<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Impact of the Covid-19 Pandemic on Students Studying in High Education Institutions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mariia Nazarkevych</string-name>
          <email>mariia.a.nazarkevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Hrytsyk</string-name>
          <email>volodymyr.v.hrytsyk@lpnu.ua</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anzhela Kuza</string-name>
          <email>anzhela.kuza@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Shevchuk</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maryna Kostiak</string-name>
          <email>m.kostiak@gmail.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Ivan Franko National University</institution>
          ,
          <addr-line>1 Universytetska str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv National Agrarian University</institution>
          ,
          <addr-line>1 Volodymyra Velykoho str., Dublyany, 30831</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>12 Stepan Bandera str., Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Ukrainian Academy of Printing</institution>
          ,
          <addr-line>19 Pid Goloskom str., Lviv, 79020</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>187</fpage>
      <lpage>196</lpage>
      <abstract>
        <p>Nowadays in Ukraine, people must plan their future according to the specifics of new relations - the new specifics of communications, labor organization etc. Each industry has both common problems and its own specifics. This paper examines the specifics of the education field by researching issues of higher education at Lviv Polytechnic, Lviv National Agrarian University, Ukrainian Academy of Printing in the field of information technology. In particular, the impact of time on graduates and the effectiveness of knowledge they`ve received at the university. The study is based on a survey of graduates of ICTA, Lviv National Agrarian University, Ukrainian Academy of Printing, which contains questions grouped into three subgroups: subjective perception of the studying process, subjective feeling for choosing a profession, subjective feeling of the need for changes in the education system. The survey was conducted in the target group of graduates. The answers in the training group shows the level of satisfaction with the baggage of knowledge and convictions in the quality of education among graduates. Indicate the level of how the market sees the prospects for computer science. Answers in the cyber security group is the attitude of young people (computer science students) to the provision of cyber communication at the state level. No research has been conducted on the provision of the internet at the university level. The results of the work are visualized and presented both in graphs and in absolute and relative values. The study can assess the level of resilience of computer science specialties to the problems caused by the pandemic, including distance studying and distance work in IT companies. To enhance the results, the dynamics of recruitment of entrants over several years was analyzed. In the report for 2021 we see that the number of freshmen has increased in Lviv universities. Of the 100% of surveyed students, who worked during the pandemic in the private IT companies, worked remotely and received a full salary, which also shows the resilience of the specialty to the challenges of the pandemic (this mode reduces risks and their distribution).</p>
      </abstract>
      <kwd-group>
        <kwd>1 Pandemic</kwd>
        <kwd>communications</kwd>
        <kwd>students survey</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The aim of the study is to obtain a model of the effectiveness of the use of knowledge acquired at
the university in time and how the pandemic affected the application of this knowledge. The sample
was obtained from a group of graduates and students. The results will allow us to respond quickly to
the challenges posed by a pandemic. In particular, to assess the need for qualitative/quantitative
indicators of changes in the ways of presenting knowledge, changes in the retraining of teachers,
changes in the content of courses, changes in the needs of the labor market.</p>
      <p>The study conducted a survey containing 14 questions, grouped into three subgroups: the subjective
feeling of the learning process, the subjective feeling of choosing a profession, and the subjective feeling
of internet security. The survey was conducted in the target group of the most active part of society.</p>
      <p>The aim of the study is to obtain a model of the effectiveness of the use of knowledge acquired at
the university in time and how the pandemic affected the application of this knowledge. The sample
was obtained from a group of graduates 15–20 years after graduation. The results will allow you to
respond quickly to the challenges posed by a pandemic. In particular, to assess the need for qualitative
/ quantitative indicators of changes in the ways of presenting knowledge, changes in the retraining of
teachers, changes in the content of courses, changes in the needs of the labor market.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Characteristics of Graduates of the National University Lviv Polytechnic</title>
      <p>For indirect verification of the survey results, this section reflects the reporting of NU “LP” and
ICTA. In particular, the trend of increasing the number of first-year students is considered.</p>
      <p>
        In 2020 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] 24,834 students studied at Lviv Polytechnic, of which 20,612 were full-time students
and part-time students, see Fig. 1. In 2020, 24,834 students studied at Lviv Polytechnic, of which 20,612
were full-time students and 4,222 part-time students.
