Issue 2 (212), article 5

DOI:https://doi.org/10.15407/kvt212.02.080

Cybernetics and Computer Engineering, 2023, 2(212)

FAINZILBERG L.S.1,2 DSc. (Engineering), Professor,
Chief researcher of Intelligent Automatic Systems Department1,
Professor of the Department of Biomedical Cybernetics2,
https://orcid.org/ 0000-0002-3092-0794,
e-mail: fainzilberg@gmail.com

KHARCHENKO A.R.2,
Student Faculty of Biomedical Engineering,
e-mail: kharchenko.anastasia@lll.kpi.ua

1 International Research and Training Center for Information Technologies
and Systems of the National Academy of Sciences of Ukraine
and Ministry of Education and Science of Ukraine,
40, Acad. Glushkov av., Kiyv, 03187, Ukraine

2 National Technical University of Ukraine
“Ihor Sikorsky Kyiv Polytechnic Institute»
37, Peremogy av., Kiyv, 03056, Ukraine

REMOTE MONITORING OF HEARING FROM THE POSITION OF PERSONALIZED MEDICINE

Introduction. At the current stage of society’s development, an increasing number of people suffer from hearing loss. Hearing plays an important role in the combat fitness of the military. Hearing loss can be prevented by regular testing. But in field conditions, it is impossible to conduct an audiometric study based only on standard methods.

The purpose of this paper is the development of methods for hearing loss evaluation based on tonal threshold audiometry using the client-server system, which provides remote communication between a patient and a doctor.

Methods. To check the hearing ability, the results of the current audiogram are compared with the users personal norm. In case of deviation from the norm the doctor is notified. He uses this information system to adjust the treatment.

Results. Developed information technology provides the opportunity of remote monitoring of the hearing condition and correction of treatment. It is demonstrated that the determination of the patient’s personal norm can be carried out by calculating the median from the user’s audiograms obtained with a smartphone and head phones.

Conclusions. The information system, which ensures the implementation of the proposed procedures, can be used on a mid-range smartphone running the Android operating system.

Keywords: audiogram, population and personal hearing norms, client-server information technology.

Download full text!

REFERENCES
1 World Health Organization. Hearing screening considerations for implementation. 54 p.

2 Larry Medwetsky. Understanding the Fundamentals of the Audiogram. So What?. Convention “Hearing Loss Association of America”. URL: https://www.hearingloss.org/wp-content/ uploads/HLM_JulAug2014_LarryMedwetsky_Audiogram1.pdf?pdf=2014-hlm-ja-lmedwetsky.

3 National Health and Nutrition Examination Survey (NHANES). Audiometry procedures manual. 2003. 111 p.

4 Varfolomieiev, A., Lysenko, O. An improved algorithm of median flow for visual object tracking and its implementation on ARM platform. Jourmal Real-Time Image Process. 2016. 11. pp. 527-534.
https://doi.org/10.1007/s11554-013-0354-1

5 Bisgaard, Nikolai & Vlaming, Marcel & Dahlquist, Martin. Standard Audiograms for the IEC 60118-15 Measurement Procedure. Trends in amplification. 2010. No. 14. pp. 113-20.
https://doi.org/10.1177/1084713810379609

6 Lin, Y., Abdulla, W.H. Principles of Psychoacoustics. In: Audio Watermark. Springer, Cham. 2015.
https://doi.org/10.1007/978-3-319-07974-5

7 “AURORA Hearing Rehabilitation Center” LLC Medical Center. Audiogram – what is it?. URL: https://aurora.ua/articles/audiohrama-shcho-tse-take/. (in Ukrainian).

8 Health and Safety Authority (HSA). Guidelines on Hearing Checks and Audiometry Under the Safety, Health and Welfare at Work (General Application) Regulations 2007, Control of Noise at Work. 2007.

9 Paul J. Govaerts. Audiometric Tests and Diagnostic Workup. 2003. pp. 33-48.
https://doi.org/10.1201/9780203913062.ch2

10 Soer M. Pure tone audiometry. Open access guide to audiology and hearing aids for otolaryngologists. 2014.

11 Occupational Safety and Health Administration (OSHA). Hearing Conservation. 2002.

12 Bright K., Eichwald J., Hall J. and al. Childhood Hearing Screening. American Academy of Audiology. 2011.

13 Stavrakas M., Kyriafinis G., Tsalighopoulos M. Diagnosis and Evaluation of hearing loss. Digital Tools for Computer Music Production and Distribution. Hershey, PA: IGI Global. 2016. pp. 31-50.
https://doi.org/10.4018/978-1-5225-0264-7.ch002

14 Minnesota department of health. Hearing Screening Training Manual. 2022.

15 Lysenko O. M. Portable multifunctional system of objective auditory screening based on modern DSP and “network-on-crystal” technologies. Science and innovation of KPI named after Igor Sikorsky. 2014. (in Ukrainian).

16 Melo I., Silva A., Camargo A. and al. Accuracy of smartphone-based hearing screening tests: a systematic review. Systematic Review. SciELO. 2021. No 34.
https://doi.org/10.1590/2317-1782/20212020380

17 Potgieter J., Swanepoel W., Myburgh H. and al. Development and validation of a smartphone-based digits-in-noise hearing test in south african english. International Journal of Audiology. 2016. No 55.
https://doi.org/10.3109/14992027.2016.1172269

18 Leonidas A., Paulina T., Ruben C., Altamirano C, Sebastian F.. Methods used in mobile applications for the diagnosis of hearing loss: A systematic mapping study. KnE Engineering. 2020. pp. 89-107.

19 Sousa K., Swanepoel W., Moore D., Smits C. A Smartphone National Hearing Test: Performance and Characteristics of Users. American Journal of Audiology. 2018. No 27. pp. 448-454.
https://doi.org/10.1044/2018_AJA-IMIA3-18-0016

20 Khazan A., Luberadzka D., Rivilla D. and al. Home-Based Audiometry With a Smartphone App: Reliable Results?. American Journal of Audiologia. 2021. No 31. pp. 914-922.
https://doi.org/10.1044/2022_AJA-21-00191

21 Yesantharao L., Donahue M., Smith A. and al. Virtual audiometric testing using smartphone mobile applications to detect hearing los. Investigative Otolaryngology. 2002.
https://doi.org/10.1002/lio2.928

22 Mahomed-Asmail F., Swanepoel W.. Mobile phone audiometry. Open access guide to audiology and hearing aids for otolaryngologists. 2013.

