<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The evolving landscape of computer science and software engineering: Trends, challenges, and future directions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhiy O. Semerikov</string-name>
          <email>SE@SW</email>
          <email>semerikov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii M. Striuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>PCWrEooUrckResehdoinpgs ISSNc1e6u1r-3w-0s0.o7r3g</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Academy of Cognitive and Natural Sciences</institution>
          ,
          <addr-line>54 Gagarin Ave., Kryvyi Rih, 50086</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute for Digitalisation of Education of the NAES of Ukraine</institution>
          ,
          <addr-line>9 M. Berlynskoho Str., Kyiv, 04060</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kryvyi Rih National University</institution>
          ,
          <addr-line>11 Vitalii Matusevych Str., Kryvyi Rih, 50027</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Kryvyi Rih State Pedagogical University</institution>
          ,
          <addr-line>54 Universytetskyi Ave., Kryvyi Rih, 50086</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Workshop for Young Scientists in Computer Science &amp; Software Engineering</institution>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Zhytomyr Polytechnic State University</institution>
          ,
          <addr-line>103 Chudnivsyka Str., Zhytomyr, 10005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>1</fpage>
      <lpage>46</lpage>
      <abstract>
        <p>The 7th Workshop for Young Scientists in Computer Science &amp; Software Engineering (CS&amp;SE@SW 2024) brought together researchers, practitioners, and experts to explore the latest advancements, trends, and challenges in the rapidly evolving fields of computer science and software engineering. The workshop covered a wide range of topics, including software engineering processes, theoretical computer science, computer systems, and cuttingedge computer applications. The papers presented at the workshop showcase the innovative research being conducted by young scientists, highlighting the potential for groundbreaking developments in areas such as artificial intelligence, machine learning, data analytics, and human-computer interaction. This proceedings volume provides a comprehensive overview of the research presented at the workshop, organized into four main chapters: Software Engineering, Theoretical Computer Science, Computer Systems, and Computer Applications. The Software Engineering chapter focuses on requirements, design, construction, testing, and methodologies, emphasizing the importance of robust and eficient software development practices. The Theoretical Computer Science chapter explores advancements in algorithms, data structures, theory of computation, and formal methods, providing a foundation for future innovations. The Computer Systems chapter discusses developments in computer architecture, performance, and databases, underlining the critical role of hardware and data management in modern computing. Finally, the Computer Applications chapter showcases the practical applications of computer science and software engineering, with a particular focus on graphics, visualization, human-computer interaction, scientific computing, and artificial intelligence.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;computer science</kwd>
        <kwd>software engineering</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>machine learning</kwd>
        <kwd>human-computer interaction</kwd>
        <kwd>data analytics</kwd>
        <kwd>algorithms</kwd>
        <kwd>database systems</kwd>
        <kwd>computer architecture</kwd>
        <kwd>software development methodologies</kwd>
        <kwd>interdisciplinary research</kwd>
        <kwd>scientific computing</kwd>
        <kwd>visualization</kwd>
        <kwd>formal methods</kwd>
        <kwd>theory of computation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        1. Software engineering
• Software requirements [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]
• Software design [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref7 ref8 ref9">7, 8, 9, 10, 11, 12</xref>
        ]
• Software construction [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
• Software testing [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]
• Software maintenance [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
• Software engineering management [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]
• Software development process [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref14 ref8 ref9">14, 8, 9, 10, 11, 12</xref>
        ]
• Software engineering models and methods [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]
• Software quality [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]
• Software engineering professional practice [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
2. Theoretical computer science
• Data structures and algorithms [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19">16, 17, 18, 19</xref>
        ]
• Theory of computation [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]
• Information and coding theory [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
• Formal methods [
        <xref ref-type="bibr" rid="ref15 ref20">20, 15</xref>
        ]
3. Computer systems
• Computer architecture and computer engineering [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
• Computer performance analysis [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
• Databases [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
      </p>
    </sec>
    <sec id="sec-2">
      <title>4. Computer applications</title>
      <p>
        • Computer graphics and visualization [
        <xref ref-type="bibr" rid="ref14 ref15 ref20 ref22 ref23 ref24 ref25">20, 22, 14, 15, 23, 24, 25</xref>
        ]
• Human-computer interaction [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref26 ref8">8, 13, 11, 12, 26</xref>
        ]
• Scientific computing [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref27">20, 22, 21, 27</xref>
        ]
• Artificial intelligence [
        <xref ref-type="bibr" rid="ref10 ref13 ref14 ref16 ref17 ref19 ref22 ref24 ref25 ref27 ref28 ref29">22, 16, 28, 14, 17, 13, 10, 29, 27, 24, 25, 19, 30, 31, 32, 33, 34</xref>
        ]
      </p>
    </sec>
    <sec id="sec-3">
      <title>This volume represents the proceedings of the 7th</title>
      <p>Workshop for Young Scientists in Computer Science
&amp; Software Engineering (CS&amp;SE@SW 2024), held
in Kryvyi Rih, Ukraine, on December 27, 2024. It
comprises 28 contributed papers that were carefully
peer-reviewed and selected from 64 submissions.</p>
      <p>At least two program committee members reviewed
each submission. The papers included in this volume demonstrate the immense potential for
groundbreaking advancements and inspire further research in these dynamic and essential fields.</p>
      <sec id="sec-3-1">
        <title>2. CS&amp;SE@SW 2023 Program Committee</title>
        <p>• Nadire Cavus, Near East University, Northern Cyprus [35, 36]
• Stuart Charters, Lincoln University, New Zealand [37, 38]
• Dragoş-Daniel Iordache, National Institute for Research and Development in Informatics - ICI</p>
        <p>
          Bucuresti, Romania [39, 40]
• Orken Mamyrbayev, Institute of Information and Computational Technologies, Kazakhstan [41, 42]
• Bongkyo Moon, Quantum Informatics Research, Korea [43, 44]
• Michael O’Grady, University College Dublin, Ireland [45, 46]
• Grażyna Paliwoda-Pękosz, Krakow University of Economics, Poland [47, 48]
• Nagender Kumar Suryadevara, University of Hyderabad, India [49, 50]
• Tetiana Vakaliuk, Zhytomyr Polytecnic State University, Ukraine [51, 52]
• Nataliia Veretennikova, Lviv Polytechnic National University, Ukraine [53, 54]
• Alejandro Zunino, ISISTAN - UNCPBA &amp; CONICET, Argentina [55, 56]
Additional reviewers:
• Roman Danel, Institute of Technology and Business in České Budějovice, Czechia [57, 58]
• Andriy Dudnik, Taras Shevchenko National University of Kyiv, Ukraine [
          <xref ref-type="bibr" rid="ref30">59, 60</xref>
          ]
• Emre Erturk, Eastern Institute of Technology, New Zealand [
          <xref ref-type="bibr" rid="ref31 ref32">61, 62</xref>
          ]
• Helena Fidlerová, Slovak University of Technology, Slovakia [
          <xref ref-type="bibr" rid="ref33 ref34">63, 64</xref>
          ]
• Oleksii Haluza, National Technical University “Kharkiv Polytechnic Institute”, Ukraine [
          <xref ref-type="bibr" rid="ref35 ref36">65, 66</xref>
          ]
• Pavlo Hryhoruk, Khmelnytskyi National University, Ukraine [
          <xref ref-type="bibr" rid="ref37 ref38">67, 68</xref>
          ]
• Oleksandr Kolgatin, Simon Kuznets Kharkiv National University of Economics, Ukraine [
          <xref ref-type="bibr" rid="ref39 ref40">69, 70</xref>
          ]
• Valerii Kontsedailo, Inner Circle, Netherlands [
          <xref ref-type="bibr" rid="ref41 ref42">71, 72</xref>
          ]
• Hennadiy Kravtsov, Kherson State University, Ukraine [
          <xref ref-type="bibr" rid="ref43 ref44">73, 74</xref>
          ]
• Vyacheslav Kryzhanivskyy, R&amp;D Seco Tools AB, Sweden [75, 76]
• Andrey Kupin, Kryvyi Rih National University, Ukraine [77, 78]
• Nadiia Lobanchykova, PwC, Netherlands [79, 80]
• Mykhailo Medvediev, ADA University, Azerbaijan [81, 82]
• Vasyl Oleksiuk, Ternopil Volodymyr Hnatiuk National Pedagogical University, Ukraine [83, 84]
• Jaderick P. Pabico, University of the Philippines Los Baños, Philippines [85, 86]
• James B. Procter, University of Dundee, UK [87, 88]
• Oleg Pursky, Kyiv National University of Trade and Economics, Ukraine [
          <xref ref-type="bibr" rid="ref45">89, 90</xref>
          ]
• Serhiy Semerikov, Kryvyi Rih State Pedagogical University, Ukraine [
          <xref ref-type="bibr" rid="ref46 ref47">91, 92</xref>
          ]
• Etibar Seyidzade, Baku Engineering University, Azerbaijan [
          <xref ref-type="bibr" rid="ref48 ref49">93, 94</xref>
          ]
• Andrii Striuk, Kryvyi Rih National University, Ukraine [
          <xref ref-type="bibr" rid="ref50 ref51">95, 96</xref>
          ]
• Volodymyr Voytenko, Athabasca University, Canada [
          <xref ref-type="bibr" rid="ref52 ref53">97, 98</xref>
          ]
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>3. CS&amp;SE@SW 2024 organizers</title>
        <p>The 6th edition of the CS&amp;SE@SW was coordinated by the Academy of Cognitive and Natural Sciences
(ACNS), a non-governmental organisation dedicated to nurturing the growth of researchers’ expertise in
the cognitive and natural sciences arena. ACNS’s mission encompasses enhancing research, safeguarding
rights and liberties, and catering to professional, scientific, social, and other interests.</p>
        <p>ACNS is engaged in a spectrum of activities, including:
• Spearheading research initiatives within the cognitive and natural sciences domain and fostering
collaborative ties among researchers.
• Orchestrating conferences, workshops, training sessions, internships, and other platforms for
exchanging and disseminating knowledge in the realm of cognitive and natural sciences.
• Publishing conference proceedings, collections of scholarly works, and scientific journals (https:
//acnsci.org/cms/journals/):
– Educational Dimension (https://acnsci.org/ed)
– Educational Technology Quarterly (https://acnsci.org/etq)
– CTE Workshop Proceedings (https://acnsci.org/cte)
– Science Education Quarterly (https://acnsci.org/seq)
– Journal of Edge Computing (https://acnsci.org/jec)</p>
        <p>
          Among ACNS’s prominent publications is the Diamond Open Access Science Education Quarterly
(SEQ), a peer-reviewed academic journal dedicated to advancing research and practice in science
education across all educational levels. The journal publishes original empirical studies [
          <xref ref-type="bibr" rid="ref54 ref55">99, 100</xref>
          ],
theoretical frameworks, literature reviews [
          <xref ref-type="bibr" rid="ref56 ref57">101, 102</xref>
          ], and innovative teaching methodologies [
          <xref ref-type="bibr" rid="ref58 ref59">103, 104</xref>
          ]
that contribute to the understanding and improvement of science teaching and learning.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>4. CS&amp;SE@SW 2024 articles overview</title>
        <sec id="sec-3-3-1">
          <title>4.1. Software engineering</title>
          <p>
            In their paper “Optimizing the process of ER diagram creation with PlantUML”, Kurotych and Bulatetska
[
            <xref ref-type="bibr" rid="ref7">7</xref>
            ] explore the capabilities of PlantUML, a popular open-source tool for generating diagrams based
on textual descriptions, in the context of creating Entity Relationship Diagrams (ERDs) for relational
databases. The authors identify several shortcomings in PlantUML’s basic functionality for ERD creation
and propose solutions to improve the quality and readability of the generated diagrams.
