<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Designing Risk Resilient Networked High-Load Computing Web-Systems for Information Flow Processing</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Nadiia</forename><surname>Pasieka</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Zora</forename><surname>Říhová</surname></persName>
							<email>zora.rihova@trilogic.cz</email>
							<affiliation key="aff1">
								<orgName type="institution">University of South Bohemia</orgName>
								<address>
									<addrLine>Branišovská 1645/31a, České Budějovice</addrLine>
									<postCode>370 05</postCode>
									<country>Czechia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marta</forename><surname>Vohnoutová</surname></persName>
							<email>marta.vohnoutova@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">University of South Bohemia</orgName>
								<address>
									<addrLine>Branišovská 1645/31a, České Budějovice</addrLine>
									<postCode>370 05</postCode>
									<country>Czechia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nelly</forename><surname>Lysenko</surname></persName>
							<email>nelli.lysenko@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandra</forename><surname>Lysenko</surname></persName>
							<email>lysenkowa@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Vasyl</forename><surname>Sheketa</surname></persName>
							<email>vasylsheketa@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">National Tech. University of Oil &amp; Gas</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76068</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Pasyeka</surname></persName>
							<email>pasyekanm@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">National Tech. University of Oil &amp; Gas</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76068</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Kulchytska</surname></persName>
							<email>nataliia.kulchytska@pnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Vasyl Stefanyk Precarpathian National University</orgName>
								<address>
									<addrLine>Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Designing Risk Resilient Networked High-Load Computing Web-Systems for Information Flow Processing</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">BBB8DA357B3E71588BB33631DF45423F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Risky software systems, task distribution, algorithms, architecture, Web-systems 000-0002-4824-2370 (N.Pasieka)</term>
					<term>0000-0003-3896-4297 (Z.Říhová)</term>
					<term>0000-0002-8915-8626 (M.Vohnoutová)</term>
					<term>0000−0002−1029−7843 (N.Lysenko)</term>
					<term>0000−0002−1029−7843 (O.Lysenko)</term>
					<term>0000−0002−1318−4895 (V.Sheketa)</term>
					<term>0000−0002−3058−6650 (M.Pasieka)</term>
					<term>0000-0001-9308-6840 (N.Kulchytska)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Improved models and algorithms for the architecture of a high-loaded risk resilient Web-system, whose main differences are the possibility of aggregation and sharing of large sets of heterogeneous computing resources to process information data distributed between geographically separated territories. The proposed model and algorithms allow the efficient and secure use of additional network resources connected to the functional network, in contrast to traditional approaches, when these resources are not available within a single computing node on an independent computing platform. Subsequently, innovative approaches have been developed to build high-load risk resilient distributed cluster software systems, which provides a significant increase in the total amount of effective processing of information flows of the node communication system as a whole. Therefore, the use of this approach is appropriate for distributed risk-tolerant software systems where rapid loss of information flows is highly undesirable. Next, algorithms were developed for automated load management of independent computer platforms of information data flows for efficient scaling (clustering) of risk-resistant software systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Balancing the load on computing nodes provides an even load of hardware and software systems on independent computing platforms. A risk-resistant software system that balances the computational load must automatically decide on which node to perform the affective calculations associated with the new information task. So, the main task of balancing is the process of effective support of the process of transferring (migration) part or the whole calculation from the most loaded computing nodes to the less loaded ones, input factor loading i of i = 1, ..., r; uj -output parameter weighting, output parameter weighting j of j = 1, ..., s.</p><p>When solving the problem of risky maximization of an efficiency criterion, the actual problem of having a share in the distribution of two linear aggregate quantities arises <ref type="bibr" target="#b45">[46]</ref>.</p><p>Also, the problem of maximizing the efficiency of risk-sustainable software Web-systems is called linear particle programming. At the same time, there are many possibilities for transforming linear particle programming into a linear programming problem.</p><formula xml:id="formula_0">𝑓𝑓 0 = ∑ 𝑣𝑣 𝑖𝑖 𝑥𝑥 𝑖𝑖 𝑟𝑟 𝑖𝑖=1 ∑ 𝑢𝑢 𝑗𝑗 𝑦𝑦 𝑗𝑗 𝑠𝑠 𝑗𝑗=1 → 𝑚𝑚𝑚𝑚𝑚𝑚!,<label>(1)</label></formula><p>with</p><formula xml:id="formula_1">∑ 𝑣𝑣 𝑖𝑖 𝑥𝑥 𝑖𝑖 𝑟𝑟 𝑖𝑖=1 ∑ 𝑢𝑢 𝑗𝑗 𝑦𝑦 𝑗𝑗 𝑠𝑠 𝑗𝑗=1</formula><p>≥ 1or all modules m = 1, 2, …, n; u j ≥ 0, j = 1, 2, ..., s; v i ≥ 0, i = 1, 2, ..., r; yj -expression j -and the output parameter of the investigated computational module (node); xim -expression i -that input factor m -of that computing node with i = 1, ..., r and m = 1, ..., n; yjm -expression j -that input factor m -of that computing node with i = 1, ..., r and m = 1, ..., n; vi -input factor weights i with i = 1, ..., r; uj -weighing the output parameter j with j = 1, ..., s.</p><p>For further investigation we modify this nonlinear problem of risky criterion optimization using a complex fractional programming theory algorithm, a more traditional and less resource-intensive linear programming algorithm. Thus, the complex problem of optimizing the risk-sustainable efficiency criterion can be simplified to a linear problem using linear optimization techniques <ref type="bibr" target="#b27">[28]</ref>. To obtain the efficiency criterion value for all computational modules (nodes), it is necessary to solve the maximization problem individually for each individual module involved in scientific research. In this case, the vectors xim and yim are each time replaced by the profile of input and output parameters of the computational module under study, respectively <ref type="bibr" target="#b23">[24]</ref>. In the other problem of maximizing the risky criterion, they remain the same for each computational node <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b29">30,</ref><ref type="bibr" target="#b34">35,</ref><ref type="bibr" target="#b44">45]</ref>. In this problem, constraints are imposed to ensure that qualitative efficiency values are found in the region between zero and one (e0 ∈[0,1]).</p><p>The main property of this model is formed from the constraint criterion of risky sustainable efficiency. Its target function proportionally tends to increase the output parameter of the observed computational module to the limit of the risk-sustainable efficiency criterion. When a certain function is mathematically decoupled, after applying the duality theorem to it, an equivalent or so called encompassing form is formed. The principle of duality when using linear programming indicates that for each considered direct linear model of optimization of the risk-sustainable efficiency criterion there exists a dual corresponding linear optimization model, and in the case of solving one model contains all expressions for solving the other model. Thus, the original optimized model will be treated as a direct linear programming problem. Using the dual method, we minimize the weighted sum of the input parameters in one normalized output parameter. Mathematical formulation of linear programming model when using dual method is carried out as follows:</p><formula xml:id="formula_2">min 𝑔𝑔 0 = � 𝑡𝑡 𝑖𝑖 𝑟𝑟 𝑖𝑖=1 𝑥𝑥 𝑖𝑖,<label>(2)</label></formula><p>with g0 -the value of the efficiency criterion of the studied computing node; xi -expression i -of that computing node input factor with i = 1, ..., r; ti -variable weighting factors.</p><p>Linear combinations determine potential reference groups for measuring the efficiency criterion of computational nodes involved in the study. So, according to the task of optimization (2) of the target function which is minimized, the proposed method selects such a reference group in which the criterion of efficiency of the involved computational node looks not effective enough <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b36">37,</ref><ref type="bibr" target="#b39">40]</ref>.