=Paper=
{{Paper
|id=Vol-3887/paper16
|storemode=property
|title=Evaluation of the Effectiveness of Network-centric Control of Mobile Agents in a Dynamic Environment Using Neural Networks
|pdfUrl=https://ceur-ws.org/Vol-3887/paper16.pdf
|volume=Vol-3887
|authors=Vadym Mukhin,Valerii Zavgorodnii,Anna Zavgorodnya,Oleksandr Yarovyi,Lesia Baranovska,Oleg Mukhin
|dblpUrl=https://dblp.org/rec/conf/its2/MukhinZZYBM23
}}
==Evaluation of the Effectiveness of Network-centric Control of Mobile Agents in a Dynamic Environment Using Neural Networks==
Vadym Mukhin, Valerii Zavgorodnii, Anna Zavgorodnya, Oleksandr Yarovyi,
Lesia Baranovska and Oleg Mukhin
National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 37, Prospect Beresteiskyi, Kyiv, 03056,
Ukraine
Abstract
This paper examines the network-centric approach for enhancing the efficiency of mobile agent control. The
primary distinction of this approach is the use of a "wandering center." If communication with the active
center is lost, a new center is appointed to continue control, ensuring the system's survivability and
improving the overall efficiency of mobile agent management.
An experimental study was conducted to evaluate the parameters and effectiveness of network-centric
control of mobile agents. The study utilized a developed model of mobile agent interaction based on network-
centric control, along with a simulation model of agent behavior in a dynamic environment. Additionally, a
neural network was created that accurately predicts the probability of hitting the target (%) under changing
dynamics. The use of this neural network also helped identify input parameters with minimal impact on the
outcome.
Keywords
Mobile agent, network-centric control, dynamic environment, neural networks, simulation model 1
1. Introduction
Today, most existing mobile agents are controlled manually using remote controls that operate on
radio channels. However, this manual control poses several challenges, including the need for
specialized operator training, limited operational range, and dependency on weather conditions [1,
2].
A mobile agent can be a software or hardware entity capable of performing various tasks within
a network or on a device, such as carrying information, conducting computations, and interacting
with other agents or the environment [3, 4].
Controlling mobile agents requires qualified specialists. For example, in the U.S. military,
experienced Air Force pilots undergo a full year of training to become proficient mobile agent
operators – a task that, in some cases, can be more demanding than piloting an aircraft. Operator
errors and mechanical failures account for most mobile agent accidents [5, 6].
A new technological trend involves the development of mobile agents equipped with an even
number of rotors that rotate diagonally in opposite directions. Mobile agents are just one component
within a complex, multi-functional system [7, 8]. Unlike manned aircraft, operating mobile agents
requires additional support system components, including the agent itself, the operator’s workstation,
software, data lines, and other elements necessary to achieve mission objectives. Current
development trends favor compact mobile agents, with a focus on simplicity of control, reliability,
and maneuverability [9, 10].
ITS-2023: Information Technologies and Security, November 30, 2023, Kyiv, Ukraine
v.mukhin@kpi.ua (V. Mukhin); zavgorodniivalerii@gmail.com (V. Zavgorodnii);
annzavgorodnya@gmail.com (A. Zavgorodnya); getem13@ukr.net (O. Yarovyi);
lesia@baranovsky.org (L. Baranovska); o.mukhin01@gmail.com (O. Mukhin)
0000-0002-1206-9131 (V. Mukhin); 0000-0002-8347-7183 (V. Zavgorodnii);
0000-0001-8523-1761 (A. Zavgorodnya); 0000-0002-3889-5730 (O. Yarovyi);
0000-0003-0024-8180 (L. Baranovska); 0009-0005-5301-8276 (O. Mukhin)
© 2023 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
ceur-ws.org
184
Workshop ISSN 1613-0073
Proceedings
In model aviation and professional applications such as the civil sector, agriculture, military, law
enforcement, and other fields, mobile agents are in high demand. Selecting the optimal models and
control systems is crucial for effectively monitoring ground-based targets [11, 12].
Thus, pilotless mobile agents present a more efficient and economical alternative to manned
aircraft for many tasks [13–15].
The main challenge in controlling mobile agents lies in the reliance on centralized control systems,
where the control center serves as a vulnerable element; if communication with it is lost, further
control becomes impossible. In contrast, decentralized control faces issues with coordinating and
circulating large volumes of information, leading to slower response times. A promising alternative
is a network-centric approach, which allows control to be transferred to an alternative center when
needed [16–18].