1–46
          </p>
          <p>The paper describes techniques for enhancing the appearance of ERDs, such as highlighting primary
and foreign keys, removing unnecessary elements, and creating legends for user convenience. The
authors also introduce a plugin module to improve the structure and maintainability of the PlantUML
code (PUML) by organizing it into functions and procedures. This modular approach ofers benefits
like standardized styles and reduced code duplication.</p>
          <p>Furthermore, the paper presents Sqlant, a tool developed by the authors to automate the generation
of PUML code directly from a PostgreSQL database. Sqlant retrieves database schema information and
generates PUML code that can be used to visualize ERDs in the PlantUML environment. The integration
of PlantUML with automation tools like Sqlant is particularly beneficial in environments where database
structures undergo frequent changes.</p>
          <p>Despite the limitations in PlantUML’s oficial documentation, the authors demonstrate its significant
potential for creating high-quality ERDs and streamlining the database modeling process. The proposed
approaches and tools contribute to the eficiency and efectiveness of development teams working with
relational databases.</p>
          <p>
            In their paper “Design and evaluation of a personalized digital mathematics tutor for grade 6 learners”,
Shokaliuk and Kavetskyi [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ] present the development and assessment of an adaptive mathematics
tool aimed at enhancing the learning experience and outcomes for sixth-grade students. The authors
highlight the limitations of traditional assessment methods in catering to the diverse needs of learners
and the potential of technology-enhanced solutions to address these challenges.
          </p>
          <p>The proposed system leverages Python and CustomTkinter to create an engaging and intuitive user
interface that generates adaptive questions, provides immediate feedback, and tracks student progress
in real-time. The tool’s architecture consists of three main components: a test generator, a user interface,
and a student performance tracker. The test generator employs rule-based and probabilistic algorithms
to create questions tailored to the student’s ability level and target areas of weakness identified from
performance data.</p>
          <p>To evaluate the efectiveness of the adaptive assessment tool, the authors conducted a quasi-experimental
study comparing the experimental group using the tool with a control group receiving traditional
instruction. The study assessed the impact on students’ problem-solving skills, attitudes towards
mathematics, and overall academic achievement. Data were collected through the tool’s log files and
semi-structured interviews, and analyzed using mixed methods, including data mining techniques and
thematic analysis.</p>
          <p>The results demonstrate the tool’s positive impact on student learning and engagement. The system’s
adaptive feedback and personalized recommendations led to a 25% reduction in the average number
of attempts required to solve problems correctly. Students also reported increased enjoyment and
confidence in mathematics, with the experimental group showing significantly greater improvements
compared to the control group. The tool’s user-friendly interface, built using Python and CustomTkinter,
was well-received by students, with 85% finding it easy to use and 90% reporting it as motivating.</p>
          <p>While the findings highlight the potential of adaptive assessment tools in mathematics education, the
authors acknowledge the study’s limitations, such as the small sample size and the lack of long-term
evaluation. They also outline future research directions, including the integration of machine learning
techniques to further enhance adaptability and the expansion of content coverage to higher grade levels
and more advanced mathematical topics.</p>
          <p>
            In the paper “Methodology for implementing electronic audit projects (SAF–T UA) for large taxpayers
in Ukraine”, Chernukha et al. [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ] delve into the intricacies of developing and implementing software
for generating the electronic audit file (SAF–T UA) in the context of large commercial enterprises in
Ukraine. The authors highlight the significance of this transition towards standardizing accounting
practices and aligning with European norms.
          </p>
          <p>The study provides a comprehensive analysis of the challenges and considerations involved in the
SAF-T implementation process. It outlines the main problems, such as the lack of of-the-shelf software
solutions, the need for integration with existing accounting systems, resource allocation, staf training,
and compliance with audit conditions specific to Ukraine. The authors propose a general architecture
concept for the software development, emphasizing the importance of a dedicated project team and the
integration of data from various sources, including ERP and CRM systems.</p>
          <p>To gain insights into the perceptions and expectations of key stakeholders, the researchers conducted
a survey involving oficials from diferent functional areas within large enterprises. The findings
reveal a generally positive outlook towards the SAF-T implementation, with anticipated benefits such as
optimized accounting processes, reduced administrative costs, and increased transparency in interactions
with tax authorities. However, the survey also highlights challenges, such as the lack of familiarity with
tax authorities’ requirements and the need for extensive staf training.</p>
          <p>The paper ofers practical recommendations for the project team, covering aspects such as data
control, information security, archiving, and collaboration with fiscal authorities. The authors stress
the importance of involving specialists from various domains, including accounting, IT, merchandising,
and management, to ensure a comprehensive approach to the implementation process.</p>
          <p>The study underscores the potential of SAF-T in simplifying tax control, enhancing transparency, and
facilitating Ukraine’s harmonization with European accounting practices. However, it also acknowledges
the technical, organizational, and methodological complexities that must be addressed for successful
implementation.</p>
          <p>
            In the paper “Designing and evaluating an afordable Arduino-based lie detector prototype”,
Pravytskyi et al. [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ] present the development and assessment of a low-cost lie detection system that combines
physiological sensors with machine learning techniques. The authors highlight the importance of lie
detection in various contexts and the limitations of existing methods, such as polygraphs and fMRI.
          </p>
          <p>The proposed lie detector prototype utilizes an Arduino UNO development board and integrates
temperature, humidity, and pulse sensors to measure physiological responses. The system architecture
consists of three main components: an Arduino sketch for sensor data acquisition, a data collection
program for labeling and storing the data, and a machine learning model for classifying the data
sequences as truth or lies.</p>
          <p>The machine learning component employs a long short-term memory (LSTM) neural network
implemented using the Keras library. The model is trained on overlapping sequences of sensor readings
to predict the probability of each sequence corresponding to a lie. The authors describe the data
preprocessing steps, model architecture, and training process in detail.</p>
          <p>The lie detector prototype was evaluated on a set of 20 questions designed to elicit a mix of truthful
and deceptive responses. The results showed an accuracy of 55% in classifying true statements and 45%
in classifying lies, with an overall accuracy of 50%. While these results demonstrate the challenges in
developing an accurate lie detection system, they are comparable to the performance of average human
lie detectors and other machine learning approaches reported in the literature.</p>
          <p>The authors discuss the limitations of the study, including the controlled laboratory setting, the
limited set of physiological measures, and the use of a single machine learning model for all participants.
They also highlight the ethical considerations surrounding lie detection technologies, such as reliability,
privacy, informed consent, and the potential for misuse or misinterpretation.</p>
          <p>The paper concludes by emphasizing the need for further research and development to improve
the accuracy, reliability, and generalizability of afordable lie detection systems. The authors suggest
potential enhancements, such as incorporating additional sensors, developing personalized models, and
integrating behavioral measures. They also stress the importance of addressing the ethical challenges
and considering the appropriate role of lie detectors in various contexts.</p>
          <p>
            In the paper “Development of the Student Simulator game: From concept to code”, Oleksiuk et al. [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]
present their experience in designing and developing an educational game application that simulates a
student’s journey through various computer science disciplines. The authors emphasize the relevance
of using games in the educational process to engage and motivate learners.
          </p>
          <p>The study begins by analyzing diferent types of educational games employed in computer science
education, such as simulation games, puzzle-based learning games, and role-playing games. Through
a SWOT analysis, the authors justify the choice of simulators and combined gaming applications for
their project. They identify several basic requirements for the Student Simulator game, including a 3D
interface, multiple game locations, manipulation of object models, and player registration and rating.</p>
          <p>The game development process is described in detail, following a project methodology that involves
students and faculty members. The authors create a matrix of game elements to map the main system
components to game features and design a comprehensive game model that combines all the game
locations and player actions.</p>
          <p>After a comparative analysis, the authors select Godot as the game engine, Blender for creating
3D graphics, and Firebase for data storage and management. They provide insights into the
decisionmaking process, considering factors such as afordability, system requirements, team experience, and
tool capabilities.</p>
          <p>The paper delves into the technical aspects of game development, including the implementation of
player movement, interaction systems, location management, and a virtual operating system called
PandaOS. The authors also discuss the integration of mini-games, such as the Bamboo+ visual programming
language and a test system using 3D tablet models.</p>
          <p>User registration and authentication are handled using Firebase Authentication, while player data and
progress are stored in the Firestore database. The game also incorporates a rating system to encourage
healthy competition among players.</p>
          <p>The authors reflect on the challenges and lessons learned during the development process, highlighting
the importance of teamwork, communication, and the use of project management tools like GitHub.
They also discuss the prospects and potential improvements for the Student Simulator game, such as
the integration of artificial intelligence for personalized learning and the implementation of multiplayer
and collaboration modes.</p>
          <p>The paper concludes by emphasizing the modular structure of the Student Simulator game and its
potential for further expansion and improvement. The authors underscore the significance of involving
various specialists in the development process and the importance of promoting the game through a
dedicated website.</p>
          <p>
            In their paper “Information system for generating recommendations for risk-oriented trading
strategies based on deep learning”, Rudnichenko et al. [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ] present a comprehensive study on the development
and technical aspects of an information system that leverages deep learning models to generate
recommendations for risk-oriented trading strategies on stock exchanges. The authors emphasize the
growing need for specialized tools to automate the analysis of alternatives, identify trends, and evaluate
trading strategies in the face of the increasing volume and complexity of financial data.
          </p>
          <p>The study utilizes a dataset representing exchange trading information on Apple assets obtained from
the Yahoo Finance system. The authors develop a conceptual design for a software system comprising
three functionally independent modules and provide a formal schematization of these modules. They also
create a project of the system, including a diagram of the main components displaying the relationships
between the elements. The development process is carried out in the PyCharm environment, with a
well-organized structure of directories and files to manage the system software.</p>
          <p>A graphical user interface with interactive widgets is implemented to facilitate data entry, processing,
and visualization. The authors conduct a thorough analysis of the developed modules, describing
the strategic recommendations they generate for making trading decisions. The obtained results are
interpreted, and their key features are identified. The paper concludes by outlining promising areas for
further research and possible ways to improve the system.</p>
          <p>The study’s novelty lies in the adaptation, aggregation, and hybrid software implementation of
various approaches to forming recommendations for trading decisions within a single system built
on a modular architecture, as well as in the development and optimization of diferent deep learning
models with an assessment of their efectiveness. The proposed system has the potential to enhance
the accuracy and adaptability of trading decisions by integrating deep learning methods and providing
a comprehensive tool for data analysis and strategy evaluation.</p>
          <p>
            In the paper “Modeling and simulating of Dufing pendulum in the moved coordinate system”,
Zemlianukhina et al. [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ] propose a mathematical framework for designing novel discrete-time chaotic
systems based on existing ones. The authors’ approach involves applying coordinate transformations
to the domain where the initial system dynamic is defined, focusing on the shift of the 2D system
coordinate origin to define new system state variables that account for this shift.