</p><p>Therefore, this mathematical problem can be interpreted as follows: for the investigated computational node to determine the minimum efficiency criterion of the input parameter G0, where compared to the weighted probabilities of comparative units, the weighted combination of output parameters of any input parameter does not detract from the output parameter, and the weighted integral combination of input factors of any input factor is G0 times greater than the input factor.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Parametric network model with time metrics to calculate load volume</head><p>The basic principles of operation and functioning of the network model of cloud computing on independent computing platforms differ significantly from traditional serial and parallel models.</p><p>The main feature of the network model of cloud computing is the ability to aggregate and collectively use large information sets of heterogeneous computational data flows, distributed geographically. Basically, this approach provides significant advantages, for example, when a software system is developed that requires information resources that are not available within one computing node, it can get them in other computing nodes connected to the cloud network <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b22">23,</ref><ref type="bibr" target="#b26">27]</ref>. However, the use of such a complex architecture for processing data flows has several caveats and some problems. To a highly heterogeneous, dynamically formed distributed computing environment it is rather difficult to apply such traditional metrics of performance criterion definition as the speed of data flow calculation, bandwidth of exchange channels, etc. to such a highly heterogeneous, dynamically formed distributed computing environment. That's why to estimate the quality of the provided cloud service it's necessary to use specialized computational metrics <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b30">31</ref>]. Let's assume that in a network cloud environment m computing resources are available and there is a system of distribution of task flow t, which provides an even distribution of information tasks j∈ t into available resources. Within the framework of using such developed software system with the use of cloud technology each user's information task can be divided into certain computing actions k ∈ j. When setting a task, the processing time dj is determined in order to get the corresponding junction. Each information task of user j and all corresponding actions k ∈ j are in the cloud grid and at a certain point rj. So, a cloud network that operates in online mode, with custom rj. values that are unknown in advance for a significant number of these tasks. As soon as a certain custom task for processing arrives in the cloud network, it is planned to search for and allocate the necessary resources to run it. Suppose that as a result of the final distribution of computing tasks S for each action k ∈ j a certain time for processing Ck(S). is required. So, a user's computational task in the cloud network j can be processed not faster than in a certain period of time determined by the expression (3):</p><formula xml:id="formula_3">𝐶𝐶 𝑗𝑗 (𝑆𝑆) = max 𝑘𝑘∈𝑗𝑗 𝐶𝐶 𝑘𝑘 (𝑆𝑆),<label>(3)</label></formula><p>with Ck(S). -the maximum processing time of the user's task; k -action; j -mission.</p><p>Let us define pj as the processing time of user's task k ∈ j. So, the processing time of user's task in a cloud network can be calculated as follows (4):</p><formula xml:id="formula_4">𝑝𝑝 𝑗𝑗 = 𝐶𝐶 𝑗𝑗 (𝑆𝑆) − 𝑚𝑚𝑚𝑚𝑚𝑚 𝑘𝑘∈𝑗𝑗 (𝐶𝐶 𝑘𝑘 (𝑆𝑆) − 𝑝𝑝 𝑘𝑘 ),<label>(4)</label></formula><p>with pj -user task processing time; Ck(S) -execution time; Cj(S) -maximum execution time; pk -decision implementation time.</p><p>The received integral values allow estimating properties of the cloud network computing environment. To analyze the quality of the cloud service provided by the network computing environment, you can use the value of the maximum delay in user tasks <ref type="bibr" target="#b4">(5)</ref>:</p><formula xml:id="formula_5">𝐿𝐿 𝑚𝑚𝑚𝑚𝑥𝑥 = max 𝑗𝑗∈𝑡𝑡 �𝐶𝐶 𝑗𝑗 (𝑆𝑆) − 𝑑𝑑 𝑗𝑗 �,<label>(5)</label></formula><p>with Lmax -maximum delay of the user's task; Cj(S) -maximum processing time; dj -time of uncompleted user tasks.</p><p>In order to optimize the work of a distributed cloud, it is necessary to achieve the minimization of Lmax value, and you can also use the Tj value, which determines how late the user's task is <ref type="bibr" target="#b5">(6)</ref>:</p><formula xml:id="formula_6">𝑗𝑗 ∈ 𝑡𝑡 ⋀ 𝐶𝐶 𝑗𝑗 &gt; 𝑑𝑑 𝑗𝑗 ,<label>(6)</label></formula><p>with t -information computing resources are available; dj -time of uncompleted user tasks; Cjtime to complete one task; k -action; j -mission.</p><p>Consequently, this indicator provides information on the number of outstanding computational requests from users who have entered the cloud network for processing. Consumption of computing resources of the RCk cloud network is a certain subtask of computing, which is defined as the product of the corresponding solution time by the number of resources used in the network <ref type="bibr" target="#b6">(7)</ref>:</p><formula xml:id="formula_7">𝑅𝑅𝐶𝐶 𝑘𝑘 = 𝑝𝑝 𝑘𝑘 × 𝑚𝑚 𝑘𝑘 ,<label>(7)</label></formula><p>with RCk -total consumption of network computing resources; pk -decision implementation time; mk -the number of resources used.</p><p>Using the value of integrated consumption of computing resources of the cloud network, you can calculate the value of available information resources U (8):</p><formula xml:id="formula_8">𝑈𝑈 = 𝑅𝑅𝐶𝐶(𝑆𝑆) 𝑚𝑚 × (max 𝑗𝑗∈𝑡𝑡 𝐶𝐶 𝑗𝑗 (𝑠𝑠) − min 𝑗𝑗∈𝑡𝑡 (𝐶𝐶 𝑗𝑗 (𝑆𝑆) − 𝑝𝑝 𝑗𝑗 ) , (<label>8</label></formula><formula xml:id="formula_9">)</formula><p>with U -the amount of use of available information resources; m -resource quantity; pjprocessing time of the j-th problem; RC(S) -time of total consumption; Cj(S) -time of the j-th task.</p><p>By a certain value that characterizes the criterion of optimally used computing resources of the cloud distributed network. In the process of processing information requests in the cloud distributed network, there are often situations when the software system fails during the processing of the user's task <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b25">26,</ref><ref type="bibr" target="#b42">43,</ref><ref type="bibr" target="#b43">44,</ref><ref type="bibr" target="#b46">[47]</ref><ref type="bibr" target="#b47">[48]</ref>.</p><p>Then the user's task to process the information request must be run several times for its successful execution. Because users and administrators may have different (and even conflicting) requirements for a cloud-based Web system, it is difficult to find the right metrics that are universal and satisfying for everyone. From the user's point of view of the developed software system using cloud technology, the following metrics of the average response time to the request (Average Response Time) and the average waiting time of the request (Average Wait Time) can be distinguished:</p><formula xml:id="formula_10">𝐴𝐴𝑅𝑅𝐴𝐴 = 1 |𝑡𝑡| �(𝐶𝐶 𝑗𝑗 (𝑆𝑆)) 𝑗𝑗∈𝑡𝑡 ,<label>(9)</label></formula><p>with ART -average response time; Cj(S) -time of the j-th task; pj -time of realization of the j-th task; t -available resources.</p><formula xml:id="formula_11">𝐴𝐴𝐴𝐴𝐴𝐴 = 1 |𝑡𝑡| ��𝐶𝐶 𝑗𝑗 (𝑆𝑆) − 𝑝𝑝 𝑗𝑗 � 𝑗𝑗∈𝑡𝑡 ,<label>(10)</label></formula><p>with AWT -average waiting time; Cj(S) -time of execution of the j -th task; t -available resources.</p><p>The ART parameter value characterizes the average response time to a user's information request, namely, how quickly user tasks are processed. Besides, value of parameter AWT is very important for developers of algorithm of actions on rather small information tasks, and also on processing of their inquiries. So, the optimum and simple method of measurement of fair efficiency of use of information and hardware resources is calculation of deviation of weighted average time of expectation of processing of inquiry:</p><formula xml:id="formula_12">𝐴𝐴𝐴𝐴𝐴𝐴𝑊𝑊 = 1 |𝑡𝑡| � �(𝐶𝐶 𝑗𝑗 (𝑆𝑆) − 𝑝𝑝 𝑗𝑗 ) 2 − (� 𝐶𝐶 𝑗𝑗 (𝑆𝑆) − 𝑝𝑝 𝑗𝑗 |𝑡𝑡| 𝑗𝑗∈𝑡𝑡 ) 2 𝑗𝑗∈𝑡𝑡 ,<label>(11)</label></formula><p>with AWTD -deviation of the average waiting time for processing the user's information request; t -available resources; Cj(S) -time of execution of the j -th task; pj -time of realization of the j -th task.</p><p>AWTD must be minimized in order to achieve optimal results in the cloud network. In modern cloud network Web-systems, the ability to complete processing of a given volume of tasks is more important than the acceleration of distributed visco-productive Web-system, obtained with this approach to processing. It should be noted that the information tasks of the user, which are carried out in cloud network environments, can have a rather complex architecture than the information tasks of the user, which are carried out in parallel systems with traditional architecture. For example, the information flows of user tasks have a more complex logical structure than the packages of corresponding tasks <ref type="bibr" target="#b24">[25]</ref>. Using a cloud mesh requires changing such notions as errors of a developed program system of Web-services which is designed on a mesh model, generates error messages as soon as there comes a situation when it is impossible to successfully execute and finish a user's information task. For example, a failure of a developed software system using cloud technology may occur if it is impossible to find the appropriate resources to perform information calculations or through their completion.