An analysis of recent scientific literature reveals that, although modern information technologies
have advanced considerably, the network-centric approach to control remains underdeveloped
compared to centralized and decentralized methods.
2. A network-centric approach to enhancing the efficiency of mobile
agent control systems
Three main approaches to the control of mobile agents can be identified: centralized, decentralized,
and network-centric. In centralized control, a single command center issues control signals to all
mobile agents. If this center is disabled or compromised, all mobile agents lose connectivity and
cannot be controlled.
Decentralized control, while reducing dependence on a single command point, has the drawback
of coordination challenges. For example, if mobile agents need to rapidly reconfigure, a large amount
of information must be transmitted to them, significantly reducing the overall speed of the control
system [19, 20].
The network-centric approach is designed to address the limitations of the previous models. This
approach integrates all forces and resources into a single information system, enabling control
objectives to be met even in dynamic, complex environments that are subject to unpredictable
interference. Such interference can be irregular, intermittent, and variable, yet network-centric
control is still effective under these conditions [21, 22].
Consider a control network that a subset of mobile agents follows. Among the entire group of
mobile agents, approximately 10% are selected as nodes that hold partial control information (Fig. 1).
These nodes, equipped with control functions, form a network, and from them, one is designated as
the primary control center [23, 24].
Only the node mobile agents (NMA) are coordinated directly by the control center; these nodes,
in turn, control the remaining mobile agents (MA). This setup minimizes communication interference
since individual control of each node could overwhelm communication channels. For example, if the
command is to change direction quickly, adjusting the coordinates for each mobile agent individually
would require significant time. Furthermore, if there is only one primary control agent and it
suddenly stops responding, is damaged, or is compromised, all mobile agents would lose direction,
become vulnerable to interception, or cease to operate [25–27].
A network-centric system consists of a primary control mobile agent (MMA) that continuously
sends commands to other mobile agents, setting parameters such as movement direction [28, 29].
Alongside commands, it also relays information from the control center to the node mobile agents. If
the primary control agent fails for any reason, copies of all information, including control data for all
mobile agents, are preserved within the node mobile agents. In this way, an adversary would need to
disable every node agent to compromise the entire network – a challenging task since the enemy
cannot readily identify which agents’ function as nodes. This network organization enhances the
resilience of the control system.
185
Figure 1: Mobile agent control system based on network-centric control
A key feature of a network-centric system is its “wandering center.” If the primary control mobile
agent is identified and disabled by an adversary, the stability of the system remains unaffected, as
control can quickly be reassigned. A new control agent is selected from the remaining active node
agents, allowing for seamless continuity. This flexibility means that control can be handed over to
another node at any moment, ensuring sustained operation. In this network-centric mobile agent
control system, two types of information are managed:
control: this includes global coordinates transmitted from the control center to the main
control agent.
command: this includes the coordinates transmitted by the control agent to node agents,
which then relay local coordinates to other agents. Thus, mobile agents navigate based on local
rather than global coordinates, as provided by the node agents.
In summary, a key strength of the network-centric approach is the use of a roving control center.
If connections to the current center are lost, a new center is assigned to maintain control. This design
ensures system survivability, thereby greatly enhancing the overall effectiveness of mobile agent
control.
3. Evaluation of the Effectiveness of Network-Centric Control for
Mobile Agents in a Dynamic Environment
Based on the network-centric control algorithm model for mobile agents in dynamic environments
and the simulation model of interacting mobile agents, it is essential to conduct experimental studies
to assess parameters and evaluate the effectiveness of network-centric control.
186
To validate the scientific and methodological framework developed, we performed mathematical
modeling to analyze the effectiveness of network-centric control for mobile agents in a dynamic
environment.
The software tools used in this study include:
Simulations were performed on a personal computer with an Intel® Celeron® processor (3.2 GHz)
and 16 GB of RAM running on Microsoft Windows 10.
Microsoft SQL Server 2022 was utilized as the database management system.
Microsoft Visual Studio 2022 Community Edition served as the development environment.
Development was conducted in C# using an object-oriented approach.
Experiments in the simulation environment included setting initial parameters, performing
intermediate calculations, and visualizing results with Windows Presentation Foundation.
The minimum required percentage of node mobile agents % (nodePercentage) needed to reach the
target was calculated as follows. A target is considered "hit" if both of the following conditions are
met:
The percentage of mobile agents that reached the target (targetHitPercentage) must be at least
equal to the required percentage of mobile agents needed to hit the target (targetHitPercentage).
