INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.13, No.3, Jun. 2021

Comprehensive Methods of Evaluation of Distance Learning System Functioning

Full Text (PDF, 950KB), PP.62-71


Views:28   Downloads:1

Author(s)

Oleg Barabash, Oleksandr Laptiev, Valentyn Sobchuk, Ivanna Salanda, Yulia Melnychuk, Valerii Lishchyna

Index Terms

Synthesize;Model;Network;Functional stability;Redundancy;Software systems

Abstract

Given recent events, training during quarantine can only take place remotely. To ensure quality training, communication must be seamless. To do this, the network must function smoothly. The solution to this problem is functionally stable networks that allow uninterrupted transmission of information due to redundancy. An important issue is the definition of redundancy. To solve this problem, the article considers the method of synthesis of the structure of the distance learning system. The method of synthesis of network structure used for providing distance learning by the criterion of maximum functional stability on the basis of the introduction of correcting communication lines is offered. With this method, you can develop tools for self-recovery of distributed software, taking into account the characteristics of disparate computer resources through the use of redundancy. This will allow you to develop functionally stable software systems, significantly reduce the recovery time of such systems after or in the event of possible failures. To increase the efficiency of the developed method, the mathematical model of the hyper network based on two hypergraphs was improved, which allows taking into account different requirements for the quality of the network.

Cite This Paper

Oleg Barabash, Oleksandr Laptiev, Valentyn Sobchuk, Ivanna Salanda, Yulia Melnychuk, Valerii Lishchyna, "Comprehensive Methods of Evaluation of Distance Learning System Functioningt", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.3, pp.62-71, 2021. DOI: 10.5815/ijcnis.2021.03.06

Reference

[1]Kravchenko Y. Evaluating the effectiveness of cloud services. 2019 IEEE 1th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&T`2019, Kyiv, 2019, pp.120–124

[2]Pennington, J.; Socher, R.., Manning, C. D. Glove: Global vectors for word representation. EMNLP, 2014, vol. 14, pp. 1532–43. 

[3]Dukhnovska K.K. Formuvannya Posukovy dynamical vector space.Shtunniy intertekt, 2016,  no3.4, pp. 28-36.

[4]Barabash O.V., Open’ko P.V., Kopiika O.V., Shevchenko H.V., Dakhno N.B. Target Programming with Multicriterial Restrictions Application to the Defense Budget Optimization. Advances in Military Technology, 2019, vol. 14, no. 2, pp. 213 – 229 .2019.

[5]Kreines M.G., Kreines E.M. Control model for the alignment of the quality assessment of scientific documents based on the analysis of content-related context. JCSSI, 2016, vol. 55, no. 6, pp. 938–947.

[6]Musienko A.P., Serdyuk A.S. Lebesgue-type inequalities for the de la Valée-Poussin sums on sets of analytic functions . Ukrainian Mathematical Journal September 2013, Volume 65, Issue 4, рр. 575 – 592. 

[7]Musienko A.P., Serdyuk A.S.   Lebesgue-type inequalities for the de la Vallée poussin sums on sets of entire functions . Ukrainian Mathematical Journal October 2013, Volume 65, Issue 5, рр. 709 – 722. 

[8]Milov O., Yevseiev S., Milevskyi S., Ivanchenko Y., Nesterov O., Puchkov O., Yarovyi A., Salii A., Tiurin V., Timochko O. Development the model of the antagonistic agent’s behavior under a cyber-conflict. Eastern European Journal of Advanced Technologies. Kharkiv.2019. 4/9 (100). pp. 6–19.

[9]Oleg Barabash, Oleksandr Laptiev, Oksana Kovtun, Olga Leshchenko, Kseniia Dukhnovska, Anatoliy Biehun. The Method dynavic TF-IDF. International Journal of Emerging Trends in Engineering Research (IJETER), Volume 8. No. 9, September 2020.pp 5713-5718

[10]Barabash Oleg, Laptiev Oleksandr, Tkachev Volodymyr, Maystrov Oleksii, Krasikov Oleksandr, Polovinkin Igor. The Indirect method of obtaining Estimates of the Parameters of Radio Signals of covert means of obtaining Information. International Journal of Emerging Trends in Engineering Research (IJETER), Volume 8. No. 8, August 2020. Indexed- ISSN: 2278 – 3075. pp4133 – 4139

[11]Sweta Srivastav, Sangeeta Gupta. Results with Matlab coding of Middle Graph of Cycle and its related graphs in context of Sum Divisor Cordial International Journal of Innovative Technology and Exploring Engineering (IJITEE), Volume-8 Issue-2, February 2020. pp. 398-401.

[12]Mashkov O.A., Sobchuk V.V., Barabash O.V., Dakhno N.B., Shevchenko H.V., Maisak T.V. Improvement of variational-gradient method in dynamical systems of automated control for integro-differential models. Mathematical Modeling and Computing, 2019, Vol. 6, No. 2, pp. 344 – 357.

[13]Barabash O., Dakhno N., Shevchenko H., Sobchuk V. Integro-Differential Models of Decision Support Systems for Controlling Unmanned Aerial Vehicles on the Basis of Modified Gradient Method. IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC). 16-18 October, National Aviation University, 2018. Kyiv, Ukraine. pp. 94 – 97. 

[14]Ihor Ruban, Nataliia Bolohova, Vitalii Martovytskyi, Nataliia Lukova-Chuiko , Valentyn Lebediev. Method of sustainable detection of augmented reality markers by changing deconvolution. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE).Volume 9, No.2, March-April 2020, pp.1113 – 1120.