23 Patel K., Thibodeau L., McCullough D. and al. Development and Pilot Testing of Smartphone-Based Hearing Test Application. International Journal of Environmental Research and Public Health. 2021.
https://doi.org/10.3390/ijerph18115529

24 MWM Mustafa. High-Rated Hearing Test Android Mobile Applications: Are they Appropriate for Action?. Otolaryngology Open Access Journal. 2022. No 7.
https://doi.org/10.23880/ooaj-16000249

25 Bright T., Pallawela T. Validated Smartphone-Based Apps for Ear and Hearing Assessments: A Review. JMIR Rehabilitation and assistive technologies. 2016. No 2.
https://doi.org/10.2196/rehab.6074

26 Fainzilberg L.S. Generalized Approach to Building Computer’s Tools of Preventive Medicine for Home Using. International Scientific Technical Journal “Problems of Control and Informatics”. 2022. No 1. pp. 136-158.
https://doi.org/10.34229/1028-0979-2022-1-12

27 Mazur G. Digital Multimeter Principles. American Technical Publishers. 2010. 182 p.

28 Wang, M., Ai, Y., Han, Y. et al. Extended high-frequency audiometry in healthy adults with different age groups. Journal of Otolaryngology – Head & Neck Surg. 2021. No 50.
https://doi.org/10.1186/s40463-021-00534-w

29 Fainzilberg L., Kharchenko A. Determination of the Personal Hearing Standard in the Audiometer on a Smartphone. Proceedings of XI International Scientific and Practical Conference “Modern Scientific Research: Achievements, Innovations and Development Prospects” (Berlin, April 24-26, 2022). Berlin, Germany: MDPC Publishing, 2022, pp. 33-39.

Received 03.04.2023

Issue 2 (212), article 4

DOI:https://doi.org/10.15407/kvt212.02.052

Cybernetics and Computer Engineering, 2023, 2(212)

PANAGIOTIS KATRAKAZAS1, Ph.D.,
Research Area Manager,
ORCID 0000-0001-7433-786X,
e-mail: p.katrakazas@zelus.gr

THEODORA KALLIPOLITOU1,
Delivery Manager & Sustainability Expert,
ORCID 0000-0001-5059-4909,
e-mail: d.kallipolitou@zelus.gr

LEONIDAS KALLIPOLITIS2,
Chief Technology Officer,
ORCID 0000-0002-5689-298X,
e-mail: lkallipo@aegisresearch.eu

ILIAS SPAIS2, Ph.D.,
Senior Project Manager,
Researcher ID: 0000-0002-6167-3247,
e-mail: hspais@aegisresearch.eu

1Zelus P.C.,
Tatoiou 92, 14452, Metamorfosi, Athens, GR

2AEGIS IT Research GmbH,
25 Humboldt Str. Braunschweig, 38106, Germany

ANALYSIS AND DEFINITION OF NECESSARY MECHANISMS
TO ENSURE THE SECURITY AND PRIVACY OF DIGITAL HEALTH DATA UNDER A CYBERNETIC DIGITAL INVESTIGATION FRAMEWORK

Introduction: The recent scale-up of events caused after the Covid-19 pandemic and its subsequent healthcare crisis, highlights the digital forensics importance in a connected health ecosystem. It is therefore safe to assume that there is a growing interest in digital forensics and how they are applied within the existing healthcare ecosystem and under which concept, posing the main research question of the current study.

The purpose of the paper is to presente here focuses on defining and developing the necessary mechanisms to ensure the security and privacy of the data disseminated by existing research in both fields of digital health and cybersecurity. A cybernetics-inspired framework is structured based on existing practices and key gaps identified.

Results: Five electronic databases, namely Scopus, IEEEXplore, PubMed, DOAJ (Directory of Open Access Journals and arXiV were identified as the main data sources. A State-of-the-Art analysis has been performed to realize the limits of the devices and the machines (including the systems and their elements involved) in the healthcare domain, when these break down so that the investigation will teach us something new that is nontrivial. A highly relevant dimension in our approach for a digital forensics driven connected health landscape is based on rigorous and comprehensive feedback take-off methods, which are seemingly lacking.

Conclusion: The main point of our study is to show that while there might seem an immense multiplicity, a unity can be formulated and vice versa: where something appears as a unit, an unbounded plurality of conditions might be enclosed within it. Moving into a connected health future should be built upon existing accidents so as to mark the upcoming changes that would affect such a system.

Keywords: digital forensics, connected health, cybernetic digital investigation framework, cybersecurity.

Download full text!

REFERENCES
1. K. Colorafi, ‘Connected health: a review of the literature’, mHealth, vol. 2, p. 13, Apr. 2016,
https://doi.org/10.21037/mhealth.2016.03.09

2. C. Kuziemsky, R. M. Abbas, and N. Carroll, ‘Toward a Connected Health Delivery Framework’, in 2018 IEEE/ACM International Workshop on Software Engineering in Healthcare Systems (SEHS), May 2018, pp. 46-49.
https://doi.org/10.1145/3194696.3194703

3. C. S. Pattichis and A. S. Panayides, ‘Connected Health’, Front. Digit. Health, vol. 1, p. 1, 2019,
https://doi.org/10.3389/fdgth.2019.00001

4. C. Horan and H. Saiedian, ‘Cyber Crime Investigation: Landscape, Challenges, and Future Research Directions’, J. Cybersecurity Priv., vol. 1, no. 4, Art. no. 4, Dec. 2021,
https://doi.org/10.3390/jcp1040029

5. S. Kumar, A. K. Bharti, and R. Amin, ‘Decentralized secure storage of medical records using Blockchain and IPFS: A comparative analysis with future directions’, Secur. Priv., vol. 4, no. 5, p. e162, 2021,
https://doi.org/10.1002/spy2.162

6. N. J. Podlesny, A. V. D. M. Kayem, and C. Meinel, ‘Towards Identifying De-anonymisation Risks in Distributed Health Data Silos’, in Database and Expert Systems Applications, Cham, 2019, pp. 33-43.
https://doi.org/10.1007/978-3-030-27615-7_3

7. A. Adel, ‘A Conceptual Framework to Improve Cyber Forensic Administration in Industry 5.0: Qualitative Study Approach’, Forensic Sci., vol. 2, no. 1, Art. no. 1, Mar. 2022,
https://doi.org/10.3390/forensicsci2010009

8. M. J. Page et al., ‘The PRISMA 2020 statement: an updated guideline for reporting systematic reviews’, BMJ, vol. 372, p. n71, Mar. 2021.