Among the mobile agents that reached the target, there must be at least one node mobile agent
(targetReachedCount > 0).
To evaluate these conditions, 100 experimental trials were conducted, using the following
parameters:
Number of mobile agents (numberOfAgents): 100.
Minimum percentage of mobile agents required to hit the target (targetHitPercentage): 5%.
Percentage of node mobile agents (nodePercentage): ranging from 1% to 20% of the total number
of mobile agents.
Initial (startLatitude, startLongitude) and target (targetLatitude, targetLongitude) geographic
coordinates for node mobile agents.
Percentage of mobile agents that lost communication (lossPercentage), randomly generated
between 50% and 90%. For each agent that lost communication, the geographic coordinates were set
to NULL.
The experimental results were used to plot graphs illustrating the relationship between the
percentage of node mobile agents % (nodePercentage) and the probability of hitting the target
(targetHitPercentage) in each experiment (Fig. 2).
Figure 2: Relationship between the percentage of node mobile agents and the probability of hitting
the target
187
Based on the experimental results, the average effectiveness of target hits with varying numbers
of node mobile agents was analyzed (see Table 1 and Fig. 3).
Table 1
Target-Hitting Effectiveness with Varying Numbers of Node Mobile Agents
Number of Number of mobile agents with which communication was lost, %
nodal mobile
up to 50% up to 60% up to 70% up to 80% up to 90%
agents, %
0 24 22 17 12 6
1 29 27 24 19 22
2 31 31 32 22 19
3 33 44 53 38 28
4 78 66 62 53 47
5 87 82 54 47 34
6 84 78 82 72 62
7 92 83 92 88 72
8 91 83 88 76 70
9 90 92 91 78 72
10 99 94 97 82 84
11 100 98 98 84 83
12 100 100 96 92 88
13 100 100 100 91 94
14 100 100 100 97 92
15 100 100 100 100 97
16 100 100 100 100 100
17 100 100 100 100 100
18 100 100 100 100 100
19 100 100 100 100 100
20 100 100 100 100 100
Figure 3: Average Effectiveness of Target Hits with Varying Numbers of Node Mobile Agents
Figure 3 indicates the average effectiveness of target hits based on the percentage of node mobile
agents:
188
16% or more node mobile agents: 100% effectiveness.
12–15% node mobile agents: 95% effectiveness.
10–11% node mobile agents: 90% effectiveness.
7–9% node mobile agents: 80% effectiveness.
0–6% node mobile agents: less than 80% effectiveness.
From the above, it can be concluded that to achieve effective target damage (80% and above), the
minimum required number of node mobile agents (nodePercentage) is between 7% and 9%. Therefore,
using more than 9% of node mobile agents out of the total number of mobile agents is not advisable.
4. Evaluation of the Effectiveness of Network-Centric Control for
Mobile Agents in a Dynamic Environment Using Neural Networks
Evaluating the effectiveness of network-centric control for mobile agents in a dynamic environment,
using neural networks, plays a crucial role in determining the suitability of this approach for various
tasks. The main stages of this method can be described as follows:
1. Training Data Preparation: collect and prepare a large dataset representing different
scenarios and dynamic environmental conditions.
2. Creating a Dataset for Network Training: split the collected data into training and test sets to
evaluate the network's adaptability to new situations.
3. Designing and Configuring the Neural Network:
develop a neural network architecture suited for controlling mobile agents in dynamic
environments.
set the parameters and functions to optimize training.
4. Neural Network Training: use the training set to teach the network to recognize and solve
agent control tasks in various environments.
5. Validation and Performance Evaluation:
use the test set to assess the network’s accuracy and efficiency under real-world
conditions.
analyze the results in the context of specific tasks and environmental constraints.
6. Improvement and Adaptation:
use the results to refine the network architecture and its parameters.
adapt the network to changes in environmental dynamics and control tasks.
The process of training and creating the neural network was carried out using the Deductor Studio
Academic analytical platform, which provides highly efficient tools for data analysis and processing.
A critical step in this process was utilizing a specially created and carefully prepared dataset to train
the network.
The dataset included information from solving 1,000 different problems, which played a key role
in enhancing the adaptability and accuracy of the neural network. This approach to data preparation
contributed significantly to the network’s ability to solve diverse tasks and ensured its high efficiency
across various contexts.
