<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Improving a machine learning method for an automated control system ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viktoriia Zhebka</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Ananchenko</string-name>
          <email>ananchenko.oe@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kateryna Osadcha</string-name>
          <email>katheryna.osadcha@ntnu.no</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Zhebka</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Aronov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bogdan Khmelnitsky Melitopol State Pedagogical University</institution>
          ,
          <addr-line>59 Naukove mistechko str., 69000 Zaporizhzhia</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Norwegian University of Science and Technology</institution>
          ,
          <addr-line>1 Høgskoleringen, 7034 Trondheim</addr-line>
          ,
          <country country="NO">Norway</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>State University of Information and Communication Technologies</institution>
          ,
          <addr-line>7 Solomenskaya str., 03110 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>and Telecommunication Systems II</institution>
        </aff>
      </contrib-group>
      <fpage>372</fpage>
      <lpage>377</lpage>
      <abstract>
        <p>The paper is devoted to the improvement of the automated learning management system by integrating the metric proximal gradient method. Improving the automated learning management system helps to increase the efficiency, quality, and safety of the educational process by automating routine tasks and implementing individualized curricula. The paper discusses the use of machine learning to analyze student performance and detect suspicious user activity, which increases the transparency and reliability of the system. The use of the metric proximal gradient method ensures efficient solutions to optimization problems and increases the adaptability of the model in a dynamic educational environment. Also the paper presents an improved approach to automated learning management systems through the implementation of an advanced machine learning method based on the metric proximal gradient algorithm. The research addresses key challenges in educational process management, including system efficiency, quality assurance, and security enhancement. The proposed method incorporates a specialized database for comprehensive event logging and implements clustering and regression algorithms for student performance analysis. The improved metric proximal gradient algorithm demonstrates effective convergence properties through diagonal step sizing and non-monotonic linear search strategies. Results indicate that this approach provides enhanced optimization capabilities for handling complex data structures and adapting to dynamic educational environments. The implementation shows particular promise in personalizing educational routes, optimizing curricula, and maintaining system security through automated anomaly detection.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;machine learning method</kwd>
        <kwd>automated control system</kwd>
        <kwd>metric proximal gradient</kwd>
        <kwd>educational process 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Improving an automated learning management system
(ACS) is an important step towards increasing the
efficiency, quality, and safety of the educational process.
Automating routine administrative tasks, such as creating
timetables, recording attendance, and generating reports,
allows you to optimize resource management and reduce
staff workload. This allows administrators to focus on more
strategic tasks, such as improving curricula and managing
the quality of education [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>
        Improving the quality of the educational process is one of
the key goals of improving the automated control system. The
introduction of machine learning technologies allows for more
accurate tracking and analysis of student performance, which
helps to identify learning problems on time and provide the
necessary support. Such innovations also allow for the creation
of individualized curricula, which provide a more personalized
approach to education, contributing to better learning and
improved academic results [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The transparency and fairness of the educational
process will also benefit from the improvement of the
automated learning management system. Automating the
assessment and recording of student results reduces the risk
of human error and subjectivity, which helps build trust in
the system on the part of students and their parents. The
transparency of teachers’ and administrators’ actions
provided by automated systems increases the level of
responsibility and openness in the educational environment
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Improving data security is also an important aspect. In
today’s cyber threat environment, it is necessary to
implement modern authentication and monitoring methods
to protect the personal data of students and teachers [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
This not only reduces the risk of information compromise
but also ensures compliance with regulatory data protection
requirements. In addition, the use of data for analysis and
informed decision-making helps the management of
educational institutions to identify trends, predict results,
and develop strategies for further development.
      </p>
      <p>
        Improving the ACS also ensures adaptation to modern
educational trends, such as distance learning, integration of
digital resources, and the use of interactive platforms [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
This allows educational institutions to remain relevant and
competitive in the market of educational services. In
addition, improving the usability of the system contributes
to the satisfaction of students, teachers, and administration,
which is an important factor in creating a positive
educational environment [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref8 ref9">8–15</xref>
        ].
      </p>
      <p>
        Thus, the improvement of the ACS is necessary to
ensure an efficient, high-quality, and safe educational
process that meets modern requirements and challenges.
This not only improves the management and provision of
education but also contributes to the overall development of
educational institutions in a dynamic world [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19">16–19</xref>
        ].
Therefore, the purpose of the paper sis to improve the
automated learning management system by introducing an
advanced machine learning method [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23">20–23</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Research results</title>
      <p>The automated control system (ACS) implements a
specialized database to store logs of all events occurring in
the system. The logs contain information about user
authentication, changes in schedules, grades, documents,
and other critical operations. Such a database provides high
detail and the ability to retrospectively analyze user actions.
An important aspect is the ability to sort logs by various
parameters (user, subject, document, etc.), which allows the
administrator to obtain the necessary information for
analysis and decision-making.</p>
      <p>Machine learning (ML) in an automated learning
management system can be effectively used to analyze
student performance. Using clustering and regression
algorithms, the system can track the dynamics of the
academic performance of individual students or groups. For
example, based on historical data on grades, attendance, and
assignments, the system can predict the likelihood of
successful completion of a course or identify students who
need additional support.</p>
      <p>In addition, a ‘Decency’ or ‘Integrity’ rating system can
be introduced that automatically assigns ratings to students
based on their behavior (completing assignments on time,
attending classes, etc.). Such ratings can serve as an
additional motivational tool for students.</p>
      <p>Another important function of ML in an ACS system is
to detect suspicious user activity. For this purpose, anomaly
detection algorithms are used that can identify deviations
from a typical user behavioral pattern. For example, if a user
who normally interacts with the ‘timetable’ and ‘grades’
tabs suddenly logs in from another device and immediately
accesses confidential documents such as ‘R&amp;D’, the system
generates an alarm.</p>
      <p>The system can automatically determine the priority
level (e.g., critical, high, medium, low) for each incident,
depending on the degree of deviation from the norm. With
the help of classification algorithms, such events can be
automatically filtered and forwarded to the administrator
for further investigation. In critical cases, the system can
automatically block access to the system from a suspicious
device until the circumstances are clarified.</p>
      <p>The system also monitors the devices from which the
user usually accesses the system. If a new device appears
that has not been used before, the system can request
confirmation from the user or simply inform the
administrator to avoid unauthorized access.</p>
      <p>Integration of machine learning into ACS systems
significantly increases the level of security and management
efficiency. The introduction of such technologies allows for
automated tracking of student progress, as well as timely
detection and response to suspicious user activity, which
contributes to the overall reliability and safety of the
educational process.</p>
      <p>It is proposed to use the method of metric proximal
gradient as a machine learning method.</p>
      <p>The algorithm of the metric proximal gradient:</p>
      <p>Select the starting point 
Update the metric Mn.</p>
      <p>∈  .
y n1  xn   M n 1 f  xn 
xn1  prox
q,Mn</p>
      <p> y n1 