9. A. Shaaban and N. Abdelbaki, ‘Comparison Study of Digital Forensics Analysis Techniques; Findings versus Resources’, Procedia Comput. Sci., vol. 141, pp. 545-551, Jan. 2018.
https://doi.org/10.1016/j.procs.2018.10.128

10. K. Hovhannisyan, P. Bogacki, C. A. Colabuono, D. Lofù, M. V. Marabello, and B. E. Maxwell, ‘Towards a Healthcare Cybersecurity Certification Scheme’, Jun. 2021.
https://doi.org/10.1109/CyberSA52016.2021.9478255

11. P. Kieseberg, B. Malle, P. Frühwirt, E. Weippl, and A. Holzinger, ‘A tamper-proof audit and control system for the doctor in the loop’, Brain Inform., vol. 3, no. 4, Art. no. 4, Dec. 2016.
https://doi.org/10.1007/s40708-016-0046-2

12. J. Priisalu and R. Ottis, ‘Personal control of privacy and data: Estonian experience’, Health Technol., vol. 7, no. 4, pp. 441-451, Dec. 2017.
https://doi.org/10.1007/s12553-017-0195-1

13. G. Grispos, W. B. Glisson, and K.-K. R. Choo, ‘Medical Cyber-Physical Systems Development: A Forensics-Driven Approach’, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Jul. 2017, pp. 108-113.
https://doi.org/10.1109/CHASE.2017.68

14. J. King, ‘Measuring the forensic-ability of audit logs for nonrepudiation’, in 2013 35th International Conference on Software Engineering (ICSE), May 2013, pp. 1419-1422.
https://doi.org/10.1109/ICSE.2013.6606732

15. R. A. Nabha and H. Sbeyti, ‘Exploiting Vulnerabilities Of MRI Scanner Machine: Lebanon Case Study’, in 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2020, pp. 1-7.
https://doi.org/10.1109/ISDFS49300.2020.9116449

16. G. Grispos and K. Bastola, ‘Cyber Autopsies: The Integration of Digital Forensics into Medical Contexts’, in 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS), Jul. 2020, pp. 510-513.
https://doi.org/10.1109/CBMS49503.2020.00102

17. M. Savari, M. Montazerolzohour, and Y. E. Thiam, ‘Comparison of ECC and RSA algorithm in multipurpose smart card application’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 49-53.
https://doi.org/10.1109/CyberSec.2012.6246121

18. M. Savari, M. Montazerolzohour, and Y. E. Thiam, ‘Combining encryption methods in multipurpose smart card’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 43-48.
https://doi.org/10.1109/CyberSec.2012.6246120

19. M. Chernyshev, S. Zeadally, and Z. Baig, ‘Healthcare Data Breaches: Implications for Digital Forensic Readiness’, J. Med. Syst., vol. 43, no. 1, p. 7, Nov. 2018.
https://doi.org/10.1007/s10916-018-1123-2

20. V. Malamas, T. Dasaklis, P. Kotzanikolaou, M. Burmester, and S. Katsikas, ‘A Forensics-by-Design Management Framework for Medical Devices Based on Blockchain’, in 2019 IEEE World Congress on Services (SERVICES), Jul. 2019, vol. 2642-939X, pp. 35-40.
https://doi.org/10.1109/SERVICES.2019.00021

21. H. F. Atlam, A. Alenezi, M. O. Alassafi, A. A. Alshdadi, and G. B. Wills, ‘Security, cybercrime and digital forensics for IoT’, in Intelligent Systems Reference Library, Springer International Publishing, 2019.
https://doi.org/10.1007/978-3-030-33596-0_22

22. K. Kumari, S. Saha, and S. Neogy, ‘Cost Based Model for Secure Health Care Data Retrieval’, in Security in Computing and Communications, vol. 969, S. M. Thampi, S. Madria, G. Wang, D. B. Rawat, and J. M. Alcaraz Calero, Eds. Singapore: Springer Singapore, 2019, pp. 67-75.
https://doi.org/10.1007/978-981-13-5826-5_5

23. A. Bruno and G. Cattaneo, ‘Experimental Analysis of the Pixel Non Uniformity (PNU) in SEM for Digital Forensics Purposes’, in Pervasive Systems, Algorithms and Networks, vol. 1080, C. Esposito, J. Hong, and K.-K. R. Choo, Eds. Cham: Springer International Publishing, 2019, pp. 313-320.
https://doi.org/10.1007/978-3-030-30143-9_26

24. S. Bindahman, N. Zakaria, and N. Zakaria, ‘3D body scanning technology: Privacy and ethical issues’, in Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Jun. 2012, pp. 150-154.
https://doi.org/10.1109/CyberSec.2012.6246113

25. J. P. van Zandwijk and A. Boztas, ‘The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence?’, Digit. Investig., vol. 28, pp. S126-S133, Apr. 2019.
https://doi.org/10.1016/j.diin.2019.01.021

26. A. Azfar, K.-K. R. Choo, and L. Liu, ‘Forensic Taxonomy of Popular Android mHealth Apps’, ArXiv150502905 Cs, May 2015, Accessed: Oct. 26, 2021. Online. Available: http://arxiv.org/abs/1505.02905

27. Z. A. Alhaboby et al., ‘Understanding the Cyber-Victimisation of People with Long Term Conditions and the Need for Collaborative Forensics-Enabled Disease Management Programmes’, in Cyber Criminology, H. Jahankhani, Ed. Cham: Springer International Publishing, 2018, pp. 227-250.
https://doi.org/10.1007/978-3-319-97181-0_11

28. I. Baggili, J. Oduro, K. Anthony, F. Breitinger, and G. McGee, ‘Watch What You Wear: Preliminary Forensic Analysis of Smart Watches’, in 2015 10th International Conference on Availability, Reliability and Security, Aug. 2015, pp. 303-311.
https://doi.org/10.1109/ARES.2015.39

29. G. Grispos, T. Flynn, W. Glisson, and K.-K. R. Choo, ‘Investigating Protected Health Information Leakage from Android Medical Applications’, ArXiv210507360 Cs, May 2021, Accessed: Oct. 27, 2021. Online. Available: http://arxiv.org/abs/2105.07360

30. H. Chi, ‘Integrate mobile devices into CS security education’, in Proceedings of the 2015 Information Security Curriculum Development Conference, New York, NY, USA, Oct. 2015, pp. 1-4.