For the parameters listed in Table 2, a mechanism for estimating the probability of target damage
(%) based on the neural network can be applied.
Table 2
The main parameters of the task
Parameter Description
number Mobile agent number
numberOfAgents Number of mobile agents, units
189
targetHitPercentage The number of mobile agents that will be enough to hit the target, %
targetHitCount The number of mobile agents that will be enough to hit the target, units.
nodePercentage Number of nodal mobile agents, %
nodeCount Number of nodal mobile agents, units
startLatitude Initial geographic coordinates of the mobile agent (latitude), degrees.
startLongitude Initial geographic coordinates of the mobile agent (longitude), degrees.
targetLatitude Final geographical coordinates of the mobile agent (latitude), degrees.
targetLongitude Final geographic coordinates of the mobile agent (longitude), degrees.
lossPercentage Number of mobile agents with which communication was lost, %
lossCount The number of mobile agents with which communication was lost, units.
targetHitProbability Probability of hitting the target, %
The parameters from Table 2 were provided as input data for building a neural network (Fig. 4).
Figure 4: Input Data Set for Neural Network Construction
Based on the results of the correlation analysis of the raw data, it was determined that not all fields
should be used for neural network training. Only the fields listed in Table 3 are relevant, as the
remaining fields have an insignificant impact on the resulting value (Fig. 5).
Table 3
Input data for neural network training
Parameter Description
number Mobile agent number
numberOfAgents Number of mobile agents, units
targetHitPercentage The number of mobile agents that will be enough to hit the target, %
targetHitCount The number of mobile agents that will be enough to hit the target, units.
nodePercentage Number of nodal mobile agents, %
nodeCount Number of nodal mobile agents, units
lossPercentage Number of mobile agents with which communication was lost, %
lossCount The number of mobile agents with which communication was lost, units.
targetHitProbability Probability of hitting the target, %
targetHitProbability Probability of hitting the target, %
190
Figure 5: Correlation Analysis of Input Data
The obtained dataset was used to train a multilayer perceptron neural network. The following
network structure was established: five layers of neurons, with the first (input) layer containing 7
neurons, three hidden layers containing 7, 3, and 5 neurons respectively, and the fifth (output) layer
containing 1 neuron. The activation function used is sigmoid. The architecture of the network –
defined by the number of layers, their sizes, and the activation function – determines its ability to
solve specific tasks. This framework demonstrates how data moves through the network, from the
input to the output layer, with each layer performing calculations using weights and the activation
function. The backpropagation method was employed for training.
The schematic representation of the neural network structure is shown in Figure 6, where the line
colors indicate the values of the weighting factors. The output of the neural network is the probability
of a target being hit (%). By applying the parameters of a different task to the input, the network
generates a predictive output for the probability of hitting the target (%).
Figure 6: The structure of a neural network
During the training of the neural network, the probability values of hitting the target (%) were
obtained. On average, the deviation across 1,000 experiments was 3.8%. This suggests that the neural
network trained using this methodology yields results that closely match the efficiency of the mobile
agent control system (Table 4).
191
Table 4
Comparison of the results of the neural network with the original data
numberOfAgents 73 99 87 44 66 89 79 50 91
targetHitPercentage 5 5 5 5 5 5 5 5 5
targetHitCount 4 5 4 2 3 4 4 2 5
nodePercentage 10 11 4 5 15 6 19 15 15
nodeCount 7 11 3 2 10 5 15 8 14
lossPercentage 63 51 69 69 90 63 86 63 73
lossCount 46 50 60 30 59 56 68 31 66
targetHitProbability 74 88 70 84 55 16 57 17 100
Neural network
77 86 68 83 58 15 60 16 99
data
Error, % 4.05 2.27 2.86 1.19 5.45 6.25 5.26 5.88 1.00
The structure of the neural network selected for training resulted in the smallest relative
calculation error, while errors for other network configurations exceeded 5%. Therefore, the
constructed neural network can be effectively used to solve similar problems, as it accurately reflects
the results and allows for the estimation of the probability of hitting the target (%) in dynamically
changing environments. Additionally, the use of the neural network helped identify input parameters
with minimal impact on the outcome.
5. Conclusions
This study reviews the network-centric approach as a method for enhancing the efficiency of mobile
agent control systems. The key distinction of this approach, compared to others, is the use of a
"wandering center." If communication with the current center is lost, a new center is appointed,
ensuring the continuity of the control process. This structure guarantees the system's survivability
and, as demonstrated, offers significant potential for improvement, ultimately increasing the overall
efficiency of mobile agent control.
