y. (2018). “Technologies of
development laser based system for measuring the concentration of contaminants for ecological monitoring.”
Paper presented at the 2018 IEEE 13th International Scientific and Technical Conference on Computer
Sciences and Information Technologies, CSIT 2018 - Proceedings, 1 93-96.
doi:10.1109/STCCSIT.2018.8526602
[32] T. A. Tabishev, M. V. Alikaeva and A. L. Betuganova, “Electronic Informational and Educational
Environment and Organization of the Educational Process of a Modern University (on the Materials of the
Kabardino-Balkar State University),” 2019 International Conference "Quality Management, Transport and
Information Security, Information Technologies" (IT&amp;QM&amp;IS), Sochi, Russia, 2019, pp. 569-572, doi:
10.1109/ITQMIS.2019.8928402.
[33] X. Meng, C. Cui and X. Wang, “Looking Back Before We Move Forward: A Systematic Review of Research
on Open Educational Resources,” 2020 Ninth International Conference of Educational Innovation through
Technology (EITT), Porto, Portugal, 2020, pp. 92-96, doi: 10.1109/EITT50754.2020.00022.
[34] Y. Romanyshyn, V. Sheketa, L. Poteriailo, V. Pikh, N. Pasieka and Y. Kalambet “Social-communication
web technologies in the higher education as means of knowledge transfer.” IEEE 2019 14th International
Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT). – Vol.3.
– 2019. – Lviv, Ukraine. – pp. 35–39.
[35] Zharikova M. &amp; Sherstjuk, V. (2017). “Academic integrity support system for educational institution.” 2017
IEEE 1st Ukraine Conference on Electrical and Computer Engineering, UKRCON 2017 - Proceedings, pp.
1212-1215. doi:10.1109/UKRCON.2017.8100445
[36] Shkitsa, L., Kornuta, V., Kornuta, O., Bekish, I.: The model of informational space for innovation and design
activities in the university. Sci. Innov. 15(6), 14–22 (2019). https://doi.org/10.15407/scin15.06.014Shkitsa,
L., Kornuta, V., Kornuta, O., Bekish, I., Bui, V.: Information support of design innovation activity of the
technical university. Manag. Syst. Prod. Eng. 28(2), 127–132 (2020).
https://doi.org/10.2478/mspe-20200019
[37] Shkitsa L., Kornuta V., Kornuta O., Bui V., Bekish I. (2021) In-campus Way of the Insight Transfer
Technology. In: Ivanov V., Trojanowska J., Pavlenko I., Zajac J., Peraković D. (eds) Advances in Design,
Simulation and Manufacturing IV. DSMIE 2021. Lecture Notes in Mechanical Engineering. Springer,
Cham. https://doi.org/10.1007/978-3-030-77719-7_32
[38] Shkitsa L., Kornuta V., Kornuta O., Bui V., Bekish I. (2021) In-campus Way of the Insight Transfer
Technology. In: Ivanov V., Trojanowska J., Pavlenko I., Zajac J., Peraković D. (eds) Advances in Design,
Simulation and Manufacturing IV. DSMIE 2021. Lecture Notes in Mechanical Engineering. Springer,
Cham. https://doi.org/10.1007/978-3-030-77719-7_32</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ji</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Tu</surname>
          </string-name>
          , “
          <article-title>One Quantifiable Security Evaluation Model for Cloud Computing Platform,” 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD), Lanzhou</article-title>
          , China,
          <year>2018</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>201</lpage>
          , doi: 10.1109/CBD.
          <year>2018</year>
          .
          <volume>00043</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yasmeen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yasmin</surname>
          </string-name>
          and
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Saleem</surname>
          </string-name>
          , “
          <article-title>Cognitive Learning in Outcome-Based Education: A Case Study of Bachelor of Science in Electrical Engineering</article-title>
          ,” 2019
          <source>International Conference on Innovative Computing (ICIC)</source>
          , Lahore, Pakistan,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/ICIC48496.
          <year>2019</year>
          .
          <volume>8966711</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>C. M. C. Rezende</surname>
            ,
            <given-names>A. C. G.</given-names>
          </string-name>
          <string-name>
            <surname>Inocêncio</surname>
          </string-name>
          ,
          <string-name>
            <surname>T. B. De Oliveira</surname>
            and
            <given-names>A. P. F. V.</given-names>
          </string-name>
          <string-name>
            <surname>Boaventura</surname>
          </string-name>
          , “
          <article-title>Educational Technologies for Brazilian Basic Education</article-title>
          ,
          <source>” 2019 14th Iberian Conference on Information Systems and Technologies (CISTI)</source>
          , Coimbra, Portugal,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.23919/CISTI.
          <year>2019</year>
          .