          </p>
          <p>The authors treat the resulting dynamical system as an interval system with piecewise linear interval
boundaries, enabling them to consider possible uncertainties caused by changes in system parameters
and the presence of nonlinear functions. This approach allows them to rewrite the system into a
linearlike form, simplifying the process of performing coordinate transformations compared to the initial
nonlinear systems. The study transforms the continuous-time system dynamic into a discrete-time
domain to facilitate its implementation in modern digital devices.</p>
          <p>The discrete-time transformation enables the authors to define system dynamics using its previous
states to determine the piecewise constant factors in the system equations. The system equation is
designed to leverage information about previous system motions, its motion in the moved coordinate
system, and the motions of the considered moved coordinate system. To increase the complexity of
the system dynamic, the authors propose considering its perturbed motions as the diference between
motions in the moved and stationary coordinate systems.</p>
          <p>The study demonstrates the application of the proposed approach by considering the Dufing
pendulum equations, a well-known chaotic system. The authors show that combining the motion equations of
the core system and the motions of the coordinate system’s origin can lead to the design of novel chaotic
systems with more complex dynamics. The systematic approach presented in this paper ofers a solid
foundation for chaotic system design and has the potential to advance the field of secure communication
using chaotic signals.</p>
          <p>
            In their paper “A web-based Kanban application for enhancing agile project management practices”,
Moiseienko et al. [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ] present a comprehensive analysis of agile project management in the digital
era, focusing on a comparative study of popular tools and methodologies. The authors examine the
evolution of agile practices from their roots in software development to their application in diverse
contexts.
          </p>
          <p>The study provides a detailed comparison of Scrum and Kanban methodologies, highlighting their
strengths, weaknesses, and suitability for diferent project types. The authors emphasize that the
choice between Scrum and Kanban depends on various factors, such as project size, complexity, team
composition, and organizational culture. They also discuss the potential benefits of hybrid approaches
that combine elements of both methodologies.</p>
          <p>Additionally, the paper analyzes three prominent agile project management tools: Trello, Jira, and
Worksection. The authors evaluate their features, usability, and efectiveness in supporting agile
practices. They provide insights into the factors that organizations should consider when selecting
an agile project management tool, such as project complexity, team size, industry, and organizational
maturity.</p>
          <p>To further contribute to the field, the authors present the development and user evaluation of Kards,
a web-based Kanban application designed to facilitate agile adoption. Kards aims to provide a simple
and accessible tool for individuals and teams to manage their projects using the Kanban methodology.
The application incorporates key features and functionalities that support the efective implementation
of Kanban principles, such as a visual Kanban board, task management, collaboration, and analytics.</p>
          <p>The study’s findings highlight the potential of Kards to facilitate the adoption of agile project</p>
          <p>The study highlights the challenges of integrating computer science education into primary school
curricula, such as the lack of qualified teachers, shortage of age-appropriate learning resources, and
the need to make computer science concepts engaging, interactive, and accessible to children with
diverse learning styles and backgrounds. The authors propose interactive online trainers as a promising
solution to address these challenges, providing an engaging and accessible platform for students to
learn and practice computer science concepts at their own pace.</p>
          <p>The interactive online trainer presented in this paper incorporates game-based learning, multimedia
elements, and self-regulated learning principles to promote student engagement, motivation, and
knowledge construction. The system features three main types of learning activities: image-text
matching, puzzle assembly, and multiple-choice quizzes, which are designed to progressively build
students’ understanding of computer science concepts.</p>
          <p>The paper discusses the design principles, software architecture, and key features of the trainer, as
well as the theoretical foundations underpinning its design, including constructivist learning,
gamebased learning, multimedia principles, and self-regulated learning. The authors also outline a plan for
evaluating the efectiveness of the trainer in terms of student learning outcomes, engagement, and
motivation using a mixed-methods, quasi-experimental research design.</p>
          <p>The study’s findings suggest that the interactive online trainer has the potential to support the
integration of computer science education into primary school curricula and promote early exposure to
computational thinking and digital literacy skills. By providing a simple and accessible tool, the trainer
can help address the challenges of limited teacher expertise and access to age-appropriate learning
materials, thus promoting the widespread adoption of computer science education in primary schools.</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>4.2. Theoretical computer science</title>
          <p>
            The paper “Overview of modern algorithms for world procedural generation in computer games” by
Laitaruk and Hryshanovych [
            <xref ref-type="bibr" rid="ref16">16</xref>
            ] provides a comprehensive survey of popular algorithms used for
procedurally generating game worlds. The authors emphasize the importance of procedural content
generation (PCG) in creating varied and immersive gaming experiences while optimizing development
resources.
          </p>
          <p>The paper systematically examines several key algorithmic approaches:
• Graph grammars and rewriting systems for generating structured game elements like cities,
dungeons, and trees. The time complexity of these methods is analyzed in depth.
• Voronoi diagrams for partitioning game spaces into distinct regions, with a focus on the Fortune’s
algorithm and the impact of using diferent distance metrics like Manhattan, Euclidean, and
Minkowski.
• Gradient noises, particularly Perlin noise and fractional Brownian noise, for creating
naturallooking terrain, textures, and environmental efects. The usage of these techniques in games like
Minecraft is discussed.
• Cellular automata for generating cave-like structures, mazes, and simulating fluid dynamics, with
an analysis of neighborhood types and transition rules.
• Genetic algorithms for optimizing game world parameters based on desired gameplay features,
represented as a genotype-to-phenotype mapping.</p>
          <p>The authors provide a comparative table summarizing the characteristics, use cases, and time
complexity of each method. They also discuss the combination of these techniques and the application of
physics-based simulation to enhance the realism and interactivity of the generated worlds.</p>
          <p>The paper concludes by highlighting the trade-ofs between computational complexity and the quality
and controllability of the generated content, as well as identifying promising areas for future research
in PCG for games.</p>
          <p>
            The paper “Overview of small language models in practice” by Popov et al. [
            <xref ref-type="bibr" rid="ref17">17</xref>
            ] delves into the
emerging field of small language models (SLMs) and their practical applications. The authors highlight
the limitations of large language models (LLMs) in terms of computational resources, privacy concerns,
and generalization capabilities, which have motivated the development of SLMs.
          </p>
          <p>The paper provides an in-depth analysis of the key features and advantages of SLMs, including their
resource eficiency, data privacy, and potential for fine-tuning to specific domains. The authors discuss
the main techniques for obtaining SLMs, such as pruning, knowledge distillation, and quantization,
along with their respective strengths and weaknesses.</p>
          <p>The experimental evidence for SLM performance is critically examined, with a focus on recent
benchmarks and case studies. The authors note the challenges in comparing SLMs to LLMs due to
diferences in model architectures, training data, and evaluation metrics. They also conduct a novel
question-answering experiment using a set of carefully designed sanity questions to assess the reliability
and common-sense reasoning capabilities of several state-of-the-art SLMs.</p>
          <p>The paper addresses the terminological ambiguities surrounding AI and language models, proposing
refined definitions for terms like “SLM”, “local”, and “remote” models to facilitate clearer communication
within the research community.</p>
          <p>Finally, the authors provide an overview of the current ecosystem of tools and platforms for managing
and deploying SLMs, highlighting their accessibility and potential for widespread adoption.</p>
          <p>The paper concludes by emphasizing the promise of SLMs as a practical and eficient alternative to
LLMs in various applications, while also acknowledging the need for further research to fully understand
their capabilities and limitations.</p>
          <p>
            The paper “Topic modelling of Ukrainian folk songs: A case study on Podillia region” by Petrovych
[
            <xref ref-type="bibr" rid="ref18">18</xref>
            ] explores the application of computational methods, particularly Latent Dirichlet Allocation (LDA),
to uncover thematic structures and motifs in the folk songs of the Podillia region in Ukraine. The authors
aim to bridge the gap between traditional folkloristic analysis and modern data-driven approaches.
          </p>
          <p>The study utilizes a dataset of 2,762 folk songs, which undergoes preprocessing steps such as
tokenization, lemmatization, and stopword removal. The author construct a document-term matrix and
apply LDA to identify the top 20 latent topics, each characterized by a set of keywords representing
distinct thematic clusters.</p>
          <p>The results reveal recurrent themes in Podillia folk songs, including seasonal cycles, family
relationships, social rituals, and emotional experiences. The author provide an in-depth interpretation of
each topic, discussing the cultural significance and narrative patterns associated with the identified
keywords.</p>
          <p>The paper also addresses the challenges of adapting computational methods to Ukrainian folk song
corpora, such as dealing with colloquial language, regional dialects, and metaphorical expressions. The
author propose strategies for overcoming these obstacles, such as using language-specific preprocessing
tools and incorporating domain knowledge.</p>
          <p>To assess the quality of the generated topics, the author employ coherence evaluation metrics and
compare their findings with traditional folkloristic classifications. She find that the computational
approach complements and enriches existing knowledge, providing new insights into the thematic
richness of Podillia folk songs.</p>
          <p>The paper concludes by highlighting the potential of computational folkloristics in deepening our
understanding of cultural heritage and oral traditions, while also acknowledging the limitations and
areas for future research, such as refining methodologies and integrating hybrid approaches.</p>
          <p>
            The paper “Bibliometric analysis and experimental assessment of chatbot training approaches”
presents a comprehensive analysis of chatbot training approaches through both bibliometric analysis and
experimental evaluation. The authors, Liashenko and Semerikov [
            <xref ref-type="bibr" rid="ref19">19</xref>
            ], make several key contributions:
1. Conduct an extensive bibliometric analysis of 549 publications from Scopus, identifying four key
research clusters:
• Natural language processing
• Application of NLP technologies in society
• Use of machine learning for NLP
• Chatbots in education and service sectors
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>2. Create and evaluate two novel datasets for chatbot training:</title>
      <p>• A 1.9GB corpus from CEUR Workshop Proceedings (predominantly English)
• A 107MB corpus from Information Technologies and Learning Tools journal (predominantly</p>
      <p>Ukrainian)
3. Provide a thorough examination of chatbot training approaches:
• Supervised learning (Seq2Seq and Transformer architectures)
• Reinforcement learning (including RLHF)
• Transfer learning methods</p>
    </sec>
    <sec id="sec-5">
      <title>4. Present practical fine-tuning experiments:</title>
      <p>• Fine-tune GPT-2-XL on the English corpus
• Fine-tune GPT2-uk on the Ukrainian corpus
• Demonstrate working implementations using transformers library</p>
      <p>The methodological approach is rigorous, with clear documentation of the bibliometric analysis
process using VOSviewer and careful selection of models and evaluation metrics. The experimental
results validate the efectiveness of transfer learning for domain-specific chatbot development.</p>
      <p>The paper’s main limitation is that it doesn’t provide quantitative evaluation metrics for the
finetuned models’ performance, though it does present a working prototype interface. However, this is
balanced by the comprehensive theoretical framework and practical implementation details provided.</p>
      <p>
        The paper “Channel extractor for UAV PPM signals” by Smolij et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] addresses the challenge
of eficiently transmitting control signals and data in unmanned aerial vehicle (UAV) communication
systems using pulse-position modulation (PPM). The authors propose a novel hardware solution for
extracting individual pulse-width modulation (PWM) channels from a single PPM signal line, enabling
multi-channel control of UAVs while minimizing wiring complexity.