The research highlights the effectiveness of network-centric control when compared to centralized
control (in which no nodal mobile agents are used). It was found that as the number of nodal mobile
agents increases, the effectiveness of hitting the target improves. Notably, effective performance (80%
or higher) is achieved with just 9% of the total number of mobile agents functioning as nodal agents,
suggesting that exceeding this threshold would not provide additional benefits.
Finally, the results from the mobile agent control system were compared with the output from the
neural network training, which estimates the probability of hitting the target with a relative deviation
of 3.8%. This confirms that the neural network, trained using the proposed methodology, produces
results that closely align with the efficiency of the mobile agent control system.
References
[1] Moutinho A. Modeling and nonlinear control for airship autonomous flight. Instituto Superior
Tecnico, Technical University of Lisbon. 2017. P. 55–65.
[2] Fukau T., Kanzawa T., Osuka K. Inverse optimal tracking control of an aerial blimp robot.
Proceedings of the 5th International Workshop. Robot Motion and Control. 2015. P. 193–198.
[3] Ko J., Klein D., Fox D., Haehne D. Gaussian Processes and Reinforcement Learning for
Identification and Control of an Autonomous Blimp Proc. of the IEEE Int. Conf. Robotics and
Automation. 2017. P. 742–747.
192
[4] V. Zavgorodnii, N. Braykovs'ka, O. Yarovyi, A. Zavgorodnya, V. Liskin, O. Mukhin. The Method
of Restoring Parameters of Mobile Agents in a Unified Dynamic Environment Considering
Similarity Coefficients. International Journal of Computer Network and Information Security
(IJCNIS). Vol.15. No. 4. R. 25-35. 2023. DOI: https://doi.org/10.5815/ijcnis.2023.04.03
[5] Kwon J., Kim J., Seo J. Vector field guided auto-landing control of airship with wind disturbance.
Proceedings of the 19th World Congress, Cape Town, South Africa. 2014. P. 1114–1119.
[6] A. Dodonov, V. Mukhin, V. Zavgorodnii, Y. Kornaga, A. Zavgorodnya, O. Mukhin. Method of
Parallel Information Object Search in Unified Information Spaces. International Journal of
Computer Network and Information Security (IJCNIS). Vol. 13. No. 4. P.1-13, 2021. DOI:
https://doi.org/10.5815/ijcnis.2021.04.01
[7] Cortes, J., Martinez, S., Karatas, T., Bullo, F. (2002) Coverage control for mobile sensing networks.
IEEE Conference on Robotics and Automation. Arlington, VA, pp. 1327-1332.
DOI:https://doi.org/10.48550/arXiv.math/0212212
[8] Dodonov, A., Mukhin, V., Zavgorodnii, V., Kornaga, Ya., Zavgorodnya A. (2021). Method of
searching for information objects in unified information space. System research and information
technologies. N1. P. 34–46. DOI:https://doi.org/10.20535/SRIT.2308-8893.2021.1.03
[9] Golembo, VA, Bochkaryev, O.Yu., Tsyzh, AM (2006) The task of forming individual zones of
responsibility by a team of mobile agents. Visn. National Lviv Polytechnic University. Vol. 573.
P. 62-67.
[10] Mukhin, V., Kornaga, Y., Bazaliy, M., Zavgorodnii, V., Krysak, I., Mukhin, O. (2020) Obfuscation
Code Techniques Based on Neural Networks Mechanism. IEEE 2nd International Conference on
System Analysis & Intelligent Computing (SAIC). Kyiv. Ukraine. P. 1–6.
DOI:https://doi.org/10.1109/SAIC51296.2020.9239247
[11] Chikriy A.A., Baranovskaya L.V., Chikriy A.A. (2000) An approach game problem under the
failure of controlling devices. J. of Automation and Information Sciences. Vol. 32, No. 5. P. 1–8.
DOI:https://doi.org/10.1615/JAutomatInfScien.v32.i5.10
[12] Baranovska L.V. Quasi-linear differential-difference game of approach. Understanding Complex
Systems. 2019. P. 505–524. DOI:https://doi.org/10.1007/978-3-319-96755-4_26.
[13] El-Zahar E. Applications of Adaptive multi-step differential transform method to singular
perturbation problems arising in science and engineering. Appl. Math. Inf. Sci. 2015. Vol. 9, no.
