ICTERI 2018: 14TH INTERNATIONAL CONFERENCE ON ICT IN EDUCATION, RESEARCH, AND INDUSTRIAL APPLICATIONS
PROGRAM FOR MONDAY, MAY 14TH
Days:
next day
all days

View: session overviewtalk overview

09:00-10:30 Session 3L-Person-1: System Modeling for Forming Competences
Location: 18
09:00
Cognitive Tasks Design by Applying Computer Modeling System for Forming Competences in Mathematics

ABSTRACT. The article defines the basic concepts of “cognition”, “cognitive activity”, “cognitive task”, “cognitive competence”, “system of computer modeling”; types of computer models; it determines the components and structure of pupils’ competence formation in mathematics on the basis of solving cognitive tasks using computer simulation systems; specifies levels and types of cognitive tasks; singles out features, basic components and levels of pupils’ cognitive activity of general secondary education institutions. It was found out that different types of cognitive tasks (emotional-figurative, evaluation-educational, practical-educational, theoretically oriented, information-oriented) consistent with their levels of complexity (learning-reproductive, analytical, theoretical, applied, research, creative) form a system for the development of cognitive abilities of a high school pupil. It is determined that assessment of cognitive abilities of pupils can be carried out according to the following criteria: cognitive bases, cognitive processes, cognitive activity and cognitive qualities. It is established that the use of cognitive tasks using computer modeling systems will facilitate the formation of pupils' competences in mathematics. It is substantiated that the use of computer modeling systems will provide variability of tasks, complexity, universal access, organization of individual and team work.

09:25
Models and applied tools for prediction of student ability to effective learning

ABSTRACT. Models of the system “Learner-techno-tools-environment” (SLTE) from viewpoints of psychophysiology, stages of learning and appropriate ICT tools were developed and their constructions were discussed. Functional system of cognitive activity (FSCA) in digital environment has been developed as a re-finement of the previous general functional system of activity by K.Anokhin. The FSCA was proposed as a structural functional system representing psychophysiological model of cognitive activity, and as a hyper-complex dynamic system. Theoretical models correspond to ICT tis are used for students’ abilities assessment, monitoring of the intellect development on micro-age intervals, as well as for studying cognitive stability in over week’s intervals.

09:45
Mathematical models of supporting the solution of the algebra tasks in systems of computer mathematics for educational purposes

ABSTRACT. The article describes systems of computer mathematics for educational purposes with intelligent properties oriented to support practical activities of users - students and teachers. Systems of computer mathematics for educational purposes are oriented, first of all, in support of practical activity of users - students and teachers for solving educational mathematical tasks. The article presents mathematical models and methods for solving algebra tasks in systems of computer mathematics for educational purposes.

10:05
Model of the curriculum revision system in computer science

ABSTRACT. The onrush of information technology raises the task of revising curricula of spe-cialties in computer science. The objectives of the study are to define the requirements and develop a model of the curriculum revision system in computer science. Subject of research: curriculum revision system in computer science. Research methods: review and analysis of scientific publications, modeling of complex systems, questionnaires, expert method of evaluation. The model of the revision system of the curriculum is built taking into account the modern requirements of employers to the competence of university graduates in computer sciences. The architecture of this system is built on the basis of research on the functionality of such elements as the Top Competences (required in the labor market), Employers' Requirements, Learning outcomes (expected results of teachers) and the formation of the ICT curriculum. The expert method is used to assess the quality of the revision model of the curriculum on the example of a specialty in the field of computer science. Results of the research: the requirements of the labor market to the competence of university graduates were investigated, systematized and formulated in the field of computer science. These requirements are the basis for the formation of a new or improvement of the existing curriculum at the university.

09:00-10:35 Session ITER-1: Business Process Modeling
Location: Assembly Hall
09:00
Estimation of Currency Risks in the Process of Enterprise Foreign Economic Activity

ABSTRACT. The problem of risk analysis during foreign economic activity is now becoming ever more relevant especially for Ukrainian economy. In this paper, we had analyzed the environment of currency risk formation and evaluated them based on the example of Antonov State Company which is the leader of the domestic aviation industry as the leading exporter of high-technology products with a high degree of added value. The currency risk estimation of Antonov State Company was done through assessment of the foreign exchange position, matching model, Value at Risk method (VaR) and statistical analysis. In order to analyse the all range of Ukraine’s economy threats, which is open economy, we have proposed a methodology for an integrated valuation of currency risk.

09:25
Production Activity of Agricultural Business Structures and Its Efficiency in Ukraine
SPEAKER: Sergey Us

ABSTRACT. The paper discusses that in the conditions of domestic economy transformational changes, insufficient financing and economic risks growth; there is a need to increase efficiency level of agricultural business structures activity. Providing of these conditions depends on scientific and practical developments implementation into enterprises production activity with a purpose of its improvement. To achieve a high efficiency level, it’s necessary to analyze the agribusiness structures functioning environment which is characterized by market conditions dynamic changes and greatly affects the size, specialization, production structure etc. Most enterprises are on the stage of assets accumulation and production diversification directions search which involves different activities and intensive development. At the same time, banks’ lending volume decrease and production costs growth due to devaluation of the national currency as well as economic activity decline leads to agricultural enterprises research of new ways to increase return on investments.

09:45
The predictive power of the sentiment of financial reports

ABSTRACT. The present study examines the predictive power of the tone or sentiment of 10-K annual and 10-Q quarterly financial statements for future corporate development. The sentiment indicator was calculated using word lists developed for financial texts by Loughran/McDonalds and Henry and applying a conventional and a tf-idf weighted word count. The results show that the sentiment indicator is of significant incremental prognostic quality both for the next quarter and the quarter following it. Unlike suggested by previous literature, neither the scope and content of the word lists nor the weighting method applied had a significant influence on forecasting quality.

10:10
Geographic Information Systems: Should They Be Used in Public Finance Reform Development?