      </p>
      <p>The paper begins by providing a comprehensive background on UAV communication systems, signal
modulation techniques, and the advantages of PPM for transmitting multiple control signals over a
shared medium. The authors highlight the importance of reliable and responsive communication for
precise UAV control in various applications, such as reconnaissance, environmental monitoring, and
rescue operations.</p>
      <p>The proposed PPM channel extractor system consists of three main components: a counter register,
a user-input channel register, and a compare circuit. The authors present a detailed schematic of the
circuit, implemented using inverters, XOR gates, JK flip-flops, and other logic elements. The operation
of the extractor is thoroughly explained, with a focus on the conversion of the PPM signal to individual
PWM channels based on user-defined channel indices.</p>
      <p>The paper also analyses the DC component of the PPM signal and provides mathematical formulas for
its calculation. The authors discuss the relationship between pulse width, frequency, and the modulating
signal, as well as the power spectral density and signal-to-noise ratio of PPM.</p>
      <p>The proposed system is simulated using the Micro-Cap software, and the results demonstrate the
successful extraction of PWM signals for single and multiple channels. The authors also observe and
discuss the presence of a minor "glitch" in the output signal, attributing it to the reset time of the
lfip-flops and concluding that it does not adversely afect the control process.</p>
      <p>The paper concludes by highlighting the flexibility, scalability, and robustness of the proposed PPM
approach to mineral classification using hyperspectral imaging data. The authors address the
challenging task of identifying minerals in remote, geologically complex terrains through the integration of
deep learning techniques with hyperspectral remote sensing.</p>
      <p>The research focuses on the Djebel Meni region in Northwestern Algeria, utilizing data from NASA’s
Hyperion EO-1 sensor to classify three key clay minerals: illite, kaolinite, and montmorillonite. The
authors propose a hybrid 3D-2D CNN architecture that efectively combines spatial and spectral feature
extraction capabilities. The methodology includes comprehensive preprocessing steps, including bad
bands removal, radiometric calibration, and atmospheric correction using the QUAC module.</p>
      <p>A notable contribution is the detailed optimization of the CNN architecture, featuring four 3D
convolutional layers followed by three 2D convolutional layers. This hybrid approach enables the
network to capture both spectral dependencies and spatial features efectively. The model achieves
impressive results with an overall accuracy of 94.26% and a Kappa coeficient of 0.9401, outperforming
traditional methods like SAM and standalone 2D or 3D CNNs.</p>
      <p>The experimental validation is thorough, utilizing a balanced dataset split across training (70%),
validation (10%), and testing (20%) sets. The authors implement various optimization techniques,
including batch normalization, L2 regularization, and dropout, to enhance model generalization. The
results are comprehensively evaluated using multiple metrics, including precision, recall, and F1-score
for each mineral class.</p>
      <p>The paper makes significant contributions to the field of hyperspectral mineral mapping by:
• Introducing a novel hybrid CNN architecture specifically optimized for mineral classification
• Providing a comprehensive framework for preprocessing hyperspectral data
• Demonstrating superior classification performance compared to existing methods
• Establishing a reproducible methodology for mineral identification in complex geological settings
This research advances the application of deep learning in geological remote sensing and opens new
possibilities for automated mineral mapping in challenging terrains. The authors’ approach could be
particularly valuable for mineral exploration and geological surveys in remote or inaccessible regions.</p>
      <p>
        The paper “Method of semantic features estimation for political propaganda techniques detection
using transformer neural networks” by Krak et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] presents a novel method for detecting political
propaganda techniques using transformer neural networks enhanced with semantic feature analysis.
The authors address the critical challenge of identifying propaganda in media content, which has
become increasingly important in today’s information-rich society.
      </p>
      <p>The proposed method introduces several key innovations:
• Integration of semantic features (text emotionality, bullying, fear, and hate speech) to improve
propaganda detection accuracy
• Modified transformer neural network architecture that processes both text data and numerical
semantic feature vectors
• Enhanced explainability of the model’s decisions through semantic feature analysis
The experimental results demonstrate significant improvements in detection accuracy for several
propaganda techniques. Notable gains were achieved for techniques such as “Red Herring” (9%
improvement), “Whataboutism” (4% improvement), and “Thought Terminating Cliches” (3% improvement).
The method achieved an average accuracy of 89%, with maximum accuracy reaching 97% for certain
techniques.</p>
      <p>The authors also emphasize the method’s contribution to Sustainable Development Goals (SDGs),
particularly SDG 4 (Quality Education) and SDG 16 (Peace, Justice and Strong Institutions), through its
potential to enhance media literacy and strengthen democratic institutions.</p>
      <p>
        The work represents a significant advancement in automated propaganda detection, though there
remain opportunities for further optimization, particularly for techniques where accuracy decreased
or remained unchanged. Future research directions include expanding the set of detected semantic
features to improve detection accuracy for underperforming techniques.
by Krak et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] presents an innovative approach to detecting and interpreting cyberbullying in
text using neural networks and visual analytics. The authors recognize the growing significance of
cyberbullying detection systems, particularly given the increasing number of social media users and
decreasing age of users.
      </p>
      <p>The proposed method combines a BERT-based neural network for multi-label classification of
cyberbullying types with visual analytics to explain the model’s decisions. A key contribution is the
implementation of three complementary visualization approaches:
1. Color palette visualization – highlighting influential words with varying color intensities based
on their impact on classification
2. Local word importance diagrams – showing the contribution of individual words to specific
cyberbullying classifications
3. General word importance diagrams – presenting the overall significance of words across all
cyberbullying types</p>
      <p>The authors trained and evaluated their model using the “Cyberbullying Classification” dataset,
achieving impressive performance metrics: Accuracy (0.956478), Precision (0.963677), Recall (0.956478),
and F1-Score (0.960019). These results demonstrate signicfiant improvements over previous approaches,
with accuracy gains of 2.49-9.05% compared to similar studies.</p>
      <p>A particular strength of the paper is its focus on explainability in AI decision-making, especially
crucial for sensitive applications like cyberbullying detection. The method integrates LIME (Local
Interpretable Model-agnostic Explanations) for generating interpretable visualizations that help users
understand why specific text segments are classified as cyberbullying.</p>
      <p>The authors also connect their work to broader societal impacts, noting its alignment with multiple
UN Sustainable Development Goals (SDGs), including those related to well-being (SDG3), education
(SDG4), gender equality (SDG5), reducing inequalities (SDG10), and promoting justice (SDG16).</p>
      <p>The paper concludes by suggesting future research directions, including adaptation for multiple
languages, user studies to assess the impact of visual analytics on human decision-making, and exploration
of alternative interpretation methods.</p>
      <p>
        The paper “Design and implementation of a mobile health application for physical activity tracking and
exercise motivation” by Stepanyuk et al. [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] presents a novel mHealth application aimed at promoting
physical activity and exercise adherence. The authors develop a modular system that incorporates
evidence-based strategies for behavior change, including real-time activity tracking, personalized
goal-setting, and motivational elements.
      </p>
      <p>The paper’s architecture section details five key modules: core, tracking, planning, motivation, and
user interface, along with a synchronization component. The system employs the Model-View-Presenter
(MVP) architectural pattern to ensure modularity and extensibility. Notable implementation features
include sophisticated data privacy measures using SSL/TLS protocols and AES-256 encryption, along
with robust data anonymization techniques.</p>
      <p>The authors conducted a preliminary evaluation with 2 participants over a 4-week period, measuring
daily step count, weekly active minutes, and goal achievement rates. While the study showed promising
results in terms of increased physical activity levels and user satisfaction, the extremely small sample
size (n=2) significantly limits the generalizability of the findings.</p>
      <p>A key strength of the paper lies in its comprehensive technical documentation and thoughtful system
architecture. However, the evaluation section presents a major limitation due to its minimal participant
pool. The authors acknowledge this limitation and propose several directions for future work, including
larger-scale studies, integration of machine learning algorithms, and adaptation for specific populations
such as older adults or individuals with chronic conditions.</p>
      <p>
        The paper “AI-agent-based system for fact-checking support using large language models” by
Kupershtein et al. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] presents a timely solution for automated fact-checking using Large Language Models
(LLMs). Given the increasing prevalence of disinformation and its societal impact, the authors propose
an AI-based architecture to enhance the eficiency and accuracy of fact verification processes.
      </p>
      <p>The paper provides a thorough analysis of disinformation’s impact, particularly focusing on Ukraine’s
experience with targeted misinformation campaigns. The authors present compelling statistics from
the European External Action Service’s report, showing that 21.3% of analyzed disinformation incidents
were directed against Ukraine during 2022-2023.</p>
      <p>The core contribution is a comprehensive AI-agent-based system architecture comprising six main
components:</p>
      <p>The experimental results demonstrate the system’s efectiveness, achieving 90% accuracy in fake news
detection. The authors conducted thorough testing across multiple scenarios, including verification of
claims about Ukrainian power outages and language policy changes. Notably, they openly discuss the
system’s limitations, such as occasional LLM “hallucinations” and the importance of human oversight.</p>
      <p>A particular strength of the paper is its practical implementation using modern tools, including
OpenAI’s GPT-4o, Python libraries for web scraping, and Streamlit for the user interface. However, the
evaluation could benefit from a larger sample size of test cases and more rigorous comparative analysis
with existing fact-checking systems.</p>
      <p>The paper “Advances in neural text generation: A systematic review (2022-2024)” by Slobodianiuk
and Semerikov [30] presents a comprehensive systematic review of recent developments in neural text
generation. The authors conducted this review to complement an earlier review covering 2015-2021,
focusing specifically on advances made between 2022 and 2024. Using the PRISMA methodology, they
analyzed 43 articles from the Scopus database to identify current trends, approaches, and methodologies
in neural text generation.</p>
      <p>The review makes several significant contributions to the field. First, it identifies a clear shift towards
innovative model architectures, particularly Transformer-based models like GPT-2, GPT-3, and BERT,
while noting that traditional approaches like RNNs and LSTMs continue to serve specific applications.