      </p>
      <p>
        The contingent of full-time and part-time students at educational and research institutes in Fig.2 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
Thus, in 2020/2021, 24,834 students studied at Lviv Polytechnic, of which 20,612 full-time and 4,222
part-time, in 2019/2020 25,208 students studied at Lviv Polytechnic, of which 20,574 were full-time
and 4634 students by correspondence, in 2018/2019 25815 students studied at Lviv Polytechnic, of
which 20719 full-time and 5096 by correspondence, in 2018/2019 25815 students studied at Lviv
Polytechnic, of which full-time 20719, and 5096 students by correspondence, in 2017/2018 25815
students studied at Lviv Polytechnic, of which 20719 full-time and 5096 by correspondence, in
2016/2017 27109 students studied at Lviv Polytechnic, with of which 21,437 full-time students and
5,672 part-time students.
      </p>
      <p>
        Thus, in 2019, the University enrolled in educational programs for bachelors, regardless of forms of
education and sources of funding, a total of 5421 people (in 2018—5673 people, in 2017—5422 people,
in 2016—5523 people) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        In total, 10,950 people were enrolled in Lviv Polytechnic and the colleges that are part of its structure
in 2019 (11,574 in 2018, 11,701 in 2017), of which 5,287 were enrolled at the expense of the state
budget persons [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>That is, we are seeing a steady increase in the number of computer science students, and the
pandemic has only underscored the industry’s adaptability to the challenges of globalization.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Characteristics of graduates who studied at the Ukrainian Academy of</title>
    </sec>
    <sec id="sec-4">
      <title>Printing</title>
      <p>
        The Ukrainian Academy of Printing includes: three faculties with 19 departments and Lviv
Polygraphic Professional College [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>UAP is constantly improving its material and technical base. In 2020, the academy launched Media
Coworking Space and Art Space, which employs student television and online publications, organizes
meetings with stakeholders, representatives of culture and art, and introduces elements of non-formal
education. Since the beginning of 2020, the academy has created and successfully operates a modern
laboratory of digital and additive technologies, where students of relevant specialties undergo practical
and laboratory classes.</p>
      <p>A total of 2,662 entrants applied for admission to the UAP for a bachelor’s degree in 2020, including
2,391 full-time applications. In 2020, 403 applications were submitted for a master's degree, of which
305 were full-time and 98 were part-time.</p>
      <p>The largest number of applications for full-time bachelor’s degree applications is submitted in the
specialty “Journalism”—409, “Computer Science”—327.</p>
      <p>Today the contingent of students of the Ukrainian Academy of Printing is 2560 people. In total, in
2020, a total of 608 people were enrolled in the UAP for all levels of higher education, of which 331—
by state order, 277—on a contract basis.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Survey and Analysis of the Results of Respondents-Graduates in the Field of “Computer Security”</title>
      <p>The list of questions and answers of respondents-graduates in the field of "Computer Security" aged
35–40 years is given in Table 1.</p>
      <p>Did / how did the pandemic affect your opinion about your choice 7%
of specialty (profession)?
Has distance learning had a positive effect on your learning? 0%
Do you think that in the future part of classes at the university 0%
should be remote?</p>
      <p>This study (Anonymous survey) showed that ICTA graduates (35-40 years old) clearly indicate their
priority on IT. These answers show that a) the active part of society (sample of 35-40 years) already
consciously sees the prospect of employment in the field of IT; b) clearly considers certain tools to
achieve the goal; c) see the main purpose of training quality employment.</p>
      <p>Surveys of students of the Ukrainian Academy of Printing were conducted with students studying
in the Educational and Professional Programs Computer Science, Information Systems and
Technologies, Automation and Computer-Integrated Technologies, for bachelor's and master's degrees.</p>
      <p>Questions and answers of respondents-students of the Ukrainian Academy of Printing in the field of
“Computer Science” aged 19-20 years (sample of 122 respondents) is given in Table 2.</p>
      <p>Did / how did the pandemic affect your opinion about your choice of
specialty (profession)?