arg min  q  x  
x 
1 yn1  x 2 
2 M n 
yn1  yn</p>
      <p> 
If 2 so, then the algorithm stops.
Otherwise, repeat step 2.</p>
      <p>The study of the choice of algorithm step size to
ensure fast convergence revealed that the diagonal
step size is more effective than the scalar step size.
However, it is necessary to develop clear rules for
determining the diagonal step size in convex
optimization algorithms.</p>
      <p>The standard proximal gradient method is
guaranteed to converge in sufficiently small steps
  1 , provided that f is L-smooth. In this case,</p>
      <p>L
without using the Lipschitz constant, it is possible
to search over several rows with a return strategy.
The methods used in this case guarantee
convergence.</p>
      <p>A non-monotonic linear search on a string allows
the objective function F(x) to grow between
iterations but leads to a possible decrease in its
value. Given the current iteration xn, the initial
metric Mn, and the potential next iteration xn + 1
check whether the following (Mn, xn + 1) criterion is
satisfied.
xn1  xn 2</p>
      <p>The next step is to perform a return, changing the scale
of the metric M n with the coefficient   1.</p>
      <p>The next step is to analyze the convergence of the
algorithm. Assume that the function f is L-smooth and
M n  0 . The algorithm of the variable metric proximal
gradient with diagonal metric will have the following steps:
1. Set the parameters, starting points, and starting
metrics.</p>
      <p>2. Calculate and by the formula.
Set parameters
Set the initial</p>
      <p>points
Set the initial</p>
      <p>metric
Calculate</p>
      <p>Let's initialize
Yes</p>
      <p>No
Yes</p>
      <p>No
Yes</p>
      <p>No</p>
      <p>Calculate
c , y n  </p>
      <p>n