Second, it documents the evolution of evaluation metrics, showing that while BLEU and ROUGE
remain standard, new metrics such as BERTScore have emerged to provide more nuanced assessment
of generated text quality.</p>
      <p>A notable finding is the growing diversity in both datasets and applications. The authors observe
increased interest in unlabeled data and the expansion of text generation into specialized domains
such as medical text generation and table-to-text generation. The review also highlights an important
trend in language coverage – while English remains dominant, there is growing research interest in
low-resource languages, indicating a move towards more inclusive language technology development.</p>
      <p>Methodologically, the study is robust, employing both automated analysis through large language
models (Claude 3 Sonnet and GPT-4) and human verification to ensure accurate data extraction. The
authors provide detailed comparisons with the previous review period, enabling readers to track the
evolution of the field over time.</p>
      <p>The paper is particularly valuable for its systematic categorization of neural network architectures,
evaluation metrics, and applications in text generation. The authors present their findings through clear
tables and figures, making the information easily accessible to researchers and practitioners in the field.</p>
      <p>One of the review’s strengths is its thorough examination of methodological trends, revealing that
while traditional approaches persist, innovative architectures – particularly those leveraging attention
mechanisms and transformer-based models – are becoming increasingly prevalent.</p>
      <p>The paper concludes with important observations about future research directions, highlighting
open questions regarding quality assessment, domain adaptation, and ethical considerations in text
generation technologies. These insights make the review not just a summary of current work but also a
valuable resource for identifying promising future research directions.</p>
      <p>The paper “Automating machine learning: A meta-synthesis of MLOps tools, frameworks and
architectures” by Hanchuk and Semerikov [31] presents a comprehensive meta-synthesis of MLOps
practices, tools, and frameworks. The authors address the growing need for efective operationalization
of machine learning models in production environments, noting that despite advances in ML algorithms,
deployment remains challenging.</p>
      <p>The research employs a rigorous meta-synthesis methodology to analyze existing systematic reviews,
examining MLOps from multiple perspectives. The authors particularly focus on three key systematic
reviews from 2022-2023, supplemented with additional literature to provide a holistic view of the MLOps
landscape.</p>
      <p>The manuscript makes several significant contributions:
1. Provides a detailed analysis of MLOps definitions, workflows, and core components
2. Identifies common frameworks and architectures facilitating MLOps implementation</p>
    </sec>
    <sec id="sec-6">
      <title>3. Examines tools for creating ML pipelines and operationalizing models</title>
      <p>4. Proposes a relationship diagram connecting MLOps principles, processes, and practices
A particularly valuable contribution is the authors’ systematic breakdown of MLOps practices
into key categories including continuous integration/delivery, model versioning, pipeline automation,
monitoring, and lifecycle management. They also address critical aspects such as data security, privacy,
and model explainability.</p>
      <p>The manuscript concludes by identifying future research directions, including the need for detailed
implementation recommendations and new tools for automating ML model lifecycles. While
comprehensive in scope, the work could benefit from more concrete case studies demonstrating the practical
application of the identified practices.</p>
      <p>This paper makes a valuable contribution to the MLOps field by synthesizing existing knowledge
and providing a structured framework for understanding and implementing MLOps practices. It serves
as both a theoretical foundation and practical guide for organizations seeking to improve their machine
learning operations.</p>
      <p>The paper “Research and development of a subtitle management system using artificial intelligence”
by Striuk and Hordiienko [32] presents an innovative AI-powered system for automating the generation
and management of video subtitles. The authors address the critical challenge of making video content
accessible to wider audiences, including individuals with hearing impairments and those who don’t
understand the spoken language, while noting that manual subtitle creation is time-consuming and
labor-intensive.</p>
      <p>The proposed system leverages state-of-the-art automatic speech recognition (ASR) and machine
translation (MT) technologies to generate accurate, synchronized subtitles in multiple languages. The
system architecture consists of four main components: a speech recognition module utilizing advanced
acoustic and language models, a machine translation module employing encoder-decoder architecture
with attention mechanisms, a subtitle segmentation and formatting module, and a user-friendly interface
for managing the subtitle generation process.</p>
      <p>The paper provides a comprehensive literature review covering key aspects of AI-based subtitle
generation, including speech recognition techniques, machine translation approaches, multimodal
methods, and evaluation methodologies. The authors analyze various approaches, from traditional
hidden Markov models to modern deep learning architectures like CNNs and RNNs, highlighting their
applications in diferent domains such as educational content and entertainment.</p>
      <p>The paper concludes by discussing the implications of the proposed system for subtitle
generation pipelines and identifying directions for future research, including expanding language coverage,
improving domain adaptation, and enhancing contextual understanding. The authors acknowledge
current limitations while emphasizing the system’s potential to significantly improve the eficiency and
accessibility of video content across diferent domains.</p>
      <p>The paper “A comprehensive survey on reinforcement learning-based recommender systems:
State-ofthe-art, challenges, and future perspectives” by Rossiiev et al. [33] presents an extensive overview of how
reinforcement learning (RL) is being applied to recommendation systems. The authors systematically
analyze the current state of research in this rapidly evolving field, examining both theoretical foundations
and practical applications.</p>
      <p>The paper begins by highlighting the limitations of traditional recommendation approaches like
collaborative filtering and content-based methods, particularly their struggles with dynamic user
preferences and sparse feedback. The authors then present reinforcement learning as a promising
framework to address these challenges by formulating recommendation as a sequential decision-making
process.</p>
      <p>The survey provides a thorough examination of how the recommendation problem can be modeled
using the Markov Decision Process (MDP) framework, detailing the construction of states, actions,
and rewards. It explores various RL approaches including model-free methods (Q-learning, SARSA),
model-based methods, policy gradient techniques (REINFORCE, Actor-Critic), and deep reinforcement
learning implementations (DQN, DDPG).</p>
      <p>A significant contribution of this work is its analysis of how RL can be integrated with other
recommendation techniques. The authors discuss hybrid approaches combining RL with collaborative
ifltering, content-based methods, knowledge graphs, and graph neural networks. This integration allows
systems to leverage the strengths of multiple approaches while mitigating their individual weaknesses.</p>
      <p>The paper concludes by identifying key challenges and future research directions, including:
• The need for efective ofline reinforcement learning methods
• Scalability and computational eficiency concerns
• Improving explainability and interpretability
• Ensuring robustness against adversarial attacks
• Developing better evaluation metrics and simulation environments
• Expanding real-world applications and case studies</p>
      <p>The paper “Research and development of software for hydroacoustic signal analysis using machine
learning techniques” by Poliaiev et al. [34] presents a comprehensive software system for analyzing
hydroacoustic signals using machine learning techniques. The authors address the challenging problem
of underwater acoustic signal processing, which has important applications in navigation, marine
monitoring, and security systems.</p>
      <p>The paper begins by establishing the complexity of hydroacoustic signal analysis, noting how
underwater acoustic propagation is afected by various environmental factors including depth, water
composition, and bottom topography. The authors highlight how recent advances in machine learning
have enabled more sophisticated approaches to processing these complex signals.</p>
      <p>The proposed system incorporates multiple components: data acquisition, preprocessing, feature
extraction, and machine learning models for classification, regression, and clustering tasks. The
preprocessing pipeline includes denoising, normalization, segmentation, and handling of missing values.
The feature extraction process considers temporal, spectral, and statistical properties of the signals.</p>
      <p>The machine learning methodology employs various models, including Support Vector Machines
(SVM), Random Forests, K-Nearest Neighbors (KNN), and Gaussian Mixture Models (GMM). The
experimental results demonstrate the efectiveness of these approaches, with SVM achieving 94%
accuracy in classification tasks and Support Vector Regression (SVR) showing superior performance in
regression tasks with an R-squared value of 0.65.</p>
      <p>A notable contribution is the development of a user-friendly web interface that allows for interactive
signal analysis and visualization. The system’s modular architecture ensures scalability and ease of
integration with other applications through a RESTful API.</p>
      <p>The authors validate their approach using real-world hydroacoustic data from government sources,
providing comprehensive evaluation metrics and analysis. The paper concludes by suggesting future
work in areas such as online learning, explainable AI, and distributed computing to further enhance the
system’s capabilities.</p>
      <p>
        The paper “Investigating vulnerabilities of personal data on financial websites” by Fedorenko et al.
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] explores the critical issue of personal data security on financial websites in the digital age. The
authors emphasize the severe consequences of data breaches, ranging from identity theft to long-term
reputational damage. They analyze the complex interplay of technological, human, and organizational
factors contributing to vulnerabilities.
      </p>
      <p>The paper identifies common attack methods, such as SQL injection, cross-site scripting (XSS),
and phishing, which exploit weaknesses in web application security. It also highlights the increasing
sophistication of cybercriminals and the proliferation of hacking tools. The authors discuss recent
high-profile data breaches, like the Kyivstar incident in December 2023, to underscore the devastating
impact of successful attacks.</p>
      <p>To address these challenges, the paper proposes a multi-pronged approach involving proactive
measures by organizations and vigilance by individual users. It outlines strategies like robust security
controls, regular auditing, strong password hygiene, and enabling two-factor authentication. The
authors conduct security assessments of two prominent Ukrainian financial websites, OLX.ua and
Privat24, providing practical insights into their security measures and areas for improvement.</p>
      <p>The paper concludes by emphasizing the need for a comprehensive, multi-layered approach to
personal data protection on financial websites. It calls for future research to develop advanced
vulnerability detection tools, explore emerging technologies’ security challenges, and evaluate data protection
regulations’ efectiveness.</p>
      <sec id="sec-6-1">
        <title>5. CS&amp;SE@SW 2024: Conclusion and outlook</title>
        <p>The 7th Workshop for Young Scientists in Computer Science &amp; Software Engineering (CS&amp;SE@SW
2024) has once again showcased the impressive depth and breadth of research being conducted by
emerging talents in these rapidly evolving fields. The papers presented at this year’s workshop have
explored cutting-edge topics spanning software engineering, theoretical computer science, computer
systems, and computer applications.</p>
        <p>In the field of software engineering, authors have proposed novel approaches for optimizing ER
diagram creation, developing personalized digital mathematics tutors, implementing electronic audit
projects, designing afordable lie detector prototypes, and creating engaging educational games. These
contributions demonstrate the potential for software engineering methodologies to address real-world
challenges and enhance user experiences across diverse domains.</p>
        <p>Theoretical computer science papers have delved into modern algorithms for procedural content
generation, the practical applications of small language models, topic modeling of folk songs, and
advanced methods for chatbot training. These studies highlight the ongoing evolution of foundational
computer science concepts and their increasing relevance to contemporary problems.</p>
        <p>In the realm of computer systems, researchers have developed innovative solutions for
automating mineral sample preparation, analyzing scientific journal promotion strategies, and conducting
scientometric analyses of accounting information systems. These works underscore the critical role
of computer systems in enabling eficient data management, analysis, and decision-making across
industries.</p>
        <p>Finally, the computer applications track has featured groundbreaking research on hyperspectral
mineral classification, propaganda detection using semantic features, cyberbullying identification
through visual analytics, mobile health apps for physical activity promotion, AI-based fact-checking
systems, and advanced subtitle generation techniques. These papers illustrate the immense potential
for computer applications to address societal challenges, improve public health, combat disinformation,
and enhance accessibility.</p>
        <p>As we reflect on the success of CS&amp;SE@SW 2024, it is evident that the workshop has provided a
valuable platform for young scientists to share their research, exchange ideas, and foster collaborations.
The high-quality submissions and thought-provoking discussions have not only advanced the
state-ofthe-art in computer science and software engineering but also laid the foundation for future innovations.</p>
        <p>Looking ahead, CS&amp;SE@SW remains committed to nurturing the growth of emerging researchers
and facilitating the dissemination of cutting-edge knowledge. As the fields of computer science and
software engineering continue to evolve at an unprecedented pace, workshops like CS&amp;SE@SW will
play an increasingly crucial role in shaping the future of these disciplines.</p>
        <p>We eagerly anticipate the next edition of the workshop, to be held on December 26, 2025, in Kryvyi
Rih, Ukraine, where we will once again convene to explore the frontiers of computer science and
software engineering research.</p>
        <p>Acknowledgments: We would like to express our sincere gratitude to all those who contributed to the success of this
workshop. First and foremost, we extend our appreciation to the authors for submitting their high-quality research and to the
program committee members and reviewers for their valuable time and expertise in evaluating the submissions.</p>
        <p>We acknowledge the support of CEUR-WS.org, which hosts and publishes the workshop proceedings, thereby providing
an open-access platform for disseminating the presented research.</p>
        <p>Finally, we extend our gratitude to Tetiana A. Vakaliuk for her generous support.</p>
        <p>We hope that the discussions and collaborations initiated during this event will continue to inspire future research and
innovation in our field.</p>
        <p>Declaration on Generative AI: During the preparation of this work, the authors used Claude 3 Opus and Claude 3.5
Sonnet in order to: Drafting content, Abstract drafting. After using these tools, the authors reviewed and edited the content
as needed and takes full responsibility for the publication’s content.
support using large language models, CEUR Workshop Proceedings (2025) 321–331.
[30] A. V. Slobodianiuk, S. O. Semerikov, Advances in neural text generation: A systematic review
(2022-2024), CEUR Workshop Proceedings (2025) 332–361.
[31] D. O. Hanchuk, S. O. Semerikov, Automating machine learning: A meta-synthesis of MLOps
tools, frameworks and architectures, CEUR Workshop Proceedings (2025) 362–414.
[32] A. M. Striuk, V. V. Hordiienko, Research and development of a subtitle management system using
artificial intelligence, CEUR Workshop Proceedings (2025) 415–427.
[33] O. D. Rossiiev, N. N. Shapovalova, O. H. Rybalchenko, A. M. Striuk, A comprehensive survey
on reinforcement learning-based recommender systems: State-of-the-art, challenges, and future
perspectives, CEUR Workshop Proceedings (2025) 428–440.
[34] A. O. Poliaiev, N. N. Shapovalova, S. V. Bilashenko, A. M. Striuk, Research and development of
software for hydroacoustic signal analysis using machine learning techniques, CEUR Workshop
Proceedings (2025) 441–450.