ABSTRACT. Public finance reform is one of the most complex areas of decision-making. It requires good implementing methodology and proper tools for visualization possible results of reform for the society. The purpose of this article is to show how geographic information systems (GIS) can be used in the development of reforms in the sphere of public finance. GIS can become a very useful tool in the development of reforms. GIS could provide a wide range of analysis and provide better support for ideas of reforms. GIS is very useful in the case of public finance reform, because it makes it possible to combine statistical, demographical and geographical analysis. Also GIS provides very good visualization that helps ordinary citizens to understand an idea of reform and its aftereffects. GIS can increase transparency and accountability of government, because it is quite difficult to manipulate open map data. GIS is not a perfect tool and several challenges should be also considered. Firstly, the software for GIS must be revised quite often. Secondly, GIS software continues to change and improve over time and there are now several GIS applications that range from being relatively free (having limited tools) to being very expensive (for example, ArcGIS 10.). Thirdly, to follow the idea of increasing transparency, all GIS software should have no conflicts between each other. This means that data from one GIS software can be easily exported into different GIS applications.

09:00-10:30 Session TheRMIT-1: Internet of Things Reliability and Availsbility

10.20 -10.30. Discussion

Location: 56
09:00
WS TheRMIT Co-Chair Welcome. Challenges in IT Reiability, Safety and Security

ABSTRACT. WS TheRMIT Co-Chair Welcome

09:05
Multi-Criteria Selection of the Wireless Communication Technology for Specialized IoT Network

ABSTRACT. The task of the selection of the appropriate wireless communication technol-ogy (WCT) in the IoT networks is very relevant today. The complexity of the selection process is due to the large number of existing WCTs, which are available on the IoT communications market, and the variety of their fea-tures, possibilities and spheres of applications. In this paper, the multi-criteria decision making approach for choosing the WCT (data transfer technology) within designing IoT systems is considered. For solving multi-criteria deci-sion making problem, authors use the ideal point method with different met-rics to calculate the distance between alternatives. Special attention is paid to the impact analysis of various metrics on the results of the WCT selection. The reliability, dependability, safety and security of IoT systems are consid-ered as the most important criteria for decision making in WCT selection processes. Special cases of choosing the WCT in the IoT networks with con-firmation of the appropriateness of the using proposed approach are dis-cussed.

09:25
Patching the Firewall Software to Improve the Availability and Security: Markov Models for Internet of Things Based Smart Business Center
SPEAKER: unknown

ABSTRACT. The paper considers the tasks and solutions for availability assessing and securing the Internet of Things (IoT), in particular, the Smart Business Center (SBC) with wired communication networks. The goal of this paper is to develop and research of SBC availability models, taking into account the changes in power consumption modes in operating systems, denial-of-services (DDoS) attacks, patching for firewalls depending on the presence of software vulnerabilities, considering reliability of system components such as a server and a router. Comparison of several models of the IoT system availability has been made and recommendations have been formulated regarding the policy of patching.

09:45
A Markov Model of Healthcare Internet of Things System Considering Failures of Components

ABSTRACT. An active infiltration of information technology in the healthcare sector has led to a fundamental change in people's quality of life. In this regard, the security and safety problems of this technology using increase rapidly. This paper touches upon the issue of the healthcare Internet of Things (IoT) infrastructure failures of components and complete system. The purpose of the paper is to develop and research an availability model of a healthcare IoT system regarding failures of components. A detailed analysis of an architecture of healthcare IoT infrastructure is given. The main causes of the healthcare IoT based system failures are considered. Much attention is given to developing and research of a Markov model of a healthcare IoT system considering failures of components. Some essential high-level requirements that such system must meet are presented. The analysis of obtained simulation results showed the rates that have the greatest influence on the availability function of the healthcare IoT system.

10:05
Reducing Power Consumption of Measurement and Control Modules Fed with Autonomous Power Supply
SPEAKER: Pavlo Bykovyy

ABSTRACT. In this paper, a detailed analysis is made of the possibility of reducing the energy consumption of the measuring and control modules when they are powered by an autonomous source, a battery, without the possibility of restoring its charge. These modules are designed, in particular, to work in the system for emergency and post-emergency monitoring of equipment and the territory of complex technical systems (for example, nuclear power plants), which must ensure a long (according to regulatory documents - at least 72 hours) data and commands exchanging. The issue of saving energy consumption is considered: (i) at all levels of building measurement and control modules - from wireless data interchange and commands at the level of the structure of the system as a whole to the structure of the most measurement-control modules and circuits of their nodes (ii) in the context of providing informativity, survivability and reliability of data exchange and commands in the system of emergency and post-emergency monitoring of equipment and the territory as a whole. It is shown that the use of modern technical elements (in particular, drones operating as data and instructions retransmitters) and structural solutions (in particular, calibration of analog-digital and digital-analog converters) allows to ensure high reliability of data and commands exchange despite simplifying the structure of nodes for saving energy consumption.

09:30-10:30 Session RMSE-1: Applied Aspects of Rigorous Methods in Software Engineering
Location: Chinese Room
09:30
Investigating Separation Logic as Logic of Quasiary Predicates

ABSTRACT. In the paper separation logic is presented as quasiary logic. It is shown how special structures within separation logic such as store and heap can be modeled using nominative data. Thus functions and predicates can be treated as quasiary and properties of the separation logic as quasiary logic can be investigated.

09:50
Using Formal B Method in Software Engineering: Case Study
SPEAKER: Tural Mamedov

ABSTRACT. Formal methods are a required tool in a software development process life-cycle, because they give to programmers significant reduction in the testing and verification time. Teaching such tools is a challenge because many students don’t understand the importance of formal methods. For the reason, misunderstanding generate problems related with low motivation and poor performance in students. In the literature many approaches for solving these problems are presented, some of them associated with active learning strategies like case method, simulation and gamification. During the work, case study approach was proposed by formalizing and verifying tram movement. The abstract machine and its implementation with formal B Method were constructed. Also formal representation of tram movement was proved with industrial tool named Atelier B.

10:10
Verification System Based on Program-Oriented Logics
SPEAKER: unknown

ABSTRACT. In this paper we present a verification system VerSQ based on special program-oriented logics. This system allows a user to formulate statements about software systems in a special formal language ForQL (FORmal Quasiary Language) which is designed to be an imitation of a fragment of English language. The system gives a user tools proving such statements in a semi-automatic manner. The system can be applied in such domains as specification and verification of software systems, computer-assisted learning, computer-assisted theorem proving or proof checking.

