=Paper= {{Paper |id=Vol-2917/paper6 |storemode=property |title=Activating the Process of Educational Services Using Independent Computing Resources to Manage and Monitor the Quality of Learning |pdfUrl=https://ceur-ws.org/Vol-2917/paper6.pdf |volume=Vol-2917 |authors=Nadiia Pasieka,Nelly Lysenko,Oleksandra Lysenko,Vasyl Sheketa,Mykola Pasieka,Mariana Varvaruk |dblpUrl=https://dblp.org/rec/conf/momlet/PasiekaLLSPV21 }} ==Activating the Process of Educational Services Using Independent Computing Resources to Manage and Monitor the Quality of Learning== https://ceur-ws.org/Vol-2917/paper6.pdf
Activating the Process of Educational Services Using
Independent Computing Resources to Manage and Monitor the
Quality of Learning
Nadiia Pasieka1, Nelly Lysenko1, Oleksandra Lysenko1, Vasyl Sheketa2, Mykola Pasieka2
and Mariana Varvaruk1
1
    Vasyl Stefanyk Precarpathian National University, Ivano-Frankivsk, 76000, Ukraine,
2
    National Tech. University of Oil & Gas, Ivano-Frankivsk, 76068, Ukraine


                 Abstract
                 The educational and methodological systems and methods aimed at enhancing the educational
                 process are analyzed. These methods and techniques are designed to effectively solve
                 problems, the quality and training of specialists on the basis of integrated methods, as well as
                 improving the content, forms and methods of organizational educational process,
                 implementing current trends. Based on these results, scientific research and practical research
                 on the effectiveness of software application on independent computing structures showed many
                 positive aspects, that is, this method has broad prospects for the construction of distributed
                 information systems. The use of an independent computing structure allows the application
                 software to be used around the clock without worrying about its working condition, since this
                 task was outsourced to a third party when used. However, this way of organizing the
                 management and monitoring of the educational process has its drawbacks, that is, the necessary
                 level of protection of personal data on such independent platforms is not studied. Since the
                 information database is located on an independent computing platform, the owner of the
                 educational platform cannot guarantee the security of the process of external intervention. In
                 addition, the use of information technology has been calculated and analyzed to prove and
                 improve the model of enhancing the learning process, thereby improving the learning process
                 and enhancing the quality of education.

                 Keywords 1
                 higher school, learning, quality of education, information technologies, management of higher
                 education institution.

1. Introduction
    With the rapid development of information and communication technologies, the expansion of free
cloud services is becoming relevant to the application and introduction of the latest information services
in industrial use on the basis of common use of competitive technologies. Taking this into account,
there is an urgent need to outsource information and communication technologies – cloud services (IT-
services) in the development. [2, 8, 17] The concept of "IT-outsourcing" provides the transfer of any IT
process (program, function, work) or a certain part of a third party organization, which provides
professional IT-services on an independent computer platform, it supports the functioning of
information and reference, expert systems, information security databases and databases of enterprises,
storage and processing of significant amounts of data, provision of hardware resources. Outsourcing

MoMLeT+DS 2021: 3rd International Workshop on Modern Machine Learning Technologies and Data Science, June 5, 2021, Lviv-Shatsk,
Ukraine
EMAIL: pasyekanm@gmail.com (N. Pasieka); nelli.lysenko@gmail.com (N. Lysenko); lysenkowa@gmail.com (O. Lysenko);
vasylsheketa@gmail.com (V. Sheketa); pms.mykola@gmail.com (M. Pasieka); varvaruk.mariana@gmail.com (M. Varvaruk)
ORCID: 000-0002-4824-2370 (N. Pasieka); 0000−0002−1029−7843 (N. Lysenko); 0000−0002−1029−7843 (O. Lysenko);
0000−0002−1318−4895 (V. Sheketa); 0000−0002−3058−6650 (M. Pasieka); 0000-0002-9606-9146 (M. Varvaruk)
              ©️ 2021 Copyright for this paper by its authors.
              Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
              CEUR Workshop Proceedings (CEUR-WS.org)
solves the issue of reducing the financial and time costs of implementation, support and modernization
of IT-infrastructure. It ensures the convergence of information and communication media, namely, the
convergence of various electronic technologies to increase business requirements for stability and
availability of IT- services. [11]
    To develop a software system using cloud technologies, the development team must develop a
structural scheme that defines the main functional properties of the software system, their interrelation
and purpose. The functionality of a software system is understood as the components of the system
elements, devices, functional groups, functional links. Building a structural scheme, which is designed
to reflect the overall structure of the project (task in hand), is the development of its main blocks, nodes,
parts and formation of the main links between them. From the structural scheme of software
development of the system with the use of cloud technologies it should be clear how the system works
in the main modes of operation and how its parts interact. The designations of the structural scheme
elements can be chosen arbitrarily, though the generally accepted rules of scheme execution should be
observed as much as possible. [13, 26]
    Cloud computing is a free way to access external information and communication resources in the
form of various Internet services. The term “cloud computing” was proposed by Ramnath K. Chellappa,
who noted it as a computational paradigm in which the boundaries of computational elements will
depend on the economic feasibility, not only on technical limitations [25]. The appearance of the first
technology, which provided access to applications through the site, namely the software systems as a
service (Software as a Service [SaaS]).
    The urgency of development of distributed software systems on the basis of cloud technology lies
in the fact that the need for modern high-performance systems is constantly growing and the methods
of their correct development and algorithms of supporting computational work on independent
computing platforms at the peak moments of the load are very few. [5, 6, 16] The study focuses on the
most controversial modern challenges in the development of software systems based on cloud
technology, faced by architects of such systems, namely, the algorithms of moving the load between
the computing nodes and the architectures of software organization within the framework of business
logic of enterprises. The use of the proposed technique on independent computing platforms for the
development of fault-tolerant software systems based on cloud technology allows us to expand the
worldview approaches to the construction of productive mechanisms of distribution of computational
load between the nodes of the corresponding system. [1, 4, 9, 10, 12] Taking into account the
insufficient research of this subject area we understand that the successful algorithm of the mechanism
of transferring the computational load which promotes the effective modification of this resource within
the framework of the task in hand is the main criterion in the choice of program technologies by the
architect of program systems (Figure 1).




