<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Embracing Emerging Technologies: Insights from the 6th Workshop for Young Scientists in Computer Science &amp; Software Engineering</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhiy O. Semerikov</string-name>
          <email>SE@SW</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii M. Striuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Academy of Cognitive and Natural Sciences</institution>
          ,
          <addr-line>54 Gagarin Ave., Kryvyi Rih, 50086</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute for Digitalisation of Education of the NAES of Ukraine</institution>
          ,
          <addr-line>9 M. Berlynskoho Str., Kyiv, 04060</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kryvyi Rih National University</institution>
          ,
          <addr-line>11 Vitalii Matusevych Str., Kryvyi Rih, 50027</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Kryvyi Rih State Pedagogical University</institution>
          ,
          <addr-line>54 Universytetskyi Ave., Kryvyi Rih, 50086</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Zhytomyr Polytechnic State University</institution>
          ,
          <addr-line>103 Chudnivsyka Str., Zhytomyr, 10005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The 6th Workshop for Young Scientists in Computer Science &amp; Software Engineering showcases cuttingedge research from emerging talents. This volume comprises diverse papers illuminating emerging technologies' profound impact across various domains. Several contributions underscore the pivotal role of telemetry, graph theory, and machine learning in optimising distributed systems, detecting anomalies, and streamlining processes. Others delve into acoustic surveillance techniques for UAV detection, genetic algorithms for university scheduling, and neural network-driven optimisation of chemical synthesis. The proceedings also highlight novel approaches to assessing software architecture reliability, implementing ERP systems, and designing information systems for viral infection data analysis. Thermal resistance calculation software, multimodal distribution data processing methods, and high-performance computing energy consumption modelling are also explored. Moreover, the importance of user experience research in cross-platform application development is emphasised, alongside the design of virtual physics laboratories and Python learning game applications. Notably, predatory conferences are addressed, proposing robust conference management platforms to uphold research integrity. Collectively, these papers exemplify young scientists' innovative spirit and determination to tackle real-world challenges and push the boundaries of their disciplines.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;emerging technologies</kwd>
        <kwd>telemetry</kwd>
        <kwd>graph theory</kwd>
        <kwd>machine learning</kwd>
        <kwd>acoustic surveillance</kwd>
        <kwd>genetic algorithms</kwd>
        <kwd>neural networks</kwd>
        <kwd>software reliability</kwd>
        <kwd>enterprise resource planning</kwd>
        <kwd>user experience</kwd>
        <kwd>virtual laboratories</kwd>
        <kwd>Python learning games</kwd>
        <kwd>predatory conferences</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>gies.</p>
      <p>
        CS&amp;SE@SW topics of interest since 2018 [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1, 2,
3, 4, 5</xref>
        ] are:
1. Software engineering
• Software requirements [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]
• Software design [
        <xref ref-type="bibr" rid="ref6 ref7 ref8 ref9">6, 8, 9, 7</xref>
        ]
• Software construction [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">10, 8, 9</xref>
        ]
• Software testing [
        <xref ref-type="bibr" rid="ref11 ref6">6, 11</xref>
        ]
• Software maintenance [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
• Software engineering management [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
• Software development process [8, 9, 12,
      </p>
      <p>7]
• Software engineering models and
meth</p>
      <p>
        ods [
        <xref ref-type="bibr" rid="ref10">13, 10</xref>
        ]
• Software quality [
        <xref ref-type="bibr" rid="ref11 ref6">14, 6, 11</xref>
        ]
• Software engineering professional
prac
      </p>
      <p>
        tice [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
2. Theoretical computer science
• Data structures and algorithms [
        <xref ref-type="bibr" rid="ref9">15, 16, 17, 9</xref>
        ]
• Theory of computation [15]
• Information and coding theory [18, 19]
• Formal methods [18]
3. Computer systems
4. Computer applications
• Computer architecture and computer engineering [16, 17]
• Computer performance analysis [16]
• Databases [17]
• Computer graphics and visualization [
        <xref ref-type="bibr" rid="ref12">20, 12</xref>
        ]
• Human-computer interaction [
        <xref ref-type="bibr" rid="ref8">21, 8, 17</xref>
        ]
• Scientific computing [20, 16, 17]
• Artificial intelligence [
        <xref ref-type="bibr" rid="ref9">22, 20, 13, 9, 19</xref>
        ]
      </p>
      <p>
        This volume represents the proceedings of the 6th Workshop for Young Scientists in Computer
Science &amp; Software Engineering (CS&amp;SE@SW 2023), held in Kryvyi Rih, Ukraine, on February
2, 2024. It comprises 17 contributed papers that were carefully peer-reviewed and selected from
42 submissions. At least two program committee members reviewed each submission. The
accepted papers present a state-of-the-art overview of successful cases and provide guidelines
for future research.
2. CS&amp;SE@SW 2023 Program Committee
• Nadire Cavus, Near East University [23, 24]
• Stuart Charters, Lincoln University [25, 26]
• Attila Kertesz, University of Szeged [
        <xref ref-type="bibr" rid="ref13">27, 28</xref>
        ]
• Nagender Kumar Suryadevara, University of Hyderabad [
        <xref ref-type="bibr" rid="ref14 ref15">29, 30</xref>
        ]
• Orken Mamyrbaeyv, Institute of Information and Computational Technologies [
        <xref ref-type="bibr" rid="ref16 ref17">31, 32</xref>
        ]
• Bongkyo Moon, QIR [
        <xref ref-type="bibr" rid="ref18 ref19">33, 34</xref>
        ]
• Michael J. O’Grady, University College Dublin [
        <xref ref-type="bibr" rid="ref20 ref21">35, 36</xref>
        ]
• Grażyna Paliwoda-Pękosz, Krakow University of Economics [
        <xref ref-type="bibr" rid="ref22 ref23">37, 38</xref>
        ]
• Pedro Valderas, Universitat Politècnica de València [
        <xref ref-type="bibr" rid="ref24">39, 40</xref>
        ]
• Nataliia Veretennikova, Lviv Polytechnic National University [41, 42]
• Xianzhi Wang, University of Technology Sydney [43, 44]
• Alejandro Zunino, ISISTAN - UNCPBA &amp; CONICET [45, 46]
Additional reviewers:
• Emrah Atilgan, Eskişehir Osmangazi University [47, 48]
• Olexander Barmak, Khmelnytskyi National University [49, 50]
• Kevin Matthe Caramancion, University of Wisconsin–Stout [
        <xref ref-type="bibr" rid="ref25 ref26">51, 52</xref>
        ]
• Pavlo Hryhoruk, Khmelnytskyi National University [
        <xref ref-type="bibr" rid="ref27 ref28">53, 54</xref>
        ]
• Oleksandr Kolgatin, Simon Kuznets Kharkiv National University of Economics [
        <xref ref-type="bibr" rid="ref29 ref30">55, 56</xref>
        ]
• Valerii Kontsedailo, Inner Circle [
        <xref ref-type="bibr" rid="ref31 ref32">57, 58</xref>
        ]
• Vyacheslav Kryzhanivskyy, R&amp;D Seco Tools AB [
        <xref ref-type="bibr" rid="ref33 ref34">59, 60</xref>
        ]
• Andrey Kupin, Kryvyi Rih National University [
        <xref ref-type="bibr" rid="ref35 ref36">61, 62</xref>
        ]
• Mykhailo Medvediev, ADA University [
        <xref ref-type="bibr" rid="ref37 ref38">63, 64</xref>
        ]
• Vasyl Oleksiuk, Ternopil Volodymyr Hnatiuk National Pedagogical University [
        <xref ref-type="bibr" rid="ref39 ref40">65, 66</xref>
        ]
• Viacheslav Osadchyi, Borys Grinchenko Kyiv University [
        <xref ref-type="bibr" rid="ref41 ref42">67, 68</xref>
        ]
• James B. Procter, University of Dundee [
        <xref ref-type="bibr" rid="ref43 ref44">69, 70</xref>
        ]
• Serhiy Semerikov, Kryvyi Rih State Pedagogical University [
        <xref ref-type="bibr" rid="ref45 ref46">71, 72</xref>
        ]
• Etibar Seyidzade, Baku Engineering University [
        <xref ref-type="bibr" rid="ref47 ref48">73, 74</xref>
        ]
• Andrii Striuk, Kryvyi Rih National University [
        <xref ref-type="bibr" rid="ref49 ref50">75, 76</xref>
        ]
• Tetiana Vakaliuk, Zhytomyr Polytechnic State University [77, 78]
• Volodymyr Voytenko, Athabasca University [79, 80]
      </p>
    </sec>
    <sec id="sec-2">
      <title>3. CS&amp;SE@SW 2023 organizers</title>
      <p>The 6th edition of the CS&amp;SE@SW was coordinated by the Academy of Cognitive and Natural
Sciences (ACNS), a non-governmental organisation dedicated to nurturing the growth of
researchers’ expertise in the cognitive and natural sciences arena. ACNS’s mission encompasses
enhancing research, safeguarding rights and liberties, and catering to professional, scientific,
social, and other interests.</p>
      <p>ACNS is engaged in a spectrum of activities, including:
• Spearheading research initiatives within the cognitive and natural sciences domain and
fostering collaborative ties among researchers.