</p><p>Using the concept of fault tolerance in software systems using cloud technology, we can define as the main possibility to increase the time delay of both software and hardware errors until there is no chance that the work on processing user requests will be successfully completed. Metric of completed user request processing in a software system using cloud technology Workload Completion, which is formed as a ratio of successfully completed user tasks to the total volume of all requests set by the cloud network scheduler:</p><formula xml:id="formula_13">𝐴𝐴𝐶𝐶 = ∑ 𝑗𝑗 ∈ 𝑡𝑡 ⋀ (𝑗𝑗 𝑐𝑐𝑐𝑐𝑚𝑚𝑝𝑝𝑐𝑐𝑚𝑚𝑡𝑡𝑐𝑐𝑑𝑑) |𝑡𝑡| ,<label>(12)</label></formula><p>with WC -indicator of completed user requests processing; t -available resources; j -task. This metric allows to define the main limitations of the cloud network software system, and its maximization can be the main goal. However, it also has some critical limitations from the point of view of using free information and hardware resources, as a user's task with a smaller number of computational actions has a significant influence on the changes of this value <ref type="bibr" target="#b15">[16]</ref>.</p><p>Task completion calculates the number of completed actions to the total number of performed actions, which were implemented within the cloud software system of user tasks distribution:</p><p>This metric allows you to define the main limitations of a cloud network software system, and its maximization can be the main goal. However, it also has some critical limitations from the point of view of using free information and hardware resources because the task of a user with less computational actions has a much greater influence on the change of this value.</p><p>Task completion calculates the number of completed actions to the total number of performed actions, which were implemented within the cloud software system of user tasks distribution:</p><formula xml:id="formula_14">𝐴𝐴𝐶𝐶 = ∑ 𝑗𝑗 ∈ 𝑡𝑡 ⋀ 𝑘𝑘 ∈ 𝑗𝑗 ⋀ (𝑘𝑘 𝑐𝑐𝑐𝑐𝑚𝑚𝑝𝑝𝑐𝑐𝑚𝑚𝑡𝑡𝑐𝑐𝑑𝑑) ∑ 𝑗𝑗 ∈ 𝑡𝑡 |𝑗𝑗| , (<label>13</label></formula><formula xml:id="formula_15">)</formula><p>with TC -index of completed actions for processing user tasks; t -available resources; k -action; j -task.</p><p>It is also worth considering such a notion as the completion of unlocked actions from user tasks for processing enabled task completion, i.e. when they can be performed only when all corresponding dependencies for a given sequence of actions will be executed by a software system using cloud technology:</p><formula xml:id="formula_16">𝐸𝐸𝐴𝐴𝐶𝐶 = ∑ 𝑗𝑗 ∈ 𝑡𝑡 ⋀ 𝑘𝑘 ∈ 𝑗𝑗 ⋀ (𝑘𝑘 𝑐𝑐𝑐𝑐𝑚𝑚𝑝𝑝𝑐𝑐𝑚𝑚𝑡𝑡𝑐𝑐𝑑𝑑) ∑ 𝑗𝑗 ∈ 𝑡𝑡 ⋀ 𝑘𝑘 ∈ 𝑗𝑗 ⋀ (𝑘𝑘 𝑐𝑐𝑚𝑚𝑒𝑒𝑒𝑒𝑐𝑐𝑐𝑐𝑑𝑑) , (<label>14</label></formula><formula xml:id="formula_17">)</formula><p>with ETC -integral indicator of completed unlocked actions relative to user tasks; t -available resources; k -action; j -task.</p><p>So, we have considered the main principles of the cloud network model's functioning while developing program systems which differ greatly from traditional serial and parallel models. Their main difference is the possibility of aggregating and sharing large sets of heterogeneous information resources distributed between geographically separated computational independent platforms. Basically such architectural approaches to developing program systems with the use of cloud technology bring considerable advantages and financial benefits, for example, when a program Websystem requires considerable information resources which are inaccessible within one computing node, it can get them in another node connected to the cloud network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Models and algorithms of distributed high-performance software Web-system architecture optimization</head><p>Any Web-systems or cloud services that serve a lot of users, a priori highly loaded. However, highly loaded distributed software Web-systems cannot effectively apply models, methods and algorithms that are used as basic approaches to the development of ordinary Web-sites <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b41">42]</ref>. A considerable increase of the user audience and corresponding calculations without proper approaches to optimization of the architecture of program systems development with the use of cloud technology can lead to considerable complications in their maintenance in time <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b16">17,</ref><ref type="bibr" target="#b20">21,</ref><ref type="bibr" target="#b28">29]</ref>. Now all the models, methods and algorithms for developing the architecture of distributed fault-tolerant Websystems are developed and used with the use of generally accepted information technologies <ref type="bibr" target="#b18">[19]</ref>. Methods of sending information packets should use an algorithm for calculating the checksum of the control protocol transfer of the package, which allows you to display the checksum of the control protocol transfer of data of the package using the checksum of the header of this package <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b35">36]</ref>.</p><p>Having considered the checksum recalculation algorithm, which is to use the output package checksum and the input package checksum to calculate the checksum. So, if the clipboard is divided into two information parts, the checksum of the entire buffer can be linearly expressed through checksums of its parts. Typical length of the header protocol control transmission of the package, usually has a shorter length by several times than the basis of the entire information package. Consequently, the computational load is reduced in n-times the resources of the entire software Web-system and allows to significantly reduce the cost of redirection of client requests from one node to another. At the next technological stage, the user request passes to the computing node for processing. The architecture of the computing node for processing user's information requests should be organized in a hierarchy style. At the bottom of this hierarchy are important computing modules for processing user requests, the failure of which can temporarily slow down the overall operation of the Web-system, but not paralyze it as a whole. If the lower computation modules do not work, the cloud network Web-system allows to use the corresponding computation modules of other nodes. However, at such organization of computing process it is clear that the level of communication between nodes on processing of user requests should be perfect. Features of the organization of the architecture of the computing node for processing high-user requests requires a clear hierarchy of these modules. Its essence is that each of the computing modules of the node must be as isolated from the others as possible and to exchange information at the level of common system messages while being information dependent. So, the design of software Web-system should be developed according to the following principle: «where the failure is a certain part of the Web-services work, which should be controlled at the level of system messages exchange». The architecture of the hierarchy of failures consists in the fact that any Web-system consists of computing modules, and the next has a sequence of actions when the modules of descendants refused. The information flow in this case is in ascending order, because only the parent computing module contains data about what actions should be performed if one or more modules do not work on the cloud computing platform. However, in cases when one of the computing modules of a node fails or is loaded, a request is made to another module, the highest in its hierarchy. It should also be noted that the main computing module may not participate in the development of the client's request, and act as a Web service, which can be in direct contact with other nodes of the cloud network and simultaneously conduct diagnostics of the corresponding modules of the node. After that, the information flows of data generated by the user are developed, and if they cannot be executed, the management decision is made to transfer the information flow from the idle or heavily loaded module, to one which has redundant resources (Figure <ref type="figure" target="#fig_0">1</ref>). The choice of a computing module for executing user requests is based not only on its load, but also on information about the number of failures in other modules of the cloud node. This algorithm is necessary in order not to create information packages of instantaneous data flow for processing from extremely busy node modules to less busy ones. As a result of these manipulations, a complex cloud network for exchange of information arrays of calculations between the corresponding modules of computing nodes is formed. However, the main purpose in building a highly loaded distributed software Web-systems is to create not such a software system using cloud technology that does not fail during industrial use, and that as long as possible will be able to work and cope with various information challenges and their own mistakes <ref type="bibr" target="#b40">[41]</ref>. After the information message flow has been redirected, the computational module does not stop working. So, we can emphasize the strategies that can be implemented in each of these computing modules <ref type="bibr" target="#b14">[15]</ref>.