  Figure 1: The model of fault-tolerant distributed software system based on cloud technologies
   Methods: System analysis, logical mathematical approach to assessing the level of difficulty of test
questions for an objective analysis of their complexity, analysis of publications on the topic,
comparison, generalization of cognitive and negative features of similar approaches and critical testing
of the proposed development, cluster analysis of test questions, reasoning based on precedents.

2. Practical deploying educational services on a cloud platform to
   management and monitoring the quality of learning
   With the rapid development of information technologies, other models of provision and use of cloud
services on independent computing platforms were further developed (Figure 2) [31].




   Figure 2: The model of cloud services on independent computing platforms
   The evolutionary development of existing service models in particular:
   •     Hardware as a Service (HaaS) - hardware;
   •     Security as a Service (SECaaS) - providing security;
   •     Backend as a Service (BaaS) – “backend”;
   •     Recovery as a Service (RaaS) - recovery of programs and data;
   •     Data as a Service (DaaS) - data acquisition and processing;
   •     Logging as a Service (LaaS) - authorization and identification;
   •     Network as a Service (NaaS) - network technologies;
   •     Platform as a Service (PaaS) - computing platform;
   •     Desktop as a Service (DaaS) - desktop;
   •     Storage as a Service (STaaS) - storages and databases;
   •     API as a Service (APIaaS) - API (application programming interface).
   Some of the listed services provided by independent computing platforms are aimed at using a
limited number of specialists as developers and administrators, while others are successfully used by
consumers in a wide range of their activities. [23]
   Development of software systems using cloud technologies refers not only to software modules, but
also to ensuring their effective delivery of the developed software module as a component of the
software system to interested users, and at the same time contains the stages of deployment and
maintenance of software modules. However, the service-oriented architecture does not consider how
the developed application should be delivered to the interested users or how independent providers of
computing services will efficiently manage the software modules during their execution. Cloud
computing on independent platforms can help SOSE deliver software modules efficiently by ensuring
that they can be easily deployed and maintained by cloud service providers through virtualization, using
a standardized interface for easy access by interested users and using software modules as part of a
developed cloud-based software system.
   Challenges for software development
   Today's paradigms in software development using independent computing platforms require
innovative approaches to providing efficient virtualization and interaction between the layers of SaaS,
PaaS and IaaS. The essence of this approach calls for a rethinking of urgent issues in software
engineering, but some of them are not new, and at the same time they require more serious attention in
the context of providing computing services on cloud platforms. We noted seven critical areas in the
development that create serious obstacles to the development of software modules using SOSE.
    Confidentiality and data integrity
    By using independent cloud computing platforms, interested users have limited control over the
processing and storage of data streams, i.e. on remote computing nodes owned and operated by various
cloud service providers. Since these data streams are not encrypted, there is a significant risk that cloud
service providers or malware may disclose or alter their content. While there are many methods to protect
your privacy, all of them cannot fully guarantee it, but when applying a certain model of protection to
cloud services and systems, you must remember that they are only designed to protect your data flows
from malicious attacks outside the system [14]. Cloud services and software on independent platforms
have different providers of these services within the virtual system.
    Reliability and availability of cloud platforms as services
    Stakeholders rely heavily on independent cloud service providers for business logic solutions. There
are growing concerns in the information space about how these information threats can affect the
reliability and availability of cloud platforms as a service - from the uncertain economic climate of
society as a whole, and of the service provider in particular, to natural and man-made disasters and
cyberattacks - can have a significant impact on the service, and therefore on the business, of the cloud
user. To minimize these information threats, independent cloud service users must test their data backup
plan, system reliability, disaster recovery and disaster recovery plans. To minimize these information
threats, independent cloud service users must verify their data backup plan, overall system reliability,
emergency exit and software system recovery plans, end-of-service support, and event history
documentation before deciding to use certain services. [20, 21, 28] Today, a variety of cyberattacks are
an extremely critical threat. Independent cloud computing services and systems provide fast and flexible
computing resources to meet the business needs of interested users. For the business community, the
computing capabilities and resources of independent cloud service providers often seem unlimited, as
they are available at any time and in any volume. However, information-cyberattack software can also
buy significant amounts of cloud computing resources that enable them to launch more powerful
cyberattacks. Attackers have already used the Amazon EC2 and Google App Engine cloud computing
platforms. To solve this problem, both for the services themselves and for independent cloud service
providers, innovative and effective software tools are needed to monitor and detect harmful actions
against users, as well as to strictly authenticate users and control their access.
    Security in a multitasking cloud
    In the developed software systems with the use of cloud technologies on independent computing
platforms in a multifunctional device one copy of the software module runs on the server, which can