• Orchestrating conferences, workshops, training sessions, internships, and other platforms
for exchanging and disseminating knowledge in the realm of cognitive and natural
sciences.
• Publishing conference proceedings, collections of scholarly works, and scientific journals
(https://acnsci.org/journal):
– Educational Dimension [81]
– Educational Technology Quarterly [82]
– CTE Workshop Proceedings [83]</p>
      <p>
        Among ACNS’s prominent publications is the Diamond Open Access Journal of Edge
Computing (JEC), a peer-reviewed journal covering the science, theories, and practice of IoT, distributed
systems, and edge computing [84]. JEC considers scientific research on using and applying edge
computing in various fields: education, science, medicine, architecture, etc. [ 85]. Notably, JEC
covers a broad range of topics aligned with CS&amp;SE@SW topics of interest:
• Artificial intelligence [86, 87]
• Computer networks [88]
• Computer performance analysis [89]
• Concurrent, parallel and distributed systems [
        <xref ref-type="bibr" rid="ref51 ref52 ref53">90, 91, 92</xref>
        ]
• Formal methods [
        <xref ref-type="bibr" rid="ref54">93</xref>
        ]
• Human-computer interaction [
        <xref ref-type="bibr" rid="ref55 ref56">94, 95, 89, 84</xref>
        ]
• Mathematical foundations [
        <xref ref-type="bibr" rid="ref57">96</xref>
        ]
• Scientific computing [
        <xref ref-type="bibr" rid="ref58 ref59 ref60 ref61">97, 98, 99, 100, 89</xref>
        ]
      </p>
    </sec>
    <sec id="sec-3">
      <title>4. CS&amp;SE@SW 2023 keynote</title>
      <p>This year, one keynote speaker was selected by the CS&amp;SE@SW 2023 program committee:
Dmytro Nechai (Chief architect at PLATMA, CTO at SalesJinn, mentor and lector at National
Technical University of Ukraine and “Igor Sikorsky Kyiv Polytechnic Institute”) “The future is
already here. What is low-code and what to serve it with?” (figure 1).</p>
    </sec>
    <sec id="sec-4">
      <title>5. CS&amp;SE@SW 2023 articles overview</title>
      <sec id="sec-4-1">
        <title>5.1. Software engineering</title>
        <p>The article “An approach to assessing the reliability of software systems based on a graph model
of method dependence” by Krutko et al. [14] proposes a method for evaluating the reliability
of software systems. The authors highlight the importance of software quality, particularly
reliability, in today’s rapidly evolving software development landscape. They observe that
existing reliability assessment methods often rely on hardware models, which may not fully
capture the intricacies of software systems.</p>
        <p>The article describes the proposed method, including the steps in constructing the graph model
and calculating reliability indicators. It also presents examples demonstrating the application of
the approach to simple and complex software systems.</p>
        <p>
          The article “Methodology of implementation of modern information systems at commercial
enterprises” [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] provides a comprehensive overview of implementing ERP (Enterprise Resource
Planning) systems based on the AIM (Application Implementation Method) methodology, with
a focus on Ukrainian realities. Authored by Yurii O. Chernukha, Oksana V. Klochko, and Tetiana
P. Zuziak from Vinnytsia Mykhailo Kotsiubynskyi State Pedagogical University, Ukraine, the
article delves into the various stages of implementing ERP systems, including preparation and
planning, selecting an ERP system, design, development and testing, training and support,
analysis and optimisation, and support and updates.
        </p>
        <p>The authors meticulously detail each phase, providing insights into the tasks, challenges, and
considerations associated with implementing ERP systems. They emphasise the importance
of careful planning, stakeholder collaboration, and continuous monitoring throughout the
implementation process. Furthermore, they highlight the significance of selecting the right ERP
system and project management strategies to ensure successful outcomes.</p>
        <p>A notable aspect of the article is its discussion on the methodology for implementing ERP
systems. It mainly focuses on the Oracle AIM methodology, which divides the project into six
phases and encompasses various processes within each phase. The authors provide an in-depth
analysis of the documents associated with each process, ofering readers a comprehensive
understanding of the documentation required for successful ERP implementation.</p>
        <p>Moreover, the article addresses the challenges specific to Ukrainian enterprises, such as
historical processes, diverse applications, and limited documentation, and provides practical
recommendations for overcoming these challenges. It emphasises the importance of
organisational restructuring, business process optimisation, and the active involvement of company
management in the implementation process.</p>
        <p>Additionally, the article discusses the role of project management tools and communication
platforms in facilitating collaboration and coordination among project teams. It highlights
the significance of Microsoft Project, Jira, Confluence, and other tools in streamlining project
activities and ensuring efective communication among team members.</p>
        <p>The article “Information System Module for Analysis of Viral Infections Data Based on
Machine Learning” [13] presents a comprehensive exploration of the development and
implementation of an information system module designed to analyse viral infection data. Authored
by Nickolay Rudnichenko, Vladimir Vychuzhanin, Tetiana Otradskya, and Igor Petrov, the
article delves into the significance of automating data analysis processes, particularly in the
context of viral diseases, utilising intelligent technologies and machine learning methods.</p>
        <p>The article begins by addressing the relevance of data analysis automation in various fields,
emphasising the importance of modern tools and approaches in eficiently handling large
volumes of data. With a focus on viral diseases, especially in the post-COVID-19 era, the authors
highlight the ongoing need for analysing disease patterns, forecasting, and automating symptom
detection to prevent further spread.</p>
        <p>Key components and technologies used in developing the information system module are
described, including using the UML language for system design modelling, client-server
architecture, and relational database implementation. The process of creating, training, and testing
machine learning models is detailed, along with assessing input features’ significance and error
matrix evaluation.</p>
        <p>The article provides insights into the project structure, outlining the system’s functionalities
such as authentication, dataset importation, data visualisation, and model parameter
modification. It also presents a sequence diagram illustrating the system’s operation and a component
diagram highlighting its main modules.</p>
        <p>Results from implementing five machine learning models – Gaussian Naive Bayes, Decision
Tree, Random Forest, Support Vector Machine, and Neural Network – are discussed, along with
the performance metrics and analysis of each model’s outputs. The authors demonstrate the
efectiveness of these models in analysing COVID-19 symptom data, identifying key symptoms
indicative of the virus, and assessing model accuracy and speed.</p>
        <p>In summary, the article provides a thorough overview of developing and implementing an
information system module for analysing viral infection data using machine learning
techniques. It underscores the importance of automated data analysis in addressing public health
challenges, with implications for improving disease prevention and control strategies. The
ifndings contribute to advancing research in the field of data-driven healthcare and highlight
avenues for future exploration, including developing more eficient models and expanding
datasets for comprehensive analysis.</p>
        <p>
          The article “Designing a cross-platform user-friendly transport company application” [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]
delves into the crucial aspects of developing an application for a transportation company with
a focus on cross-platform compatibility user experience (UX) and user interface (UI) design.
Authored by Maksym Y. Salohub, Olena H. Rybalchenko, and Svitlana V. Bilashenko from Kryvyi
Rih National University, the paper presents a comprehensive approach to creating a scalable
as panic buttons, driver selection options, and trip archives for users.
        </p>
        <p>The article discusses various approaches to cross-platform development, emphasising the
advantages of using technologies like React Native to streamline the development process and
ensure compatibility across diferent platforms. The authors also address challenges in UI design
and propose solutions to create an intuitive and visually appealing interface.</p>
        <p>Furthermore, the paper outlines the system development process, including using
technologies like Express.js for backend development and MongoDB for database management. The
integration of Expo CLI facilitates testing and deployment, while the utilisation of Feather Icons
enhances the semantic interaction within the application.</p>
        <p>
          The article “Research of the route planning algorithms on the example of a drone delivery
system software development” [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] provides an in-depth analysis of various route planning
algorithms for drone delivery systems. Authored by Yevhen L. Turchyk, Milana V. Puzino, Olena
H. Rybalchenko, and Svitlana V. Bilashenko, the paper delves into the existing drone delivery
systems worldwide, examines diferent route-building algorithms, and discusses the advantages
and disadvantages of each approach.
        </p>
        <p>The paper begins with an introduction highlighting the significance of eficient logistics,
particularly in urban settings. It introduces the concept of drone delivery as a potential solution
to overcome challenges in last-mile delivery. It sets the stage for the research by emphasising
the need for quick and convenient operation in drone delivery systems.</p>
        <p>The subsequent sections thoroughly review existing drone delivery systems, such as
Amazon Prime Air, Starship Technologies, and Zipline, providing insights into their operations,
advantages, and limitations. Recent research on drone delivery systems is also analysed,
covering topics like multi-physics modelling, cloud-based drone management, and optimisation
algorithms for route planning.</p>
        <p>A comprehensive review of common approaches and algorithms for drone delivery route
planning follows, including the Traveling Salesman Problem algorithm, Dijkstra’s algorithm,
A* algorithm, and reinforcement learning. Each algorithm is evaluated based on execution
speed, scalability, and implementation simplicity. The authors argue that reinforcement learning
emerges as the most optimal solution due to its ability to adapt to dynamic environments and
optimise delivery routes eficiently.</p>
        <p>The paper concludes with a discussion on system development, outlining the general
architecture of a drone delivery system, hardware simulation using ArduPilot SITL, and implementing
a route-building subprogram using Q-Learning. The provided code snippets ofer insights into
how reinforcement learning techniques can be applied to optimise delivery routes.</p>
        <p>
          The article “Implementing E2E tests with Cypress and Page Object Model: evolution of
approaches” [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] presents a comprehensive exploration of various methodologies for constructing
Cypress tests using the Page Object Model (POM). Authored by Inessa V. Krasnokutska and
Oleksandr S. Krasnokutskyi from Yuriy Fedkovych Chernivtsi National University, the article
delves into diferent strategies for organising tests with Cypress while utilising the POM design
pattern.