</p><p>In the first strategy we will understand that the computational module was under a significant load. In such a situation, the module executes the whole list of user tasks that came into it or remained in it for processing, performing the primary reboot, and generates an information message to the module that is higher in the hierarchy, and is ready to work. Given that the cloud network of computing nodes modules and the main load balancer constantly exchange information messages about readiness for processing, and the module will receive a new data stream for processing at each subsequent iteration of data flow in the distribution of the load on the nodes.</p><p>The snapshot/restore method of data duplication is often used in highly loaded distributed Web systems. Thus, a hybrid system model with a central balancing node of load balancing and cloud network communication between computing nodes allows you to simply add more nodes by applying a cluster structure. High level of communication between computing nodes creates a problem for the data cloning method, because in case of failure of one of the nodes it is necessary to recalculate the integral performance of the Web-system as a whole. It is clear that in this case we can divide the problems connected with the failure of the computational node into two conditional groups. The first group of software and hardware technical problems. Since the redistribution of computational volume occurs at the level of computational modules in case if the software of the developed Web-system generates an error, the system will automatically and quickly restore its performance if its computational module at the top of the hierarchy was properly designed and did not get a cascade error. Then it will alert other computational nodes about errors and redirect the flow of computational information data to other modules. So, in this situation there is no duplication of a particular computational node on an independent platform, but just a launch of a standard instance.</p><p>In order to significantly reduce the risk of loss of a significant number of user requests, it is necessary that the balancing computing node contains a buffer that will act as a «retry» in the case when a certain node is physically unavailable. Therefore, using the method of duplication, provides the creation of a typical computing node and simultaneously restores the performance of the Websystem. However, in the development of program systems with the use of cloud technology there is a whole class of distributed algorithms where there are certain structures of information data flows (arrays, records), the size of which depends on the total number of simultaneously interacting processes that perform processing by different computing nodes on independent platforms. An example of such algorithm application is the protocol of making a coordinated decision <ref type="bibr" target="#b33">[34]</ref>. When modifying the topology of a distributed highly-advantageous and computational Web-system, the structure of data flows and algorithms of their processing will also change. Therefore, there is an urgent need to modify the scenario of behavior of the used simulation model, namely, to change the algorithms and structures of data flows describing the behavior of the corresponding objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Implementation of data flow processing methods for recovery of computing nodes</head><p>In the development of highly loaded distributed Web-systems, architects make up of several computing nodes, and which are an instance of a single computing system, thus forming a «clustering». However, the modified algorithm of data flow processing requires a clear separation not only on the physical level, but also on the program one. Software of Web-systems is traditionally divided into logical modules, that is by functional purpose <ref type="bibr" target="#b32">[33]</ref>. By working out of software Websystem the architect needs its design so that computing modules in the structure had as little logic as possible as the main task of redistribution of volume of loading is support of system balance. No less important requirement to architecture of software of Web-system is avoidance of strong connectivity. Strong connectivity between computing modules is that one of the modules comes into contact with a large number of other modules on independent platforms. That is, if it breaks down a significant number of modules will send a message to the service module, and that in turn will notify the other nodes of the need for their temporary replacement. To effectively overcome possible computational problems, you can use such methods to restore the functionality of developed software Web-system using cloud technology: the clone_args method stores the values of the arguments that were sent to the computational module that failed <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b13">14,</ref><ref type="bibr" target="#b37">38,</ref><ref type="bibr" target="#b38">39]</ref>.</p><p>Since the absence of a timely response from the module is classified as its failure in this case, the parent method of the module must get the appropriate information about the arguments that were sent to the child method. However, the direct features of the clone_args method do not end there, in particular there are indirect properties to which they relate:</p><p>• the current integral processing time value for the computing module or failure module method; • the fixed time for which the processing of cloud Web-systems computing nodes failed;</p><p>• launch frequency of a computational module, which allows you to determine the need for this module, and therefore, when distributing the load between the nodes need to more effectively allocate the necessary software and hardware resources.</p><p>The report method allows sending statistical data for the service module about processing the information flows of all child nodes at certain intervals. Also, its use facilitates automated forecasting of degradation dynamics of the developed software Web-system. So, the report method can be used not only to inform about the planned statistical indicators but also when one or several child computing modules have failed.</p><p>The restart method provides the developed Web-system program with the use of cloud technology by rebooting the computational module in case of its failure. The main purpose of rebooting is to avoid destructive incoming data streams.</p><p>The callback method allows sending an information message to the parent module about the successful or unsuccessful reboot of the computing node. This method is passed as an argument to the computing module, which should be checked for stable operation after starting or restarting a software Web system that provides a "callback method". Having analyzed the character of errors which can occur in computing modules of the developed program Web-system we'll notice several main reasons: errors in the program code, and also problem data flows and high load in nodes.</p><p>The feedback method provides communication between the computational nodes of the developed program Web-system using cloud technology and is as independent of others, that's why it can be surrounded by a lot of micro services of Web-systems with which it is necessary to exchange information flows. To do this, of course, you should inform the service computing module, which is on top of the corresponding hierarchy. That's why each computing module implements the feedback method that knows how to contact it and is able to redistribute data flows from modules that fail or are heavily loaded to work nodes. Modified computational model of the recovery method, the modules that have failed, are shown in (Figure <ref type="figure" target="#fig_1">2</ref>) <ref type="bibr" target="#b31">[32]</ref>. This modified algorithm implements only service modules for processing data flows. In contrast to conventional computing modules, service modules provide a much smaller number of operations to obtain a positive result, which directly affects their work. In this case, service modules act as a «stable part of a software system in one computing point» on the node on an independent computing platform. Consequently, when developing a program Web-system it is important to use methods for providing the minimum vulnerability of this computational module. These computational methods constantly inform about the results of work for a certain quantum of time or unplanned in case of leaving the working state. It is clear that the service module has information about the work of all developed software Web-systems. The less time quantum of updating of information streams about results of work of developed program Web-system, the more precisely and effectively it is possible to define necessary computing node for transfer of its load.