<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Improving a machine learning method for an automated control system ⋆</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Viktoriia</forename><surname>Zhebka</surname></persName>
							<email>viktoria_zhebka@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomenskaya str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksii</forename><surname>Ananchenko</surname></persName>
							<email>ananchenko.oe@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomenskaya str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kateryna</forename><surname>Osadcha</surname></persName>
							<email>katheryna.osadcha@ntnu.no</email>
							<affiliation key="aff1">
								<orgName type="institution">Norwegian University of Science and Technology</orgName>
								<address>
									<addrLine>1 Høgskoleringen</addrLine>
									<postCode>7034</postCode>
									<settlement>Trondheim</settlement>
									<country key="NO">Norway</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Bogdan Khmelnitsky Melitopol State Pedagogical University</orgName>
								<address>
									<addrLine>59 Naukove mistechko str</addrLine>
									<postCode>69000</postCode>
									<settlement>Zaporizhzhia</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Serhii</forename><surname>Zhebka</surname></persName>
							<email>szhebka@hotmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomenskaya str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Aronov</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">State University of Information and Communication Technologies</orgName>
								<address>
									<addrLine>7 Solomenskaya str</addrLine>
									<postCode>03110</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Improving a machine learning method for an automated control system ⋆</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E5508E1F066F8FAA0B2F7B52D5BA20F2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:51+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>machine learning method</term>
					<term>automated control system</term>
					<term>metric proximal gradient</term>
					<term>educational process 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper is devoted to the improvement of the automated learning management system by integrating the metric proximal gradient method. Improving the automated learning management system helps to increase the efficiency, quality, and safety of the educational process by automating routine tasks and implementing individualized curricula. The paper discusses the use of machine learning to analyze student performance and detect suspicious user activity, which increases the transparency and reliability of the system. The use of the metric proximal gradient method ensures efficient solutions to optimization problems and increases the adaptability of the model in a dynamic educational environment. Also the paper presents an improved approach to automated learning management systems through the implementation of an advanced machine learning method based on the metric proximal gradient algorithm. The research addresses key challenges in educational process management, including system efficiency, quality assurance, and security enhancement. The proposed method incorporates a specialized database for comprehensive event logging and implements clustering and regression algorithms for student performance analysis. The improved metric proximal gradient algorithm demonstrates effective convergence properties through diagonal step sizing and non-monotonic linear search strategies. Results indicate that this approach provides enhanced optimization capabilities for handling complex data structures and adapting to dynamic educational environments. The implementation shows particular promise in personalizing educational routes, optimizing curricula, and maintaining system security through automated anomaly detection.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Improving an automated learning management system (ACS) is an important step towards increasing the efficiency, quality, and safety of the educational process. Automating routine administrative tasks, such as creating timetables, recording attendance, and generating reports, allows you to optimize resource management and reduce staff workload. This allows administrators to focus on more strategic tasks, such as improving curricula and managing the quality of education <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>Improving the quality of the educational process is one of the key goals of improving the automated control system. The introduction of machine learning technologies allows for more accurate tracking and analysis of student performance, which helps to identify learning problems on time and provide the necessary support. Such innovations also allow for the creation of individualized curricula, which provide a more personalized approach to education, contributing to better learning and improved academic results <ref type="bibr" target="#b2">[3]</ref>.</p><p>The transparency and fairness of the educational process will also benefit from the improvement of the automated learning management system. Automating the assessment and recording of student results reduces the risk of human error and subjectivity, which helps build trust in the system on the part of students and their parents. The transparency of teachers' and administrators' actions provided by automated systems increases the level of responsibility and openness in the educational environment <ref type="bibr" target="#b3">[4]</ref>.</p><p>Improving data security is also an important aspect. In today's cyber threat environment, it is necessary to implement modern authentication and monitoring methods to protect the personal data of students and teachers <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. This not only reduces the risk of information compromise but also ensures compliance with regulatory data protection requirements. In addition, the use of data for analysis and 0000-0003-4051-1190 (V. Zhebka); 0009-0005-3446-5994 (O. Ananchenko); 0000-0003-0653-6423 (K. Osadcha); 0009-0007-4620-9888 (S. Zhebka); 0009-0000-7868-8341 (A. Aronov) informed decision-making helps the management of educational institutions to identify trends, predict results, and develop strategies for further development.</p><p>Improving the ACS also ensures adaptation to modern educational trends, such as distance learning, integration of digital resources, and the use of interactive platforms <ref type="bibr" target="#b6">[7]</ref>. This allows educational institutions to remain relevant and competitive in the market of educational services. In addition, improving the usability of the system contributes to the satisfaction of students, teachers, and administration, which is an important factor in creating a positive educational environment <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref>.</p><p>Thus, the improvement of the ACS is necessary to ensure an efficient, high-quality, and safe educational process that meets modern requirements and challenges. This not only improves the management and provision of education but also contributes to the overall development of educational institutions in a dynamic world <ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref>. Therefore, the purpose of the paper sis to improve the automated learning management system by introducing an advanced machine learning method <ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Research results</head><p>The automated control system (ACS) implements a specialized database to store logs of all events occurring in the system. The logs contain information about user authentication, changes in schedules, grades, documents, and other critical operations. Such a database provides high detail and the ability to retrospectively analyze user actions. An important aspect is the ability to sort logs by various parameters (user, subject, document, etc.), which allows the administrator to obtain the necessary information for analysis and decision-making.