have several users or tenants at the same time. In the multilayer architecture the software system is
developed practically separates its information data and configuration, where each interested user works
with an individual sample of the virtual software module.
    Services and systems of cloud computing on independent computing platforms have a multi order,
because many interested users repeatedly use the software module and a set of hardware for processing
information flows. The main problem with cloud data flow protection platforms and developed software
systems is the vulnerability to cyberattacks. To provide the necessary level of protection, service
providers use a hypervisor that controls access between virtual machines and hardware and software.
However, some hardware and software tools, such as processor caches and graphics processors, are not
designed to provide strong insulation properties for multilayer architecture. Even virtual machine
hypervisors, which are provided by an independent cloud service provider, may have some flaws that
allow the virtual machine of one interested user to gain unauthorized control over other tasks and data
flows. More recently, cybercriminals have exploited multiple hypervisor vulnerabilities to affect other
users' computing operations or to gain unauthorized access to data sets. Therefore, addressing these
vulnerabilities requires innovative methods of developing software systems to provide multilayer
architectures for cloud-based services, such as virtual machine isolation and monitoring.
    Cloud risk profile
    Cloud-based software systems developed on independent computing platforms have limited access
to services and cloud computing, as well as information on internal system architecture, software module
versions, configuration, operations and related security practices of these service providers. This limited
access for interested users can increase usability, but it also has serious limitations for operational risk
management. Risk management in software engineering ensures that module developers initially identify
and analyse threats to the software module business process and use appropriate strategies to minimize
and control risks. Namely, how the failure to complete projects within the specified time schedules and
budget constraints, as well as not fully meet the requirements of interested users. Since software
developers using cloud technology lack information about the internal organization of the system under
the layer of virtual abstraction, they may not be able to conduct appropriate research on risk management.
To solve this problem, software developers should turn to independent cloud service providers and
consider three steps:
     partial or full disclosure of software design and infrastructure information;
     Disclosure of relevant logs and data such as network intrusion logs, anomaly logs and security
       logs;
     Disclosure of security policy details and enforcement mechanisms.
    Taking a professional look at these steps will not completely eliminate the risk, but the information
obtained will provide much more effective business risk management.
    Monitoring the quality of cloud service delivery
    Independent providers of cloud platforms as services and management of various QoS software
requirements are extremely difficult to manage, as numerous software module developers dynamically
create services in networks to form several computing workflows, and different cloud technology
providers with different methods and policies manage services in different ways. As a result, the QoS
functions of all cloud services are closely linked and there are trade-offs between them.
    Thus, the functions responsible for the bandwidth and latency of a particular service rely on the
distribution of information resources of the developed software system during the execution of the
module. Often, a single server hosts multiple services that compete for CPU time, memory and server
bandwidth. In addition, service compositions, the status of server resources, workflow priorities and QoS
requirements usually change dynamically during cloud computing. So, meeting QoS requirements for
multiple computing processes requires effective methods of adaptive allocation of system resources for
each cloud service. Managing multiple QoS properties for such developed software, services and cloud
computing systems requires situational awareness, context analysis and QoS assessment, as well as
optimal hardware and software resource allocation. [18, 22]
    Internet Things as Cloud Services Delivery Systems
    When developing software systems using cloud technology, the main criterion is the network,
because users or software systems are located on different hardware devices, namely: desktops, laptops,
smartphones, tablets and personal computers, that is, they can access network services at any time and
in any place with the help of standard protocols of information exchange. Since identity theft and service
theft are major threats, mobile services and computing providers in independent cloud platforms require
rigorous software development techniques to provide unrestricted access to computing data services. [3]
    Cloud platform legislation
    Users who use cloud computing services and systems on independent platforms do not know the
exact physical and geographical location of their data because they have often processed and stored data
in undefined locations, both domestic and foreign. However, legally, each territory has a different
legislative jurisdiction, and independent cloud service providers in foreign countries cannot always
guarantee compliance with regulatory and legal requirements. This can be, for example, protection of
privacy, backup of information data or the provision of audits and the like. Thus, independent cloud
service providers may not be prepared to take responsibility for security incidents, failure to comply with
data backup requirements, and the provision of audits. They may also not be able to protect intellectual
property according to compliance standards.
    While computing services and cloud computing have great potential, there are some criticisms of
meeting the increasing demands for dynamic development and use of software modules, and the full
realization of this potential requires a change in the structure of software development.