          <volume>8760595</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C. P.</given-names>
            <surname>Morrey</surname>
          </string-name>
          , “
          <article-title>Pathway Mapping for an Educational Program,” 2020 Intermountain Engineering, Technology and Computing (IETC), Orem</article-title>
          ,
          <string-name>
            <surname>UT</surname>
          </string-name>
          , USA,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/IETC47856.
          <year>2020</year>
          .
          <volume>9249219</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wei</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Yuan</surname>
          </string-name>
          , “
          <article-title>Reflection on College Informationized Teaching Model under the Background of Educational Informationization</article-title>
          ,”
          <source>2019 IEEE International Conference on Computer Science and Educational Informatization (CSEI)</source>
          , Kunming, China,
          <year>2019</year>
          , pp.
          <fpage>81</fpage>
          -
          <lpage>83</lpage>
          , doi: 10.1109/CSEI47661.
          <year>2019</year>
          .
          <volume>8939017</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Doko</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Bexheti</surname>
          </string-name>
          , “
          <article-title>A systematic mapping study of educational technologies based on educational data mining and learning analytics</article-title>
          ,
          <source>” 2018 7th Mediterranean Conference on Embedded Computing (MECO)</source>
          ,
          <year>Budva</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/MECO.
          <year>2018</year>
          .
          <volume>8406052</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fox</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jha</surname>
          </string-name>
          , “
          <article-title>Conceptualizing a Computing Platform for Science Beyond 2020: To Cloudify HPC</article-title>
          , or HPCify Clouds?”
          <source>2017 IEEE 10th International Conference on Cloud Computing (CLOUD)</source>
          , Honolulu, CA,
          <year>2017</year>
          , pp.
          <fpage>808</fpage>
          -
          <lpage>810</lpage>
          , doi: 10.1109/CLOUD.
          <year>2017</year>
          .
          <volume>120</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>McGrath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Short</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ennis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Judson</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Brenner</surname>
          </string-name>
          , “
          <article-title>Cloud Event Programming Paradigms: Applications and Analysis</article-title>
          ,
          <source>” 2016 IEEE 9th International Conference on Cloud Computing (CLOUD)</source>
          , San Francisco, CA, USA,
          <year>2016</year>
          , pp.
          <fpage>400</fpage>
          -
          <lpage>406</lpage>
          , doi: 10.1109/CLOUD.
          <year>2016</year>
          .
          <volume>0060</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Soltan</surname>
          </string-name>
          , G. Zunimova and G. Sarsenbayeva, “
          <source>The Algorithm for Designing Competency Oriented Educational Programs Based on the Data Analysis of Academic Processes,” 2020 Ural Symposium on Biomedical Engineering</source>
          , Radioelectronics and Information Technology, Yekaterinburg, Russia,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/USBEREIT48449.
          <year>2020</year>
          .
          <volume>9117787</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Haryono</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Utanto</surname>
          </string-name>
          ,
          <string-name>
            <surname>Budiyono</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Subkhan</surname>
            and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Zulfikasari</surname>
          </string-name>
          , “
          <article-title>The Implementation of Educational Technologists' Competencies in Improving Learning Quality</article-title>
          ,
          <source>” 2019 5th International Conference on Education and Technology (ICET)</source>
          , Malang, Indonesia,
          <year>2019</year>
          , pp.
          <fpage>76</fpage>
          -
          <lpage>80</lpage>
          , doi: 10.1109/ICET48172.
          <year>2019</year>
          .
          <volume>8987215</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J. C.</given-names>
            <surname>Ponce Gallegos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Toscano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Silva</given-names>
            <surname>Sprock</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Muñoz</given-names>
            <surname>Arteaga</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Aguas</surname>
          </string-name>
          , “Educational Inclusion in Higher Education: Mexico,” 2019
          <string-name>
            <given-names>XIV</given-names>
            <surname>Latin</surname>
          </string-name>
          <article-title>American Conference on Learning Technologies (LACLO</article-title>
          ),
          <source>San Jose Del Cabo, Mexico</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>204</fpage>
          -
          <lpage>211</lpage>
          , doi: 10.1109/LACLO49268.
          <year>2019</year>
          .
          <volume>00043</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Renz</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Meinel</surname>
          </string-name>
          , “
          <source>The “Bachelor Project”: Project Based Computer Science Education,” 2019 IEEE Global Engineering Education Conference (EDUCON)</source>
          , Dubai, United Arab Emirates,
          <year>2019</year>
          , pp.
          <fpage>580</fpage>
          -
          <lpage>587</lpage>
          , doi: 10.1109/EDUCON.
          <year>2019</year>
          .
          <volume>8725140</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Chrysafiadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Papadimitriou</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Virvou</surname>
          </string-name>
          , “
          <article-title>Which is better for learning: a web-based educational application or an educational game?” 2019 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS</article-title>
          ), Berlin, Germany,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.23919/SPECTS.