31. C. Hassenfeldt, S. Baig, I. Baggili, and X. Zhang, ‘Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications’, in Proceedings of the 14th International Conference on Availability, Reliability and Security, New York, NY, USA, Aug. 2019, pp. 1-12.
https://doi.org/10.1145/3339252.3340515

32. M. Akour, S. Banitaan, H. Alsghaier, and K. A. Radaideh, ‘Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers’, in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2019, pp. 1-7.
https://doi.org/10.1109/ISDFS.2019.8757487

33. T. Flynn, G. Grispos, W. B. Glisson, and W. Mahoney, ‘Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack’, Jan. 2020, Accessed: Oct. 31, 2021. Online. Available: https://shsu-ir.tdl.org/handle/20.500.11875/3199
https://doi.org/10.24251/HICSS.2020.791

34. S. Kim, W. Jo, J. Lee, and T. Shon, ‘AI-enabled device digital forensics for smart cities’, J. Supercomput., Jul. 2021.
https://doi.org/10.1007/s11227-021-03992-1

35. F. Hantke and A. Dewald, ‘How can data from fitness trackers be obtained and analyzed with a forensic approach?’, in 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Sep. 2020, pp. 500-508.
https://doi.org/10.1109/EuroSPW51379.2020.00073

36. Á. MacDermott, S. Lea, F. Iqbal, I. Idowu, and B. Shah, ‘Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches’, in 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Jun. 2019, pp. 1-6.
https://doi.org/10.1109/NTMS.2019.8763834

37. Y. H. Yoon and U. Karabiyik, ‘Forensic Analysis of Fitbit Versa 2 Data on Android’, Electronics, vol. 9, no. 9, Art. no. 9, Sep. 2020.
https://doi.org/10.3390/electronics9091431

38. S. Kang, S. Kim, and J. Kim, ‘Forensic analysis for IoT fitness trackers and its application’, Peer–Peer Netw. Appl., vol. 13, no. 2, pp. 564-573, Mar. 2020,
https://doi.org/10.1007/s12083-018-0708-3

39. M. Siddiqi, S. T. Ali, and V. Sivaraman, ‘Forensic Verification of Health Data From Wearable Devices Using Anonymous Witnesses’, IEEE Internet Things J., vol. 7, no. 11, pp. 10745-10762, Nov. 2020.
https://doi.org/10.1109/JIOT.2020.2982958

40. N. Rahman and M. Thariq, ‘A digital evidence taxonomy of m-health apps in iot environment’, Jun. 2020.

41. N. Phumkaew and V. Visoottiviseth, ‘Android Forensic and Security Assessment for Hospital and Stock-and-Trade Applications in Thailand’, in 2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE), Jul. 2018, pp. 1-6.
https://doi.org/10.1109/JCSSE.2018.8457347

42. Z. Zhou, A. Gaurav, B. B. Gupta, H. Hamdi, and N. Nedjah, ‘A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic’, Neural Comput. Appl., pp. 1-14, Sep. 2021.
https://doi.org/10.1007/s00521-021-06389-6

43. W. Zhuang, Y. Shen, L. Li, C. Gao, and D. Dai, ‘Develop an Adaptive Real-Time Indoor Intrusion Detection System Based on Empirical Analysis of OFDM Subcarriers’, Sensors, vol. 21, no. 7, Art. no. 7, Jan. 2021.
https://doi.org/10.3390/s21072287

44. C.-L. Hsu, W.-X. Chen, and T.-V. Le, ‘An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things’, Sensors, vol. 20, no. 22, Art. no. 22, Jan. 2020.
https://doi.org/10.3390/s20226471

45. N. H. N. Zulkipli, A. Alenezi, and G. B. Wills, ‘IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things’, presented at the 2nd International Conference on Internet of Things, Big Data and Security, Oct. 2021, pp. 315-324. Accessed: Oct. 27, 2021. Online. Available: https://www.scitepress.org/PublicationsDetail.aspx?ID=fpfedOeeepw=&t=1

46. L. Lao, Z. Li, S. Hou, B. Xiao, S. Guo, and Y. Yang, ‘A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling’, ACM Comput. Surv., vol. 53, no. 1, p. 18:1-18:32, Feb. 2020.
https://doi.org/10.1145/3372136

47. A. Kyaw, B. Cusack, and R. Lutui, ‘Digital Forensic Readiness In Wireless Medical Systems’, in 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Nov. 2019, pp. 1-6.
https://doi.org/10.1109/ITNAC46935.2019.9078005

48. A. K. Kyaw, Z. Tian, and B. Cusack, ‘Design and Evaluation for Digital Forensic Ready Wireless Medical Systems’, in IoT Technologies for HealthCare, vol. 314, N. M. Garcia, I. M. Pires, and R. Goleva, Eds. Cham: Springer International Publishing, 2020, pp. 118-141.
https://doi.org/10.1007/978-3-030-42029-1_9

49. Z. Wu, X. Qi, G. Liu, L. Fang, J. Liu, and J. Cui, ‘An extend RBAC model for privacy protection in HIS’, in 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Mar. 2018, pp. 1-6.

50. M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, and E. K. Markakis, ‘A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues’, IEEE Commun. Surv. Tutor., vol. 22, no. 2, pp. 1191-1221, 2020.
https://doi.org/10.1109/COMST.2019.2962586

51. A. Kumar and R. Kumar, ‘Privacy Preservation of Electronic Health Record: Current Status and Future Direction’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 715-739.
https://doi.org/10.1007/978-3-030-22277-2_28

52. X. Liu, X. Yuan, and J. Liu, ‘Towards Privacy-Preserving Forensic Analysis for Time-Series Medical Data’, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), Aug. 2018, pp. 1664-1668.
https://doi.org/10.1109/TrustCom/BigDataSE.2018.00247

53. E. Al Alkeem, C. Y. Yeun, and M. J. Zemerly, ‘Security and privacy framework for ubiquitous healthcare IoT devices’, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), Dec. 2015, pp. 70-75.
https://doi.org/10.1109/ICITST.2015.7412059

54. H. Qiu, M. Qiu, M. Liu, and G. Memmi, ‘Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0’, IEEE J. Biomed. Health Inform., vol. 24, no. 9, pp. 2499-2505, Sep. 2020.
https://doi.org/10.1109/JBHI.2020.2973467

55. P. Agbedanu and A. D. Jurcut, ‘BLOFF: A Blockchain based Forensic Model in IoT’, ArXiv210308442 Cs, pp. 59-73, 2021.
https://doi.org/10.4018/978-1-7998-7589-5.ch003