3. Practical deploying educational services on a cloud platform to management
   and monitoring the quality of learning

  3.1. Information support of the learning process and its management
    The problem of effective or assured functioning of integrated systems of organizational and production
direction is related to both technological components and the ability of personnel to make decisions. That
is, the level of professional training of operators of different authority ranks is one of the decisive criteria
for the functioning of the integrated hierarchical information management system of a higher educational
institution.
   The professional level of pedagogical and production personnel is based on the knowledge base obtained
in school, so it is developed on the basis of subject-oriented theoretical knowledge obtained in higher
education and in the process of special training or mobile trainings. As practice of work of the personnel in
various conditions (extreme, marginal) shows, not all cope with technological tasks for a number of reasons
(physiological, mental, cognitive), that is such workers in extreme conditions cannot effectively use the
acquired knowledge given some features of thinking or behavior [33, 36, 38].
   The analysis showed that for an effective management strategy it is necessary to consider, in addition to
technological requirements, the ability of administrative personnel to make decisions in different situations
[32, 37]. This ability is closely related to intelligence, psychology, professional training, the level of mental
and intellectual stability and way of thinking in making decisions with appropriate information support.
   Types of thinking in terms of levels of cognition (sensory and rational) can be reflected in the following
order:
     philosophical theoretical thinking at the verbal-logical level;
     generation of ideas and hypotheses regarding problem-solving schemes;
     visual (figurative) thinking - action thinking, in which the solution of problems is carried out by real
        transformation of the situation in the target with the observation of the motor act;
     visual-imaginative thinking - is associated with the representation of situations and their changes as
        a result of activity, taking into account the acting factors and completing the various characteristics
        of objects;
     analytical (logical) thinking, its dynamics and structuring are determined by the hierarchy of levels
        of goal orientation, a real assessment of the situation, effective purposeful search for a scheme of
        problem solving;
     heuristic as an egocentric disoriented inner thinking of a person.
   Thus, information support for the learning and management process of the university is a process of
determining the strategic content, search, collection, processing and presentation of necessary information
in an informative form. The use of information technology ensures the intensification of the learning
process and provides an opportunity to improve the effectiveness of the educational level of the specialist
[29].

  3.2. Software service of the learning management process
   To prove the effectiveness of using computer services on independent computing platforms to monitor
and manage the learning process we deploy a specialized software application whose work is shown in
(Figure 3-6). This specialized computer application can be used both for students (trainees) and teachers
[19, 30]. It allows you to interactively select from an information database only the information you need
at the moment.




  Figure 3: An example of a robot program: “Information about students”
Figure 4: An example of a robot program: “Information about students”




Figure 5: An example of a robot program: “By date interval”
   Figure 6: An example of a robot program: “In the context of the subjects studied”
   Besides, at the further expansion of functionality of the given software application with use of
storehouses of the data where the information on all listeners and teachers for the certain interval of time
will be stored, there will be a possibility of analytical processing of these data for support of acceptance of
administrative decisions for the purpose of improvement of ways of delivering the educational content and
thereby to provide possibility to influence improvement of quality of rendering of educational services.

4. Logical and mathematical model for assessing the level of difficulty of test
   tasks to enhance the learning process
    Let the test consist of m different tasks, and n students perform the test. Denote by xi,j, j the numerical
score of the success of the j-th task and the i-th student. If the j-th student performed j-th task, then xi,j = 1
to 100 points for the task. Test results in the form of a matrix of results x, which has size [n] [m], are shown
in Table 1: where - i = 1, n - number of students who participated in the test; j = 1, m - number of questions
posed to students.

Table 1
The result of the test of students in relation to question numbers
          1    2    3    4    5    6    7    8     9    10    11   12   13   14   15   16   17   18    19   20   21

 St. 1    84   50   92   87   91   77   94   90    98   100   96   97   86   94   85   42   79   100   88   91   86
 St. 2    80   48   80   77   88   74   78   92    69   98    77   80   84   88   83   64   69   98    84   88   80
 St. 3    90   93   87   92   93   75   94   100   78   89    84   82   92   95   97   52   93   100   94   96   91
 St. 4    77   65   58   75   72   84   81   66    71   67    83   98   74   85   88   79   83   100   77   86   78
 St. 5    66   60   63   54   72   65   80   65    63   61    74   80   70   84   78   69   67   100   74   68   71
 St. 6    55   51   64   67   72   68   83   55    39   64    67   64   69   85   77   57   65   90    65   57   69
 St. 7    80   52   88   87   92   79   94   92    90   94    90   92   84   90   84   68   79   92    85   89   82
 St. 8    77   76   84   75   82   74   83   90    74   90    80   77   86   84   85   76   82   89    83   86   82
 St. 9    88   90   85   88   90   78   92   96    76   86    88   83   87   90   90   77   92   96    92   92   88
 St. 10   82   74   66   82   76   88   84   69    78   87    83   80   86   88   84   85   81   74    68   82   78
 St. 11   77   69   74   65   72   78   86   63    69   79    76   74   78   82   69   78   84   97    87   83   77

 St. 12   69   71   72   74   74   70   81   65    77   84    82   68   72   64   61   76   70   95    71   67   76
   Graphical representation of the results of the test in relation to the quality of the questions is shown in
(Figure 7).