Has distance learning had a positive effect on your learning?
Do you think that in the future part of classes at the university should be
remote?
Did you plan to master the IT profession when you entered the 1st year?
What is the first job you would like to get after graduation?
Do you already work in IT?
Is your work remote?
Is 4G bandwidth on your mobile device enough for you today (in the
pandemic era)?
Is 100 mB/s bandwidth enough for you today (in the pandemic era)?
Do you use Wi-Fi at home?
In your opinion, was there a cyber attack on you that could have been
avoided in the absence of a pandemic?
In your opinion, was a cyberattack carried out on your relatives, which
could have been avoided in the absence of a pandemic?
In your opinion, was there a cyber attack on your acquaintances, which
could have been avoided in the absence of a pandemic?
The main place of residence to study in Lviv?
0
83
24
122
122
24
91
116</p>
      <p>Unknown/
None
119
32
5
0
0
8
31
0
4
0
0
6
10
—
1 Did / how did the pandemic affect your opinion about your choice of 2 18
specialty (profession)?
2 Has distance learning had a positive effect on your learning? 22 3
3 Do you think that in the future part of classes at the university should be 18 5
remote?
4 Did you plan to master the IT profession when you entered the 1st year? 27 0
5 What is the first job you would like to get after graduation? 28 0
6 Do you already work in IT? 2 24
7 Is your work remote? 15 13
8 Is 4G bandwidth on your mobile device enough for you today (in the 26 1
pandemic era)?
9 Is 100 mb /s bandwidth enough for you today (in the pandemic era)? 26 1
10 Do you use wi-fi at home? 28 0
11 In your opinion, was there a cyber attack on you that could have been 1 27
avoided in the absence of a pandemic?
12 In your opinion, was a cyberattack carried out on your relatives, which 1 27
could have been avoided in the absence of a pandemic?
13 In your opinion, was there a cyber attack on your acquaintances, which 1 27
could have been avoided in the absence of a pandemic?
14 The main place of residence to study in Lviv? 10 18
15 Did the LNAU Virtual Learning Environment have a positive effect on 27 0
your learning process?</p>
      <p>
        The answers to the questions related to the group of Internet / mobile communications indicate a)
the use of the full range of services; b) satisfaction with this volume of services (Fig. 3). Which, given
the total use of laptops in the classroom, indicates a lack of compliance with the university's provision
of computer technology laboratories [
        <xref ref-type="bibr" rid="ref10 ref11 ref8 ref9">8–11</xref>
        ].
      </p>
      <p>
        Answers to a group of questions about the impact of cyber attacks [
        <xref ref-type="bibr" rid="ref12 ref13 ref14">12–14</xref>
        ] show that the impact of
negative Internet factors is perceived as either insignificant (the government copes with the task of
protecting cyberspace), or there is a problem of misunderstanding the concept of cyber attack, and
therefore additional research is needed will provide a more detailed list of threats).
8
3
5
1
0
2
0
1
1
0
—
—
—
—
1
      </p>
      <p>
        The survey was conducted taking into account the methods described in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Questions for
respondents were selected according to [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Visualization of the results was performed on Python in
real time according to the method discussed in [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">17–19</xref>
        ]. In the future, it is planned to create a mobile
survey installation, the approaches to which are described in [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref27 ref28">20–23, 27–30</xref>
        ].
      </p>
      <p>
        The paper shows the experiment as an element of pre-processing or for subjective evaluation [
        <xref ref-type="bibr" rid="ref24 ref25">24,25</xref>
        ].