        </p>
        <p>The authors begin by introducing the problem of automating tests for a website, using the
example of the saucedemo.com website. They emphasise the importance of covering positive
and negative test cases, such as successful logins and unsuccessful login attempts resulting in
error messages.</p>
        <p>The article outlines nine distinct approaches to implementing the Page Object Model with
Cypress. These approaches range from tests without POM to utilising POM with various
techniques, such as selectors for elements, getters for error messages, and assessor properties.
Each approach is discussed in detail, highlighting its advantages, disadvantages, and evolution
from simpler to more refined implementations.</p>
        <p>The article provides code snippets and examples to illustrate each approach, making it
accessible for readers to understand and implement in their projects. The authors also provide
insights into the rationale behind each approach, discussing factors such as code maintainability,
readability, and adherence to best practices.</p>
        <p>
          The article “Design and development of a game application for learning Python” by Oleksiuk
et al. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] explores the creation of a Python learning game application and presents the outcomes
of meeting its objectives. The authors analyse various game-based learning experiences,
establish application requirements, select Unity3D as the game engine, and describe their experience
in developing the PythonLeaner game.
        </p>
        <p>The article begins by discussing the significance of game-based learning in teaching
programming. It highlights its benefits, such as increased engagement, active participation, hands-on
learning, and simulation of real-life scenarios. It then outlines the research objectives, including
analysing experiences, describing application requirements, selecting development tools, and
analysing key development points.</p>
        <p>The model of the game application for learning Python is described, emphasising the
incorporation of educational objectives, game mechanics, hands-on learning, individualised
progression, and reporting of learning outcomes. The game model includes modes such as New
Game, Continue, Shop, and Exit, emphasising individualised progression through levels.</p>
        <p>A comparison of game engines Unity3D, Unreal Engine, and CryEngine is provided,
highlighting Unity3D as the chosen platform for its ease of learning, compatibility, multi-platform
support, and active community. The article then analyses key development points, including
scene design, script creation, Firebase integration for data storage, and implementation of game
features such as animations, user input delay, and task types.</p>
        <p>The conclusion summarises the achieved objectives, emphasising the analysis of experiences,
the establishment of application requirements, the selection of Unity3D as the game engine, and
the description of crucial development points. It also outlines prospects for research, including
multiplayer integration, code interpretation, artificial intelligence, and mobile application
development.</p>
      </sec>
      <sec id="sec-4-2">
        <title>5.2. Theoretical computer science</title>
        <p>The article “Application of Daubechies wavelet analysis in problems of acoustic detection of
UAVs” [18] provides an in-depth exploration of the utilisation of Daubechies wavelet analysis for
acoustic signal processing in the context of detecting unmanned aerial vehicles (UAVs). Authored
by Oleksandr Yu. Lavrynenko et al. from the National Aviation University in Ukraine, the study
addresses the significance of acoustic surveillance in UAV detection. It proposes Daubechies
wavelet analysis as a promising method for identifying characteristic features of UAVs’ acoustic
radiation. The article ofers a thorough exploration of Daubechies wavelet analysis in the
context of acoustic UAV detection, providing theoretical foundations and practical insights into
the application of this method. It bridges the gap between theoretical wavelet analysis and
its implementation in real-world problems, making it a valuable resource for researchers and
practitioners in signal processing and UAV detection.</p>
        <p>The article “Data processing method for multimodal distribution parameters estimation” by
Solomentsev et al. [15] describes the synthesis and analysis of a method for processing data
to estimate the parameters of multimodal distributions. The proposed approach combines
the method of moments and the method of quantiles. The method allows for estimating
the parameters of the probability density function even without prior information about the
distribution type, which is essential in practical applications, especially in telecommunications
and radio engineering.</p>
        <p>The key steps of the method include dividing the sample population into subsets
corresponding to positive and negative regions, selecting appropriate thresholds based on the distribution
characteristics, and employing a combination of moment-based and quantile-based estimation
techniques to estimate the parameters of interest. The approach is illustrated with a specific
example of the trimodal probability density function, which includes chaotic impulse noise of
positive and negative polarity.</p>
        <p>The proposed method ofers a practical solution for estimating distribution parameters in
scenarios where the distribution type is unknown or complex. Future research could explore
further refinements and extensions of the method and its application in various real-world data
processing tasks.</p>
        <p>The article “Application of artificial intelligence in digital marketing” [ 19] provides a
comprehensive analysis of how artificial intelligence (AI) can be utilised to optimise digital marketing
strategies for companies. Authored by Ihor V. Ponomarenko, Volodymyr M. Pavlenko, Oksana
B. Morhulets, Dmytro V. Ponomarenko, and Nataliia M. Ukhnal, the paper explores various
aspects of AI integration into digital marketing tools, emphasising its role in enhancing user
engagement, personalisation, content generation, customer support, sentiment analysis, and
more.</p>
        <p>The authors begin by highlighting the significance of digitisation processes in reshaping
consumer behaviour and increasing dependence on innovative technologies. They argue that
AI catalyses qualitative transformations in digital marketing, enabling companies to leverage
vast amounts of data generated online for strategic decision-making. Through a methodological
approach grounded in scientific analysis, the paper outlines the primary sources of information
utilised in AI applications for digital marketing, including data from company websites, social
media, public sources, and web scraping.</p>
        <p>Furthermore, the article delves into the models and methods employed in AI-driven digital
marketing, emphasising the importance of data analysis, content personalisation, and customer
interaction channels. It discusses the role of machine learning algorithms in processing big
data, segmenting target audiences, generating personalised content, and enhancing customer
support services. The authors also highlight the significance of sentiment analysis in gauging
user attitudes and adjusting marketing strategies accordingly.</p>
        <p>In addition to providing insights into current practices, the article identifies future research
directions in AI-driven digital marketing. It emphasises the need for ongoing development of
machine learning algorithms, specialised programming languages, and innovative methodological
approaches to optimise marketing strategies further and enhance user experiences.</p>
      </sec>
      <sec id="sec-4-3">
        <title>5.3. Computer systems</title>
        <p>The article “Modern methods of energy consumption optimisation in FPGA-based heterogeneous
HPC systems” [16] provides a comprehensive investigation into optimising energy eficiency
in heterogeneous High-Performance Computing (HPC) systems, with a focus on integrating
Field-Programmable Gate Arrays (FPGAs) into existing architectures. The authors, Oleksandr V.
Hryshchuk and Sergiy P. Zagorodnyuk from Taras Shevchenko National University of Kyiv,
Ukraine, delve into the parametrisation, modelling, and optimisation techniques necessary for
sustainable HPC practices.</p>
        <p>The article begins by outlining the growing concern over the escalating energy consumption of
HPC systems, highlighting the need for efective optimisation strategies to address sustainability
and operational costs. It characterises the heterogeneity within modern HPC environments,
incorporating diverse hardware components such as CPUs, GPUs, FPGAs, and accelerators.</p>
        <p>The research delves into modelling techniques, leveraging heuristic methods and statistical
approaches to construct accurate predictive models for energy consumption. Additionally,
integrating dynamic power management strategies, such as Dynamic Voltage and Frequency
Scaling (DVFS) and task scheduling, is explored to optimise energy usage without compromising
performance.</p>
        <p>The authors provide a theoretical framework for energy optimisation in heterogeneous
HPC systems, discussing optimisation problem definitions for task scheduling and outlining
optimisation criteria. They compare cluster architectures, focusing on homogeneous Massive
Parallel Processor (MPP) systems and heterogeneous systems combining CPUs, GPUs, and
FPGAs. The article highlights the emerging field of FPGA-based HPC systems and identifies a
research gap in energy optimisation for these systems.</p>
        <p>In conclusion, the article emphasises the need for further research and development of energy
optimisation techniques tailored to FPGA-based heterogeneous HPC systems. It suggests
that future work should amplify existing methods, including heuristic solutions for power
consumption planning in FPGA-coupled architectures.</p>
        <p>The article “Conference platform metadata and functions: existing platforms analysis and
ontology-based approach” by Shapovalov and Shapovalov [17] provides a comprehensive
analysis of existing conference management platforms and proposes an ontology-based approach to
enhance the structure and functionality of such systems. The review begins by highlighting
the rise of predatory conferences and the need for robust platforms to ensure the quality and
integrity of scholarly events.</p>
        <p>The authors analyse six well-known conference platforms, categorising them into
informationaloriented and process-oriented systems. Each platform is detailed, emphasising its unique features
and focus areas. The authors identify standard fields and functionalities across these platforms
through data collection and processing, revealing insights into user priorities and platform
capabilities.</p>
        <p>Key findings include the prevalence of search functionality as the most critical feature,
followed by peer reviewing, registration, submission, and publication of conference materials.