10:30
Use of insertion modeling for the analysis of regulatory requirements

ABSTRACT. This article outlines the formalization of the normative legal text. A formal model of a legal document is presented as an ordered set of rules. Verification is implemented by means of algebraic computation and symbolic modelling. The formalization of legal requirements is performed with the use of an intermediate language, Such a formal model can be verified for inconsistency and incompleteness, which are the causes of gaps and ambiguities in legal requirements.

10:30-11:00Coffee Break
11:00-12:30 Session 3L-Person-2: Cloud-based Learning Environment
Location: 18
11:00
The Concept, Principles of Design and Implementation of the University Cloud-based Learning and Research Environment

ABSTRACT. The scientific and methodological background of creation and development of the cloud-based learning and research environment of the university is substantiated. The conceptual and terminology body of the cloud-based environment investiga-tion is defined, the main features of such environment are revealed. The article highlights the promising ways of providing access to the cloud-based learning and research software in higher educational institutions. It is emphasized that the cloud computing services implementation is the actual trend of modern ICT peda-gogical systems development. The analysis and evaluation of existing experience and educational research of different types of software packages use are pro-posed. The general model of formation and development of the cloud-based learning and research environment of educational personnel training is substantiated. The reasonable ways of methods selection on the basis of the proposed model are considered and the prospects for their use in educational systems of higher education are described. The analysis and assessment of the prospects of the cloud-based educational and research environment development is fulfilled.

11:25
СoCalc as a Learning Tool for Neural Network Simulation in the Special Course “Foundations of Mathematic Informatics”
SPEAKER: Maiia Popel

ABSTRACT. The role of neural network modeling in the learning сontent of special course “Foundations of Mathematic Informatics” was discussed. The course was developed for the students of technical universities – future IT-specialists and directed to breaking the gap between theoretic computer science and it’s applied applications: software, system and computing engineering. CoCalc was justified as a learning tool of mathematical informatics in general and neural network modeling in particular. The elements of technique of using CoCalc at studying topic “Neural network and pattern recognition” of the special course “Foundations of Mathematic Informatics” are shown. The program code was presented in a CofeeScript language, which implements the basic components of artificial neural network: neurons, synaptic connections, functions of activations (tangential, sigmoid, stepped) and their derivatives, methods of calculating the network`s weights, etc. The features of the Kolmogorov’s theorem application were discussed for determination the architecture of multilayer neural networks. The implementation of the disjunctive logical element and approximation of an arbitrary function using a three-layer neural network were given as an examples. According to the simulation results, a conclusion was made as for the limits of the use of constructed networks, in which they retain their adequacy. The framework topics of individual research of the artificial neural networks is proposed.

11:50
The Design and Evaluation of the Cloud-Based Learning Components on the basis of the Systems of Computer Mathematics

ABSTRACT. In the article the problems of the systems of computer mathematics (SCM) using as a tool to support the learning and research activities of the students in the fields of informatics and mathematics are investigated. The role of SCM in the process of bachelors of informatics training and special aspects of pedagogical applications of these systems in the operations research study are defined. The article highlights the promising ways of providing access to the mathematical software in higher educational institutions. The cloud-based learning component with the use of Maxima system is described and evaluated. The results of pedagogical experiment are provided. The analysis and evaluation of existing experience of mathematical software use both in local and cloud-based settings is proposed.

12:10
The group methodology of using cloud technologies in the training of future computer science teachers
SPEAKER: unknown

ABSTRACT. The development of cloud computing resources and their implementation in university education require an increase in the ICT-competence of future computer science teachers. The article considers the use of project method as an effective tool of encouraging students’ cooperation while solving practical problems and as a means of developing their essential professional skills. The authors suggest using private and public cloud technologies to support the implementation of group methodology in the teaching process. One of such technologies is academic cloud based on the Apache CloudStack platform. This cloud environment is deployed in Physics and Mathematics Department of Ternopil V. Hnatiuk National Pedagogical University. The suggested method has been verified experimentally.

11:00-12:35 Session ITER-2: Fuzzy logic and neural networks in economics
Location: Assembly Hall
11:00
Electricity Price Forecasting A methodological ANN-based Approach with special Consideration of Time Series Properties

ABSTRACT. If one examines the spot price series of electrical power over the course of time, it is striking that the electricity price across the day takes a course that is determined by power consumption following a day and night rhythm. This daily course changes in its height and temporal extent in both, the course of the week, as well as with the course of the year. This study deals methodologically with non-linear correlative and autocorrelative time series properties of the electricity spot price. We contribute the usage of non-fully connectionist networks in relation to fully connectionist networks to decompose non-linear correlative time series properties. Additionally, we contribute the usage of long short-term-memory network (LSTM) to discover and to deal with autocorrelation effects.

11:25
High-Frequency Trade as a component of Algorithmic Trading: market consequences
SPEAKER: Nadiia Reznik

ABSTRACT. The paper discusses about influence of algorithmic trading on the stock exchanges. Speculates about high-frequency trade as a component of algorithmic trading, shows its advantages and disadvantages. Competently constructed methodology and technology of the game help to receive a profit without defeats. IT-technologies play one of the leading parts. The speed of any of the trading platforms and the wide spread of the Internet are essential and important factors in modern trade. Every second can become decisive in Internet-trading. Creating new, developing and improving existing Internet-technologies will surely lead to even greater mobilization of investors in the future. Traders should use server-based platforms to minimize technical failures. The biggest advantage of high-frequency trade and algorithmic trading is to cover weak sides of human, but it needs constant monitoring.

11:45
Neuro-Fuzzy Model of Development Forecasting and Effective Agrarian Sector Transformations of Ukraine

ABSTRACT. Research goals and objective: to predict the economic dynamics of the synergetic transformation model of Ukrainian agrarian sector using a neural network on fuzzy data. The object of research: Neuro-Fuzzy Model of Economic Forecasting. The subject of research: forecasting the economic dynamics of the synergetic transformation model of Ukrainian agrarian sector using a neural network on fuzzy data. Research Methods are neuro model, fuzzy logic, assessment of the risk of Voronov and Maksimov. Results of the research: We can say that the risk of this forecast, predicted by the neural network, is "very low", we can definitely trust the forecast, and the risk is calculated by the equation of the neuroregression "low", which indicates that we can trust the forecast, but with caution and further monitoring.