[35] H. Bicen, N. Cavus, The most preferred social network sites by students, Procedia - Social and</p>
        <p>Behavioral Sciences 2 (2010) 5864–5869. doi:10.1016/j.sbspro.2010.03.958.
[36] N. Cavus, Y. B. Mohammed, M. N. Yakubu, An Artificial Intelligence-Based Model for Prediction
of Parameters Afecting Sustainable Growth of Mobile Banking Apps, Sustainability 13 (2021)
6206. doi:10.3390/su13116206.
[37] D. Budgen, B. Kitchenham, S. Charters, S. Gibbs, A. Pohthong, J. Keung, P. Brereton, Lessons
from Conducting a Distributed Quasi-experiment, in: 2013 ACM / IEEE International Symposium
on Empirical Software Engineering and Measurement, 2013, pp. 143–152. doi:10.1109/ESEM.
2013.12.
[38] D. Ghimire, S. Charters, S. Gibbs, Scaling Agile Software Development Approach in Government
Organization in New Zealand, in: Proceedings of the 3rd International Conference on Software
Engineering and Information Management, ICSIM ’20, Association for Computing Machinery,
New York, NY, USA, 2020, p. 100–104. doi:10.1145/3378936.3378945.
[39] C. Pribeanu, D. D. Iordache, Evaluating the Motivational Value of an Augmented Reality System
for Learning Chemistry, in: A. Holzinger (Ed.), HCI and Usability for Education and Work,
volume 5298 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg,
2008, pp. 31–42. doi:10.1007/978-3-540-89350-9_3.
[40] C. Pribeanu, D. D. Iordache, From Usability to User Experience: Evaluating the Educational
and Motivational Value of an Augmented Reality Learning Scenario, in: Afective, Interactive
and Cognitive Methods for E-Learning Design, IGI Global, 2010, p. 244–259. doi:10.4018/
978-1-60566-940-3.ch013.
[41] O. V. Dubolazov, A. G. Ushenko, Y. A. Ushenko, M. Y. Sakhnovskiy, P. M. Grygoryshyn,
N. Pavlyukovich, O. V. Pavlyukovich, V. T. Bachynskiy, S. V. Pavlov, V. D. Mishalov, Z. Omiotek,
O. Mamyrbaev, Laser Müller matrix diagnostics of changes in the optical anisotropy of biological
tissues, in: Information Technology in Medical Diagnostics II, CRC Press, 2019, p. 195–204.
doi:10.1201/9780429057618-24.
[42] A. Tolegenova, P. A. Kisała, A. Zhetpisbayeva, O. Mamyrbayev, B. Medetov, Experimental
determination of the characteristics of a transmission spectrum of tilted fiber Bragg gratings,
Metrology and Measurement Systems 26 (2019) 581–589. doi:10.24425/mms.2019.129585.
[43] H. Lee, B. Moon, A. H. Aghvami, Enhanced SIP for Reducing IMS Delay under WiFi-to-UMTS
Handover Scenario, in: 2008 The Second International Conference on Next Generation Mobile
Applications, Services, and Technologies, 2008, pp. 640–645. doi:10.1109/NGMAST.2008.63.
[44] J. Bae, B. Moon, Time synchronization with fast asynchronous difusion in wireless sensor
network, in: 2009 International Conference on Cyber-Enabled Distributed Computing and
Knowledge Discovery, 2009, pp. 82–85. doi:10.1109/CYBERC.2009.5342158.
[45] J. Wan, C. A. Byrne, M. J. O’Grady, G. M. P. O’Hare, Managing Wandering Risk in People With
Dementia, IEEE Transactions on Human-Machine Systems 45 (2015) 819–823. doi:10.1109/
THMS.2015.2453421.
[46] M. O’Grady, D. Langton, F. Salinari, P. Daly, G. O’Hare, Service design for climate-smart
agriculture, Information Processing in Agriculture 8 (2021) 328–340. doi:10.1016/j.inpa.2020.07.
003.
[47] P. Lula, G. Paliwoda-Pundefinedkosz, An ontology-based cluster analysis framework, in:
Proceedings of the First International Workshop on Ontology-Supported Business Intelligence, OBI
’08, Association for Computing Machinery, New York, NY, USA, 2008. doi:10.1145/1452567.
1452574.
[48] D. Dymek, M. Grabowski, G. Paliwoda-Pękosz, A proposition of an emerging technologies
expectations model: An example of student attitudes towards blockchain, Technological and
Economic Development of Economy 28 (2021) 101–130. doi:10.3846/tede.2021.15702.
[49] N. K. Suryadevara, S. Kelly, S. C. Mukhopadhyay, Ambient Assisted Living Environment
Towards Internet of Things Using Multifarious Sensors Integrated with XBee Platform, in: S. C.
Mukhopadhyay (Ed.), Internet of Things: Challenges and Opportunities, volume 9 of Smart
Sensors, Measurement and Instrumentation, Springer International Publishing, Cham, 2014, pp.
217–231. doi:10.1007/978-3-319-04223-7_9.
[50] S. C. Mukhopadhyay, N. K. Suryadevara, A. Nag, Wearable Sensors and Systems in the IoT,</p>
        <p>Sensors 21 (2021) 7880. doi:10.3390/s21237880.
[51] S. O. Semerikov, T. A. Vakaliuk, I. S. Mintii, V. A. Hamaniuk, V. N. Soloviev, O. V. Bondarenko, P. P.</p>
        <p>Nechypurenko, S. V. Shokaliuk, N. V. Moiseienko, V. R. Ruban, Mask and Emotion: Computer
Vision in the Age of COVID-19, in: Digital Humanities Workshop, DHW 2021, Association for
Computing Machinery, New York, NY, USA, 2022, p. 103–124. doi:10.1145/3526242.3526263.
[52] I. S. Mintii, T. A. Vakaliuk, S. M. Ivanova, O. A. Chernysh, S. M. Hryshchenko, S. O. Semerikov,
Current state and prospects of distance learning development in Ukraine, CEUR Workshop
Proceedings 2898 (2021) 41–55.
[53] A. Bomba, N. Kunanets, M. Nazaruk, V. Pasichnyk, N. Veretennikova, Model of the Data Analysis
Process to Determine the Person’s Professional Inclinations and Abilities, in: Z. Hu, S. Petoukhov,
I. Dychka, M. He (Eds.), Advances in Computer Science for Engineering and Education II, volume
938 of Advances in Intelligent Systems and Computing, Springer International Publishing, Cham,
2020, pp. 482–492. doi:10.1007/978-3-030-16621-2_45.
[54] Y. Pankiv, N. Kunanets, O. Artemenko, N. Veretennikova, R. Nebesnyi, Project of an Intelligent
Recommender System for Parking Vehicles in Smart Cities, in: 2021 IEEE 16th International
Conference on Computer Sciences and Information Technologies (CSIT), volume 2, 2021, pp.
419–422. doi:10.1109/CSIT52700.2021.9648687.
[55] A. De Renzis, M. Garriga, A. Flores, A. Cechich, A. Zunino, Case-based Reasoning for Web
Service Discovery and Selection, Electronic Notes in Theoretical Computer Science 321 (2016)
89–112. doi:10.1016/j.entcs.2016.02.006, CLEI 2015, the XLI Latin American Computing
Conference.
[56] A. Zunino, M. Campo, Chronos: A multi-agent system for distributed automatic meeting
scheduling, Expert Systems with Applications 36 (2009) 7011–7018. doi:10.1016/j.eswa.
2008.08.024.
[57] L. Moravec, R. Danel, J. Chlopecký, Application of the Cyber Security Act in Havířovská
teplárenská společnost, a.s, in: R. Nemec, L. Chytilova (Eds.), SMSIS 2017 - Proceedings of the
12th International Conference on Strategic Management and its Support by Information Systems
2017, VSB-Technical University of Ostrava, 2017, pp. 425–433.
[58] N. Shakhovska, R. Holoshchuk, S. Fedushko, O. Kosar, R. Danel, M. Repka, The Sequential
Associative Rules Analysis of Patient’s Physical Characteristics, in: N. Shakhovska, S. Montenegro,
Y. Estève, S. Subbotin, N. Kryvinska, I. Izonin (Eds.), Proceedings of the 1st International Workshop
on Informatics &amp; Data-Driven Medicine (IDDM 2018), Lviv, Ukraine, November 28-30, 2018,
volume 2255 of CEUR Workshop Proceedings, CEUR-WS.org, 2018, pp. 82–92. URL: https://ceur-ws.
org/Vol-2255/paper8.pdf.
[59] A. Dudnik, Y. Kravchenko, O. Trush, O. Leshchenko, N. Dakhno, V. Rakytskyi, Study of the
Features of Ensuring Quality Indicators in Multiservice Networks of the Wi-Fi Standard, in: 2021
IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 2021, pp.</p>
        <p>Workshop Proceedings 3364 (2023) 1–23.
[75] V. Kryzhanivskyy, V. Bushlya, O. Gutnichenko, R. M’Saoubi, J.-E. Ståhl, Computational and
Experimental Inverse Problem Approach for Determination of Time Dependency of Heat Flux in
Metal Cutting, Procedia CIRP 58 (2017) 122–127. doi:10.1016/j.procir.2017.03.204, 16th
CIRP Conference on Modelling of Machining Operations (16th CIRP CMMO).
[76] P. Moskvin, V. Kryzhanivskyy, P. Lytvyn, L. Rashkovetskyi, Multifractal spectrums for volumes
of spatial forms on surface of ZnxCd1-xTe-Si (111) heterostructures and estimation of the fractal
surface energy, Journal of Crystal Growth 450 (2016) 28–33. doi:10.1016/j.jcrysgro.2016.
05.035.
[77] S. Semerikov, D. Zubov, A. Kupin, M. Kosei, V. Holiver, Models and Technologies for Autoscaling
Based on Machine Learning for Microservices Architecture, CEUR Workshop Proceedings 3664
(2024) 316–330.
[78] S. S. Korniienko, P. V. Zahorodko, A. M. Striuk, A. I. Kupin, S. O. Semerikov, A systematic review
of gamicfiation in software engineering education, CEUR Workshop Proceedings 3844 (2024)
83–95.
[79] I. Pilkevych, O. Boychenko, N. Lobanchykova, T. Vakaliuk, S. Semerikov, Method of assessing
the influence of personnel competence on institutional information security, CEUR Workshop
Proceedings 2853 (2021) 266–275.
[80] N. M. Lobanchykova, T. A. Vakaliuk, V. P. Korbut, S. M. Lobanchykov, Y. B. Krasnov, Features of
designing systems for the formation of an internal microclimate of a high class of cleanliness
of operating rooms of medical institutions, IOP Conference Series: Earth and Environmental
Science 1415 (2024) 012124. doi:10.1088/1755-1315/1415/1/012124.
[81] A. V. Morozov, T. A. Vakaliuk, I. A. Tolstoy, Y. O. Kubrak, M. G. Medvediev, Digitalization of
thesis preparation life cycle: A case of Zhytomyr Polytechnic State University, CEUR Workshop
Proceedings 3553 (2023) 142–154.
[82] N. Lobanchykova, S. Kredentsar, I. Pilkevych, M. Medvediev, Information technology for mobile
perimeter security systems creation, Journal of Physics: Conference Series 1840 (2021) 012022.
doi:10.1088/1742-6596/1840/1/012022.
[83] V. P. Oleksiuk, J. A. Overko, O. M. Spirin, T. A. Vakaliuk, A secondary school’s experience of
a cloud-based learning environment deployment, CEUR Workshop Proceedings 3553 (2023)
93–109.