</p><p>Packaging, state transfer and data flow.</p><p>As soon as in the developed program Web-system with the use of cloud technology there was a consensus between computing nodes that delegate and accept a part of computational work, it is necessary to prepare a package of raw data for a new node. And only after that to establish a connection between the modules that send user requests to those that fail, and to another working module in another computing node. Also, the service module sends a message marked that the computing module is damaged -«temporarily unavailable for new requests for processing data flows», then performs the standard procedure of rebooting. This procedure is implemented in each computing module thanks to the corresponding restart method, and it is also connected to the service module on the computing node by the feedback method. As soon as the software system receives the message that the computational module has failed, clone_args copies all the input data streams sent for processing and an indirect set of data about the current state of the system. In this case there is little time for making managerial decisions, so the service module may rather try to pick up a new computational node, simultaneously copying the whole information call thread through the clone_args method and directing it to the service module. When analyzing the sequence of the corresponding actions it becomes clear that it will be necessary to form a list of processing calls which are now waiting for other parent computing modules or their methods. However, this list is a kind of queue for processing user requests that are processed by a new working computing module from the created queue. Amazon Simple Queue Service works by the same principle -a service that quickly receives queues of user messages for storage and processing. As soon as the computational node becomes available for information flows of data, the service node composes this data and links the corresponding modules and their states (Figure <ref type="figure" target="#fig_2">3</ref>). To ensure the reliability of data flow transmission, it is necessary to divide a specific set of these data into appropriate fragments and add to each of them a header with the sequence number. The fragments of information data flows obtained in this way form a segment. On the next step of data processing each segment passes into a package, and then with the help of transport information protocols comes to the recipient's computing node. After the package is delivered to the recipient's computing node, the correctness of receiving the information flow in the segment is checked by means of a checksum recalculation, and it is automatically determined that the previous information flow segments were also successfully received. At this stage, the recipient's computing node sends an information request to the sender's node about a new data packet or a repeat transmission of the previous data packet. This operation algorithm ensures that all previous packets from the data stream sequence have been successfully received. In the developed modified model computing modules are isolated from each other and do not have information about the general state of the Web-system, while establishing a connection between them, as well as receiving messages about their state. For interaction of computational module, we use asynchronous exchange of information messages where each corresponding module has its own turn of information messages. So, a computing module that sends a message waits for the next notification about its delivery, otherwise the recipient ignores this message.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>The conducted system analysis examines the basic design principles of distributed risky Websystems and the technologies that architects of such software systems most often use in their design. We also conclude that redundancy is an indispensable attribute in the design of most risk resilient Web-systems, which are characterized by a high load capacity with respect to user requests. The main criterion in the design of risk resilient Web-systems is their scalability, which is used when operations require significant computational resources, which significantly reduces the performance of the system and requires it to increase its overall capacity. Also, methods for assessing the reliability and resilience of developed risk-resistant software Web-systems are investigated, as any software system must be objectively monitored, and this must be predicted in their work. The main aspects of operation of distributed fault-tolerant software Web-systems are considered, as problems of their administration, as well as restoration of performance in case of failure may arise in the process of highly profitable operation. Analyzing the technologies used in the design of software Web-systems in the study, we have improved methods, according to which a comprehensive analysis of computing load balancing, which is the main task in the design of distributed fault-tolerant software Web-systems. To solve the problem of efficient operation of the developed software system, we use algebraic methods to optimize the balancing of computational load on the nodes, as well as the network model of its distribution, thereby creating a hybrid mechanism of information flows. We consider the theoretical and practical foundations that ensure the effective functioning of the failure hierarchy mechanism, which allows us to provide a risksustainable efficient calculation of the computational load of software modules and nodes as a whole. Analyzing a high-loaded distributed fault-tolerant software Web-system, it is found that its fundamental criterion is the efficiency of processing information data streams, generally calculated as the quotient of the sum of all output volumes by the sum of all input data streams. For each specific computational module or node, its value of efficiency is determined. Comparison of the effectiveness of computing nodes is carried out using the linear programming method and at the same time different basic models and their variants. It is proposed to determine the number of computational modules or nodes involved to build a criterion for the boundary of risk efficiency, and for all other cases -the criterion of their inefficiency. Improved functionality of the network model, which differs significantly from the usual sequential and parallel models. The main difference is the ability to aggregate and share significant sets of heterogeneous computing resources for the development of geographically distributed information flows. In many cases this provides significant advantages, since the developed software Web-system requires additional resources that are not available within a single computational node, at the same time they can be obtained from other nodes connected to the functional grid. During the study, we improved the algorithm for transferring the computational load without using redundant resources and proposed a modified model of interaction between computing modules to process information flows within a single node, and the developed software Web-system in general. Also considered the methodology for determining the causes of failure of computing modules and nodes, highlighted two types of major problems associated with the failure of the node, software and hardware problems. We modify the model of computational process control for the development of information data streams, where modules isolated from each other do not have a common state, but between them you can establish an information connection and receive notifications about their state. Asynchronous exchange of information messages is used for interaction of computing modules, where each module organizes its own message queue. A module sends an information message, waits for an acknowledgement of the corresponding delivery message, but does not receive it if the recipient of the message ignores it. An important aspect of the study is that the risk of stable free computing resources of the developed software Web-system can be found within its capabilities.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Model of failure hierarchy processing in software Web-systems</figDesc><graphic coords="7,67.80,253.32,469.80,333.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Algorithm of load redistribution in case of failure computing nodes of the software Web-system</figDesc><graphic coords="10,98.00,184.00,406.58,264.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Model of packing, transfer of states and information flows of data</figDesc><graphic coords="11,88.15,286.50,422.00,272.50" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">ArcheOpterix: An extendable tool for architecture optimization of AADL models</title>
		<author>