n
BB 2
, if 
n
BB1
 
n</p>
      <p>BB2


n
BB1
 
1

n</p>
      <p>BB2
Initialize Mn according to the formula
,in other cases

 1 ,
  БnБ1

 1
min    n ,
 ББ 2

 cin yin  min1
  cin 2 
 xn   M n 1 f  x n  
.</p>
      <p>M n : M n
,
xn1 : prox
q,M n</p>
      <p> xn   M n 1 f  xn  .
as long as the criterion is met</p>
      <p>F  xn1   F n  1 xn1  xn 2
2</p>
      <p>M n
,
F n  max F  xn , F  xn1 ,....., F  xnminKls,n1  .</p>
      <p>Return the metric Mn and perform the next iteration
xn + 1.</p>
      <p>Repeat steps 2–6 until the stopping criterion is satisfied</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>The use of the metric proximal gradient method in the
automated learning management system (ALMS) is a
promising approach to solving optimization problems and
improving the system’s performance. This method allows
you to solve complex optimization problems where
conventional gradient methods may be ineffective due to
the presence of irregularities or special structures in the
objective function. In particular, the metric proximal
gradient method effectively copes with sparse or
heterogeneous data, which is typical in large educational
systems.</p>
      <p>Due to its ability to take into account the local geometry
of the problem, this method can be used to adaptively tune
model parameters, which is especially important in dynamic
environments where conditions change over time. For
example, it can be used to optimize curricula, personalize
educational routes for students, or detect anomalies in user
behavior that require immediate response.</p>
      <p>In general, the use of the metric proximal gradient
method in ACS systems is recommended for tasks requiring
high accuracy, adaptability, and efficient processing of
complex data structures. This will increase the level of
automation, forecast accuracy, and safety in the
management of the educational process.</p>
      <p>in in  mn1
c y i
cn 2 </p>
      <p>i
in in  mn1
c y i
 ck 2 
i</p>
      <p>1