[84] V. P. Oleksiuk, O. R. Oleksiuk, T. A. Vakaliuk, A model of application and learning of cloud
technologies for future Computer Science teachers, CEUR Workshop Proceedings 3820 (2024)
82–101.
[85] I. Banicescu, R. L. Carino, J. P. Pabico, M. Balasubramaniam, Overhead analysis of a dynamic
load balancing library for cluster computing, in: 19th IEEE International Parallel and Distributed
Processing Symposium, 2005. doi:10.1109/IPDPS.2005.320.
[86] S. Dhandayuthapani, I. Banicescu, R. L. Carino, E. Hansen, J. R. Pabico, M. Rashid, Automatic
selection of loop scheduling algorithms using reinforcement learning, in: CLADE 2005.
Proceedings Challenges of Large Applications in Distributed Environments, 2005., 2005, pp. 87–94.
doi:10.1109/CLADE.2005.1520907.
[87] H. Wright, K. Brodlie, J. Wood, J. Procter, Problem Solving Environments: Extending the Rôle
of Visualization Systems, in: A. Bode, T. Ludwig, W. Karl, R. Wismüller (Eds.), Euro-Par 2000
Parallel Processing, volume 1900 of Lecture Notes in Computer Science, Springer Berlin Heidelberg,
Berlin, Heidelberg, 2000, pp. 1323–1331. doi:10.1007/3-540-44520-X_185.
[88] S. A. MacGowan, F. Madeira, T. Britto-Borges, M. Warowny, A. Drozdetskiy, J. B. Procter, G. J.</p>
        <p>Barton, The Dundee Resource for Sequence Analysis and Structure Prediction, Protein Science
29 (2020) 277–297. doi:10.1002/pro.3783.
[89] V. Derbentsev, N. Datsenko, V. Babenko, O. Pushko, O. Pursky, Forecasting Cryptocurrency Prices
Using Ensembles-Based Machine Learning Approach, in: 2020 IEEE International Conference
on Problems of Infocommunications. Science and Technology (PIC S&amp;T), 2020, pp. 707–712.
doi:10.1109/PICST51311.2020.9468090.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , First Student Workshop on Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>2292</volume>
          (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . URL: http: //ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2292</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , Second Student Workshop on Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>2546</volume>
          (
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>20</lpage>
          . URL: http: //ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2546</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , 3rd Workshop for Young Scientists in Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>2832</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2832</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          , 4th Workshop for Young Scientists in Computer Science &amp; Software Engineering,
          <source>CEUR Workshop Proceedings</source>
          <volume>3077</volume>
          (
          <year>2022</year>
          )
          <article-title>i-xxxv</article-title>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3077</volume>
          /intro.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <source>Embracing Emerging Technologies: Insights from the 6th Workshop for Young Scientists in Computer Science &amp; Software Engineering, CEUR Workshop Proceedings</source>
          <volume>3662</volume>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>36</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3662</volume>
          /paper00.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <article-title>The evolving landscape of computer science and software engineering: Trends, challenges, and future directions</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>1</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Kurotych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. V.</given-names>
            <surname>Bulatetska</surname>
          </string-name>
          ,
          <article-title>Optimizing the process of ER diagram creation with PlantUML</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>47</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Shokaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. O.</given-names>
            <surname>Kavetskyi</surname>
          </string-name>
          ,
          <article-title>Design and evaluation of a personalized digital mathematics tutor for grade 6 learners</article-title>
          , CEUR Workshop Proceedings (
          <year>2025</year>
          )
          <fpage>58</fpage>
          -
          <lpage>65</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Chernukha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Klochko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kizim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mozghalov</surname>
          </string-name>
          ,
          <article-title>Methodology for implementing electronic audit projects (SAF-T UA) for large taxpayers in Ukraine</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>66</fpage>
          -
          <lpage>79</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Moiseienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moiseienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lubentsova</surname>
          </string-name>
          ,
          <article-title>A web-based Kanban application for enhancing agile project management practices</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>131</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zhdaniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Tarasova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moiseienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Stepanyuk</surname>
          </string-name>
          ,
          <article-title>An interactive online trainer for primary school computer science education: Design, implementation, and theoretical foundations</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>139</fpage>
          -
          <lpage>151</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Oleksiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. Y.</given-names>
            <surname>Dzhuha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. P.</given-names>
            <surname>Melnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Verbovetskyi</surname>
          </string-name>
          ,
          <article-title>Development of the Student Simulator game: From concept to code</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>89</fpage>
          -
          <lpage>109</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Pravytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Merzlykin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Stepanyuk</surname>
          </string-name>
          ,
          <article-title>Designing and evaluating an afordable Arduino-based lie detector prototype</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>80</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Rudnichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vychuzhanin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Shvedov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Otradskya</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Petrov</surname>
          </string-name>
          ,
          <article-title>Information system for generating recommendations for risk-oriented trading strategies based on deep learning</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>110</fpage>
          -
          <lpage>119</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>H.</given-names>
            <surname>Zemlianukhina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Voliansky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Volianska</surname>
          </string-name>
          ,
          <article-title>Modeling and simulating of Dufing pendulum in the moved coordinate system</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>120</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I. F.</given-names>
            <surname>Laitaruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. O.</given-names>
            <surname>Hryshanovych</surname>
          </string-name>
          ,
          <article-title>Overview of modern algorithms for world procedural generation in computer games</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>152</fpage>
          -
          <lpage>163</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R. O.</given-names>
            <surname>Popov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Karpenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Gerasimov</surname>
          </string-name>
          ,
          <article-title>Overview of small language models in practice</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>164</fpage>
          -
          <lpage>182</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>O. B.</given-names>
            <surname>Petrovych</surname>
          </string-name>
          ,
          <article-title>Topic modelling of Ukrainian folk songs: A case study on Podillia region</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>183</fpage>
          -
          <lpage>198</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R. O.</given-names>
            <surname>Liashenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Bibliometric analysis and experimental assessment of chatbot training approaches</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>199</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V. M.</given-names>
            <surname>Smolij</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. V.</given-names>
            <surname>Smolij</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. Y.</given-names>
            <surname>Kovalenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Shvydenko</surname>
          </string-name>
          ,
          <article-title>Channel extractor for UAV PPM signals</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>226</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Krapyvnyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Azaryan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Shvydkyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. V.</given-names>
            <surname>Shvets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Hrytsenko</surname>
          </string-name>
          ,
          <article-title>Development of an automated system for preparing mineral raw material samples for discrete analysis</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>237</fpage>
          -
          <lpage>244</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Attallah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Zigh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Mehalli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Ali</given-names>
            <surname>Pacha</surname>
          </string-name>
          ,
          <article-title>A modified 3D-2D convolutional neural networks for robust mineral identification: Hyperspectral analysis in Djebel Meni (Northwestern Algeria)</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>272</fpage>
          -
          <lpage>285</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Korotun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. M.</given-names>
            <surname>Nikitchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. O.</given-names>
            <surname>Korotun</surname>
          </string-name>
          ,
          <article-title>Methods of data analysis to study the efectiveness of scientific journal promotion</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>245</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>I.</given-names>
            <surname>Krak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Molchanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Didur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sobko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mazurets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barmak</surname>
          </string-name>
          ,
          <article-title>Method of semantic features estimation for political propaganda techniques detection using transformer neural networks</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>286</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>I.</given-names>
            <surname>Krak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sobko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Molchanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Tymofiiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mazurets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Barmak</surname>
          </string-name>
          ,
          <article-title>Method for neural network cyberbullying detection in text content with visual analytic</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>298</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>O. H.</given-names>
            <surname>Fedorenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Velychko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Kaidan</surname>
          </string-name>
          ,
          <article-title>Investigating vulnerabilities of personal data on ifnancial websites</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>451</fpage>
          -
          <lpage>458</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Horodyskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. L.</given-names>
            <surname>Hrabchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Bereznyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Fedorova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. M.</given-names>
            <surname>Iefremov</surname>
          </string-name>
          ,
          <article-title>Information systems development in accounting: A systematic network study</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>260</fpage>
          -
          <lpage>271</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Stepanyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Merzlykin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Zheludko</surname>
          </string-name>
          ,
          <article-title>Design and implementation of a mobile health application for physical activity tracking and exercise motivation</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          (
          <year>2025</year>
          )
          <fpage>310</fpage>
          -
          <lpage>320</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kupershtein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Zalepa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sorokolit</surname>
          </string-name>
          , S. Prokopenko,
          <article-title>AI-agent-based system for fact-checking 93-98</article-title>
          . doi:
          <volume>10</volume>
          .1109/ATIT54053.
          <year>2021</year>
          .
          <volume>9678691</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [60]
          <string-name>
            <given-names>L.</given-names>
            <surname>Kuzmych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ornatskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kvasnikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuzmych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dudnik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kuzmych</surname>
          </string-name>
          ,
          <article-title>Development of the Intelligent Instrument System for Measurement Parameters of the Stress - Strain State of Complex Structures</article-title>
          ,
          <source>in: 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>124</lpage>
          . doi:
          <volume>10</volume>
          .1109/ATIT58178.
          <year>2022</year>
          .
          <volume>10024222</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [61]
          <string-name>
            <given-names>E.</given-names>
            <surname>Erturk</surname>
          </string-name>
          ,
          <article-title>Using a Cloud Based Collaboration Technology in a Systems Analysis</article-title>
          and Design Course,
          <source>International Journal of Emerging Technologies in Learning (iJET) 11</source>
          (
          <year>2016</year>
          )
          <fpage>33</fpage>
          -
          <lpage>37</lpage>
          . doi:
          <volume>10</volume>
          .3991/ijet.v11i01.
          <fpage>4991</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [62]
          <string-name>
            <given-names>S.</given-names>
            <surname>Day</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Erturk</surname>
          </string-name>
          ,
          <article-title>E-Learning objects in the cloud: SCORM compliance, creation and deployment options, Knowledge Management and E-Learning 9 (</article-title>
          <year>2017</year>
          )
          <fpage>449</fpage>
          -
          <lpage>467</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [63]
          <string-name>
            <given-names>J.</given-names>
            <surname>Mesarosova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Martinovicova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fidlerova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. H.</given-names>
            <surname>Chovanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Babcanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Samakova</surname>
          </string-name>
          ,
          <article-title>Improving the level of predictive maintenance maturity matrix in industrial enterprise</article-title>
          ,
          <source>Acta Logistica</source>
          <volume>9</volume>
          (
          <year>2022</year>
          )
          <fpage>183</fpage>
          -
          <lpage>193</lpage>
          . doi:
          <volume>10</volume>
          .22306/al.
          <year>v9i2</year>
          .
          <fpage>292</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [64]
          <string-name>
            <given-names>H.</given-names>
            <surname>Fidlerová</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Prachař</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sakál</surname>
          </string-name>
          ,
          <article-title>Application of Material Requirements Planning as Method for Enhancement of Production Logistics in Industrial Company</article-title>
          ,
          <source>Applied Mechanics and Materials</source>
          <volume>474</volume>
          (
          <year>2014</year>
          )
          <fpage>49</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .4028/www.scientific.net/AMM.474.49.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [65]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Bardamid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Belyaeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Bondarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Davis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Galuza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Garkusha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Haasz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. G.</given-names>
            <surname>Konovalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Kudlenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Poon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Ryzhkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. I.</given-names>
            <surname>Solodovchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Shtan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Voitsenya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. L.</given-names>
            <surname>Yakimov</surname>
          </string-name>
          ,
          <article-title>Ion fluence and energy efects on the optical properties of SS mirrors bombarded by hydrogen ions</article-title>
          , Physica Scripta T
          <volume>103</volume>
          (
          <year>2002</year>
          )
          <fpage>109</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [66]
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Belyaeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Galuza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Kolenov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. G.</given-names>
            <surname>Konovalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Savchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Skorik</surname>
          </string-name>
          ,
          <article-title>Efect of sputtering on the samples of ITER-grade tungsten preliminarily irradiated by tungsten ions: Optical investigations</article-title>
          ,
          <source>The Physics of Metals and Metallography</source>
          <volume>114</volume>
          (
          <year>2013</year>
          )
          <fpage>703</fpage>
          -
          <lpage>713</lpage>
          . doi:
          <volume>10</volume>
          .1134/S0031918X13060033.