12:10
Universal Direct Analytic Models for the Minimum of Triangular Fuzzy Numbers

ABSTRACT. This paper reveals the analytic models for the results of fuzzy arithmetic op-erations, in particular, minimum of fuzzy sets. Special attention is paid to the synthesis of the universal direct models for minimum of triangular fuzzy numbers with different relations between their parameters. Furthermore, we present the components of the universal library of the resulting direct models for various combinations of the triangular fuzzy numbers masks. Modeling results confirm the efficiency of the proposed soft computing models for re-al-time fuzzy information processing.

11:00-12:30 Session RMSE-2: Theoretical Aspects of Rigorous Methods in Software Engineering
Location: Chinese Room
11:00
On the Sequence Rule for the Floyd-Hoare Logic with Partial Pre- and Post-Conditions

ABSTRACT. Classical Floyd-Hoare logic is valid when total pre- and post-conditions are considered. In the case of partial conditions (predicates) the logic becomes invalid. This situation may be corrected by introducing additional constraints for the rules of the logic. But such constraints, especially for the sequence and while rules, are rather complicated. In this paper we propose a new simpler sequence rule formulated in an extended program algebra. The same considerations also allow to reformulate the while rule.  The obtained results can be useful for software verification.

11:30
Toward Synthesis of Event-Pattern Detectors for Event Complex Processing with Using Machine Learning

ABSTRACT. The tendency to expand the use of event-driven architecture leads to the need to improve the efficiency of designing components of such systems, in particular, event-pattern detectors. Authors of the paper propose to use machine-learning to automate designing processes of event-pattern detectors. For substantiating their opinion, the authors conducted a series of computer experiments, showing that the idea is not groundless. Summing up, the authors draw attention to the issues that require further research aimed at creating information technology for the synthesis of event-pattern detectors.

12:00
Category Methods for Analysis of Two Approaches to Modelling Logical Time Based on Concept of Clocks
SPEAKER: unknown

ABSTRACT. This paper continues the study that has been begun in the series of authors' papers and has devoted to clarifying the interconnection between denotational and operational approaches for modelling logical time based on the concept of logical clocks. In the paper, a new category, namely the category of schedules, has introduced. The original definition of a morphism of schedules precedes to introducing this category. Refinement of a number of results of previous papers made it possible to establish the functorial nature of the method of associating the linear clock structure with a schedule and to prove that the corresponding functor determines the equivalence of the category of schedules and the category of linear clock structures.

11:00-12:30 Session TheRMIT-2: Software and Clouds Reliability and Security

12.20 – 12.30. Discussion

Location: 56
11:00
Information Technology of Evaluating the Sufficiency of Information on Quality in the Software Requirements Specifications

ABSTRACT. The paper presents the research of information flows at the early stages of the software development lifecycle on the subject their impact on the expected level of software quality. The result of the research is the identification of the problem of evaluating the sufficiency of information on quality in the software requirements specifications (SRS), and the development of information technology that addresses this problem. Information technology is based on the use of standards ISO 25010, ISO 25023 for the development of set-theoretical and ontological models of software quality. During the use of this information technology, the developers receive: the assessment of the sufficiency of information on quality in the SRS; request about the complement of the SRS with the necessary information with the purpose to increase the sufficiency of the volume of information on quality. The use of ontologies provides the automation of the processes of forming the requests for the complement of requirements, which reduces the subjective influence of professionals and preserves their experience and knowledge in the software company.

11:20
Availability as a Cloud Service for Control System of Critical Energy Infrastructure

ABSTRACT. The increasing of energy consumptions and attempts to use Management and Control System based on cloud computing technologies for ensuring normal work of the critical energy infrastructure (CEI) are made serious demands for analyzing Infrastructure as a Service (IaaS) Cloud availability level. In this paper, a new perspective unified platform for determining of availability level of the IaaS Cloud pertaining to the information components of the CEI is described. In fact Semi-Markov Modeling Process for assess of overall availability level of the IaaS Cloud with multiple pools of physical and virtual machines based on a novel Availability as a Cloud Service platform in order to improve effectiveness of CEI was presented by authors.

11:40
Model of information and control systems in smart buildings with separate maintenance by reliability and security

ABSTRACT. This article presents the information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Markov models. Markov model is used to develop number of strategies which help to recover system and elimination all the possibility threat, during life of systems. Strategies of developing Markov models for describing the recovery of system components after an attack or a software failure are discussed. The use of Markov models is usually justified by the customer's requirements for a specific criterion for assessing the quality of the system.

12:00
Synthesis of a Quite Proof Cryptosystem with Increased Unicity Distance for Cloud Computing
SPEAKER: unknown

ABSTRACT. Modern cryptosystems have a narrow application area, mainly because of a strict restriction of overrunning during the encryption of so-called unicity distance for the key. It is possible to essentially increase the unicity distance by using a synthesis of a constructed/artificial/planned language in the application area, where an alphabet of a high dimension is used. There was made a synthesis of highly secured cryptosystem. It has such feature as the security of text information with an increased unicity distance. This distance is set into a tabular form which assumes that this text information is taken from the thesaurus of predefined application area. There were gotten mathematical expressions that display the procedure of the encryption and decryption. There were considered the features of construction of the generator of pseudorandom sequences. Also there was defined the level of security of the cryptosystem with a different levels of resource capabilities of the. There was given a graph of correlation between the indicator of security and the code length of the encryption key. There were also defined the conditions of providing a necessary security regime in cloud systems.

12:30-14:00Lunch Break
13:30-15:30 Session ITER-3: Computational Economics and Economic Modeling
Location: Assembly Hall
13:30
Methods of nonlinear dynamics and the construction of cryptocurrency crisis phenomena precursors

ABSTRACT. This article demonstrates the possibility of constructing indicators of critical and crisis phenomena in the volatile market of cryptocurrency. For this purpose, the methods of the theory of complex systems such as recurrent analysis of dynamic systems and the calculation of permutation entropy are used. It is shown that it is possible to construct dynamic measures of complexity, both recurrent and entropy, which behave in a proper way during actual pre-crisis periods. This fact is used to build predictors of crisis phenomena. On the example of the main five crises recorded in the time series of the key cryptocurrency bitcoin, the effectiveness of the proposed indicators-precursors of crises.