			<persName><forename type="first">S</forename><surname>Aleti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bjornander</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Grunske</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Meedeniya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSE Workshop on Model-Based Methodologies for Pervasive and Embedded Software</title>
				<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="73" to="77" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Analysis of success factors of technology transfer process of the information and communication technology</title>
		<author>
			<persName><forename type="first">H</forename><surname>Jamalludin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Jamalludin</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICAEES.2016.7888074</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advances in Electrical, Electronic and Systems Engineering (ICAEES)</title>
				<meeting><address><addrLine>Putrajaya, Malaysia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="382" to="387" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Development of information system for aggregation and ranking of news taking into account the user needs</title>
		<author>
			<persName><forename type="first">V</forename><surname>Andrunyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vasevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chyrun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Chernovol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Antonyu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gozhyj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Korobchynskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2604</biblScope>
			<biblScope unit="page" from="1127" to="1171" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">D</forename><surname>Rosenberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Siegel</surname></persName>
		</author>
		<idno type="DOI">10.1109/QRS-C.2019.00101</idno>
		<title level="m">Critical Quality Factors for Rapid, Scalable, Agile Development, 19-th International Conference on Software Quality, Reliability and Security Companion (QRS-C)</title>
				<meeting><address><addrLine>Sofia, Bulgaria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="514" to="515" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Voronenko Information technology of gene expression profiles processing for purpose of gene regulatory networks reconstruction</title>
		<author>
			<persName><forename type="first">S</forename><surname>Babichev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lytvynenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Skvor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Korobchynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
		<idno type="DOI">10.1109/DSMP.2018.847845</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 2nd International Conference on Data Stream Mining and Processing</title>
				<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="336" to="341" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="middle">M</forename><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Shoga</surname></persName>
		</author>
		<author>
			<persName><surname>Boehm</surname></persName>
		</author>
		<idno type="DOI">10.1109/QRS-C.2019.00032</idno>
		<title level="m">Exploring the Dependency Relationships between Software Qualities, 19-th International Conference on Software Quality, Reliability and Security Companion (QRS-C)</title>
				<meeting><address><addrLine>Sofia, Bulgaria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="105" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><surname>Zhi</surname></persName>
		</author>
		<title level="m">Quality Assessment for Large-Scale Industrial Software Systems: Experience Report at Alibaba, 26-th Asia-Pacific Software Engineering Conference (APSEC)</title>
				<meeting><address><addrLine>Putrajaya, Malaysia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Infocommunication Networks Design with Self-Similar Traffic</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mohsin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Radivilova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kirichenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/CADSM.2019.8779314</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</title>
				<meeting><address><addrLine>Polyana, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="24" to="27" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Classification of existing virtualization methods used in telecommunication networks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Bondarenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Radivilova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Alfroukh</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2018.8409104</idno>
	</analytic>
	<monogr>
		<title level="m">9th International Conference on Dependable Systems</title>
				<meeting><address><addrLine>Kiev</addrLine></address></meeting>
		<imprint>
			<publisher>Services and Technologies</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="83" to="86" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Asymptotic method of traffic simulations</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dronjuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-05209-0_12</idno>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Synthesis of Noise-Like Signal Based on Ateb-Functions</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-30843-2_14</idno>
	</analytic>
	<monogr>
		<title level="m">Distributed Computer and Communication Networks, DCCN 2015</title>
		<title level="s">Communications in Computer and Information Science</title>
		<editor>
			<persName><forename type="first">V</forename><surname>Vishnevsky</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Kozyrev</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="volume">601</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Analysis of Creative Industries Activities in Europеan Union Countries</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Moiseienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ja</forename><surname>Greguš</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The International Workshop on Digitalization and Servitization within Factory-Free Economy</title>
				<meeting><address><addrLine>D&amp;SwFFE</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019-11-04">2019. November 4-7, 2019</date>
			<biblScope unit="volume">160</biblScope>
			<biblScope unit="page" from="479" to="484" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">On the Impact of Refactoring on the Relationship between Quality Attributes and Design Metrics</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alomar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">W</forename><surname>Mkaouer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ouni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kessentini</surname></persName>
		</author>
		<idno type="DOI">10.1109/ESEM.2019.8870177</idno>
	</analytic>
	<monogr>
		<title level="m">ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</title>
				<meeting><address><addrLine>Porto de Galinhas, Recife, Brazil</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Pareto optimality and strategy-proofness in group argument evaluation</title>
		<author>
			<persName><forename type="first">E</forename><surname>Awad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">W</forename><surname>Caminada</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Pigozzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Podlaszewski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Rahwan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Logic and Computation</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="2581" to="2609" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Team Building Activities for Virtual Teams in Jordanian Companies: Vision and Survey</title>
		<author>
			<persName><forename type="first">A</forename><surname>Qasem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Qusef</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCSRE.2019.8807677</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference of Computer Science and Renewable Energies (ICCSRE)</title>
				<meeting><address><addrLine>Agadir, Morocco</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Approaches for Safety-Critical Embedded Systems and Telecommunication Systems Design for Avionics Based on FPGA</title>
		<author>
			<persName><forename type="first">A</forename><surname>Galkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Umiarov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Grigorieva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
		<idno type="DOI">10.1109/PICST47496.2019.9061421</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Scientific-Practical Conference Problems of Infocommunications</title>
		<title level="s">Science and Technology</title>
		<meeting><address><addrLine>Ukraine</addrLine></address></meeting>
		<imprint>