Additionally, identifiers such as DOI and subject-specific databases like DBLP are highlighted
for their role in the accurate cataloguing and citation of academic work.</p>
        <p>The article proposes an ontology-based approach to organise conference data, leveraging
systems like CIT Polyhedron to provide flexible data structures. This approach is a solution to
counteract predatory conferences by promoting healthy competition and ensuring structured
data entry.</p>
      </sec>
      <sec id="sec-4-4">
        <title>5.4. Computer applications</title>
        <p>The article “Dynamic system analysis using telemetry” by Talaver and Vakaliuk [21] provides a
comprehensive exploration of dynamic system analysis using telemetry, focusing on
detecting harmful architectural practices and anomalous events in distributed information systems.
It begins by highlighting the increasing complexity introduced by distributed architectures
like microservices, necessitating advanced monitoring and analysis tools to ensure system
performance and reliability.</p>
        <p>The theoretical background section efectively contextualises the study within the evolution
of system observability, particularly emphasising the role of telemetry in providing a holistic
view of system behaviour. The discussion on the OpenTelemetry standard and its role in
explanation of anomaly detection using the PCA algorithm is clear and insightful, showcasing
how statistical methods can be leveraged for identifying system irregularities.</p>
        <p>Results are presented efectively through visualisations generated from the Neo4j database,
demonstrating the practical application of the proposed methodology. Using Neo4j Bloom to
visualise service dependencies and anomalies adds clarity to the analysis, making it easier to
identify potential areas of improvement in system architecture.</p>
        <p>The discussion section provides valuable insights into the advantages of dynamic analysis
over static approaches and the potential for further development in telemetry-based analysis.
The comparison with existing approaches, such as New Relic, highlights the strengths of the
proposed method while acknowledging areas for future enhancement.</p>
        <p>The article “Development of a modified genetic method for automatic university scheduling”
by Fedorchenko et al. [22] from the National University “Zaporizhzhia Polytechnic” in Ukraine
addresses the challenging task of optimising university class schedules, crucial for adequate
time and resource management in higher education.</p>
        <p>The authors propose a modified genetic algorithm for university scheduling, aiming to
minimise conflicts and time intervals between classes while considering recommendations
for time and place. The paper outlines the development of sequential and parallel methods
for scheduling based on genetic search, incorporating adapted initialisation, crossover, and
selection operators.</p>
        <p>A comparative analysis between classical and modified genetic algorithms is presented,
conifrming the eficiency of the proposed approach. The modified algorithm is also compared with
diferent operators and parameters to determine optimal conditions. The results demonstrate
efective methods for improving schedule quality and optimising the educational process.</p>
        <p>The article provides a detailed literature review, problem statement, and mathematical model
development for university scheduling optimisation. It describes the software implementation
of the proposed modification and conducts experiments to evaluate its performance.</p>
        <p>The article “Predictive machine learning of soybean oil epoxidising reactions using artificial
neural networks” by Sus et al. [20] presents an innovative approach to optimising the epoxidation
process of soybean oil through the utilisation of artificial neural networks (ANNs). The study
employs experimental data to construct a training dataset for the ANN, which then facilitates
the optimisation of epoxy curing reaction parameters, monitors its evolution, and refines the
epoxy product synthesis process.</p>
        <p>The authors discuss the broad applicability of neural networks across various scientific and
technological domains, highlighting their importance in predicting outcomes, selecting optimal
conditions, and assessing quantities in chemical and biological processes. They emphasise the
significance of green chemistry and the growing importance of soybean oil epoxidation in
various industrial applications.</p>
        <p>The experimental setup involves the epoxidation of soybean oil using a specific hydrogen
peroxide system, acetic anhydride, and a catalyst. The study explores various parameters such as
concentration of reactants, catalyst amount, temperature, and reaction time. A neural network
model is then trained using this experimental data to predict the outcomes of the epoxidation
process.</p>
        <p>Results indicate that the neural network accurately predicts the epoxy and iodine numbers,
crucial indicators of the quality of epoxidised oils, based on the input parameters. The authors
demonstrate the network’s ability to interpolate experimental data to generate comprehensive
dependency graphs, even beyond the scope of available experimental data.</p>
        <p>Moreover, the study identifies optimal conditions for maximising the epoxy number and
minimising the iodine number during the epoxidation process, showcasing the practical utility
of the neural network in process optimisation.</p>
        <p>In conclusion, the article presents a robust methodology for optimising soybean oil
epoxida</p>
        <p>
          The article “Software development of thermal resistance calculator for thermal insulation
parameters determines dielectric building structures” by Bazurin et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] presents a detailed
review of the software development of a thermal resistance calculator named “ThermoResist”
for determining the parameters of thermal insulation in dielectric building structures. The
calculator is designed to calculate thermal resistance according to the State Building Regulations
of Ukraine, assuming that the contributions of diferent thermal resistance mechanisms are
additive.
        </p>
        <p>The authors provide an in-depth discussion of the computational method involved, which
includes formulas and theoretical background related to thermal conductivity and thermal
resistance in dielectric materials. They emphasise the importance of accurate prediction of
thermal conductivity in construction, particularly in rebuilding eforts post-war in Ukraine.
The article also compares existing thermal resistance calculators and identifies their limitations,
leading to the development of a specialised tool like “ThermoResist”.</p>
        <p>The functionalities of “ThermoResist” are described in detail, including modules for calculating
the thermal resistance of walls, windows, attic floors, and roof overlaps. The calculator’s
interface is intuitive, allowing users to easily input relevant data and obtain thermal resistance
calculations. The article also provides a class diagram of the program’s structure and discusses
the choice of programming language (C♯) and development environment (Microsoft Visual
Studio 2022).</p>
        <p>In conclusion, the authors highlight the significance of digitalisation in society and the
importance of tools like “ThermoResist” in the construction industry. They emphasise that
the calculator adheres to State Building Regulations and can be beneficial for both educational
purposes and practical applications by civil engineers.</p>
        <p>
          The article “Using the Three.js library to develop remote physical laboratory to investigate
difraction” [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] presents a detailed examination of the process involved in designing and
developing a virtual physics laboratory focused on studying the difraction efect. Authored
by Pavlo I. Chopyk, Vasyl P. Oleksiuk, and Oleksandr P. Chukhrai from Ternopil Volodymyr
Hnatiuk National Pedagogical University in Ukraine, the article addresses the requirements,
framework selection, design, and implementation of the virtual laboratory.
        </p>
        <p>The authors begin by outlining the importance of laboratory experiments in physics education,
highlighting their role in facilitating understanding, skill development, and critical thinking.
They also acknowledge the increasing prevalence of remote training and the need for virtual
laboratories to supplement traditional methods, mainly when practical experience is limited or
hazardous.</p>
        <p>The article systematically discusses the criteria for selecting the appropriate development
tools, focusing on 3D graphics libraries. After conducting a comparative analysis, the authors
choose the Three.js library for its performance, ease of use, flexibility, feature set, and
compatibility. They then describe the stages of designing and developing the virtual laboratory,
including formulating the physical problem, selecting tools, creating the laboratory model, and
implementing and testing.</p>
        <p>Detailed explanations accompanied by code snippets illustrate the creation of the virtual
laboratory components, such as scene objects, lighting, cameras, and interactive controls. The
authors emphasise the importance of accurately simulating the difraction phenomenon and
providing students with tools for measurement and analysis, ensuring a realistic and educational
experience.</p>
        <p>The virtual laboratory developed using Three.js allows students to observe difraction patterns,
measure distances, and calculate wavelengths, mimicking real-world experimental setups. The
article discusses integrating features such as dynamic screens, rulers, and colour filters, providing
students with a comprehensive learning environment.</p>
        <p>Finally, the authors compare the results obtained from the virtual laboratory with those from
natural experiments, demonstrating the accuracy and efectiveness of the virtual simulation.
They also acknowledge limitations such as hardware requirements and outline future research
directions, including collaboration features and integration with learning management systems.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>6. CS&amp;SE@SW 2023: Conclusion and outlook</title>
      <p>The 6th Workshop for Young Scientists in Computer Science &amp; Software Engineering (CS&amp;SE@SW
2023) has once again demonstrated its commitment to fostering the growth of emerging
researchers and providing a platform for exchanging innovative ideas and early research findings.