In addition, this study shows the possibility of applying these methods in other areas [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. The
effectiveness of the considered methods in new / other areas is planned to be investigated in further
works. The paper mentions the procedure of objective evaluation of efficiency and shows the way to
the implementation of automatic survey.
      </p>
    </sec>
    <sec id="sec-6">
      <title>5. Research Results</title>
      <p>1. The answers in the study group show the dissatisfaction of graduates with the learning process
and the belief in the insufficient quality of education. Especially the failure of programming and
computer networks. Although the ICTA is not exactly a computer science. However, as we can see
from anonymous surveys, technical specialties are clearly associated with either computer networks or
programming.</p>
      <p>For respondents of the Ukrainian Academy of Printing, it is advisable to create a single information
environment for higher education institutions using cloud services Google Suite for Education (formerly
Google Apps for Education).</p>
      <p>On a positive note, the creation of the Virtual Learning Environment of Lviv National Agrarian
University helps to improve the quality of the learning process during distance learning.
2. Answers in the group: employment indicates that the market sees the prospects of studying for the
specialty of computer science.</p>
      <p>3. The answers in the cybersecurity group shows the need for changes in universities understanding
of the concept of computer security: in an era of mass “fake Internet news,” “hired protesters with media
coverage,” “commissioned publications on social networks,” etc. Graduates (including computer
security) do not perceive this as a planned attack on them.</p>
      <p>4. Thus, the study displays that both the survey schedules and student enrollment shows the
resilience of computer science specialties to the problems caused by the pandemic, including distance
learning and distance work in IT firms.</p>
      <p>100% of the surveyed students, who worked during the pandemic in the private IT sector of
information technology, worked remotely and received a full salary, which also shows the resilience of
the specialty to the challenges of the pandemic (this mode reduces the risks).</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusions</title>
      <p>The survey was passed by all willing, who graduated from the ICTA at the National University “Lviv
Polytechnic” aged 35–40 years, students of Ukrainian Academy of Printing and Lviv National Agrarian
University. The survey was voluntary and completely anonymous: personal and contact data were not
collected.</p>
      <p>This study is allowed to collect data for analysis, forecasting and development of next steps towards
solving educational problems, including the problem of pandemic.
[29]Marusenko, R., Sokolov, V., Buriachok, V., Experimental Evaluation of Phishing Attack on
High School Students, in: Advances in Computer Science for Engineering and Education III,
668–680, 2020. https://doi.org/10.1007/978-3-030-55506-1_59
[30]Hu, Z., Buriachok, V., Sokolov, V., Implementation of social engineering attack at institution
of higher education, in: International Workshop on Cyber Hygiene, CybHyg, vol. 2654, 155–
164, 2020.
[31]Nazarkevych, M., Yavourivskiy, B., &amp; Klyuynyk, I. (2015, February). Editing raster images
and digital rating with software. In The Experience of Designing and Application of CAD
Systems in Microelectronics, 439–441.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ji</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Financial markets under the global pandemic of COVID19</article-title>
          . Finance Research Letters,
          <volume>36</volume>
          ,
          <fpage>101528</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Fauci</surname>
            ,
            <given-names>A. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lane</surname>
            ,
            <given-names>H. C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Redfield</surname>
            ,
            <given-names>R. R.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Covid-19-navigating the uncharted</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Andreadakis</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Román</surname>
            ,
            <given-names>R. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tollefsen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saville</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Mayhew</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>The COVID-19 vaccine development landscape</article-title>
          .
          <source>Nature reviews. Drug discovery</source>
          ,
          <volume>19</volume>
          (
          <issue>5</issue>
          ),
          <fpage>305</fpage>
          -
          <lpage>306</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Gorbulin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Danyk</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>National security of Ukraine: focus of priorities in a pandemic</article-title>
          .