13:55
Еconomic Modeling Of Energy Security: Simulation Of Economic Processes (Case Of Ukraine Gas System)

ABSTRACT. The paper considers issues of ensuring energy security in Ukraine. The first part of the paper is devoted to the analyses of the existing threats to energy security and the possibilities of guaranteeing this security. It was shown that the current level of energy security is unsatisfactory, which poses a real threat to the economic and national security of Ukraine. One of the most important elements of ensuring energy security in Ukraine is the production, import, and distribution of natural gas. Therefore, the second part of the paper provides a detailed statistical analysis of the natural gas supply in Ukraine. Based on economic-mathematical approaches, forecasts for state production, import and transit of gas for 2018-2020 are calculated. With the help of cluster analysis, the clusterization of regions of Ukraine by the energy security level was made in the third section. We received 5 clusters according to the levels of gas supply: the highest, high, average, low and destabilized (the level of sharp decline in natural gas consumption, due to the influence of political and economic factors). It was concluded that the government should carefully and transparently approach the negotiation processes with other states interested in joint projects for the extraction and supply of oil and gas to Ukraine.

14:20
Data Analysis of Private Investment Decision Making Using Tools Of Robo-Advisers in Long-Run Period

ABSTRACT. The most popular automated systems are robo-advice services which have the mathematical algorithm based on the main principles of consumption-savings theories. The purpose of this paper is to describe data analysis of private investment decision making using developed tool of robo-advisers in long-run period. We considered consumption-saving ratio in economics, emerging trends of robo-advice (RA) services for making investment decisions. SWOT-analysis of robo-advice services and comparative characteristics of robo-advisers explain advantage of RA services. We also developed mathematical model of robo-advisor in a long-run period and described support of investment decision making in long-run period via software module of robo-advisor. The task assignment of developed IT service is to maintain a constant level of client’s consumption during life-long period through automated analysis of how much he/she has to consume and save each year. Results of consumption and savings proposals can be modified if initial financial data changes.

14:45
Bitcoin Response to Twitter Sentiments

ABSTRACT. The paper investigates the Bitcoin exchange rate response to the daily twitter data. Sentiment score is computed for the number of obtained tweets. The prediction accuracy for Bitcoin exchange rate employing the sentiment score reveals the influence of Twitter social network on the news diffusion and target exchange rate volatility. We used the historical data on Bitcoin exchange rate and the daily sentiment score of the pertinent tweets to forecast the direction of change for Bitcoin. The results show better performance of the developed forecasting method with both historical data on exchange rate and sentiment score than using only the exchange rate data as input.

15:05
Modeling the social and human capital factors effect on the cross-country income differences

ABSTRACT. The paper is devoted to the investigation the effect of social and human capital factors on the cross-country income differences among countries that have similar with Ukraine income levels based on the economic and mathematical models construction. It was constructed four panel data models to estimate the effect of human capital accumulation on cross-country income differences. To study the influence of social factors on the dynamics of gross national income per capita of the countries and the causes of its volatility it was constructed the panel vector autoregression model.

14:00-15:30 Session 3L-Person-3: STEM
Location: 18
14:00
Model of professional retraining of teachers based on the development of STEM competencies
SPEAKER: Olga Barna

ABSTRACT. The article describes a methodology for organizing lifelong learning, professional retraining of teachers in STEM field and their lifelong learning in Volodymyr Hnatiuk Ternopil National Pedagogical University (Ukraine). It analyzes foreign and domestic approaches and concepts for the implementation of STEM in educational institutions. A model of retraining teachers in the prospect of developing their STEM competencies and a model of STEM competencies were created. The developed model of STEM competencies for professional teacher training and lifelong learning includes four components (Problem solving, Working with people, Work with technology, Work with organizational system), which are divided into three domains of STEM competencies: Skills, Knowledge, Work activities. In order to implement and adapt the model of STEM competencies to the practice of the educational process, an experimental study was conducted. The article describes the content of the scientific research and the circle of respondents and analyzes the results of the research

14:25
Experience of Foundation STEM-School

ABSTRACT. The development of artificial intelligence systems in the near future will lead to a reduction in routine, template work. The toolkit changes in most professions. There is a need for a quick retraining of a specialist and the use of computer systems. Nowadays, separate devices and systems have been created that can solve some of the problems that appear in everyday life. Therefore, STEM education is one of the directions that is in demand in society. During last few years in Ukraine there has been a rapid increase in the number of technical groups – robotics and programming. All of them are different of organization, types of classes, target audience. We made an effort to summarize the information received on this issue. In this article we analyze the situation on the market of educational services of the STEM-direction in Ukraine and in other countries, consider the existing technical and methodological support of STEM-education, as well as the experience of creating a STEM-school based on the post-graduate education center of Kherson State University. We describe the steps needed to create such a structure, its place in the educational system. Also we describe the experience of developing the material for the development of curricula, a series of events that promote the attraction of researches, and the introduction of digital technologies in the educational process.

14:50
Cognitive abilities' research technology as a tool for STEM-education

ABSTRACT. The paper discusses an experience to develop and use research ICT for STEM education with involving high school students into different projects, namely to study cognitive abilities variance over month. Experimental research was carried out in after school time with volunteers who performed series of cognitive tests of predefined type 2 or 3 days per week with registering physiological indices, as well as indices of solar physics, namely solar wind. Real new scientific results were obtained and are discussed.

15:10
Scheduling Algorithms Exploring via Robotics Learning

ABSTRACT. The new approach to schedule-related problems learning with use of robotics is reported. The materials are based on the authors' teaching experience within framework of Robotics School at Kryvyi Rih State Pedagogical University. The proposed learning problem may be used both for scheduling algorithms exploring and robotics competitions.

14:00-15:30 Session DSEDU-1: Data Science Education: Teaching methodologies and program development

The first part of DSEDU Workshop - two talks: a Keynote and a Contributed Paper.

Location: Chinese Room
14:00
Challenge-based learning in Computational Biology and Data Science

ABSTRACT. Data Science is an interdisciplinary field devoted to extract knowledge from large amounts of data. There is a great variety of programs that address the teaching of this field with a growing demand of professionals. However, data science pedagogy tends to emphasize general aspects of data and the use of tools instead of the its scientific dimension. This position paper describes an ongoing educational innovation project for the use of the Challenge-based Learning approach to teach and learn Data Science. In this approach, students work on solving complex and real world problems while the learning is obtained by iterating through three main phases: engage, investigate, and act.