The diverse range of papers presented at this year’s workshop showcases the breadth and depth
of the research undertaken by young scientists, covering various topics within computer science
and software engineering.</p>
      <p>The vision of CS&amp;SE@SW 2023 has been to create an expert environment where young
researchers can present and discuss their cutting-edge work, receive valuable feedback from
peers and experienced academics, and establish collaborations that transcend geographical
boundaries. The workshop has proven to be a nurturing ground for developing research skills,
critical thinking, and the dissemination of knowledge.</p>
      <p>The proceedings of CS&amp;SE@SW 2023 reflect the multifaceted nature of the challenges and
opportunities that lie ahead in the rapidly evolving fields of computer science and software
engineering. From exploring emerging technologies such as telemetry, graph theory, and
machine learning for optimising distributed systems and detecting anomalies to investigating
acoustic surveillance techniques for UAV detection and employing genetic algorithms for
university scheduling, the contributions showcased in this volume demonstrate the remarkable
diversity and ingenuity of the research community.</p>
      <p>Furthermore, the workshop has delved into software reliability assessment, user experience
research in cross-platform application development, virtual physics laboratories, and Python
learning game applications, underscoring the importance of interdisciplinary approaches and
the fusion of theory and practice.</p>
      <p>Looking ahead, CS&amp;SE@SW 2023 has laid the foundation for future collaborations, fostering
a spirit of curiosity, innovation, and critical inquiry among young scientists. The insights and
ifndings presented during the workshop will undoubtedly catalyse further exploration, igniting
new avenues of research and propelling the fields of computer science and software engineering
towards new horizons.</p>
      <p>As we conclude this successful edition of the workshop, we extend our gratitude to all the
authors, delegates, program committee members, and peer reviewers who have contributed
to its success. Their invaluable eforts and commitment have ensured the high quality and
relevance of the presented work, further elevating the standards of academic excellence.</p>
      <p>We look forward to the next instalment of CS&amp;SE@SW, scheduled for December 20, 2024, in
Kryvyi Rih, Ukraine. This future gathering promises to be an even more enriching and
thoughtprovoking experience, where emerging talents will converge to share their latest discoveries,
engage in stimulating discussions, and forge lasting connections that will shape the future of
these dynamic and ever-evolving fields.
[13] N. Rudnichenko, V. Vychuzhanin, T. Otradskya, I. Petrov, Information system module for
analysis viral infections data based on machine learning, CEUR Workshop Proceedings
(2024) 63–74.
[14] V. Krutko, I. Spivak, S. Krepych, An approach to assessing the reliability of software
systems based on a graph model of method dependence, CEUR Workshop Proceedings
(2024) 37–47.
[15] O. V. Solomentsev, M. Y. Zaliskyi, D. I. Bakhtiiarov, B. S. Chumachenko, Data processing
method for multimodal distribution parameters estimation, CEUR Workshop Proceedings
(2024) 144–154.
[16] O. V. Hryshchuk, S. P. Zagorodnyuk, Modern methods of energy consumption
optimization in FPGA-based heterogeneous HPC systems, CEUR Workshop Proceedings (2024)
167–176.
[17] Y. B. Shapovalov, V. B. Shapovalov, Conference platform metadata and functions: existing
platforms analysis and ontology-based approach, CEUR Workshop Proceedings (2024)
177–192.
[18] O. Y. Lavrynenko, D. I. Bakhtiiarov, B. S. Chumachenko, O. G. Holubnychyi, G. F.
Konakhovych, V. V. Antonov, Application of Daubechies wavelet analysis in problems of
acoustic detection of UAVs, CEUR Workshop Proceedings (2024) 125–143.
[19] I. V. Ponomarenko, V. M. Pavlenko, O. B. Morhulets, D. V. Ponomarenko, N. M. Ukhnal,
Application of artificial intelligence in digital marketing, CEUR Workshop Proceedings
(2024) 155–166.
[20] B. B. Sus, O. S. Bauzha, S. P. Zagorodnyuk, T. V. Chaikivskyi, , O. V. Hryshchuk, Predictive
machine learning of soybean oil epoxidizing reactions using artificial neural networks,
CEUR Workshop Proceedings (2024) 223–236.
[21] O. V. Talaver, T. A. Vakaliuk, Dynamic system analysis using telemetry, CEUR Workshop</p>
      <p>Proceedings (2024) 193–209.
[22] I. Fedorchenko, A. Oliinyk, T. Zaiko, K. Miedviediev, Y. Fedorchenko, M. Khokhlov,
Development of a modified genetic method for automatic university scheduling, CEUR
Workshop Proceedings (2024) 210–222.
[23] N. Cavus, M. M. Al-Momani, Mobile system for flexible education, Procedia Computer
Science 3 (2011) 1475–1479. doi:10.1016/j.procs.2011.01.034, world Conference
on Information Technology.
[24] A. B. Mbombo, N. Cavus, Smart University: A University In the Technological Age, TEM</p>
      <p>Journal (2021) 13–17. doi:10.18421/tem101-02.
[25] D. Budgen, J. Bailey, M. Turner, B. Kitchenham, P. Brereton, S. Charters, Cross-domain
investigation of empirical practices, IET Software 3 (2009) 410–421(11). URL: https:
//digital-library.theiet.org/content/journals/10.1049/iet-sen.2008.0106.
[26] D. Budgen, B. Kitchenham, S. Charters, S. Gibbs, A. Pohthong, J. Keung, P. Brereton,
Lessons from Conducting a Distributed Quasi-experiment, in: 2013 ACM / IEEE
International Symposium on Empirical Software Engineering and Measurement, 2013, pp.
143–152. doi:10.1109/ESEM.2013.12.
[27] A. Kertész, P. Kacsuk, A Taxonomy of Grid Resource Brokers, in: P. Kacsuk, T. Fahringer,
Z. Németh (Eds.), Distributed and Parallel Systems, Springer US, Boston, MA, 2007, pp.
201–210. doi:10.1007/978-0-387-69858-8_20.
patterns by runtime model interpretation, Software &amp; Systems Modeling 14 (2015) 1387–
1420. doi:10.1007/s10270-013-0371-3.
[40] E. Serral, P. Valderas, V. Pelechano, A Model Driven Development Method for Developing
Context-Aware Pervasive Systems, in: F. E. Sandnes, Y. Zhang, C. Rong, L. T. Yang,
J. Ma (Eds.), Ubiquitous Intelligence and Computing, Springer Berlin Heidelberg, Berlin,
Heidelberg, 2008, pp. 662–676. doi:10.1007/978-3-540-69293-5_52.
[41] Y. Romanenkov, V. Pasichnyk, N. Veretennikova, M. Nazaruk, A. Leheza, Information
and Technological Support for the Processes of Prognostic Modeling of Regional Labor
Markets, CEUR Workshop Proceedings 2386 (2019) 24–34. URL: https://ceur-ws.org/
Vol-2386/paper3.pdf.
[42] N. Veretennikova, N. Kunanets, Recommendation Systems as an Information and
Technology Tool for Virtual Research Teams, in: N. Shakhovska, V. Stepashko (Eds.), Advances
in Intelligent Systems and Computing II, Springer International Publishing, Cham, 2018,
pp. 577–587. doi:10.1007/978-3-319-70581-1_40.
[43] M. Dong, L. Yao, X. Wang, B. Benatallah, Q. Z. Sheng, H. Huang, DUAL: A Deep Unified
Attention Model with Latent Relation Representations for Fake News Detection, in:
H. Hacid, W. Cellary, H. Wang, H.-Y. Paik, R. Zhou (Eds.), Web Information Systems
Engineering – WISE 2018, Springer International Publishing, Cham, 2018, pp. 199–209.
doi:10.1007/978-3-030-02922-7_14.
[44] K. Chen, L. Yao, X. Wang, D. Zhang, T. Gu, Z. Yu, Z. Yang, Interpretable Parallel Recurrent
Neural Networks with Convolutional Attentions for Multi-Modality Activity Modeling,
in: 2018 International Joint Conference on Neural Networks (IJCNN), 2018, pp. 1–8.
doi:10.1109/IJCNN.2018.8489767.
[45] A. Zunino, M. Campo, Chronos: A multi-agent system for distributed automatic meeting
scheduling, Expert Systems with Applications 36 (2009) 7011–7018. doi:10.1016/j.
eswa.2008.08.024.
[46] A. De Renzis, M. Garriga, A. Flores, A. Cechich, A. Zunino, Case-based Reasoning
for Web Service Discovery and Selection, Electronic Notes in Theoretical Computer
Science 321 (2016) 89–112. doi:10.1016/j.entcs.2016.02.006, cLEI 2015, the XLI
Latin American Computing Conference.
[47] B. Schooley, N. Hikmet, E. Atilgan, Health IT Maturity and Hospital Quality: Efects
of PACS Automation and Integration Levels on U.S. Hospital Performance, in: 2016
International Conference on Computational Science and Computational Intelligence
(CSCI), 2016, pp. 45–50. doi:10.1109/CSCI.2016.0016.
[48] E. Atilgan, I. Ozcelik, E. N. Yolacan, MQTT Security at a Glance, in: 2021 International
Conference on Information Security and Cryptology (ISCTURKEY), 2021, pp. 138–142.
doi:10.1109/ISCTURKEY53027.2021.9654337.
[49] I. Krak, O. Barmak, E. Manziuk, A. Kulias, Data Classification Based on the Features
Reduction and Piecewise Linear Separation, in: P. Vasant, I. Zelinka, G.-W. Weber (Eds.),
Intelligent Computing and Optimization, Springer International Publishing, Cham, 2020,
pp. 282–289. doi:10.1007/978-3-030-33585-4_28.