56. J. Yuan and Y. Tian, ‘Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset’, IEEE Trans. Cloud Comput., vol. 7, no. 02, pp. 568-579, Apr. 2019.
https://doi.org/10.1109/TCC.2017.2656895

57. I. Jayaraman and A. Stanislaus Panneerselvam, ‘A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud’, J. Ambient Intell. Humaniz. Comput., vol. 12, no. 5, pp. 4911-4924, May 2021.
https://doi.org/10.1007/s12652-020-01931-1

58. X. Feng, B. Onafeso, and E. Liu, ‘Investigating Big Data Healthcare Security Issues with Raspberry Pi’, in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Oct. 2015, pp. 2329-2334.
https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.344

59. X. Feng and Y. Zhao, ‘Digital Forensics Challenges to Big Data in the Cloud’, in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Jun. 2017, pp. 858-862.
https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.132

60. H. Nguyen et al., ‘Cloud-Based Secure Logger for Medical Devices’, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Jun. 2016, pp. 89-94.
https://doi.org/10.1109/CHASE.2016.48

61. A. Gehani, G. F. Ciocarlie, and N. Shankar, ‘Accountable clouds’, in 2013 IEEE International Conference on Technologies for Homeland Security (HST), Nov. 2013, pp. 403-407.
https://doi.org/10.1109/THS.2013.6699038

62. F. Khan, ‘A detailed study on Security breaches of Digital Forensics in Cyber Physical Systems’, in 2019 Sixth HCT Information Technology Trends (ITT), Nov. 2019, pp. 38-43.
https://doi.org/10.1109/ITT48889.2019.9075094

63. A. Abdullah, H. Kaur, and R. Biswas, ‘Universal Layers of IoT Architecture and Its Security Analysis’, in New Paradigm in Decision Science and Management, Singapore, 2020, pp. 293-302.
https://doi.org/10.1007/978-981-13-9330-3_30

64. J. Ibarra, H. Jahankhani, and J. Beavers, ‘Biohacking Capabilities and Threat/Attack Vectors’, in Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity, H. Jahankhani, S. Kendzierskyj, N. Chelvachandran, and J. Ibarra, Eds. Cham: Springer International Publishing, 2020, pp. 117-131.
https://doi.org/10.1007/978-3-030-35746-7_7

65. B. Rappert, H. Wheat, and D. Wilson-Kovacs, ‘Rationing bytes: managing demand for digital forensic examinations’, Polic. Soc., vol. 31, no. 1, pp. 52-65, Jan. 2021.
https://doi.org/10.1080/10439463.2020.1788026

66. V. Kisekka and J. S. Giboney, ‘The Effectiveness of Health Care Information Technologies: Evaluation of Trust, Security Beliefs, and Privacy as Determinants of Health Care Outcomes’, J. Med. Internet Res., vol. 20, no. 4, p. e107, Apr. 2018.
https://doi.org/10.2196/jmir.9014

67. V. Kisekka, S. Goel, and K. Williams, ‘Disambiguating Between Privacy and Security in the Context of Health Care: New Insights on the Determinants of Health Technologies Use’, Cyberpsychology Behav. Soc. Netw., vol. 24, no. 9, pp. 617-623, Sep. 2021.
https://doi.org/10.1089/cyber.2020.0600

68. J. A. Hodges, ‘Forensically reconstructing biomedical maintenance labor: PDF metadata under the epistemic conditions of COVID-19’, J. Assoc. Inf. Sci. Technol., Apr. 2021.
https://doi.org/10.1002/asi.24484

69. S. Karakus and E. Avci, ‘Application of Similarity-Based Image Steganography Method to Computerized Tomography Images’, in 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Jun. 2019, pp. 1-4.
https://doi.org/10.1109/ISDFS.2019.8757521

70. J. Dalins, Y. Tyshetskiy, C. Wilson, M. J. Carman, and D. Boudry, ‘Laying foundations for effective machine learning in law enforcement. Majura – A labelling schema for child exploitation materials’, Digit. Investig., vol. 26, pp. 40-54, Sep. 2018.
https://doi.org/10.1016/j.diin.2018.05.004

71. K. C. Seigfried-Spellar, ‘Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations’, J. Police Crim. Psychol., vol. 33, no. 3, pp. 215-226, Sep. 2018.
https://doi.org/10.1007/s11896-017-9248-7

72. T. W. Jing and R. K. Murugesan, ‘Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology’, Commun. Comput. Inf. Sci., vol. 1347, pp. 674-684, 2021.
https://doi.org/10.1007/978-981-33-6835-4_44

73. A. Bruno, G. Cattaneo, U. Ferraro Petrillo, and P. Capasso, ‘PNU Spoofing: a menace for biometrics authentication systems?’, Pattern Recognit. Lett., vol. 151, pp. 3-10, 2021.
https://doi.org/10.1016/j.patrec.2021.07.008

74. N. Wiener, Cybernetics; or, Control and communication in the animal and the machine. New York: M.I.T. Press, 1961.
https://doi.org/10.1037/13140-000

75. R. GLANVILLE, ‘Cybernetics: Thinking Through the Technology’, in Traditions of Systems Theory, Routledge, 2013.

76. L. Helminger and C. Rechberger, ‘Multi-Party Computation in the GDPR’, Priv. Symp. 2022 – Data Prot. Law Int. Converg. Compliance Innov. Technol. DPLICIT, 2022.
https://doi.org/10.1007/978-3-031-09901-4_2

77. M. Roy, C. Chowdhury, and N. Aslam, ‘Security and Privacy Issues in Wireless Sensor and Body Area Networks’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 173-200.
https://doi.org/10.1007/978-3-030-22277-2_7

78. A. Vyas and S. Pal, ‘Preventing Security and Privacy Attacks in WBANs’, in Handbook of Computer Networks and Cyber Security, B. B. Gupta, G. M. Perez, D. P. Agrawal, and D. Gupta, Eds. Cham: Springer International Publishing, 2020, pp. 201-225.
https://doi.org/10.1007/978-3-030-22277-2_8

Received 29.01.2023

Issue 2 (212), article 3

DOI:https://doi.org/10.15407/kvt212.02.033

Cybernetics and Computer Engineering, 2023, 2(212)

ARALOVA N.I.1, DSc (Engineering), Senior Researcher,
Senior Researcher of Optimization of Controlled Processes Department,
ORCID 0000-0002-7246-2736,
e-mail: aralova@ukr.net

RADZIEJOWSKI P.A.2, DSc (Biology), Professor
ORCID 0000-0001-8232-2705,
e-mail: p.radziejowski@wseit.edu.pl