          <source>Bulletin of the National Academy of Sciences of Ukraine, (5)</source>
          ,
          <fpage>3</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Materials for the report of the rector of</article-title>
          the National University “Lviv Polytechnic” Y. Y.
          <source>Bobal at the Conference of the labor collective on January 28</source>
          ,
          <year>2021</year>
          . URL: http: //www.zvitrektora.
          <source>pdf (lpnu.ua).</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Information for students and entrants</article-title>
          . Access mode: http://www.https://lpnu.ua/ikni
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7] Ukrainian academy of printing / [B.
          <string-name>
            <surname>Durnyak</surname>
          </string-name>
          et al.].
          <source>Lviv : UAP</source>
          ,
          <year>2014</year>
          . 65,
          <string-name>
            <surname>ISBN</surname>
          </string-name>
          978-966-322- 443-5.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Hrytsyk</surname>
          </string-name>
          <article-title>Future of Artificial Intelligence: treats and possibility</article-title>
          ,
          <source>Proceedings of ITA'</source>
          <year>2017</year>
          ,
          <article-title>INFOS section</article-title>
          , Varna,
          <fpage>91</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Hrytsyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grondzal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Bilenkyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2015</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Augmented reality for people with disabilities</article-title>
          .
          <source>In 2015 X International Scientific and Technical Conference “Computer Sciences and Information Technologies”(CSIT)</source>
          (pp.
          <fpage>188</fpage>
          -
          <lpage>191</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Hrytsyk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Real-Time</surname>
            <given-names>Sensing</given-names>
          </string-name>
          ,
          <article-title>Reasoning and Adaptation for Computer Vision Systems</article-title>
          . In: Babichev S.,
          <string-name>
            <surname>Lytvynenko</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <source>(eds) Lecture Notes in Computational Intelligence and Decision Making. ISDMCI 2021. Lecture Notes on Data Engineering and Communications Technologies</source>
          , vol
          <volume>77</volume>
          . Springer, Cham,
          <fpage>573</fpage>
          -
          <lpage>585</lpage>
          . https://doi.org/10.1007/978- 3-
          <fpage>030</fpage>
          -82014-5_
          <fpage>39</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.,
          <string-name>
            <surname>Maslanych</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheketa</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Evaluation of the effectiveness of different image skeletonization methods in biometric security systems</article-title>
          // 2021, International Journal of Sensors,
          <source>Wireless Communications and Control</source>
          <volume>11</volume>
          (
          <issue>5</issue>
          ),
          <fpage>542</fpage>
          -
          <lpage>552</lpage>
          ; https://doi.org/10.2174/ 2210327910666201210151809
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hrytsyk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voznyi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Marchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vozna</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>Method of detecting special points on biometric images based on new filtering methods</article-title>
          . // 2021, CEUR Workshop Proceedings 2923, pp.
          <fpage>243</fpage>
          -
          <lpage>251</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Boyko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fraissard</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>Investigation of the electron-acoustic phonon interaction via the deformation and piezoelectric potentials in AlN/GaN resonant tunneling nanostructures</article-title>
          .
          <year>2021</year>
          ,
          <volume>156</volume>
          ,
          <fpage>106928</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boyko</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khimich</surname>
            ,
            <given-names>O.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>M. High-Performance Supercomputer Technologies of Simulation and Identification of Nanoporous Systems with Feedback for nComponent Competitive Adsorption</article-title>
          .
          <source>Cybernetics and Systems Analysisthis</source>
          ,
          <year>2021</year>
          ,
          <volume>57</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>316</fpage>
          -
          <lpage>328</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Boyko</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mudryk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>High-Performance Adsorption Modeling Methods with Feedback-Influynces in n-component Nanoporous Media</article-title>
          .
          <year>2021</year>
          11th International Conference on Advanced Computer Information Technologies, ACIT 2021 - Proceedingsthis link is disabled,
          <year>2021</year>
          , pp.
          <fpage>441</fpage>
          -
          <lpage>444</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Mashkov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krak</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bardachov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvynenko</surname>
          </string-name>
          , V.