[50] Y. Krak, O. Barmak, O. Mazurets, The practice implementation of the information
technology for automated definition of semantic terms sets in the content of educational
materials, CEUR Workshop Proceedings 2139 (2018) 245–254. URL: http://ceur-ws.org/
V. V. Osadchyi, T. A. Vakaliuk, P. P. Nechypurenko, O. V. Bondarenko, H. B. Danylchuk,
3rd International Conference on Sustainable Futures: Environmental, Technological,
Social and Economic Matters, IOP Conference Series: Earth and Environmental Science
1049 (2022) 011001. doi:10.1088/1755-1315/1049/1/011001.
[77] T. A. Vakaliuk, L. D. Shevchuk, B. V. Shevchuk, Possibilities of using AR and VR
technologies in teaching mathematics to high school students, Universal Journal of Educational
Research 8 (2020) 6280 – 6288. doi:10.13189/ujer.2020.082267.
[78] T. Vakaliuk, D. Antoniuk, A. Morozov, M. Medvedieva, M. Medvediev, Green IT as a tool
for design cloud-oriented sustainable learning environment of a higher education
institution, E3S Web of Conferences 166 (2020) 10013. doi:10.1051/e3sconf/202016610013.
[79] V. Voytenko, Some challenges in mobile context-aware applications for courses in
academia, in: N. C. Callaos, B. Sanchez, H. W. Chu, J. Ferrer, S. L. Fernandes (Eds.), 7th
International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2016
and 7th International Conference on Society and Information Technologies, ICSIT 2016
Proceedings, volume 1, International Institute of Informatics and Systemics, IIIS, 2016, pp.
244–245.
[80] F. Lin, A. Dewan, V. Voytenko, Open Interactive Algorithm Visualization, in: 2019 IEEE
Canadian Conference of Electrical and Computer Engineering (CCECE), 2019, pp. 1–4.
doi:10.1109/CCECE.2019.8861535.
[81] O. V. Bondarenko, P. P. Nechypurenko, V. A. Hamaniuk, S. O. Semerikov, Educational
Dimension: a new journal for research on education, learning and training, Educational
Dimension 1 (2019) 1–4. doi:10.31812/ed.620.
[82] S. Semerikov, Educational Technology Quarterly: in the beginning, Educational
Technology Quarterly 2021 (2021) 1–50. doi:10.55056/etq.13.
[83] S. Papadakis, A. E. Kiv, H. M. Kravtsov, V. V. Osadchyi, M. V. Marienko, O. P. Pinchuk, M. P.</p>
      <p>Shyshkina, O. M. Sokolyuk, I. S. Mintii, T. A. Vakaliuk, L. E. Azarova, L. S. Kolgatina, S. M.
Amelina, N. P. Volkova, V. Y. Velychko, A. M. Striuk, S. O. Semerikov, ACNS Conference
on Cloud and Immersive Technologies in Education: Report, CTE Workshop Proceedings
10 (2023) 1–44. doi:10.55056/cte.544.
[84] T. A. Vakaliuk, Editorial for JEC Volume 2 Issue 2 (2023), Journal of Edge Computing 2
(2023) 102–103. doi:10.55056/jec.654.
[85] T. A. Vakaliuk, S. O. Semerikov, Introduction to doors Workshops on Edge Computing
(2021-2023), Journal of Edge Computing 2 (2023) 1–22. doi:10.55056/jec.618.
[86] A. I. Jony, A. K. B. Arnob, A long short-term memory based approach for detecting
cyber attacks in IoT using CIC-IoT2023 dataset, Journal of Edge Computing (2024).
doi:10.55056/jec.648.
[87] I. A. Pilkevych, D. L. Fedorchuk, M. P. Romanchuk, O. M. Naumchak, Approach to the
fake news detection using the graph neural networks, Journal of Edge Computing 2
(2023) 24–36. doi:10.55056/jec.592.
[88] N. M. Lobanchykova, I. A. Pilkevych, O. Korchenko, Analysis and protection of IoT
systems: Edge computing and decentralized decision-making, Journal of Edge Computing
1 (2022) 55–67. doi:10.55056/jec.573.
[89] N. Balyk, S. Leshchuk, D. Yatsenyak, Design and implementation of an IoT-based
educational model for smart homes: a STEM approach, Journal of Edge Computing 2 (2023)</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , First Student Workshop on Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>2292</volume>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2292</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , Second Student Workshop on Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>2546</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2546</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , 3rd Workshop for Young Scientists in Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>2832</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2832</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , 4th Workshop for Young Scientists in Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>3077</volume>
          (
          <year>2022</year>
          )
          <article-title>i-xxxv</article-title>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3077</volume>
          /intro.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <source>Embracing Emerging Technologies: Insights from the 6th Workshop for Young Scientists in Computer Science &amp; Software Engineering, CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Chernukha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Klochko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Zuziak</surname>
          </string-name>
          ,
          <article-title>Methodology of implementation of modern information systems at commercial enterprises</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>48</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Verbovetskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Hrytsai</surname>
          </string-name>
          ,
          <article-title>Design and development of a game application for learning Python</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>111</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M. Y.</given-names>
            <surname>Salohub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. H.</given-names>
            <surname>Rybalchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Bilashenko</surname>
          </string-name>
          ,
          <article-title>Designing a cross-platform userfriendly transport company application</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>75</fpage>
          -
          <lpage>85</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y. L.</given-names>
            <surname>Turchyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Puzino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. H.</given-names>
            <surname>Rybalchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Bilashenko</surname>
          </string-name>
          ,
          <article-title>Research of the route planning algorithms on the example of a drone delivery system software development</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>86</fpage>
          -
          <lpage>100</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Bazurin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. I.</given-names>
            <surname>Pursky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. M.</given-names>
            <surname>Karpenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Pidhorna</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. I. Nechepourenko</surname>
          </string-name>
          ,
          <article-title>Software development of thermal resistance calculator for thermal insulation parameters determines dielectric building structures</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>237</fpage>
          -
          <lpage>245</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Krasnokutska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Krasnokutskyi</surname>
          </string-name>
          ,
          <article-title>Implementing E2E tests with Cypress and Page Object Model: evolution of approaches</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>101</fpage>
          -
          <lpage>110</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P. I.</given-names>
            <surname>Chopyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Chukhrai</surname>
          </string-name>
          ,
          <article-title>Using the Three.js library to develop remote physical laboratory to investigate difraction</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>246</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>B.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Mishra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kertesz</surname>
          </string-name>
          ,
          <article-title>Stress-Testing MQTT Brokers: A Comparative Analysis of Performance Measurements</article-title>
          ,
          <source>Energies</source>
          <volume>14</volume>
          (
          <year>2021</year>
          )
          <article-title>5817</article-title>
          . doi:
          <volume>10</volume>
          .3390/en14185817.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J.</given-names>
            <surname>Suryadevara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Sunil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. K.</given-names>
            <surname>Suryadevara</surname>
          </string-name>
          ,
          <article-title>Secured multimedia authentication system for wireless sensor network data related to internet of things</article-title>
          , in: Seventh International Conference on Sensing Technology,
          <string-name>
            <surname>ICST</surname>
          </string-name>
          <year>2013</year>
          , Wellington, New Zealand, December 3-
          <issue>5</issue>
          ,
          <year>2013</year>
          , IEEE,
          <year>2013</year>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>115</lpage>
          . URL: https://doi.org/10.1109/ICSensT.
          <year>2013</year>
          .
          <volume>6727625</volume>
          . doi:
          <volume>10</volume>
          .1109/ICSENST.
          <year>2013</year>
          .
          <volume>6727625</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>N. K.</given-names>
            <surname>Survadevara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Mukhopadhyay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Rayudu</surname>
          </string-name>
          ,
          <article-title>Applying SARIMA time series to forecast sleeping activity for wellness model of elderly monitoring in smart home</article-title>
          ,
          <source>in: 2012 Sixth International Conference on Sensing Technology (ICST)</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>162</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICSensT.
          <year>2012</year>
          .
          <volume>6461661</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Nadeem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. K.</given-names>
            <surname>Alkahtani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Mostafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mamyrbayev</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>Abdel Hameed, EFND: A Semantic, Visual, and Socially Augmented Deep Framework for Extreme Fake News Detection</article-title>
          ,
          <source>Sustainability</source>
          <volume>15</volume>
          (
          <year>2023</year>
          )
          <article-title>133</article-title>
          . doi:
          <volume>10</volume>
          .3390/ su15010133.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yeshmukhametov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kalimoldayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mamyrbayev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Amirgaliev</surname>
          </string-name>
          ,
          <article-title>Design and kinematics of serial/parallel hybrid robot</article-title>
          ,
          <source>in: 2017 3rd International Conference on Control, Automation and Robotics (ICCAR)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>162</fpage>
          -
          <lpage>165</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICCAR.
          <year>2017</year>
          .
          <volume>7942679</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bae</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Moon</surname>
          </string-name>
          ,
          <article-title>Time synchronization with fast asynchronous difusion in wireless sensor network</article-title>
          ,
          <source>in: 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>85</lpage>
          . doi:
          <volume>10</volume>
          .1109/CYBERC.
          <year>2009</year>
          .
          <volume>5342158</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Moon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Aghvami</surname>
          </string-name>
          ,
          <article-title>Enhanced SIP for Reducing IMS Delay under WiFito-UMTS Handover Scenario</article-title>
          , in: 2008 The Second International Conference on Next Generation Mobile Applications, Services, and
          <string-name>
            <surname>Technologies</surname>
          </string-name>
          ,
          <year>2008</year>
          , pp.