			<publisher>PIC S&amp;T</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="391" to="396" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">The application of quantum communication technology used in electric power information &amp; communication system confidential transmission</title>
		<author>
			<persName><forename type="first">L</forename><surname>Junwen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Ziyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jiakai</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">19th International Conference on Advanced Communication Technology</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="305" to="308" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">GA&apos;s arithmetic on time-cost optimization in architecture engineering</title>
		<author>
			<persName><forename type="first">Lv</forename><surname>Shu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ping</forename><surname>Tian-Zhenjie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Electric Information and Control Engineering</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="3293" to="3296" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">Learning Apache Cassandra -Manage Fault Tolerant and Scalable Real-Time Data Mat Brown</title>
		<author>
			<persName><forename type="first">M</forename><surname>Brown</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>Packt Publishing</publisher>
			<biblScope unit="page">276</biblScope>
			<pubPlace>Birmingham</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Kabir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rashed</surname></persName>
		</author>
		<title level="m">Multi-level client server network and its performance analysis</title>
				<meeting><address><addrLine>Saarbrücken</addrLine></address></meeting>
		<imprint>
			<publisher>LAP Lambert Academic Publishing</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page">124</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Abbott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Fisher</surname></persName>
		</author>
		<title level="m">The art of scalability: scalable web architecture, processes, and organizations for the modern enterprise</title>
				<meeting><address><addrLine>Boston</addrLine></address></meeting>
		<imprint>
			<publisher>Addison-Wesley Professiona</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page">618</biblScope>
		</imprint>
	</monogr>
	<note>2nd Edition. Kindle Edition</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Analysis of Implementation Results of the Distributed Access Control System</title>
		<author>
			<persName><forename type="first">M</forename><surname>Vladymyrenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Platonenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ageyev</surname></persName>
		</author>
		<idno type="DOI">10.1109/PICST47496.2019.9061376</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Modelling the Pertubation of Traffic Based on Ateb-functions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Medykovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Droniuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-38865-1_5</idno>
	</analytic>
	<monogr>
		<title level="m">Computer Networks</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Kwiecień</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Gaj</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Stera</surname></persName>
		</editor>
		<meeting><address><addrLine>CN</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="volume">370</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Scientific research of life cycle perfomance of information technology</title>
		<author>
			<persName><forename type="first">M</forename><surname>Medykovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Turchyn</surname></persName>
		</author>
		<idno type="DOI">10.1109/STC-CSIT.2017.8098821</idno>
	</analytic>
	<monogr>
		<title level="m">12th International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="425" to="428" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Missing Data Imputation through SGTM Neural-Like Structure for Environmental Monitoring Tasks</title>
		<author>
			<persName><forename type="first">O</forename><surname>Mishchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-16621-2_13</idno>
	</analytic>
	<monogr>
		<title level="j">Advances in Intelligent Systems and Computing</title>
		<imprint>
			<biblScope unit="volume">938</biblScope>
			<biblScope unit="page" from="142" to="151" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">A fast convergence feed-forward automatic gain control algorithm based on RF characterization of Software Defined Radio</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zeeshan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Mehtab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">W</forename><surname>Khan</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICAEES.2016.7888017</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Advances in Electrical, Electronic and Systems Engineering</title>
				<meeting><address><addrLine>Putrajaya, Malaysia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="100" to="104" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Designing network computing systems for intensive processing of information flows of data</title>
		<author>
			<persName><forename type="first">H</forename><surname>Mykhailyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kondur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Varvaruk</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-43070-2_18</idno>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Genetic algorithm for neural network architecture optimization</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A J</forename><surname>Idrissi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ramchoun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ghanou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ettaouil</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">3 International Conference on Logistics Operations Management (GOL)</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Models, methods and algorithms of web system architecture optimization</title>
		<author>
			<persName><forename type="first">N</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Romanyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Domska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Struk</surname></persName>
		</author>
		<idno type="DOI">10.1109/PICST47496.2019.9061539</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&amp;T)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="147" to="153" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The ateb-gabor filter for fingerprinting</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Logoyda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Troyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Vozniy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Shpak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">international conference on computer science and information technology</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019-09">2019. September. 2019</date>
			<biblScope unit="page" from="247" to="255" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Recovery schemes for distributed computing based on bib-schemes</title>
		<author>
			<persName><forename type="first">O</forename><surname>Riznyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Kynash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Povshuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kovalyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">First International Conference on Data Stream Mining &amp; Processing (DSMP)</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="134" to="137" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Towards Continuous Quality: Measuring and Evaluating Feature-Dependent Non-Functional Requirements in DevOps</title>
		<author>
			<persName><forename type="first">P</forename><surname>Haindl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Plösch</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICSA-C.2019.00024</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Software Architecture Companion (ICSA-C)</title>
				<meeting><address><addrLine>Hamburg, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="91" to="94" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Key Attributes for a Quality Mobile Application</title>
		<author>
			<persName><forename type="first">P</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Aggarwal</surname></persName>
		</author>
		<idno type="DOI">10.1109/Confluence47617.2020.9058278</idno>
	</analytic>
	<monogr>
		<title level="m">10-th International Conference on Cloud Computing, Data Science &amp; Engineering (Confluence)</title>
				<meeting><address><addrLine>Noida, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="50" to="54" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">System analysis of caching requests on network computing nodes</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chupakhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<idno type="DOI">10.1109/AIACT.2019.8847909</idno>