RADZIEJOWSKA M.P.3, DSc (Biology).,
Professor of Faculty of Management,
Department of Innovations
and Safety Management Systems
ORCID 0000-0002-9845-390X,
e-mail: maria.radziejowska@pcz.pl

ARALOVA A.A.1, PhD (Mathematics)
Researcher of the Department of Methods for Discrete Optimization,
Mathematical Modelling and Analyses of Complex Systems
ORCID 0000-0001-7282-2036,
email: aaaralova@gmail.com

1 Institute of cybernetics of National Academy of Science of Ukraine,
40, Acad.Glushkov av., 03187, Kyiv, Ukraine

2 Kazimiera Milanowska College of Education and Therapy , Poznan, Poland

3 Czestochowa University of Technology
19b, Armii Krajowej str., 42-200, Częstochowa, Poland

APPLICATION OF THE MATHEMATICAL MODEL OF THE FUNCTIONAL BREATHING SYSTEM FOR OPTIMAL CONTROL OF THE TRAINING PROCESS OF HIGHLY QUALIFIED ATHLETES

Introduction. One of the most important tasks of sports training in modern sports of the highest achievements is the ability to control the state of the athlete’s body in the process of training and competitive activities. The use of a systematic approach in the training of highly qualified athletes, the system-forming factor in which is sports performance, presupposes the use of various non-traditional methods of improving the adaptation of athletes to the ever-increasing training loads. The development of methods and means for increasing physical performance and, in particular, in the practice of high-performance sports, is one of the most important principles of modern sports medicine. One of these methods is interval hypoxic training.

The purpose of the paper is to reveal the effectiveness of the process of adaptation to hypoxic hypoxia during the training process in the middle mountains and during the course of normobaric interval hypoxic training as a means of controlling the training process for increasing work capacity and improving the state of the functional respiratory system.

Methods. A system approach was used to assess the functional state of the respiratory system, combining instrumental examination with the subsequent use of mathematical models of the oxygen regimes of the body, predicting the state of functional respiratory system on the mathematical model of the respiratory system with optimal control, aerobic performance and working capacity.

Results. The combination of separate conducting of the IHT course and the traditional planned training process plays a significant role in the management of the training process because increases the effectiveness of the constructive effect of hypoxia

Separate use of hypoxic hypoxia and load hypoxia significantly increases the functional state of the respiratory system, increases aerobic performance and performance of athletes in comparison with the simultaneous effects of hypoxic hypoxia and load hypoxia during the training process in mid-altitude mountains.

Keywords: functional respiratory system, intermittent  hypoxic training, athletes’ performance, the effectiveness of the adaptation process of athletes, mathematical model of the respiratory system with optimal control.

Download full text!

REFERENCES

1. Kolchinskaya A.Z. Mechanisms of action of interval hypoxic training. Interval hypoxic training. (Efficiency. Mechanisms of action): Sat. scientific. tr. Kiev. 1992. 107-113.

2. Kolchinskaya A.Z., Tsyganova T.N., Ostapenko L.A. Normobaric interval hypoxic training in medicine and sports. M .: Medicine, 2003 408 p.

3. Nakamoto F.P., Ivamoto R.K., Andrade M.dos S., de Lira C.A., Silva B.M., da Silva A.C. Effect of Intermittent Hypoxic Training Followed by Intermittent Hypoxic Exposure on Aerobic Capacity of Long Distance Runners. J Strength Cond Res. 2016 Jun;30(6):1708-20.
https://doi.org/10.1519/JSC.0000000000001258

4. Sch!ö!ffel N., Senff T., Gerber A., de Roux A., Bauer T.T., Groneberg D.A. Normobare Hypoxie: Aktuelle Implikationen f!ü!r Pneumologie und Leistungsdiagnostik [Intermittent hypoxic training–the state of science]. Pneumologie. 2008 May;62(5):279-83. German.
https://doi.org/10.1055/s-2008-1038113

5. Serebrovskaya T.V. Intermittent hypoxia research in the former soviet union and the commonwealth of independent States: history and review of the concept and selected applications. High Alt Med Biol. 2002 Summer;3(2):205-21.
https://doi.org/10.1089/15270290260131939

6. Dufour S.P, Ponsot E., Zoll J., Doutreleau S., Lonsdorfer-Wolf E., Geny B., Lampert E., Fl!ü!ck M., Hoppeler H., Billat V., Mettauer B., Richard R., Lonsdorfer J. Exercise training in normobaric hypoxia in endurance runners. I. Improvement in aerobic performance capacity.!
!J Appl Physiol (1985). 2006 Apr;100(4):1238-48.
https://doi.org/10.1152/japplphysiol.00742.2005

7. Holliss B.A., Fulford J., Vanhatalo A., Pedlar C.R., Jones A.M. Influence of intermittent hypoxic training on muscle energetics and exercise tolerance. J Appl Physiol.(1985). 2013 Mar 1;114(5):611-9.
https://doi.org/10.1152/japplphysiol.01331.2012

8. Katayama K., Sato Y., Shima N., Qiu J.C., Ishida K., Mori S., Miyamura M. Enhanced chemosensitivity after intermittent hypoxic exposure does not affect exercise ventilation at sea level. Eur J Appl Physiol. 2002 Jun;87(2):187-91.
https://doi.org/10.1007/s00421-002-0594-4

9. Serebrovskaya T.V., Karaban I.N., Kolesnikova E.E., Mishunina T.M. Kuzminskaya L.A, Serbrovsky A.N., Swanson R.J. Human hypoxic ventilatory response with blood dopamine content under intermittent hypoxic training. Can J Physiol Pharmacol. 1999 Dec;77(12):967-73. PMID: 10606443.
https://doi.org/10.1139/y99-096

10. Foster G.E. McKenzie DC, Sheel AW. Effects of enhanced human chemosensitivity on ventilatory responses to exercise. Exp Physiol. 2006 Jan;91(1):221-8.
https://doi.org/10.1113/expphysiol.2005.032276

11. Katayama K., Shima N., Sato Y., Qiu J.C., Ishida K., Mori S., Miyamura M/. Effect of intermittent hypoxia on cardiovascular adaptations and response to progressive hypoxia in humans. High Alt Med Biol. 2001 Winter;2(4):501-8.
https://doi.org/10.1089/152702901753397063