          <year>2019</year>
          .
          <volume>8823232</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yin</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Wei</surname>
          </string-name>
          , “
          <article-title>Curriculum Design with the Integration of STEAM and Educational Game</article-title>
          ,” 2020
          <source>International Symposium on Educational Technology (ISET)</source>
          , Bangkok, Thailand,
          <year>2020</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>129</lpage>
          , doi: 10.1109/ISET49818.
          <year>2020</year>
          .
          <volume>00036</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bahrami</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Singhal</surname>
          </string-name>
          , “
          <article-title>A dynamic cloud computing platform for eHealth systems</article-title>
          ,” 2015 17th
          <string-name>
            <given-names>International</given-names>
            <surname>Conference on E-health</surname>
          </string-name>
          <string-name>
            <surname>Networking</surname>
          </string-name>
          ,
          <source>Application &amp; Services (HealthCom)</source>
          , Boston, MA, USA,
          <year>2015</year>
          , pp.
          <fpage>435</fpage>
          -
          <lpage>438</lpage>
          , doi: 10.1109/HealthCom.
          <year>2015</year>
          .
          <volume>7454539</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Pasyeka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sheketa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Pasieka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chupakhina</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Dronyuk</surname>
          </string-name>
          , “
          <source>System Analysis of Caching Requests on Network Computing Nodes,” 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          , Lviv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>216</fpage>
          -
          <lpage>222</lpage>
          , doi: 10.1109/AIACT.
          <year>2019</year>
          .
          <volume>8847909</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhao</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gao</surname>
          </string-name>
          , “
          <article-title>Exploring the Training Path of Design Thinking of Students in Educational Technology</article-title>
          ,” International Conference on Computer Science and Educational Informatization, Kunming, China,
          <year>2019</year>
          , pp.
          <fpage>315</fpage>
          -
          <lpage>319</lpage>
          , doi: 10.1109/CSEI47661.
          <year>2019</year>
          .
          <volume>8938895</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Medykovskyy</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            <given-names>N.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Turchyn</surname>
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>“Scientific research of life cycle perfomance of information technology</article-title>
          .
          <source>” 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</source>
          ,
          <string-name>
            <surname>CSIT</surname>
          </string-name>
          <year>2017</year>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>428</lpage>
          . doi:
          <volume>10</volume>
          .1109/STCCSIT.
          <year>2017</year>
          .8098821
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Mykhailyshyn</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheketa</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondur</surname>
            <given-names>O.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Varvaruk</surname>
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>“Designing network computing systems for intensive processing of information flows of data</article-title>
          ” doi:10.1007/978-3-
          <fpage>030</fpage>
          - 43070-2_
          <fpage>18</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mishchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tkachenko</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Izonin</surname>
          </string-name>
          , “
          <article-title>Missing Data Imputation through SGTM Neural-Like Structure for Environmental Monitoring Tasks</article-title>
          .”
          <source>Advances in Intelligent Systems and Computing</source>
          . Vol.
          <volume>938</volume>
          .
          <year>2020</year>
          , pp.
          <fpage>142</fpage>
          -
          <lpage>151</lpage>
          , doi:10.1007/978-3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>P.</given-names>
            <surname>Chou</surname>
          </string-name>
          , “Little Engineers:
          <article-title>Young Children's Learning Patterns in an Educational Robotics Project</article-title>
          ,” 2018
          <string-name>
            <given-names>World</given-names>
            <surname>Engineering Education Forum - Global Engineering Deans Council (WEEF-GEDC</surname>
          </string-name>
          <string-name>
            <surname>)</surname>
          </string-name>
          , Albuquerque,
          <string-name>
            <surname>NM</surname>
          </string-name>
          , USA,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/WEEF-GEDC.
          <year>2018</year>
          .
          <volume>8629609</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lushyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sukhenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Davydova</surname>
          </string-name>
          , “
          <article-title>Particularities of Students' Educational Trajectories and “Projectories”: A Psychosemantic Dimension</article-title>
          ,”
          <source>2020 IEEE Problems of Automated Electrodrive. Theory and Practice (PAEP)</source>
          , Kremenchuk, Ukraine,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/PAEP49887.
          <year>2020</year>
          .
          <volume>9240866</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Pasieka</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheketa</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romanyshyn</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasieka</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Domska</surname>
            <given-names>U.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Struk</surname>
            <given-names>A.</given-names>
          </string-name>
          “
          <article-title>Models, methods and algorithms of web system architecture optimization</article-title>
          .”
          <article-title>Paper presented at the 2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology</article-title>
          , PIC S and T 2019 - pp.
          <fpage>147</fpage>
          -
          <lpage>152</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST47496.
          <year>2019</year>
          .9061539
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>