14:45
Architecting Data Science Education

ABSTRACT. Data scientists are currently among the most demanded professionals in many spheres, including industries, governments, public sector, among others. This is due to several good reasons. Probably an important one of those reasons is the growing demand to find proper ways to face the challenges of establishing data-driven economies and societies. As academics and educationalists, but also Data Science professionals, we look at how to bring up this kind of specialists such that to meet the current shortages but also mid-term demands. In this position pa-per we deliberate about how to architect thematically, didactically, and organiza-tionally a university program under the thematic umbrella of Data Science. We focus on the selection of learning units or disciplines to be covered in order to produce the M.Sci. and Ph.D. graduates who will be ready to face the future chal-lenges in the mid-term perspective. We outline our recommendation on using learning tools and materials. We also concisely present the approach for stimulat-ing competitive and cooperative atmosphere in the class that stimulates intensive collective and individual learning. We recommend to reinforce an academic pro-gram by involving industrial partners intensively in the process. We ground our deliberation on our experience in implementing relevant M.Sci. and Ph.D. pro-grams in Data Science and Semantic Technologies.

14:00-15:30 Session TheRMIT-3: Industry and Transport Systems Reliability and Safety

15.15 – 15.30. Discussion

Location: 56
14:00
Reliability-Oriented Approach for UAV Flight Control System Structural Optimization

ABSTRACT. This paper presents a reliability-oriented approach for solving structural optimiza-tion problem for UAV flight control system. The system and its components reli-ability is used as the basis for taking optimum design decisions. The proposed optimization technique is based on improved reliability models for the system components and their fault-tolerant configurations. It enables in-creasing results certainty to find an optimum variant of flight control system structure with minimum expenditure of technical resources, meeting required reli-ability level, flight duration and regularity of operations, observing principal con-straints (weight, power consumption and overall cost), taking different mainte-nance and repair modes into consideration.

14:20
RAMS Issues in Hotels Management

ABSTRACT. The paper contains novel results obtained in area of cost effective hotel management based on qualitative analysis of Key Performance Indicators (KPIs). Five RAMS attributes (reliability, availability, maintainability, safety and security) and associated KPIs are considered as business critical. We also propose the new obtained Advanced Hotel Management Framework (AHMF) for case based business effectiveness assessment and assurance, as well as a taxonomy of KPIs for hotel management.

14:40
Comparative Reliability Analysis of Reactor Trip System Architectures: Industrial Case

ABSTRACT. The aim of this paper is to propose the approach to choosing the most reliable architecture of reactor trip system. The industrial case is based on the systems developed by the use of the platform «RadICS produced by RPC «Radiy». The two-channel three-chassis and three-channel two-chassis architectures were analyzed using their reliability block diagrams (RBDs). The results of analysis show that no architecture among the given ones can be unconditionally considered the most reliable. The choice of the best alternative in terms of reliability can be made using the formulae proposed in the given paper, which allow to take into account the reliabilities of the blocks of RBDs and the percents of common failures for certain types of elements. The analytical expressions for the mean of the advantage and the percent of superiority cases in terms of reliability were obtained for the considered architectures using the aforementioned formulae. The approach to searching the cases of maximal superiority in reliability for the analyzed architectures has been proposed. The aforesaid analysis can be conducted for an arbitrary pair of architectures represented by their RBDs.

15:00
Deterministic and Stochastic models of Decision making in Air Navigation Socio-Technical System

ABSTRACT. Air Navigation System is considering as a Socio-Technical System (STS). Analysis influences the factors of professional and non-professional activities on the decision-making. Modelling of bipolar choice of operator STS for using of reflexion theory. Optimization models of decision-making operators such as the deterministic, stochastic (uncertainty, risk); neural, Markov network models are presented. Behavioral models of Human-operator (H-O) activity are using especially in emergencies. Decision Support Systems of H-O in the emergencies has developed.

15:30-16:00Coffee Break
16:00-18:00 Session 3L-Person-4: ICT in Education and 3L Retraining
Location: 18
16:00
DEVELOPMENT OF RATING SYSTEMS FOR SCIENTOMETRIC INDICES OF UNIVERSITIES

ABSTRACT. Abstract- the article provides a brief overview of the most popular scientometric systems. In our opinion, information of university’s scientific activity should be presented in the rating form, which gives an opportunity to analyze development in different directions and changes. The key idea of the article is presenting of our experience in developing system of automatic construction of ratings of scientific organizations based on their scientometric indicators in Scopus and Google Scholar. The philosophy of the system is providing open data of different scientometric systems, and possibility to deploy our system in other organizations and customize it for individual goals and tasks.

16:20
Organization of independent studying of future bachelors in computer science within higher education institutions of Ukraine

ABSTRACT. Market demand for computer sciences experts and software developers is increasing day by day in Ukraine. Therefore, the requirements to the professional competence of technical universities graduates are increasing, which in its turn needs improvement of training forms and teaching methods aimed at creating a coherent system of education. Success in the training of information technology specialists depends on many factors, one of which is self-studying. Independent work skills and self-studying abilities make the most important point in continuous education. This strongly applies to programming students who have to see it as a basis for their education. This article features basic points of independent work organization of future bachelors of computer science taking into account current condition of Ukrainian universities development level. Increasing importance of independent work of future bachelors of computer science in technical universities requires improvement in organization of educational process, modernization of teaching and methodological documentation aimed at both effective independent work of programming students, and implementing new forms and methods of control and self-control. Types of independent studying as well as conditions for effective implementation of informational support of students' educational process for self-studies are determined. Emphasis is placed on students’ motivation for independent studying activities and organization of development of a positive attitude towards non-auditing work, especially for first year students.

16:40
Using Blippar Augmented Reality Browser in the Practical Training of Mechanical Engineers
SPEAKER: Andrii Striuk

ABSTRACT. The purpose of the study is to justify the expediency of using the Blippar augmented reality browser for professional and practical training of future mechanical engineers. Tasks of the research: to analyze the expediency of using augmented reality tools in the professional training of bachelors of applied mechanics; to carry out the selection of augmented reality tools, which is expedient to use in the training of future engineer mechanics; to develop educational materials using the chosen augmented reality tools. The object of the study is the professional training of future engineers-mechanics. The subject of the study is the use of the augmented reality tools in the professional training of bachelors of applied mechanics. The paper analyzes the relevance and expediency of the use of the augmented reality tools in the professional training of future engineers-mechanics.It is determined that the augmented reality tools will promote the development of ICT competence and graphic competence of bachelors of applied mechanics The model of the use of the augmented reality tools in the training of future mechanical engineers is proposed. As the main tool, the Blippar browser and Blippbuilder's cloud-based script development tool are chosen. An example of the creation of markers and scenes of augmented reality using the selected tools is given. The advantages and disadvantages of used tools are indicated. The proposed learning tools and methods can be applied to vocational and practical training of mechanical engineers.