12. Foster G.E., McKenzie D.C., Milsom W.K., Sheel A.W. Effects of two protocols of intermittent hypoxia on human ventilatory, cardiovascular and cerebral responses to hypoxia. J Physiol. 2005 Sep 1;567(Pt 2):689-99.
https://doi.org/10.1113/jphysiol.2005.091462

13. Schmidt W., Prommer N. Impact of alterations in total hemoglobin mass on VO 2max. Exerc Sport Sci Rev. 2010 Apr;38(2):68-75.
https://doi.org/10.1097/JES.0b013e3181d4957a

14. Burtscher M., Pachinger O., Ehrenbourg I., Mitterbauer G., Faulhaber M., P!ü!hringer R., Tkatchouk E. Intermittent hypoxia increases exercise tolerance in elderly men with and without coronary artery disease. Int J Cardiol. 2004 Aug;96(2):247-54.
https://doi.org/10.1016/j.ijcard.2003.07.021

15. Katayama K., Fujita H., Sato K., Ishida K., Iwasaki K., Miyamura M. Effect of a repeated series of intermittent hypoxic exposures on ventilatory response in humans. High Alt Med Biol. 2005 Spring;6(1):50-9.
https://doi.org/10.1089/ham.2005.6.50

16. Ponsot E., Dufour S.P., Zoll J., Doutrelau S., N’Guessan B., Geny B., Hoppeler H., Lampert E., Mettauer B., Ventura-Clapier R., Richard R. Exercise training in normobaric hypoxia in endurance runners. II. Improvement of mitochondrial properties in skeletal muscle. J Appl Physiol (1985). 2006 Apr;100(4):1249-57.
https://doi.org/10.1152/japplphysiol.00361.2005

17. Basset F.A., Joanisse D.R., Boivin F., St-Onge J., Billaut F., Dor!é! J., Chouinard R., Falgairette G., Richard D., Boulay M.R. Effects of short-term normobaric hypoxia on haematology, muscle phenotypes and physical performance in highly trained athletes. Exp Physiol. 2006 Mar;91(2):391-402.
https://doi.org/10.1113/expphysiol.2005.031682

18. Vogt M., Billeter R., Hoppeler H. Effect of hypoxia on muscular performance capacity: “living low–training high”. Ther Umsch. 2003 Jul;60(7):419-24. German.
https://doi.org/10.1024/0040-5930.60.7.419

19. Zoll J., Ponsot E., Dufour S., Doutreleau S., Ventura-Clapier R., Vogt M., Hoppeler H., Richard R., Fl!ü!ck M.Exercise training in normobaric hypoxia in endurance runners. III. Muscular adjustments of selected gene transcripts. J Appl Physiol (1985). 2006 Apr;100(4):1258-66.
https://doi.org/10.1152/japplphysiol.00359.2005

20. Krivoshchekin S.G., Divert V.E., Mel’nikov V.N., Vodianitski!ĭ! S.N., Girenko L.A. Comparative analysis of gas exchange and cardiorespiratory systems reactions to increasing normobaric hypoxia and physical load of swimmers and skiers. Fiziol Cheloveka. 2013 Jan-Feb;39(1):117-25. Russian.
https://doi.org/10.1134/S0362119712060072

21. Mucci P., Blondel N.., Fabre C., Nourry C., Berthoin S. Evidence of exercise-induced O2 arterial desaturation in non-elite sportsmen and sportswomen following high-intensity interval-training. Int J Sports Med. 2004 Jan;25(1):6-13.
https://doi.org/10.1055/s-2003-45225

22. Koehle M.S., Foster G.E., McKenzie D.C., Sheel A.W. Repeated measurement of hypoxic ventilatory response as an intermittent hypoxic stimulus. Respir Physiol Neurobiol. 2005 Jan 15;145(1):33-9.
https://doi.org/10.1016/j.resp.2004.09.004

23. Katayama K., Sato Y., Ishida K., Mori S., Miyamura M. The effects of intermittent exposure to hypoxia during endurance exercise training on the ventilatory responses to hypoxia and hypercapnia in humans. Eur J Appl Physiol Occup Physiol. 1998 Aug;78(3):189-94.
https://doi.org/10.1007/s004210050406

24. Park H.Y., Sunoo S., Nam S.S. The Effect of 4 Weeks Fixed and Mixed Intermittent Hypoxic Training (IHT) on Respiratory Metabolic and Acid-base Response of Capillary Blood During Submaximal Bicycle Exercise in Male Elite Taekwondo Players. J Exerc Nutrition Biochem. 2016 Dec 31;20(4):35-43.
https://doi.org/10.20463/jenb.2016.0035

25. Temme L.A., St Onge P., Adams M., Still D.L., Statz J.K., Williams S.T. A Novel, Inexpensive Method to Monitor, Record, and Analyze Breathing Behavior During Normobaric Hypoxia Generated by the Reduced Oxygen Breathing Device. Mil Med. 2017 Mar;182(S1):210-215.
https://doi.org/10.7205/MILMED-D-16-00053

26. Lippi G., Franchini M., Banfi G. Normobaric hypoxia and sports: the debate continues. Eur J Appl Physiol. 2011 Jan;111(1):159-60.
https://doi.org/10.1007/s00421-010-1630-4

27. Millet G. P., Brocherie F.. Hypoxic Training Is Beneficial in Elite Athletes. Medicine and Science in Sports and Exercise, American College of Sports Medicine (ACSM), 2020, 52 (2), pp.515- 518.10.1249/MSS.0000000000002142.
https://doi.org/10.1249/MSS.0000000000002142

28. Ambro!ż!y T., Maciejczyk M., Klimek AT., Wiecha S., Snopkowski P., Pa!ł!ka T., Jaworski J. , Ambro!ż!y D. , Rydzik !Ł!., Cynarski W. The Effects of Intermittent Hypoxic Training on Anaerobic and Aerobic Power in Boxers Int. J. Environ. Res. Public Health. 2020, 17(24). 9361.
https://doi.org/10.3390/ijerph17249361

29. Radziievs’ki!ĭ! P.O., Radziievs’ka M.P.Hypoxic training of high qualification sportsmen. Fiziol Zh. 2003;49(3):126-33. Ukrainian. PMID: 12918261.