          <fpage>640</fpage>
          -
          <lpage>645</lpage>
          . doi:
          <volume>10</volume>
          . 1109/NGMAST.
          <year>2008</year>
          .
          <volume>63</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Byrne</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. J. O'Grady</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. M. P. O'Hare</surname>
          </string-name>
          ,
          <article-title>Managing Wandering Risk in People With Dementia</article-title>
          ,
          <source>IEEE Transactions on Human-Machine Systems</source>
          <volume>45</volume>
          (
          <year>2015</year>
          )
          <fpage>819</fpage>
          -
          <lpage>823</lpage>
          . doi:
          <volume>10</volume>
          .1109/THMS.
          <year>2015</year>
          .
          <volume>2453421</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>C.</given-names>
            <surname>Muldoon</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. M. P. O'Hare</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. J. O'Grady</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Tynan</surname>
          </string-name>
          ,
          <article-title>Agent Migration and Communication in WSNs</article-title>
          , in: 2008
          <source>Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>425</fpage>
          -
          <lpage>430</lpage>
          . doi:
          <volume>10</volume>
          .1109/PDCAT.
          <year>2008</year>
          .
          <volume>58</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>J.</given-names>
            <surname>Morajda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Paliwoda-Pekosz</surname>
          </string-name>
          ,
          <article-title>An Enhancement of Kohonen Neural Networks for Predictive Analytics: Self-Organizing Prediction Maps</article-title>
          , in: B.
          <string-name>
            <surname>B. Anderson</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Thatcher</surname>
            ,
            <given-names>R. D.</given-names>
          </string-name>
          <string-name>
            <surname>Meservy</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Chudoba</surname>
            ,
            <given-names>K. J.</given-names>
          </string-name>
          <string-name>
            <surname>Fadel</surname>
          </string-name>
          , S. Brown (Eds.),
          <source>26th Americas Conference on Information Systems, AMCIS</source>
          <year>2020</year>
          , Virtual Conference,
          <source>August 15-17</source>
          ,
          <year>2020</year>
          , Association for Information Systems,
          <year>2020</year>
          . URL: https://aisel.aisnet.org/amcis2020/ai_semantic
          <article-title>_for_ intelligent_info_systems/ai_semantic_for_intelligent_info_systems/6.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Paliwoda-Pundefinedkosz</surname>
          </string-name>
          ,
          <article-title>An ontology-based cluster analysis framework</article-title>
          ,
          <source>in: Proceedings of the First International Workshop on Ontology-Supported Business Intelligence</source>
          , OBI '08,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2008</year>
          . doi:
          <volume>10</volume>
          .1145/1452567.1452574.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>E.</given-names>
            <surname>Serral</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Valderas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pelechano</surname>
          </string-name>
          ,
          <source>Addressing the evolution of automated user behaviour</source>
          Vol-
          <volume>2139</volume>
          /
          <fpage>245</fpage>
          -
          <lpage>254</lpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [51]
          <string-name>
            <surname>K. M. Caramancion</surname>
          </string-name>
          ,
          <article-title>The Relation Between Time of the Day and Misinformation Vulnerability: A Multivariate Approach</article-title>
          , in: 2021
          <source>IEEE 16th International Conference on Computer Sciences and Information Technologies (CSIT)</source>
          , volume
          <volume>1</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>150</fpage>
          -
          <lpage>153</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSIT52700.
          <year>2021</year>
          .
          <volume>9648654</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [52]
          <string-name>
            <surname>K. M. Caramancion</surname>
          </string-name>
          ,
          <article-title>Textual vs. Visual Fake News: A Deception Showdown</article-title>
          , in: 2021
          <source>IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>35</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCEM53267.
          <year>2021</year>
          .
          <volume>00015</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>P.</given-names>
            <surname>Hryhoruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Khrushch</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>a. Grygoruk, Using Multidimensional Scaling for Assessment Economic Development of Regions</article-title>
          ,
          <source>International journal of industrial Engineering &amp; Production Research</source>
          <volume>31</volume>
          (
          <year>2020</year>
          ).
          <source>doi:10.22068/ijiepr.31.4</source>
          .597.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [54]
          <string-name>
            <given-names>P.</given-names>
            <surname>Hryhoruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Khrushch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Grygoruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Gorbatiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Prystupa</surname>
          </string-name>
          ,
          <source>Assessing the Impact of COVID-19 Pandemic on the Regions' Socio-Economic Development: The Case of Ukraine</source>
          ,
          <source>European Journal of Sustainable Development</source>
          <volume>10</volume>
          (
          <year>2021</year>
          )
          <article-title>63</article-title>
          . doi:
          <volume>10</volume>
          .14207/ ejsd.
          <year>2021</year>
          .v10n1p63.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [55]
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Kukharenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Fedosova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Kolgatin</surname>
          </string-name>
          ,
          <string-name>
            <surname>V. G.</surname>
          </string-name>
          <article-title>Dosov, Studying the processes in the xenon heat exchanger-freezer, Khimicheskoe I Neftegazovoe Mashinostroenie (</article-title>
          <year>1992</year>
          )
          <fpage>19</fpage>
          -
          <lpage>21</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [56]
          <string-name>
            <given-names>L.</given-names>
            <surname>Bilousova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kolgatin</surname>
          </string-name>
          , L. Kolgatina,
          <article-title>Pedagogical Diagnostics with Use of Computer Technologies</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>1000</volume>
          (
          <year>2013</year>
          )
          <fpage>209</fpage>
          -
          <lpage>220</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-1000/ICTERI-2013-p-
          <volume>209</volume>
          -220.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [57]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Riabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kontsedailo</surname>
          </string-name>
          ,
          <article-title>Chatbot algorithm for solving physics problems</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3553</volume>
          (
          <year>2023</year>
          )
          <fpage>75</fpage>
          -
          <lpage>92</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3553</volume>
          /paper5.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [58]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Riabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kontsedailo</surname>
          </string-name>
          ,
          <article-title>Cluster fault tolerance model with migration of virtual machines</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3374</volume>
          (
          <year>2023</year>
          )
          <fpage>23</fpage>
          -
          <lpage>40</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3374</volume>
          /paper02.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hrechuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bushlya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-E.</given-names>
            <surname>Ståhl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kryzhanivskyy</surname>
          </string-name>
          ,
          <article-title>Novel metric “Implenarity” for characterization of shape and defectiveness: The case of CFRP hole quality</article-title>
          ,
          <source>Composite Structures</source>
          <volume>265</volume>
          (
          <year>2021</year>
          )
          <article-title>113722</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.compstruct.
          <year>2021</year>
          .
          <volume>113722</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [60]
          <string-name>
            <given-names>M.</given-names>
            <surname>Moreno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Andersson</surname>
          </string-name>
          ,
          <string-name>
            <surname>R. M'Saoubi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Kryzhanivskyy</surname>
            ,
            <given-names>M. P.</given-names>
          </string-name>
          <string-name>
            <surname>Johansson-Jöesaar</surname>
            ,
            <given-names>L. J. S.</given-names>
          </string-name>
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Odén</surname>
          </string-name>
          , L. Rogström,
          <article-title>Adhesive wear of tialn coatings during low speed turning of stainless steel 316l</article-title>
          ,
          <source>Wear</source>
          <volume>524</volume>
          -
          <fpage>525</fpage>
          (
          <year>2023</year>
          )
          <article-title>204838</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.wear.
          <year>2023</year>
          .
          <volume>204838</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [61]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kupin</surname>
          </string-name>
          ,
          <source>Neural Identification of Technological Process of Iron Ore Beneficiation, in: 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>225</fpage>
          -
          <lpage>227</lpage>
          . doi:
          <volume>10</volume>
          .1109/IDAACS.
          <year>2007</year>
          .
          <volume>4488409</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [62]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kupin</surname>
          </string-name>
          ,
          <article-title>Research of properties of conditionality of task to optimization of processes of concentrating technology is on the basis of application of neural networks</article-title>
          ,
          <source>Metallurgical and Mining Industry</source>
          <volume>6</volume>
          (
          <year>2014</year>
          )
          <fpage>51</fpage>
          -
          <lpage>55</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [63]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Morozov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Tolstoy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Kubrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Medvediev</surname>
          </string-name>
          ,
          <article-title>Digitalization of thesis preparation life cycle: a case of zhytomyr polytechnic state university</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3553</volume>
          (
          <year>2023</year>
          )
          <fpage>142</fpage>
          -
          <lpage>154</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3553</volume>
          /paper14. pdf.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [64]
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Riabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Medvediev</surname>
          </string-name>
          ,
          <article-title>Implementation of STEM learning technology in the process of calibrating an NTC thermistor and developing an electronic thermometer based on it</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3358</volume>
          (
          <year>2022</year>
          )
          <fpage>39</fpage>
          -
          <lpage>52</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3358</volume>
          /paper25.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [65]
          <string-name>
            <given-names>N.</given-names>
            <surname>Balyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shmyger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <source>Model of Professional Retraining of Teachers Based on the Development of STEM Competencies, CEUR Workshop Proceedings</source>
          <volume>2104</volume>
          (
          <year>2018</year>
          )
          <fpage>318</fpage>
          -
          <lpage>331</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2104</volume>
          /paper_157.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [66]
          <string-name>
            <given-names>O.</given-names>
            <surname>Spirin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          ,
          <article-title>The Group Methodology of Using Cloud Technologies in the Training of Future Computer Science Teachers</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2104</volume>
          (
          <year>2018</year>
          )
          <fpage>294</fpage>
          -
          <lpage>304</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2104</volume>
          /paper_154.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [67]
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chukharev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iatsyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Klimov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Osadchyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nechypurenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Bondarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Danylchuk</surname>
          </string-name>
          ,
          <article-title>Our sustainable pandemic future</article-title>
          ,
          <source>E3S Web of Conferences</source>
          <volume>280</volume>
          (
          <year>2021</year>
          )
          <article-title>00001</article-title>
          . doi:
          <volume>10</volume>
          .1051/e3sconf/ 202128000001.