17:00
Digital Competency of the Students and Teachers in Ukraine: Measurement, Analysis, Development Prospects

ABSTRACT. Professional fulfilment of the personality at the conditions of digital economy requires the high level of digital competency. One of the ways to develop these competencies is education. However, to provide the implementation of digital education at the high level, the digital competency of the teachers and students is a must. This paper presents explanations on the level determination of the digital competencies for teachers and students in Ukraine according to the DigComp recommendations. Here we provide methodology and the model of competency determination by means of survey and the results of the statistical analysis. On the basis of the obtained results, this paper suggests further research prospects and recommendations on the digital competency development in educational institutions in Ukraine.

17:20
Design and Development of MOOCs

ABSTRACT. Massive open online courses (MOOCs) are the new additional dimension of education that allow to study online courses from different universities geographically located anywhere around the world. We consider the MOOC’s classification based on pedagogical approaches and product functionalities (cMOOC, xMOOC, quasi MOOC). We present diagrams of the planning, prior preparation and the development of the MOOC. There are four stages of the process: preproduction, production, postproduction and maintenance. We present the typical roadmap of MOOC development: guidelines to develop course content, video content implementation, and development of roles. We introduce as example the video content matrix of the quasi-MOOC “Ruby on Rails Web Framework for Beginners”. We recommend the following roles for the MOOC development team: experts, curriculum designers and technical specialists. This set of roles needs for effective design of MOOC.

17:40
Practical Realization of English Knowledge Control of Future IT-Specialists Using Distance Learning

ABSTRACT. At teaching English for specific purposes (ESP) at the university, it is important to find the ways to increase students’ motivation for understanding the importance of learning the foreign language and how they might use the communication skills at professional activity. The model and its practical realization of English knowledge control of future software engineers in distance learning are performed. The designed model is based on task based learning and interdisciplinary connections of different cycle disciplines: “English for Special Purpose” and disciplines of the software cycle. The various types of control tasks and testing are realized using electronic-educational environment “Kherson Virtual University”. 

16:00-17:15 Session ITER-4: Evolutionary and Simulation Economics
Location: Assembly Hall
16:00
The determinants of trade credit for firms listed on the Zagreb Stock Exchange: An empirical analysis
SPEAKER: Fitim Deari

ABSTRACT. The paper examines the firm’s trade credit and its determinants, before and after financial crisis, for a sample of 26 non-financial firms listen on Zagreb Stock Exchange. Trade credit provided and trade credit obtained are the quantitative dependent variables. Profitability, cash to total assets ratio, long-term financing, short-term financing, converting sales into cash, and inventories to total assets ratio are the quantitative independent variables. Industry and time are used as qualitative independent variables. Some of the obtained results are: firms have hold on average a balance between trade credit provided and obtained; profitability, cash ratio and converting sales into cash were found to be statistically significant determinants of trade credit provided; cash ratio and short-term financing were found to be statistically significant determinants of trade credit obtained; more profitable firms and with higher level of cash have provided more trade credit then counterparties.

16:25
Implementation of Robo-Advisors Tools for Different Risk Attitude Investment Decisions

ABSTRACT. We researched how to use Machine Learning in the financial industry on the example of Robo-Advisors and how to define the basic functionality of Robo-Advisor. Implementation of Robo-Advisors based is based on analysis of the three most popular financial services such as Betterment, FutureAdvisor, and Motif Investing. Our research examines the main ways of using data mining in the financial sector, among them are fraud prevention; risk management; customer service; virtual assistant; network security; algorithmic trading; investment portfolio management, especially in the concept of constant living income for risk averse and risk seeking investors. We compared the functionality and capabilities of existing popular tools and formulate a list of key features. Using Markowitz model we prepared experiment of robo-advisor application for investors with different attitudes to risks. Results of our investigation proposed data processing automatization from open sources of cryptocurrencies.

16:50
Ukrainian Company Cost Accounting System Development from the Evolutionary Theory Position

ABSTRACT. Cost accounting system plays an important role in an enterprise managing. Our research is based on the demonstration of the transformations of the specific Ukrainian company cost accounting system on the way to implementing the business process management concept (BPM) and new generation of the BPMS / BPMT class (Business Process Management System / Tool) software in terms of the economic evolutionary theory provisions. Particular attention is paid to the influence of the modern organizational structure of the company built on the principle of flat networks, on the organization and cost accounting methodology.

16:00-18:00 Session TheRMIT-4: Cyber Security Models and Techniques

17.15 – 17.30. Discussion

17.30 – 17.45. Closing remarks

Location: 56
16:00
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks

ABSTRACT. To be secure, modern information and communication technology (ICT) needs reliable encryption. Symmetric cryptography combines encryption algorithms that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. These algorithms are used for confidentiality ensuring in different spheres but most of them are worn out and outdated. Modern encryption algorithms development is very actual task for ICT (up to date and next generation). In this paper to improve the security effectiveness of electronic information resources, two encryption algorithms have been developed based on fixed lookup tables with extended-bit depth and dynamic key-dependent lookup tables. The developed algorithms are at least two times faster than the previous national encryption standard and virtually secure to linear and differential cryptanalysis. Properties of random sequences formed using the proposed algorithms’ encryption (in counter mode) were explored in the environment of NIST STS statistical tests, according to which they passed an integrated control by mentioned tests with better results than other generators.