    Figure 7: Visualization of the quality of the questions posed to determine the level of knowledge
of students
                         ∑𝑚 𝑋𝑖𝑗
   By calculating 𝑝𝑖 = 𝑗=1  𝑚
                                   (the proportion of correct answers of the i-th student for all test items and
𝑞𝑖 = 1 − 𝑝𝑖 – the proportion of incorrect answers), you can determine the initial logit of each student's
knowledge level (that is, the initial score of the knowledge level i-th student in the logit scale):
                                        𝛳𝑖0 = ln (𝑝𝑖 /𝑞𝑖 ), 𝑖 = 𝑙, 𝑛.                                        (1)
                         ∑𝑚
                          𝑗=1 𝑋𝑖𝑗
    By calculating 𝑝𝑗 =               (the proportion of correct answers of all students in the group to the j-th
                                𝑚
task and 𝑞𝑗 = 1 − 𝑝𝑗 – the proportion of incorrect answers), we can determine the initial logit of task
difficulty (that is, the initial estimate of the level of difficulty of the j-th task on the logit scale):
                                       𝛿𝑗0 = lm (𝑝𝑗 /𝑞𝑗 ), 𝑗 = 𝑙, 𝑚.                                         (2)
   This stage of parameter estimation is the initial one. After its completion each of the parameters will be
expressed in an interval scale, but with different values of the mean and different standard deviations. At
the next stage we translate the value of 𝛳𝑖0 and 𝛿𝑗0 into one interval scale, having previously calculated the
average value of the initial logits of students' knowledge level:
                                            𝛳 = 𝛳𝑖0 + ⋯ + 𝛳𝑛0 ,                                              (3)
   And the standard deviation V of the distribution of the initial values of the parameter:
                                                                  2
                                              ∑𝑛 (𝛳0 − 𝛳)
                                         𝑉 = √ 𝑖=1 𝑖      ,                                                  (4)
                                                  𝑛−1
   We get the formula for calculating the logit complexity of the j-th problem:
                                         𝛿𝑗 = 𝛳 + 𝑌 ∗ 𝛿𝑗0 ,      𝑗 = 1, 𝑚;                                   (5)
   Where
                                                               1/2
                                                       𝑉2
                                             𝑌 = (1 +      )          .                                     (6)
                                                      2,89
   Similarly, calculating:
                                                                  2                      1/2
                      𝛿10 + ⋯ + 𝛿𝑚
                                 0       ∑𝑚     0
                                          𝑗=1(𝛿𝑗 − 𝛿)                              𝑊2
                   𝛿=              ,…𝑊 =              ,                   𝑋 = (1 +      )      .            (7)
                            𝑚               𝑚−1                                    2,89
   We get a formula to calculate the logit level of knowledge i-th student:
                                    𝛳𝑖 = 𝛿 + 𝑋 ∗ 𝛳𝑖0 ,       𝑖 = 1, 𝑛.                                      (8)
   This estimation of the parameter 𝛿𝑗 makes it possible to assess the level of difficulty of all tasks,
regardless of the level of students' proficiency.
   Given the values obtained, we can determine the level of students' knowledge by the difficulty level of
the test tasks. If 𝛳𝑖 − 𝛿𝑗 – is a negative value and large in modulo, then the task difficulty is too hard for a
student with the level of knowledge 𝛿𝑗 and it will not be useful for assessing the level of knowledge 𝛳𝑖 of
the i-th student. If this difference is positive and large modulo, then the problem is too easy, the student
learned the question a long time ago. If 𝛳𝑖 − 𝛿𝑗 so, then the probability that the student will complete the
task correctly is 0.5.
   After estimating the values of 𝛳𝑖 − 𝛿𝑗 in the logit scale, calculate the probability 𝑃(𝛳) of different
students completing the jth test item correctly:
                                                           𝑒 1,7∗(𝛳−𝛿𝑗)
                                              𝑃𝑗 (𝛳) =                                                      (9)
                                                         1 + 𝑒 1,7∗(𝛳−𝛿𝑗)
   Where
                                                𝛳 = (𝛳1 , 𝛳2 , … , 𝛳𝑛 ).                                  (10)
   The probability of 𝑃𝑗 correctly completing j-th the test assignment is a rising function of the variable 𝛳𝑖 .
Obviously, the higher a student's level of knowledge, the greater the probability that he or she will correctly
complete j-th the test task.
   By introducing the conditional probability 𝑃𝑗 of different students correctly completing j-th the task, we
can proceed to construct a curve: j-th test task (Figure 8).