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [68]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Shepiliev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Modlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Yechkalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Mintii</surname>
            ,
            <given-names>I. S.</given-names>
          </string-name>
          <string-name>
            <surname>Mintii</surname>
            ,
            <given-names>O. M.</given-names>
          </string-name>
          <string-name>
            <surname>Markova</surname>
            ,
            <given-names>T. V.</given-names>
          </string-name>
          <string-name>
            <surname>Selivanova</surname>
            ,
            <given-names>O. M.</given-names>
          </string-name>
          <string-name>
            <surname>Drashko</surname>
            ,
            <given-names>O. O.</given-names>
          </string-name>
          <string-name>
            <surname>Kalinichenko</surname>
            ,
            <given-names>T. A.</given-names>
          </string-name>
          <string-name>
            <surname>Vakaliuk</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          <string-name>
            <surname>Osadchyi</surname>
            ,
            <given-names>S. O.</given-names>
          </string-name>
          <string-name>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Webar development tools: An overview</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2832</volume>
          (
          <year>2020</year>
          )
          <fpage>84</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [69]
          <string-name>
            <given-names>S. A.</given-names>
            <surname>MacGowan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Madeira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Britto-Borges</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Warowny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Drozdetskiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. B.</given-names>
            <surname>Procter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. J.</given-names>
            <surname>Barton</surname>
          </string-name>
          ,
          <article-title>The Dundee Resource for Sequence Analysis</article-title>
          and
          <string-name>
            <given-names>Structure</given-names>
            <surname>Prediction</surname>
          </string-name>
          ,
          <source>Protein Science</source>
          <volume>29</volume>
          (
          <year>2020</year>
          )
          <fpage>277</fpage>
          -
          <lpage>297</lpage>
          . doi:
          <volume>10</volume>
          .1002/pro.3783.
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [70]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wright</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Brodlie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Procter</surname>
          </string-name>
          ,
          <article-title>Problem Solving Environments: Extending the Rôle of Visualization Systems</article-title>
          , in: A.
          <string-name>
            <surname>Bode</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Ludwig</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Karl</surname>
          </string-name>
          , R. Wismüller (Eds.),
          <source>Euro-Par 2000 Parallel Processing</source>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2000</year>
          , pp.
          <fpage>1323</fpage>
          -
          <lpage>1331</lpage>
          . doi:
          <volume>10</volume>
          .1007/3-540-44520-X_
          <fpage>185</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [71]
          <string-name>
            <given-names>V.</given-names>
            <surname>Derbentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Serdyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Solovieva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <article-title>Recurrence based entropies for sustainability indices</article-title>
          ,
          <source>E3S Web of Conferences</source>
          <volume>166</volume>
          (
          <year>2020</year>
          )
          <article-title>13031</article-title>
          . doi:
          <volume>10</volume>
          . 1051/e3sconf/202016613031.
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [72]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Danylchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kibalnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Matviychuk</surname>
          </string-name>
          ,
          <article-title>Experimental economics and machine learning for prediction of emergent economy dynamics</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2422</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [73]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ganbayev</surname>
          </string-name>
          , E. Seyidzade,
          <article-title>Enhancing Customs Fraud Detection: A Comparative Study of Methods for Performance Measurement and Feature Improvement</article-title>
          ,
          <source>in: 2023 IEEE 17th International Conference on Application of Information and Communication Technologies (AICT)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/AICT59525.
          <year>2023</year>
          .
          <volume>10313153</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [74]
          <string-name>
            <given-names>A.</given-names>
            <surname>Adamov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mehdiyev</surname>
          </string-name>
          , E. Seyidzade,
          <article-title>Good practice of data modeling and database design for UMIS. Course registration system implementation</article-title>
          ,
          <source>in: 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICAICT.
          <year>2014</year>
          .
          <volume>7035949</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [75]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Morozov</surname>
          </string-name>
          ,
          <source>Quantum information technology on the Edge, CEUR Workshop Proceedings</source>
          <volume>2850</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . URL: http: //ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2850</volume>
          /paper0.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [76]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Chukharev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. I.</given-names>
            <surname>Sakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Iatsyshin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Klimov</surname>
          </string-name>
          ,
          <volume>148</volume>
          -
          <fpage>162</fpage>
          . doi:
          <volume>10</volume>
          .55056/jec.632.
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [90]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Ryabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <article-title>Graph theory methods for fog computing: A pseudo-random task graph model for evaluating mobile cloud, fog and edge computing systems</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>1</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.569.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [91]
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Uzdenov</surname>
          </string-name>
          ,
          <article-title>A new approach for dispatching task flows in GRID systems with inalienable resources</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>1</volume>
          (
          <year>2022</year>
          )
          <fpage>68</fpage>
          -
          <lpage>80</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.574.
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [92]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Riabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kontsedailo</surname>
          </string-name>
          ,
          <article-title>Investigating the efect of virtual machine migration accounting on reliability using a cluster model</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>37</fpage>
          -
          <lpage>63</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.585.
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [93]
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Talaver</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <article-title>Reliable distributed systems: review of modern approaches</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>84</fpage>
          -
          <lpage>101</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.586.
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [94]
          <string-name>
            <given-names>T.</given-names>
            <surname>Lorido-Botran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Bhatti</surname>
          </string-name>
          ,
          <article-title>ImpalaE: Towards an optimal policy for eficient resource management at the edge</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>1</volume>
          (
          <year>2022</year>
          )
          <fpage>43</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .55056/ jec.572.
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [95]
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Klymenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <article-title>Design and implementation of an edge computing-based GPS tracking system</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>175</fpage>
          -
          <lpage>189</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec. 634.
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [96]
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Petrosian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. V.</given-names>
            <surname>Petrosyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Pilkevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Graf</surname>
          </string-name>
          ,
          <article-title>Eficient model of PID controller of unmanned aerial vehicle</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>104</fpage>
          -
          <lpage>124</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.593.
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [97]
          <string-name>
            <surname>T. M. Nikitchuk</surname>
            ,
            <given-names>T. A.</given-names>
          </string-name>
          <string-name>
            <surname>Vakaliuk</surname>
            ,
            <given-names>O. A.</given-names>
          </string-name>
          <string-name>
            <surname>Chernysh</surname>
            ,
            <given-names>O. L.</given-names>
          </string-name>
          <string-name>
            <surname>Korenivska</surname>
            ,
            <given-names>L. A.</given-names>
          </string-name>
          <string-name>
            <surname>Martseva</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          <string-name>
            <surname>Osadchyi</surname>
          </string-name>
          ,
          <article-title>Non-contact photoplethysmographic sensors for monitoring students' cardiovascular system functional state in an IoT system</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>1</volume>
          (
          <year>2022</year>
          )
          <fpage>17</fpage>
          -
          <lpage>28</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.570.
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [98]
          <string-name>
            <surname>T. M. Nikitchuk</surname>
            ,
            <given-names>O. V.</given-names>
          </string-name>
          <string-name>
            <surname>Andreiev</surname>
            ,
            <given-names>O. L.</given-names>
          </string-name>
          <string-name>
            <surname>Korenivska</surname>
            ,
            <given-names>M. G.</given-names>
          </string-name>
          <string-name>
            <surname>Medvediev</surname>
          </string-name>
          ,
          <article-title>Model of an automated biotechnical system for analyzing pulseograms as a kind of edge devices</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>64</fpage>
          -
          <lpage>83</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.627.
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [99]
          <string-name>
            <given-names>O. L.</given-names>
            <surname>Korenivska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. B.</given-names>
            <surname>Benedytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Andreiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Medvediev</surname>
          </string-name>
          ,
          <article-title>A system for monitoring the microclimate parameters of premises based on the Internet of Things and edge devices</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>125</fpage>
          -
          <lpage>147</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec.614.
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [100]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Hrynevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Chernysh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. G.</given-names>
            <surname>Medvediev</surname>
          </string-name>
          ,
          <article-title>Edge computing in environmental science: automated intelligent robotic platform for water quality assessment</article-title>
          ,
          <source>Journal of Edge Computing</source>
          <volume>2</volume>
          (
          <year>2023</year>
          )
          <fpage>163</fpage>
          -
          <lpage>174</lpage>
          . doi:
          <volume>10</volume>
          .55056/jec. 633.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>