	</analytic>
	<monogr>
		<title level="m">3rd International Conference on Advanced Information and Communications Technologies, AICT2019 -Proceedings</title>
				<imprint>
			<biblScope unit="page" from="216" to="222" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Mathematical model of adaptive knowledge testing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sviridova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kozak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">5th International Conference on Perspective Technologies and Methods in MEMS Design</title>
				<meeting><address><addrLine>MEMSTECH</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<biblScope unit="page" from="96" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Global Virtual Team Performance: The Effect of Coordination Effectiveness, Trust, and Team Cohesion</title>
		<author>
			<persName><forename type="first">R</forename><surname>Paul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Drake</surname></persName>
		</author>
		<author>
			<persName><surname>Liang</surname></persName>
		</author>
		<idno type="DOI">10.1109/TPC.2016.2583319</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Professional Communication</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="186" to="202" />
			<date type="published" when="2016">Sept. 2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">In-Group (Us) versus Out-Group (Them) Dynamics and Effectiveness in Partially Distributed Teams</title>
		<author>
			<persName><forename type="first">R</forename><surname>Privman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Hiltz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<idno type="DOI">10.1109/TPC.2012.2237253</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Professional Communication</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="33" to="49" />
			<date type="published" when="2013-03">March 2013. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Synthesis of non-equidistant location of sensors in sensor network</title>
		<author>
			<persName><forename type="first">O</forename><surname>Riznyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Povshuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kynash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Yurchak</surname></persName>
		</author>
		<idno type="DOI">10.1109/MEMSTECH.2018.8365734</idno>
	</analytic>
	<monogr>
		<title level="m">14th International Conference on Perspective Technologies and Methods in MEMS Design, MEMSTECH 2018 -Proceedings</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="204" to="208" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">The Importance of Deliberate Team Building: A Project-Focused Competence-Based Approach</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">K</forename><surname>Land</surname></persName>
		</author>
		<idno type="DOI">10.1109/EMR.2019.2915600</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Engineering Management Review</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="18" to="22" />
			<date type="published" when="2018">june 2019. 2018</date>
		</imprint>
	</monogr>
	<note>Secondquarter</note>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Quality Metrics for Hybrid Software Development Organizations -Case Study</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pradhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Nanniyur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Melanahalli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Palla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chulani</surname></persName>
		</author>
		<idno type="DOI">10.1109/QRS-C.2019.00097</idno>
	</analytic>
	<monogr>
		<title level="m">19-th International Conference on Software Quality, Reliability and Security Companion (QRS-C)</title>
				<meeting><address><addrLine>Sofia, Bulgaria</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="505" to="506" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Quality Based Software Architectural Decision Making</title>
		<author>
			<persName><forename type="first">T</forename><surname>Aslam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Rana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Batool</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Naheed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Andaleeb</surname></persName>
		</author>
		<idno type="DOI">10.1109/COMTECH.2019.8737836</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Communication Technologies (ComTech)</title>
				<meeting><address><addrLine>Rawalpindi, Pakistan</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="114" to="119" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">An Overview of Quality Metrics Used in Estimating Software Faults</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Alakus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Turkoglu</surname></persName>
		</author>
		<idno type="DOI">10.1109/IDAP.2019.8875925</idno>
	</analytic>
	<monogr>
		<title level="m">International Artificial Intelligence and Data Processing Symposium (IDAP)</title>
				<meeting><address><addrLine>Malatya, Turkey</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Evaluation of quality of backup copy systems data in telecommunication systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bandyra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Malitchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Khrabatyn</surname></persName>
		</author>
		<idno type="DOI">10.1109/PICST47496.2019.9061379</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Scientific and Practical Conference Problems of Infocommunications Science and Technology, PIC S&amp;T′2019</title>
				<meeting><address><addrLine>Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019-10-11">08-11 October 2019. 2019</date>
			<biblScope unit="page" from="329" to="325" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Case-based notations for technological problems solving in the knowledge-based environment</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Chesanovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Poteriailo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pikh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Romanyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pasyeka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 2019 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</title>
				<meeting><address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="10" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Research on Software Quality Evaluation Method Based on Process Evaluation and Test Results</title>
		<author>
			<persName><forename type="first">W</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zhao</surname></persName>
		</author>
		<idno type="DOI">10.1109/DSA.2019.00077</idno>
	</analytic>
	<monogr>
		<title level="m">6-th International Conference on Dependable Systems and Their Applications (DSA)</title>
				<meeting><address><addrLine>Harbin, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="480" to="483" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Socialcommunication web technologies in the higher education as means of knowledge transfer</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Romanyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sheketa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Poteriailo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pikh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Pasieka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kalambet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 14th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</title>
				<meeting><address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="35" to="39" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Evolutionary mechanism of frangibility in social consensus system based on negative emotions spread</title>
		<author>
			<persName><forename type="first">Y.-F</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H.-Y</forename><surname>Duan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z.-L</forename><surname>Geng</surname></persName>
		</author>
		<idno>Article ID 4037049</idno>
	</analytic>
	<monogr>
		<title level="j">Complexity</title>
		<imprint>
			<biblScope unit="volume">2017</biblScope>
			<biblScope unit="page">8</biblScope>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Information Management -the Basis for Fulfillment of People&apos;s Information Needs</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Říhová</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Dostálek</surname></persName>
		</author>
		<idno type="DOI">10.1109/ACIT52158.2021.9548386</idno>
	</analytic>
	<monogr>
		<title level="m">11th International Conference on Advanced Computer Information Technologies (ACIT)</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="469" to="472" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