</p><p>Machine learning (ML) in an automated learning management system can be effectively used to analyze student performance. Using clustering and regression algorithms, the system can track the dynamics of the academic performance of individual students or groups. For example, based on historical data on grades, attendance, and assignments, the system can predict the likelihood of successful completion of a course or identify students who need additional support.</p><p>In addition, a 'Decency' or 'Integrity' rating system can be introduced that automatically assigns ratings to students based on their behavior (completing assignments on time, attending classes, etc.). Such ratings can serve as an additional motivational tool for students.</p><p>Another important function of ML in an ACS system is to detect suspicious user activity. For this purpose, anomaly detection algorithms are used that can identify deviations from a typical user behavioral pattern. For example, if a user who normally interacts with the 'timetable' and 'grades' tabs suddenly logs in from another device and immediately accesses confidential documents such as 'R&amp;D', the system generates an alarm.</p><p>The system can automatically determine the priority level (e.g., critical, high, medium, low) for each incident, depending on the degree of deviation from the norm. With the help of classification algorithms, such events can be automatically filtered and forwarded to the administrator for further investigation. In critical cases, the system can automatically block access to the system from a suspicious device until the circumstances are clarified.</p><p>The system also monitors the devices from which the user usually accesses the system. If a new device appears that has not been used before, the system can request confirmation from the user or simply inform the administrator to avoid unauthorized access.</p><p>Integration of machine learning into ACS systems significantly increases the level of security and management efficiency. The introduction of such technologies allows for automated tracking of student progress, as well as timely detection and response to suspicious user activity, which contributes to the overall reliability and safety of the educational process.</p><p>It is proposed to use the method of metric proximal gradient as a machine learning method.</p><p>The algorithm of the metric proximal gradient:</p><p>1.</p><p>Select the starting point 𝑥 ∈ 𝑅 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.</head><p>Update the metric M n .</p><p>    The study of the choice of algorithm step size to ensure fast convergence revealed that the diagonal step size is more effective than the scalar step size. However, it is necessary to develop clear rules for determining the diagonal step size in convex optimization algorithms.</p><formula xml:id="formula_0">1 1 n n n n y x M f x        1 1 ,M n n n q x prox y      2 1 1 arg min 2 n n M x q x y x         </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">If</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>5.</head><p>The standard proximal gradient method is guaranteed to converge in sufficiently small steps 1 L   , provided that f is L-smooth. In this case, without using the Lipschitz constant, it is possible to search over several rows with a return strategy. The methods used in this case guarantee convergence.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>6.</head><p>A non-monotonic linear search on a string allows the objective function F(x) to grow between iterations but leads to a possible decrease in its value. Given the current iteration x n , the initial metric M n , and the potential next iteration x n + 1 check whether the following (M n , x n + 1 ) criterion is satisfied. The next step is to analyze the convergence of the algorithm. Assume that the function f is L-smooth and 0 n M  . The algorithm of the variable metric proximal gradient with diagonal metric will have the following steps:</p><p>1.</p><p>Set the parameters, starting points, and starting metrics.</p><p>2.</p><p>Calculate and by the formula. </p><formula xml:id="formula_1">                   Initialize M n according to the formula       1 2 1 1 1 2 2 2 1 2 1 1 , 1 1 , , . n n n i i i n n n ББ ББ i n n n n i i i i n n k ББ ББ i n n n i i i n i c y m c c y m m c c y m in other cases c                                    Calculate       1 1 , : n n n n n q M x prox x M f x      . Repeat the expressions : n n M M   ,       1 1 , : n n n n n q M x prox x M f x      . as long as the criterion is met   2 1 1 1 2 n n n n n M F x F x x       ,           , 1 min 1 max , ,....., ls n n K n n n F F x F x F x     .</formula><p>Return the metric M n and perform the next iteration x n + 1 .</p><p>Repeat steps 2-6 until the stopping criterion is satisfied</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusions</head><p>The use of the metric proximal gradient method in the automated learning management system (ALMS) is a promising approach to solving optimization problems and improving the system's performance. This method allows you to solve complex optimization problems where conventional gradient methods may be ineffective due to the presence of irregularities or special structures in the objective function. In particular, the metric proximal gradient method effectively copes with sparse or heterogeneous data, which is typical in large educational systems.</p><p>Due to its ability to take into account the local geometry of the problem, this method can be used to adaptively tune model parameters, which is especially important in dynamic environments where conditions change over time. For example, it can be used to optimize curricula, personalize educational routes for students, or detect anomalies in user behavior that require immediate response.</p><p>In general, the use of the metric proximal gradient method in ACS systems is recommended for tasks requiring high accuracy, adaptability, and efficient processing of complex data structures. This will increase the level of automation, forecast accuracy, and safety in the management of the educational process.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Algorithm of the metric proximal gradient</figDesc><graphic coords="3,173.04,80.88,248.88,552.72" type="vector_box" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Improved metric proximal gradient algorithm</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Implementation of Active Cybersecurity Education in Ukrainian Higher School</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-35467-0_32</idno>
	</analytic>
	<monogr>
		<title level="j">Information Technology for Education, Science, and Technics</title>
		<imprint>
			<biblScope unit="volume">178</biblScope>
			<biblScope unit="page" from="533" to="551" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Implementation of Active Learning in the Master&apos;s Program on Cybersecurity</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buriachok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sokolov</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-16621-2_57</idno>