16:20
Automation System for Configuration of Cryptographic Data Protection Unit Model
SPEAKER: Ivan Zholubak

ABSTRACT. Elliptic curves are mathematical basis for digital signature processing. In this case, the processing of the elliptic curve points is based on the operations in the Galois fields GF(pm). Comparison of multipliers' hardware costs for Galois fields with different characteristics p is carried out in the work. The multipliers are intended for use as part of the cryptographic data protection system that is implemented on the FPGA. VHDL-descriptions of multipliers (cores) were created with the help of the developed core generator. It was found that hardware multipliers that process elements of the fields with characteristics 2, 3 and 7 ) and with approximately equal order and the representation of these elements in a polynomial basis have a lower hardware complexity than multipliers for Galois fields with other characteristics. Software complexity of multipliers for Galois fields GF(pm) with approximately equal order and the representation of these elements in a polynomial basis is also investigated. It was found that software multipliers that process elements of fields with characteristics 3, 5 and 7 have a higher time complexity than multipliers for Galois fields with other characteristics.

16:40
The Metamorphic Viruses’ Detection Technique Based On Its Obfuscation Features Analysis
SPEAKER: unknown

ABSTRACT. The paper presents an approach for the metamorphic viruses detection based on its obfuscation features analysis. The obfuscation features were obtained on the basis of the equivalent functional block search in the suspicious program and its modified version. The results of the research demonstrated that the efficiency of metamorphic viruses detection based on the proposed obfuscation quantitative features depends on the choice of the similarity metric at the stages of the search and the choice refinement of the equivalent functional blocks. The adequate choice of similarity metrics at both stages allowed increasing the detection efficiency of the metamorphic viruses.

17:00
DDoS botnet detection technique based on the use of the semi-supervised fuzzy c-means clustering
SPEAKER: unknown

ABSTRACT. A new technique for the DDoS botnet detection based on the botnets network features analysis is proposed. It uses the semi-supervised fuzzy c-means cluster-ing. The proposed approach includes the learning and the detection stages. Analysis is based on the extracted from the network traffic features that may in-dicate the presence of the DDoS botnets’ presence in the network. Experimental results demonstrated that the proposed technique ensures the DDoS botnet de-tection at the rate at about 95%.

17:15-19:15 Session ITER-5: Information Systems in Economics
Location: Assembly Hall
17:15
System-Dynamic Modeling of Information Influences and Co-Operations
SPEAKER: Vadym Shved

ABSTRACT. The questions of structural-functional and structural-dynamic modeling of information influences and counteractions in the economic sphere are considered. The basic models are presented in the form of a system of differential equations in the notation of system dynamics, as well as in the form of context and child DFD diagrams realized in accordance with SADT technology. Based on the developed hierarchical set of models, experiments have been implemented using the Anylogic simulation platform and real statistics on the practical activities of functioning business structures to promote goods and services in a competitive market environment. The structural-functional and structural-dynamic models of information influences and counteractions developed by the authors in the economic sphere have been successfully tested. A high degree of consistency of modeling results with empirical data is provided, which makes it possible to forecast, analyze, and manage various scenarios for the implementation of the corresponding processes.

17:40
The Concept of Benchmarking in Librarianship

ABSTRACT. In the research the adaptation of the benchmarking methodology for the study of information services is suggested. The types of benchmarking in the projection on librarianship are presented and discussed in detail. The ways of introduction of various types of it for improvement of processes and technologies of library work are offered. Scientific research provides the results of the initial stage of research in the declared direction. The benchmarking methodology was used for comparative analysis of information services provided by the university libraries in such leading countries as: USA, Canada, Australia, New Zealand.

18:05
Application of Medical Information Systems for the Implementation of Lean Technologies in the Management of Medical Institution

ABSTRACT. The article considers the principles of application of lean technologies for management of medical organization. It is shown that the introduction of medical information systems can improve the business processes of the clinic, increase patient satisfaction, availability of services, increase efficiency and eliminate temporary, financial and other losses. Specialized software for organization of logistic flows during medical examinations is presented. The article describes the experience of implementing the automation system of the medical institution within the framework of the target program "Digital economics of the Russian Federation". Among the results that can be achieved in the implementation of the approach, it is possible to identify a reduction in the waiting time for the patient to receive services, increasing patient satisfaction with the quality and timing of services, ensuring a balanced distribution of functional responsibilities between doctors and the average medical staff, as well as the restriction of staff functions within individual structural units (registry, clinical laboratory, etc.), optimization of in-formation flows, including improving the efficiency of the medical information system, elimination of duplication and excessive manual labor when entering medical information into an electronic medical record. The necessity of formation of doctors competences in the field of information technologies within the system of continuous medical education is also shown, the program of professional development on the basis of effective interaction of higher educational institution and practical health care is offered.

18:25
Auditing of the Software of Computer Accounting System
SPEAKER: Oksana Adamyk

ABSTRACT. The article is aimed at determining the order and methodology of auditing the software of the computer accounting system (CAS). It has been found that software auditing should be performed separately for each of its components. The components of the functional part of the CAS software are the database management system (DBMS) and the application software supporting the accountance automation. For auditing of the first component part are used such techniques as general evaluation, subject check of the embedded algorithms of information processing. Auditing the client software algorithms is carried out by means of the control data method, which is reduced to such procedures as creation of another database of test data with imaginary objects and its processing by the client program, as well as introduction in a copy of the real database of imaginary objects (employees, creditors, material values) and the formation of reporting. Not only the current methods of calculation or evaluation of accounting objects, but all of the software, are subject to mandatory verification. This will avoid errors if the enterprise accounting policy changes.

18:50
Integrated Information and Communication System as a Basis for Strategic Partnership in Agribusiness

ABSTRACT. The article is devoted to the study of the conditions for information and communication system (ICS) implementation into the practice of agribusiness management. ICS is proposed to be integrated on micro-, meso- and macrolevels by means of joint bases creating and modern geoinformation systems applying. Organizational and economic preparedness of agribusiness companies for the integrated ICS implementation is researched. There have been distinguished the seven factors which contain the appropriate combination of variables and substantiate the allocation of management influence priorities in the context of the integrated ICS implementation. It is assumed that the integrated ICS will make possible to provide the strategic partnership between agribusiness companies, public bodies and society. The integrated ICS could also serve as a basis for consolidated strategic planning in agribusiness.

18:00-18:15 Session Hasta Luego: A short informal gathering to exchange opinions about the workshops

This is not a real session but just a short informal gathering to exchange opinions about the workshops. We will also be happy to wish a very good evening to each other and say "See you tomorrow", which is "Hasta Luego".in Spanish.

Location: 112