[15]Serhii Yevseiev, Oleksandr Laptiev, Sergii Lazarenko, Anna Korchenko, Іryna Manzhul. Modeling the protection of personal data from trust and the amount of information on social networks. Number 1 (2021), «EUREKA: Physics and Engineering»  pp.24–31

[16]Rakushev, M., Permiakov, O., Tarasenko, S., Kovbasiuk, S., Kravchenko, Y. and Lavrinchuk, O. Numerical Method of Integration on the Basis of Multidimensional Differential-Taylor Transformations. In Proceedings of the IEEE International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&T`2019 – Proceedings, pp. 675 – 678.

[17]Valentyn Sobchuk, Volodymyr Pichkur, Oleg Barabash, Oleksandr Laptiev, Kovalchuk Igor, Amina Zidan. Algorithm of control of functionally stable manufacturing processes of enterprises. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25-27. pp.206 –211.

[18]Y. Kravchenko, O. Leshchenko, N. Dakhno, O. Trush, O. Makhovych. Evaluating the effectiveness of cloud services. IEEE International Conference on Advanced Trends in Information Theory, ATIT`2019 – Proceedings, pp.120 – 124.

[19]MaksymukO.V., SobchukV.V., Salanda I.P., Sachuk Yu.V. A system of indicators and criteria for evaluation of the level of functional stability of information heterogenic networks.  Mathematical modeling and computing. 2020.  Vol. 7, No. 2. рр. 285 – 289.

[20]O. Barabash, V. Sobchuk, N. Lukova-Chuiko, A. Musienko. Application of Petri Networks for Support of Functional Stability of Information Systems. 2018 IEEE First International Conference on System Analysis & Intelligent Computing (SAIC). 08-12 October, Igor Sikorsky Kyiv Polytechnic Institute, 2018. Kyiv, Ukraine. pp. 36 – 39.

[21]Oleksandr Laptiev, Oleh Stefurak, Igor Polovinkin, Oleg Barabash, Savchenko Vitalii, Olena Zelikovska. The method of improving the signal detection quality by accounting for interference. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020) Conference Proceedings Kyiv, Ukraine, November 25 - 27. pp.172 –176.

[22]Barabash Oleg, Laptiev Oleksandr, Tkachev Volodymyr, Maystrov Oleksii, Krasikov Oleksandr, Polovinkin Igor. The Indirect method of obtaining Estimates of the Parameters of Radio Signals of covert means of obtaining Information. International Journal of Emerging Trends in Engineering Research (IJETER), Volume 8. No. 8, August 2020. Indexed- ISSN: 2278 – 3075. pp. 4133 – 4139

[23]Yevseiev, S., Korol, O., Kots, H. Construction of hybrid security systems based on the cryptocode structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 2017, 4(9-88), pp. 4–21

[24]Evseev, S., Kotz, H., Korol, O. Analysis of the legal framework for the information security management system of the nsmep.Eastern-European Journal of Enterprise Technologies, 2015, 5(3), pp. 48–59

[25]Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., ...Milov, O., Shmatko, O. Practical implementation of the Niederreiter modified crypto-code system on truncated elliptic codes.Eastern-European Journal of Enterprise Technologies, 2018, 6(4-96), pp. 24–31

[26]Smelyakov K., Chupryna A., Hvozdiev M., Sandrkin D., Martovytskyi V. Comparative efficiency analysis of gradational correction models of highly lighted image. 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 8-11 Oct. 2019, Kyiv, Ukraine. рр. 703 – 708.

[27]Y. Kravchenko, K. Herasymenko, V. Bondarenko, O. Trush, M. Tyshchenko, O. Starkova, “Model of Information Protection system database of the mobile terminals information system on the territory of Ukraine (ІSPMTU)”, IEEE  International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&T`2020 – Proceedings, in press. 

[28]Oleg Barabash, Andrii Musienko, Spartak Hohoniants, Oleksandr Laptiev, Oleg Salash, Yevgen Rudenko, Alla Klochko. Comprehensive Methods of Evaluation of Efficiency of Distance Learning System Functioning. International Journal of Computer Network and Information Security(IJCNIS), IJCNIS Vol. 13, No. 1, Feb. 2021. pp.16 -28, Pub. Date: 2021-02-08. DOI: 10.5815/ijcnis.2021.01.02

[29]Oleg Barabash, Andrii Musienko, Spartak Hohoniants, Oleksand Laptiev, Oleg Salash, Yevgen Rudenko, Alla Klochko, "Comprehensive Methods of Evaluation of Efficiency of Distance Learning System Functioning", International Journal of Computer Network and Information Security(IJCNIS), Vol.13, No.1, pp.16-28, 2021. DOI: 10.5815/ijcnis.2021.01.02

[30]Mousumi Mitra, Aviroop Chowdhury, " A Modernized Voting System Using Fuzzy Logic and Blockchain Technology", International Journal of Modern Education and Computer Science(IJMECS), Vol.12, No.3, pp. 17-25, 2020.DOI: 10.5815/ijmecs.2020.03.03

[31]Bharati Sinha, Awadhesh Kumar Singh, Poonam Saini, "A Failure Detector for Crash Recovery Systems in Cloud", International Journal of Information Technology and Computer Science(IJITCS), Vol.11, No.7, pp.9-16, 2019. DOI: 10.5815/ijitcs.2019.07.02

[32]Ashutosh Kumar Tiwari, Sandeep Varma Nadimpalli, " New Fusion Algorithm Provides an Alternative Approach to Robotic Path Planning", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.12, No.3, pp. 1-7, 2020. DOI: 10.5815/ijieeb.2020.03.01