 n
ББ1
1

 n</p>
      <p>ББ 2
,
in other cases.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of Active Cybersecurity Education in Ukrainian Higher School</article-title>
          , Information Technology for Education,
          <source>Science, and Technics</source>
          , vol.
          <volume>178</volume>
          (
          <year>2023</year>
          )
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -35467-0_
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Implementation of Active Learning in the Master's Program on Cybersecurity, Advances in Computer Science for Engineering and Education II, vol</article-title>
          .
          <volume>938</volume>
          (
          <year>2020</year>
          )
          <fpage>610</fpage>
          -
          <lpage>624</lpage>
          . doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>57</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buhas</surname>
          </string-name>
          , et al.,
          <article-title>Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2021</year>
          )
          <fpage>273</fpage>
          -
          <lpage>281</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <article-title>Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>97</fpage>
          -
          <lpage>106</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Protection of Information in Telecommunication Medical Systems based on a RiskOriented Approach</source>
          , in: Workshop on Cybersecurity Providing in
          <source>Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>158</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          , et al.,
          <article-title>Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>290</fpage>
          -
          <lpage>300</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.
          <article-title>Formation of Requirements for the Electronic RecordBook in Guaranteed Information Systems of Distance Learning</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS 2021</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <article-title>Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>149</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <source>Systematization of Measures on Lightning Protection of the Objects of Telecommunications Network, Int. J. Adv. Trends Comput. Sci. Eng</source>
          .
          <volume>9</volume>
          (
          <issue>5</issue>
          ) (
          <year>2020</year>
          )
          <fpage>7870</fpage>
          -
          <lpage>7877</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Canale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lunardon</surname>
          </string-name>
          , Churn Prediction in Telecommunications Industry.
          <source>A Study based on Bagging Classifiers Telecom, Carlo Alberto Notebooks</source>
          <volume>350</volume>
          (
          <year>2014</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>DSTU</surname>
          </string-name>
          (
          <article-title>State standard of Ukraine) 3899:2013</article-title>
          .
          <article-title>Dyzain i Erhonomika. Terminy ta Vyznachennia Poniat [Design and Ergonomics</article-title>
          . Terms and Definitions].
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hughes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Haran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Caragea</surname>
          </string-name>
          ,
          <source>Autologistic Models for Binary Data on a Lattice. Environmetrics</source>
          <volume>22</volume>
          (
          <issue>7</issue>
          ) (
          <year>2011</year>
          )
          <fpage>857</fpage>
          -
          <lpage>871</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>ITU-T Recommendation</surname>
          </string-name>
          G.
          <volume>602</volume>
          . Transmission Media Characteristics.
          <source>Reliability and Availability of Analogue Cable Transmission Systems and Associated Equipments.</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sanjay</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Sepehri</surname>
          </string-name>
          ,
          <article-title>Applying Data Mining to Customer Churn Prediction in an Internet Service Provider</article-title>
          .
          <source>Int. J. Comput. Appl</source>
          .
          <volume>9</volume>
          (
          <issue>7</issue>
          ) (
          <year>2010</year>
          )
          <fpage>8</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Klymovych</surname>
          </string-name>
          , et al.,
          <source>The Diagnostics Methods for Modern Communication Tools in the Armed Forces of Ukraine based on Neural Network Approach, Modern Machine Learning Technologies Workshop</source>
          , vol.
          <volume>2631</volume>
          (
          <year>2020</year>
          )
          <fpage>198</fpage>
          -
          <lpage>208</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>M. J. Wainwright</surname>
            ,
            <given-names>M. I. Jordan</given-names>
          </string-name>
          , Graphical Models,
          <string-name>
            <given-names>Exponential</given-names>
            <surname>Families</surname>
          </string-name>
          , and Variational Inference,
          <source>Found. Tr. Mach. Learn</source>
          .
          <volume>1</volume>
          (
          <issue>1</issue>
          -2) (
          <year>2008</year>
          )
          <fpage>1</fpage>
          -
          <lpage>305</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Babarczi</surname>
          </string-name>
          , et al.,
          <source>A Mathematical Framework for Measuring Network Flexibility, Comput. Commun</source>
          .
          <volume>164</volume>
          (
          <year>2020</year>
          )
          <fpage>13</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mukhin</surname>
          </string-name>
          , et al.,
          <article-title>Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems' Characteristics, Int</article-title>
          .
          <source>Rev. Comput. Software</source>
          <volume>10</volume>
          (
          <issue>12</issue>
          ) (
          <year>2015</year>
          )
          <fpage>1216</fpage>
          -
          <lpage>1224</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>W.</given-names>
            <surname>Kellerer</surname>
          </string-name>
          , et al.,
          <article-title>How to Measure Network Flexibility? A Proposal for Evaluating Softwarized Networks</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          <volume>56</volume>
          (
          <issue>10</issue>
          ) (
          <year>2018</year>
          )
          <fpage>186</fpage>
          -
          <lpage>192</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>W.</given-names>
            <surname>Zucchini</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. L. MacDonald</surname>
          </string-name>
          , R. Langrock,
          <article-title>Hidden Markov Models for Time Series: An Introduction Using R, Chapman</article-title>
          and Hall (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <article-title>Distributed Computer System Resources Control Mechanism based on Network-Centric Approach</article-title>
          , Int.
          <source>J. Intell. Syst. Appl</source>
          .
          <volume>9</volume>
          (
          <issue>7</issue>
          ) (
          <year>2017</year>
          )
          <fpage>41</fpage>
          -
          <lpage>51</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhebka</surname>
          </string-name>
          ,
          <article-title>Modeliuvannia Markivskoho Vypadkovoho Polia z Metoiu Yoho Podalshoi Optymizatsii ta Zastosuvannia</article-title>
          ,
          <source>Scientific-Practical Journal Zviazok</source>
          <volume>5</volume>
          (
          <year>2020</year>
          )
          <fpage>35</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>V.</given-names>
            <surname>Zhebka</surname>
          </string-name>
          , et al.,
          <article-title>Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>322</fpage>
          -
          <lpage>332</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>