   Figure 8: Characteristic curve of the j-th task
   The characteristic curve j-th of the test task shows the relationship between the values of the independent
variable  and the values 𝑃𝑗 . The inflection point of the curve: corresponds to the value 𝛳 = 𝛿𝑗 , and at
this 𝛳 = 𝛿𝑗 point equals 0.5. Thus, a student with a level of knowledge corresponding to the difficulty of
j-th test item will answer it correctly with probability 0.5.
    For students with a level of knowledge much higher than 𝛿𝑗 , the probability of a correct answer to this
task approaches unity. If, however, the value of  is placed far enough away from the value 𝛳 = 𝛿𝑗 and to
the left of the inflection point, then the probability of correctly completing the j-th task will approach zero.
    The characteristic curves corresponding to tasks of different difficulty levels do not overlap. An increase
in the difficulty of the j-th test item by the constant C (C> 0) will cause the characteristic curve to shift to
the right. With the previous probability, the student with proficiency level 𝛳 + 𝐶 will answer this problem.
Since 𝛳 − 𝛿 = (𝛳 + 𝐶) − (𝛿 + 𝐶), the value of the function 𝑃𝑗 (𝛳) does not change. So, if a difficult
problem is taken, the student whose level of proficiency changes by the same constant as the level of
difficulty of the problem will answer it with the same probability.
    The fundamental difference of testing system based on adaptive tests is that the assessment of students'
knowledge level does not depend on the difficulty of the test, that is, it is objective. Assessment of students'
knowledge level can be effectively used to solve problems of optimization of the educational process -
evaluation of the effectiveness of innovative technology, monitoring, intelligence of students and teachers.

   Conclusion
    The analysis of educational and methodological systems and methods to improve the educational
process aimed at effective solution of the problems of competence, quality of training specialists was
carried out. Based on the results obtained, a scientific and practical study of the effectiveness of software
application on independent computing structures was conducted, which showed a number of positive
points, namely: this approach to the construction of distributed information systems has significant
prospects for the future. The use of independent computing structures makes it possible to use application
software around the clock without worrying about its working condition, because this task is transferred to
third parties during such use. However, this approach to organizing the management and monitoring of the
educational process has its disadvantages, namely: the required level of personal data protection on such
independent platforms has not yet been investigated. Since the information database is located on an
independent computing platform, the owner of the educational platform cannot guarantee security with
respect to external intervention processes. In addition, a computational analysis in terms of the use of
information technology was conducted, which resulted in the justification and improvement of the test
analysis model, which improved the learning process and the quality of education. The application of the
method of analysis to improve the educational process on the basis of information technology was
substantiated. The use of information and communication technologies provides intensification of specialist
training, as a result of which the objectives are achieved, that is, the maximum amount of professional
training for the minimum possible time of processing educational material.