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [67]
          <string-name>
            <given-names>P.</given-names>
            <surname>Hryhoruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Khrushch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Grygoruk</surname>
          </string-name>
          ,
          <article-title>Model for Assessment of the Financial Security Level of the Enterprise Based on the Desirability Scale</article-title>
          , in: A.
          <string-name>
            <surname>Kiv</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Semerikov</surname>
            ,
            <given-names>V. N.</given-names>
          </string-name>
          <string-name>
            <surname>Soloviev</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Kibalnyk</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Danylchuk</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          . Matviychuk (Eds.),
          <source>Proceedings of the Selected Papers of the 8th International Conference on Monitoring, Modeling &amp; Management of Emergent Economy, M3E2-EEMLPEED</source>
          <year>2019</year>
          , Odessa, Ukraine, May
          <volume>22</volume>
          -24,
          <year>2019</year>
          , volume
          <volume>2422</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>180</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2422</volume>
          /paper14.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [68]
          <string-name>
            <given-names>P.</given-names>
            <surname>Hryhoruk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Khrushch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Grygoruk</surname>
          </string-name>
          ,
          <article-title>Environmental safety assessment: a regional dimension</article-title>
          ,
          <source>IOP Conference Series: Earth and Environmental Science</source>
          <volume>628</volume>
          (
          <year>2021</year>
          )
          <article-title>012026</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1755</fpage>
          -1315/628/1/012026.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [69]
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. O.</given-names>
            <surname>Teplytskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Hamaniuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Ponomareva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. H.</given-names>
            <surname>Kolgatin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Kolgatina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Byelyavtseva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Amelina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. O.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <article-title>Methodic quest: Reinventing the system</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          <year>1840</year>
          (
          <year>2021</year>
          )
          <article-title>012036</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1840</year>
          /1/012036.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [70]
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Kukharenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. G. Kolgatin,</surname>
          </string-name>
          <article-title>The unsteady-state difusion model of forming a cryoprecipitate</article-title>
          ,
          <source>Inzhenerno-Fizicheskii Zhurnal</source>
          <volume>61</volume>
          (
          <year>1991</year>
          )
          <fpage>447</fpage>
          -
          <lpage>451</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [71]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Riabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kontsedailo</surname>
          </string-name>
          ,
          <article-title>Chatbot algorithm for solving physics problems</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3553</volume>
          (
          <year>2023</year>
          )
          <fpage>75</fpage>
          -
          <lpage>92</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [72]
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Riabko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Zaika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. P.</given-names>
            <surname>Kukharchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Kontsedailo</surname>
          </string-name>
          ,
          <article-title>Cluster fault tolerance model with migration of virtual machines</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3374</volume>
          (
          <year>2023</year>
          )
          <fpage>23</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [73]
          <string-name>
            <given-names>S.</given-names>
            <surname>Papadakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Kravtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Osadchyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Marienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Pinchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Shyshkina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Sokolyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Mintii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Revolutionizing education: using computer simulation and cloud-based smart technology to facilitate successful open learning</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3358</volume>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [74]
          <string-name>
            <given-names>S.</given-names>
            <surname>Papadakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. E.</given-names>
            <surname>Kiv</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Kravtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Osadchyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. V.</given-names>
            <surname>Marienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. P.</given-names>
            <surname>Pinchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Shyshkina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Sokolyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Mintii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. E.</given-names>
            <surname>Azarova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Kolgatina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Amelina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. P.</given-names>
            <surname>Volkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. Y.</given-names>
            <surname>Velychko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Unlocking the power of synergy: the joint force of cloud technologies and augmented reality in education</article-title>
          , CEUR
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [90]
          <string-name>
            <surname>O. I. Purskiˇı</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. N.</given-names>
            <surname>Zholonko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Konstantinov</surname>
          </string-name>
          ,
          <article-title>Heat transfer in the orientationally disordered phase of SF6</article-title>
          ,
          <source>Low Temperature Physics</source>
          <volume>26</volume>
          (
          <year>2000</year>
          )
          <fpage>278</fpage>
          -
          <lpage>281</lpage>
          . doi:
          <volume>10</volume>
          .1063/1.593899.
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [91]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yechkalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kislova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hladyr</surname>
          </string-name>
          ,
          <article-title>Using Mobile ICT for Online Learning During COVID-19 Lockdown</article-title>
          , in: A.
          <string-name>
            <surname>Bollin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Ermolayev</surname>
            ,
            <given-names>H. C.</given-names>
          </string-name>
          <string-name>
            <surname>Mayr</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Nikitchenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Spivakovsky</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Tkachuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Yakovyna</surname>
            , G. Zholtkevych (Eds.), Information and Communication Technologies in Education, Research, and
            <given-names>Industrial</given-names>
          </string-name>
          <string-name>
            <surname>Applications</surname>
          </string-name>
          .
          <source>ICTERI</source>
          <year>2020</year>
          , volume
          <volume>1308</volume>
          of Communications in Computer and Information Science, Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>67</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77592-
          <issue>6</issue>
          _
          <fpage>3</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [92]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Shepiliev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. V.</given-names>
            <surname>Yechkalo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Markova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. O.</given-names>
            <surname>Modlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Mintii</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Mintii</surname>
            ,
            <given-names>T. V.</given-names>
          </string-name>
          <string-name>
            <surname>Selivanova</surname>
            ,
            <given-names>N. K.</given-names>
          </string-name>
          <string-name>
            <surname>Maksyshko</surname>
            ,
            <given-names>T. A.</given-names>
          </string-name>
          <string-name>
            <surname>Vakaliuk</surname>
            ,
            <given-names>V. V.</given-names>
          </string-name>
          <string-name>
            <surname>Osadchyi</surname>
            ,
            <given-names>R. O.</given-names>
          </string-name>
          <string-name>
            <surname>Tarasenko</surname>
            ,
            <given-names>S. M.</given-names>
          </string-name>
          <string-name>
            <surname>Amelina</surname>
            ,
            <given-names>A. E.</given-names>
          </string-name>
          <string-name>
            <surname>Kiv</surname>
          </string-name>
          ,
          <article-title>Development of career guidance quests using WebAR</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          <year>1840</year>
          (
          <year>2021</year>
          )
          <article-title>012028</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1840</year>
          /1/012028.
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [93]
          <string-name>
            <given-names>A.</given-names>
            <surname>Adamov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mehdiyev</surname>
          </string-name>
          , E. Seyidzade,
          <article-title>Good practice of data modeling and database design for UMIS. Course registration system implementation</article-title>
          ,
          <source>in: 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          . 1109/ICAICT.
          <year>2014</year>
          .
          <volume>7035949</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [94]
          <string-name>
            <given-names>E. S.</given-names>
            <surname>Vagif</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Zahir</surname>
          </string-name>
          ,
          <article-title>Developing of the creative abilities of the pupils by the using the project on training method in the classes of the informatics in the general schools</article-title>
          ,
          <source>in: 2011 5th International Conference on Application of Information and Communication Technologies (AICT)</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICAICT.
          <year>2011</year>
          .
          <volume>6110955</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [95]
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Lytvynova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Kolgatina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. Y.</given-names>
            <surname>Velychko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. S.</given-names>
            <surname>Mintii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. O.</given-names>
            <surname>Kalinichenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Tukalo</surname>
          </string-name>
          , AREdu 2021 -
          <article-title>Immersive technology today</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>2898</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [96]
          <string-name>
            <given-names>P. V.</given-names>
            <surname>Zahorodko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Soloviev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. I.</given-names>
            <surname>Striuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Shalatska</surname>
          </string-name>
          ,
          <article-title>Comparisons of performance between quantum-enhanced and classical machine learning algorithms on the IBM Quantum Experience</article-title>
          ,
          <source>Journal of Physics: Conference Series</source>
          <year>1840</year>
          (
          <year>2021</year>
          )
          <article-title>012021</article-title>
          . doi:
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -
          <lpage>6596</lpage>
          /
          <year>1840</year>
          /1/012021.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [97]
          <string-name>
            <given-names>F.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dewan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Voytenko</surname>
          </string-name>
          , Open Interactive Algorithm Visualization, in: 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE),
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/ CCECE.
          <year>2019</year>
          .
          <volume>8861535</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [98]
          <string-name>
            <given-names>V.</given-names>
            <surname>Voytenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vodichev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kalinin</surname>
          </string-name>
          ,
          <article-title>Comparative Analysis of Energy Performance of Induction Single-Motor and Multi-Motor Traction Electric Drive</article-title>
          ,
          <source>in: 2021 IEEE 2nd KhPI Week on Advanced Technology (KhPIWeek)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>78</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek53812.
          <year>2021</year>
          .
          <volume>9570063</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [99]
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Karnishyna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Selivanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. P.</given-names>
            <surname>Nechypurenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. V.</given-names>
            <surname>Starova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Enhancing high school students' understanding of molecular geometry with augmented reality</article-title>
          ,
          <source>Science Education Quarterly</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>25</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .55056/seq.818.
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [100]
          <string-name>
            <given-names>S. L.</given-names>
            <surname>Malchenko</surname>
          </string-name>
          ,
          <article-title>From smartphones to stargazing: the impact of mobile-enhanced learning on astronomy education</article-title>
          ,
          <source>Science Education Quarterly</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .55056/seq.816.
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [101]
          <string-name>
            <given-names>O. A.</given-names>
            <surname>Konoval</surname>
          </string-name>
          ,
          <article-title>A relativistic approach to teaching electrodynamics: Deriving Maxwell's equations from first principles</article-title>
          ,
          <source>Science Education Quarterly</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>41</fpage>
          -
          <lpage>102</lpage>
          . doi:
          <volume>10</volume>
          .55056/seq.819.
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [102]
          <string-name>
            <given-names>P. P.</given-names>
            <surname>Nechypurenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. O.</given-names>
            <surname>Semerikov</surname>
          </string-name>
          ,
          <article-title>Implementing an integrated natural sciences course in Ukrainian high schools: A nationwide experiment from 2018-2022, Science Education Quarterly 1 (</article-title>
          <year>2024</year>
          )
          <fpage>8</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .55056/seq.820.
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [103]
          <string-name>
            <given-names>P. P.</given-names>
            <surname>Nechypurenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. D.</given-names>
            <surname>Kushnirova</surname>
          </string-name>
          ,
          <article-title>The rebirth of home chemistry experiments: An international perspective and the Ukrainian context</article-title>
          ,
          <source>Science Education Quarterly</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>103</fpage>
          -
          <lpage>108</lpage>
          . doi:
          <volume>10</volume>
          .55056/seq.824.
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [104]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Teplitsky</surname>
          </string-name>
          ,
          <article-title>Broadening didactic resource of physics dictation</article-title>
          ,
          <source>Science Education Quarterly</source>
          <volume>1</volume>
          (
          <year>2024</year>
          )
          <fpage>14</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .55056/seq.817.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>