          <source>Preface Lecture Notes on Data Engineering and Communications Technologiesthis link is disabled</source>
          ,
          <year>2022</year>
          ,
          <volume>77</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Dronjuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Troyan</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2016</year>
          ,
          <article-title>October)</article-title>
          .
          <article-title>The modified amplitudemodulated screening technology for the high printing quality</article-title>
          .
          <source>In International Symposium on Computer and Information Sciences</source>
          (pp.
          <fpage>270</fpage>
          -
          <lpage>276</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Dronyuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Fedevych</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2015</year>
          ,
          <article-title>October)</article-title>
          .
          <source>Synthesis of Noise-Like Signal Based on Ateb-Functions. In International Conference on Distributed Computer and Communication Networks</source>
          (pp.
          <fpage>132</fpage>
          -
          <lpage>140</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Logoyda</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nazarkevych</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voznyi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dmytruk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Smotr</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Identification of Biometric Images using Latent Elements</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          . EID:
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85074659529</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vavruk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2013</year>
          ,
          <article-title>February)</article-title>
          .
          <article-title>Hardware and software tools for motion control of mobile robotic system</article-title>
          .
          <source>In 2013 12th International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          (pp.
          <fpage>368</fpage>
          -
          <lpage>368</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsymbal</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khavalko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skorokhoda</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tesluyk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2018</year>
          ,
          <article-title>August)</article-title>
          .
          <article-title>Neurallike means for data streams encryption and decryption in real time</article-title>
          .
          <source>In 2018 IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP)</source>
          (pp.
          <fpage>438</fpage>
          -
          <lpage>443</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Medykovskyi</surname>
            ,
            <given-names>M. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I. G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tsymbal</surname>
            ,
            <given-names>Y. V.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Information analytical system for energy efficiency management at enterprises in the city of Lviv (Ukraine). Aktual'ni Problemy Ekonomiky= Actual Problems in Economics</article-title>
          , (
          <volume>175</volume>
          ),
          <fpage>379</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Skorokhoda</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2010</year>
          , April).
          <article-title>Methods and VLSI-structures for neural element implementation</article-title>
          .
          <source>In 2010 Proceedings of VIth International Conference on Perspective Technologies and Methods in MEMS Design</source>
          (pp.
          <fpage>135</fpage>
          -
          <lpage>135</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Medykovskyy</surname>
            ,
            <given-names>M. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasyeka</surname>
            ,
            <given-names>N. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Turchyn</surname>
            ,
            <given-names>O. B.</given-names>
          </string-name>
          (
          <year>2017</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Scientific research of life cycle performance of information technology</article-title>
          .
          <source>In 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)</source>
          (Vol.
          <volume>1</volume>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>428</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Budz</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pelekh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokulska</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Development of the quantitative method for automated text content authorship attribution based on the statistical analysis of N-grams distribution</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>6</volume>
          (
          <issue>2</issue>
          ),
          <fpage>28</fpage>
          -
          <lpage>51</lpage>
          . https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .186834
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shatskykh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kohut</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petruchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzyubyk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Design of a recommendation system based on Collaborative Filtering and machine learning considering personal needs of the user</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies</source>
          <volume>4</volume>
          (
          <issue>2</issue>
          ),
          <fpage>6</fpage>
          -
          <lpage>28</lpage>
          . https://doi.org/10.15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .175507
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Buriachok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <article-title>Implementation of Active Learning in the Master's Program on Cybersecurity</article-title>
          , in: Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education</surname>
            <given-names>II</given-names>
          </string-name>
          ,
          <fpage>610</fpage>
          -
          <lpage>624</lpage>
          ,
          <year>2019</year>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>57</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , et al.,
          <article-title>Cybersecurity in Educational Networks</article-title>
          ,
          <source>in: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>359</volume>
          -
          <fpage>364</fpage>
          ,
          <year>2020</year>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -39512-4_
          <fpage>56</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>