1. P. 223–232.
[14] Gusynin V., Gusynin A., Tachinina H. The use of differential transformations for solving non-
linear boundary value problems. Proceedings of NAU. 2016. No. 4 (69). P. 45–55.
[15] Mukhin, V., Zavgorodnii, V., Kornaga, Y., Baranovska, L. (2021). Algorithm for the Information
Space Forming and the Evaluation of Input Objects Search Efficiency. CEUR Workshop
Proceedings this link is disabled. 3241. P. 193–204. URL:https://ceur-ws.org/Vol-3241/paper18.pdf
[16] Liu Feng, Guo Wei-Wei. Research and Design of Task Scheduling Method Based on Grid
Computing. International Conference on Smart City and Systems Engineering (ICSCSGridE).
Changsha, China. 2017. P. 188–192.
[17] Sheikh S., Shahid M., Nagaraju A. A novel dynamic task scheduling strategy for computational
grid. International Conference on Intelligent Communication and Computational Techniques
(ICCT). 2017. P. 102–107.
[18] Mukhin, V., Zavgorodnii, V., Kornaga, Y., Zavgorodnya, A., Krylov, I., Rybalochka, A., Kornaga,
V., Belous, R. (2021). Devising a method to identify an incoming object based on the combination
of unified information spaces. Eastern-European Journal of Enterprise Technologies. 3(2 (111). P.
35–44. DOI:https://doi.org/10.15587/1729-4061.2021.229568
[19] Aron R., Chana I. Grid Scheduling Heuristic Methods: State of the Art. International Journal of
Computer Information Systems and Industrial Control Applications. 2014. Vol. 6, P. 466–473.
[20] Chauhan P. Decentralized Scheduling Algorithm for DAG Based Tasks on P2P Grid. Journal of
Engineering. 2014. P. 1–14.
193
[21] Canfora G. Formal Tool for Identifying Mobile Malicious Behavior. IEEE Transactions on
Software Engineering. 2019. Vol. 45. P. 1230–1252.
[22] How J., Frazolli E., Chowdhary G. Linear Flight Control Techniques. Handbook of Unmanned
Aerial Vehicles. Dordrecht; Heidelberg; New York; London: Springer. 2018. P. 529–576.
[23] Lotfi A. Zadeh. 1994. Fuzzy logic, neural networks, and soft computing. Commun. ACM 37, 3
(March 1994), 77–84. DOI:https://doi.org/10.1145/175247.175255
[24] Varley TF, Sporns O, Schaffelhofer S, Scherberger H, Dann B. Information-processing dynamics
in neural networks of macaque cerebral cortex reflect cognitive state and behavior. Proc Natl
Acad Sci US A. 2023 Jan 10; 120(2): e2207677120. DOI:https://doi.org/10.1073/pnas.2207677120
[25] Paulo Vitor de Campos Souza. Fuzzy neural networks and neuro-fuzzy networks: A review of
the main techniques and applications used in the literature. Applied Soft Computing. Vol. 92.
2020. ISSN 1568-4946. DOI:https://doi.org/10.1016/j.asoc.2020.106275
[26] AM Zador. A critique of pure learning and what artificial neural networks can learn from animal
brains. Nat Commun 10, 3770 (2019).https://doi.org/10.1038/s41467-019-11786-6
[27] V. Mukhin, V. Zavgorodnii, V. Liskin, S. Syrota, V. Koval, L. Honchar. Classification of
Information Objects with Fuzzy Parameters in E-Learning Systems. IEEE 12th International
Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and
Applications (IDAACS). Dortmund. Germany. 2023. P. 1189-1193. DOI:
https://10.1109/IDAACS58523.2023.10348768
[28] Ghafor K. Multifunctional Models, Including an Artificial Neural Network, to Predict the
Compressive Strength of Self-Compacting Concrete. Applied Sciences. 2022; 12(16):8161.
DOI:https://doi.org/10.3390/app12168161
[29] Vadym Mukhin; Yaroslav Kornaga; Yurii Bazaka; Ievgen Krylov; Andrii Barabash; Alla
Yakovleva; Oleg Mukhin "The Testing Mechanism for Software and Services Based on Mike
Cohn's Testing Pyramid Modification," 2021 11th IEEE International Conference on Intelligent
Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS),
Cracow, Poland, 2021, pp. 589-595, doi: 10.1109/IDAACS53288.2021.9660999.
194