	</analytic>
	<monogr>
		<title level="j">Advances in Computer Science for Engineering and Education II</title>
		<imprint>
			<biblScope unit="volume">938</biblScope>
			<biblScope unit="page" from="610" to="624" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</title>
		<author>
			<persName><forename type="first">V</forename><surname>Buhas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3188</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="273" to="281" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept</title>
		<author>
			<persName><forename type="first">P</forename><surname>Skladannyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="97" to="106" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach</title>
		<author>
			<persName><forename type="first">S</forename><surname>Shevchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Workshop on Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3421</biblScope>
			<biblScope unit="page" from="158" to="167" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare</title>
		<author>
			<persName><forename type="first">V</forename><surname>Astapenya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Cybersecurity Providing in Information and Telecommunication Systems</title>
				<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">3654</biblScope>
			<biblScope unit="page" from="290" to="300" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Formation of Requirements for the Electronic RecordBook in Guaranteed Information Systems of Distance Learning</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hulak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Cybersecurity Providing in Information and Telecommunication Systems</title>
				<meeting><address><addrLine>CPITS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="volume">2923</biblScope>
			<biblScope unit="page" from="137" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zhebka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3288</biblScope>
			<biblScope unit="page" from="149" to="155" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Systematization of Measures on Lightning Protection of the Objects of Telecommunications Network</title>
		<author>
			<persName><forename type="first">P</forename><surname>Anakhov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Adv. Trends Comput. Sci. Eng</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="7870" to="7877" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Churn Prediction in Telecommunications Industry. A Study based on Bagging Classifiers Telecom</title>
		<author>
			<persName><forename type="first">A</forename><surname>Canale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lunardon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Carlo Alberto Notebooks</title>
		<imprint>
			<biblScope unit="volume">350</biblScope>
			<biblScope unit="page" from="1" to="11" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m">Dyzain i Erhonomika. Terminy ta Vyznachennia Poniat [Design and Ergonomics</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>DSTU (State standard of Ukraine) 3899. Terms and Definitions</note>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Autologistic Models for Binary Data on a Lattice</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hughes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Haran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">C</forename><surname>Caragea</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Environmetrics</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="857" to="871" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<idno>ITU-T Recommendation G.602</idno>
		<title level="m">Reliability and Availability of Analogue Cable Transmission Systems and Associated Equipments</title>
				<imprint/>
	</monogr>
	<note>Transmission Media Characteristics</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Applying Data Mining to Customer Churn Prediction in an Internet Service Provider</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sanjay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Sepehri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Comput. Appl</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="8" to="14" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">The Diagnostics Methods for Modern Communication Tools in the Armed Forces of Ukraine based on Neural Network Approach</title>
		<author>
			<persName><forename type="first">O</forename><surname>Klymovych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Modern Machine Learning Technologies Workshop</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2631</biblScope>
			<biblScope unit="page" from="198" to="208" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Graphical Models, Exponential Families, and Variational Inference</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Wainwright</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Jordan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Found. Tr. Mach. Learn</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="1" to="305" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A Mathematical Framework for Measuring Network Flexibility</title>
		<author>
			<persName><forename type="first">P</forename><surname>Babarczi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comput. Commun</title>
		<imprint>
			<biblScope unit="volume">164</biblScope>
			<biblScope unit="page" from="13" to="24" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems&apos; Characteristics</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mukhin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. Rev. Comput. Software</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="1216" to="1224" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">How to Measure Network Flexibility? A Proposal for Evaluating Softwarized Networks</title>
		<author>
			<persName><forename type="first">W</forename><surname>Kellerer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Magazine</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="186" to="192" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Zucchini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">L</forename><surname>Macdonald</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Langrock</surname></persName>
		</author>
		<title level="m">Hidden Markov Models for Time Series: An Introduction Using R</title>
				<imprint>
			<publisher>Chapman and Hall</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Distributed Computer System Resources Control Mechanism based on Network-Centric Approach</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Intell. Syst. Appl</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="41" to="51" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Modeliuvannia Markivskoho Vypadkovoho Polia z Metoiu Yoho Podalshoi Optymizatsii ta Zastosuvannia</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zhebka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific-Practical Journal Zviazok</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="35" to="40" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zhebka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity Providing in Information and Telecommunication Systems</title>
		<imprint>
			<biblScope unit="volume">3654</biblScope>
			<biblScope unit="page" from="322" to="332" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