   References
[1] A. Sun, G. Gao, T. Ji and X. Tu, “One Quantifiable Security Evaluation Model for Cloud Computing
    Platform,” 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD), Lanzhou, China,
    2018, pp. 197-201, doi: 10.1109/CBD.2018.00043.
[2] A. Yasmeen, M. Yasmin and M. S. Saleem, “Cognitive Learning in Outcome-Based Education: A Case
    Study of Bachelor of Science in Electrical Engineering,” 2019 International Conference on Innovative
    Computing (ICIC), Lahore, Pakistan, 2019, pp. 1-5, doi: 10.1109/ICIC48496.2019.8966711.
[3] C. M. C. Rezende, A. C. G. Inocêncio, T. B. De Oliveira and A. P. F. V. Boaventura, “Educational
    Technologies for Brazilian Basic Education,” 2019 14th Iberian Conference on Information Systems and
    Technologies (CISTI), Coimbra, Portugal, 2019, pp. 1-5, doi: 10.23919/CISTI.2019.8760595.
[4] C. P. Morrey, “Pathway Mapping for an Educational Program,” 2020 Intermountain Engineering,
    Technology     and     Computing      (IETC),    Orem,      UT,    USA,    2020,     pp.   1-5,  doi:
    10.1109/IETC47856.2020.9249219.
[5] C. Wei and L. Yuan, “Reflection on College Informationized Teaching Model under the Background of
    Educational Informationization,” 2019 IEEE International Conference on Computer Science and
    Educational     Informatization     (CSEI),     Kunming,      China,    2019,    pp.     81-83,  doi:
    10.1109/CSEI47661.2019.8939017.
[6] E. Doko and L. A. Bexheti, “A systematic mapping study of educational technologies based on educational
     data mining and learning analytics,” 2018 7th Mediterranean Conference on Embedded Computing
     (MECO), Budva, 2018, pp. 1-4, doi: 10.1109/MECO.2018.8406052.
[7] G. Fox and S. Jha, “Conceptualizing a Computing Platform for Science Beyond 2020: To Cloudify HPC, or
     HPCify Clouds?” 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, CA,
     2017, pp. 808-810, doi: 10.1109/CLOUD.2017.120.
[8] G. McGrath, J. Short, S. Ennis, B. Judson and P. Brenner, “Cloud Event Programming Paradigms:
     Applications and Analysis,” 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San
     Francisco, CA, USA, 2016, pp. 400-406, doi: 10.1109/CLOUD.2016.0060.
[9] G. Soltan, G. Zunimova and G. Sarsenbayeva, “The Algorithm for Designing Competency Oriented
     Educational Programs Based on the Data Analysis of Academic Processes,” 2020 Ural Symposium on
     Biomedical Engineering, Radioelectronics and Information Technology, Yekaterinburg, Russia, 2020, pp.
     1-4, doi: 10.1109/USBEREIT48449.2020.9117787.
[10] Haryono, Y. Utanto, Budiyono, E. Subkhan and S. Zulfikasari, “The Implementation of Educational
     Technologists' Competencies in Improving Learning Quality,” 2019 5th International Conference on
     Education      and    Technology     (ICET),    Malang,     Indonesia,    2019,    pp.    76-80,     doi:
     10.1109/ICET48172.2019.8987215.
[11] J. C. Ponce Gallegos, B. A. Toscano, A. Silva Sprock, J. Muñoz Arteaga and N. Aguas, “Educational
     Inclusion in Higher Education: Mexico,” 2019 XIV Latin American Conference on Learning Technologies
     (LACLO), San Jose Del Cabo, Mexico, 2019, pp. 204-211, doi: 10.1109/LACLO49268.2019.00043.
[12] J. Renz and C. Meinel, “The “Bachelor Project”: Project Based Computer Science Education,” 2019 IEEE
     Global Engineering Education Conference (EDUCON), Dubai, United Arab Emirates, 2019, pp. 580-587,
     doi: 10.1109/EDUCON.2019.8725140.
[13] K. Chrysafiadi, S. Papadimitriou and M. Virvou, “Which is better for learning: a web-based educational
     application or an educational game?” 2019 International Symposium on Performance Evaluation of
     Computer and Telecommunication Systems (SPECTS), Berlin, Germany, 2019, pp. 1-6, doi:
     10.23919/SPECTS.2019.8823232.
[14] L. He, Q. Liang, R. Wang, Z. Yin and X. Wei, “Curriculum Design with the Integration of STEAM and
     Educational Game,” 2020 International Symposium on Educational Technology (ISET), Bangkok, Thailand,
     2020, pp. 127-129, doi: 10.1109/ISET49818.2020.00036.
[15] M. Bahrami and M. Singhal, “A dynamic cloud computing platform for eHealth systems,” 2015 17th
     International Conference on E-health Networking, Application & Services (HealthCom), Boston, MA, USA,
     2015, pp. 435-438, doi: 10.1109/HealthCom.2015.7454539.
[16] M. Pasyeka, V. Sheketa, N. Pasieka, S. Chupakhina and I. Dronyuk, “System Analysis of Caching Requests
     on Network Computing Nodes,” 2019 3rd International Conference on Advanced Information and
     Communications        Technologies    (AICT),     Lviv,    Ukraine,    2019,     pp.    216-222,     doi:
     10.1109/AIACT.2019.8847909.
[17] M. Qian, B. Zhao and Y. Gao, “Exploring the Training Path of Design Thinking of Students in Educational
     Technology,” International Conference on Computer Science and Educational Informatization, Kunming,
     China, 2019, pp. 315-319, doi: 10.1109/CSEI47661.2019.8938895.
[18] Medykovskyy M., Pasyeka M., Pasyeka N. & Turchyn O. (2017). “Scientific research of life cycle
     perfomance of information technology.” 12th International Scientific and Technical Conference on
     Computer Sciences and Information Technologies, CSIT 2017, pp. 425-428. doi:10.1109/STC-
     CSIT.2017.8098821
[19] Mykhailyshyn H., Pasyeka N., Sheketa V., Pasyeka M., Kondur O. & Varvaruk M. (2021). “Designing
     network computing systems for intensive processing of information flows of data” doi:10.1007/978-3-030-
     43070-2_18
[20] O. Mishchuk, R. Tkachenko and I. Izonin, “Missing Data Imputation through SGTM Neural-Like Structure
     for Environmental Monitoring Tasks.” Advances in Intelligent Systems and Computing. Vol. 938. 2020, pp.
     142-151, doi:10.1007/978-3-030-16621-2_13
[21] P. Chou, “Little Engineers: Young Children's Learning Patterns in an Educational Robotics Project,” 2018
     World Engineering Education Forum - Global Engineering Deans Council (WEEF-GEDC), Albuquerque,
     NM, USA, 2018, pp. 1-5, doi: 10.1109/WEEF-GEDC.2018.8629609.
[22] P. Lushyn, Y. Sukhenko and O. Davydova, “Particularities of Students’ Educational Trajectories and
     “Projectories”: A Psychosemantic Dimension,” 2020 IEEE Problems of Automated Electrodrive. Theory
     and Practice (PAEP), Kremenchuk, Ukraine, 2020, pp. 1-4, doi: 10.1109/PAEP49887.2020.9240866.
[23] Pasieka N., Sheketa V., Romanyshyn Y., Pasieka M., Domska U. and Struk A. “Models, methods and
     algorithms of web system architecture optimization.” Paper presented at the 2019 IEEE International
     Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T
     2019 – pp. 147-152. doi:10.1109/PICST47496.2019.9061539
[24] Pasyeka M., Sheketa V., Pasieka N., Chupakhina S. and Dronyuk, I. (2019). “System analysis of caching
     requests on network computing nodes.” 3rd International Conference on Advanced Information and
     Communications Technologies, AICT2019 - Proceedings, pp. 216-222, doi:10.1109/AIACT.2019.8847909
[25] Pasyeka M., Sviridova T. and Kozak I. “Mathematical model of adaptive knowledge testing”. 5th
     International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH 2009,
     pp. 96-97.
[26] Pasyeka N., Mykhailyshyn H. and Pasyeka M., “Development Algorithmic Model for optimization of
     Distributed Fault-Tolerant Web-Systems,” 2018 International Scientific-Practical Conference Problems of
     Infocommunications. Science and Technology (PIC S&T), Kharkiv, Ukraine, 2018, pp. 663-669, doi:
     10.1109/INFOCOMMST.2018.8632160.
[27] S. G. Temesio Vizoso, “Open educational resources in an individualized education plan,” 2019 14th Iberian
     Conference on Information Systems and Technologies (CISTI), Coimbra, Portugal, 2019, pp. 1-3, doi:
     10.23919/CISTI.2019.8760670.
[28] S. M. Bhalerao and M. Dalal, “Improved social network aided personalized spam filtering approach using
     RBF neural network,” 2017 International Conference on Intelligent Computing and Control (I2C2),
     Coimbatore, 2017, pp. 1-5, doi: 10.1109/I2C2.2017.8321938.
[29] S. Papadimitriou, K. Chrysafiadi and M. Virvou, “Evaluating the use of fuzzy logic in an educational game
     for offering adaptation,” 2019 International Conference on Computer, Information and Telecommunication
     Systems (CITS), Beijing, China, 2019, pp. 1-5, doi: 10.1109/CITS.2019.8862064.
[30] Shepard M.E., Sastre E.A., Davidson M.A. et al, “Use of individualized learning plans among fourth-year
     sub-interns in pediatrics and internal medicine.” Med Teach. 2012. pp.316-324
[31] Sikora L., Lysa N., Fedyna B., Durnyak B., Martsyshyn R. and Miyushkovych Y. (2018). “Technologies of
     development laser based system for measuring the concentration of contaminants for ecological monitoring.”
     Paper presented at the 2018 IEEE 13th International Scientific and Technical Conference on Computer
     Sciences and Information Technologies, CSIT 2018 - Proceedings, 1 93-96. doi:10.1109/STC-
     CSIT.2018.8526602
[32] T. A. Tabishev, M. V. Alikaeva and A. L. Betuganova, “Electronic Informational and Educational
     Environment and Organization of the Educational Process of a Modern University (on the Materials of the
     Kabardino-Balkar State University),” 2019 International Conference "Quality Management, Transport and
     Information Security, Information Technologies" (IT&QM&IS), Sochi, Russia, 2019, pp. 569-572, doi:
     10.1109/ITQMIS.2019.8928402.
[33] X. Meng, C. Cui and X. Wang, “Looking Back Before We Move Forward: A Systematic Review of Research
     on Open Educational Resources,” 2020 Ninth International Conference of Educational Innovation through
     Technology (EITT), Porto, Portugal, 2020, pp. 92-96, doi: 10.1109/EITT50754.2020.00022.
[34] Y. Romanyshyn, V. Sheketa, L. Poteriailo, V. Pikh, N. Pasieka and Y. Kalambet “Social-communication
     web technologies in the higher education as means of knowledge transfer.” IEEE 2019 14th International
     Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT). – Vol.3.
     – 2019. – Lviv, Ukraine. – pp. 35–39.
[35] Zharikova M. & Sherstjuk, V. (2017). “Academic integrity support system for educational institution.” 2017
     IEEE 1st Ukraine Conference on Electrical and Computer Engineering, UKRCON 2017 - Proceedings, pp.
     1212-1215. doi:10.1109/UKRCON.2017.8100445
[36] Shkitsa, L., Kornuta, V., Kornuta, O., Bekish, I.: The model of informational space for innovation and design
     activities in the university. Sci. Innov. 15(6), 14–22 (2019). https://doi.org/10.15407/scin15.06.014Shkitsa,
     L., Kornuta, V., Kornuta, O., Bekish, I., Bui, V.: Information support of design innovation activity of the
     technical university. Manag. Syst. Prod. Eng. 28(2), 127–132 (2020). https://doi.org/10.2478/mspe-2020-
     0019
[37] Shkitsa L., Kornuta V., Kornuta O., Bui V., Bekish I. (2021) In-campus Way of the Insight Transfer
     Technology. In: Ivanov V., Trojanowska J., Pavlenko I., Zajac J., Peraković D. (eds) Advances in Design,
     Simulation and Manufacturing IV. DSMIE 2021. Lecture Notes in Mechanical Engineering. Springer,
     Cham. https://doi.org/10.1007/978-3-030-77719-7_32
[38] Shkitsa L., Kornuta V., Kornuta O., Bui V., Bekish I. (2021) In-campus Way of the Insight Transfer
     Technology. In: Ivanov V., Trojanowska J., Pavlenko I., Zajac J., Peraković D. (eds) Advances in Design,
     Simulation and Manufacturing IV. DSMIE 2021. Lecture Notes in Mechanical Engineering. Springer,
     Cham. https://doi.org/10.1007/978-3-030-77719-7_32