30. Shatilo V.B., Korkushko O.V., Ischuk V.A., Downey H.F., Serebrovskaya T.V. Effects of intermittent hypoxia training on exercise performance, hemodynamics, and ventilation in healthy senior men. High Alt Med Biol. 2008 Spring;9(1):43-52.
https://doi.org/10.1089/ham.2007.1053

31. Park H.Y., Jung W.S., Kim J., Hwang H., Lim K. Efficacy of intermittent hypoxic training on hemodynamic function and exercise performance in competitive swimmers!
!J Exerc Nutrition Biochem. 2018 Dec 31;22(4):32-38.
https://doi.org/10.20463/jenb.2018.0028

32. Rodr!í!guez F.A., Truijens M.J., Townsend N.E., Stray-Gundersen J., Gore C.J., Levine B.D. Performance of runners and swimmers after four weeks of intermittent hypobaric hypoxic exposure plus sea level training. J Appl Physiol (1985). 2007 Nov;103(5):1523-35.
https://doi.org/10.1152/japplphysiol.01320.2006

33. Roels B., Thomas C., Bentley D.J., Mercier J., Hayot M., Millet G.J. Effects of intermittent hypoxic training on amino and fatty acid oxidative combustion in human permeabilized muscle fibers. Appl Physiol (1985). 2007 Jan;102(1):79-86.
https://doi.org/10.1152/japplphysiol.01319.2005

34. Desplanches D., Hoppeler H., Linossier M.T., Denis C., Claassen H., Dormois D., Lacour J.R., Geyssant A. Effects of training in normoxia and normobaric hypoxia on human muscle ultrastructure. Pflugers Arch. 1993 Nov;425(3-4):263-7.
https://doi.org/10.1007/BF00374176

35. Katayama K., Matsuo H., Ishida K., Mori S., Miyamura M. Intermittent hypoxia improves endurance performance and submaximal exercise efficiency. High Alt Med Biol. 2003 Fall;4(3):291-304.
https://doi.org/10.1089/152702903769192250

36. Holliss B.A., Burden R.J., Jones A.M., Pedlar C.R. Eight weeks of intermittent hypoxic training improves submaximal physiological variables in highly trained runners. J Strength Cond Res. 2014 Aug;2 8(8):2195-203.
https://doi.org/10.1519/JSC.0000000000000406

37. Debevec T., Amon M., Keramidas M.E., Kounalakis S.N., Pisot R., Mekjavic I.B. Normoxic and hypoxic performance following 4 weeks of normobaric hypoxic training. Aviat Space Environ Med. 2010 Apr;81(4):387-93.
https://doi.org/10.3357/ASEM.2660.2010

38. Czuba M., Bril G., P!ł!oszczyca K., Piotrowicz Z., Chalimoniuk M., Roczniok R., Zembro!ń!-!Ł!acny A., Gerasimuk D., Langfort J. Intermittent Hypoxic Training at Lactate Threshold Intensity Improves Aiming Performance in Well-Trained Biathletes with Little Change of Cardiovascular Variables. Biomed Res Int. 2019 Sep 25;2019:1287506.
https://doi.org/10.1155/2019/1287506

39. Nakamoto F.P., Ivamoto R.K., dos Andrade M. S., de Lira C.A., Silva B.M., da Silva A.C. Effect of Intermittent Hypoxic Training Followed by Intermittent Hypoxic Exposure on Aerobic Capacity of Long Distance Runners. J Strength Cond Res. 2016 Jun;30(6):1708-20. doi: 10.1519/JSC.0000000000001258.
https://doi.org/10.1519/JSC.0000000000001258

41. Haufe S., Wiesner S., Engeli S., Luft F.C., Jordan J. Influences of normobaric hypoxia training on metabolic risk markers in human subjects. Med Sci Sports Exerc. 2008 Nov;40(11):1939-44.
https://doi.org/10.1249/MSS.0b013e31817f1988

42. Ogawa T., Ohba K., Nabekura Y., Nagai J., Hayashi K., Wada H., Nishiyasu T. Intermittent short-term graded running performance in middle-distance runners in hypobaric hypoxia. Eur J Appl Physiol. 2005 Jun;94(3):254-61.
https://doi.org/10.1007/s00421-005-1322-7

43. Radziievs’ky!ĭ! P.O. Mechanisms of adaptation to intermittent hypoxic training course in sportsmen of high qualification. Fiziol Zh. 2005;51(2):90-5. Ukrainian. PMID: 15943237.

44. Katayama K., Sato K., Matsuo H., Ishida K., Mori S., Miyamura M. Effects of intermittent hypoxic training and detraining on ventilatory chemosensitive adaptations in endurance athletes. Adv Exp Med Biol. 2004;551:299-304.
https://doi.org/10.1007/0-387-27023-X_45

45. Poprz!ę!cki S., Czuba M., Zaj!ą!c A., Karpi!ń!ski J., Wilk R., Bril G., Maszczyk A., Toborek M. The blood antioxidant defence capacity during intermittent hypoxic training in elite swimmers. Biol Sport. 2016 Dec;33(4):353-360.
https://doi.org/10.5604/20831862.1221607

46. Sanchez A.M.J., Borrani F. Effects of intermittent hypoxic training performed at high hypoxia level on exercise performance in highly trained runners. J Sports Sci. 2018 Sep;36(18):2045-2052.
https://doi.org/10.1080/02640414.2018.1434747

47. Serebrovska T.V., Serebrovska Z.O., Egorov E. Fitness and therapeutic potential of intermittent hypoxia training: a matter of dose. Fiziol Zh. 2016;62(3):78-91.
https://doi.org/10.15407/fz62.03.078

48. Ji W., Wang L., He S., Yan L., Li T., Wang J., Kong A.T., Yu S., Zhang Y. Effects of acute hypoxia exposure with different durations on activation of Nrf2-ARE pathway in mouse skeletal muscle. PLoS One. 2018 Dec 4;13(12).
https://doi.org/10.1371/journal.pone.0208474

49. Toigo M., Jacobs R.A., Lundby C. Hypoxic training: effect on mitochondrial function and aerobic performance in hypoxia. Med Sci Sports Exerc. 2014 Oct;46(10):1936-45.
https://doi.org/10.1249/MSS.0000000000000321

50. Bakkman L., Sahlin K., Holmberg H.C., Tonkonogi M. . Quantitative and qualitative adaptation of human skeletal muscle mitochondria to hypoxic compared with normoxic training at the same relative work rate. Acta Physiol (Oxf). 2007 Jul;190(3):243-51. doi: 10.1111/j.1748-1716.2007.01683.x.
https://doi.org/10.1111/j.1748-1716.2007.01683.x

51. Shill D.D., Southern W.M., Willingham T.B., Lansford K.A. McCully K.K., Jenkins N.T. Mitochondria-specific antioxidant supplementation does not influence endurance exercise training-induced adaptations in circulating angiogenic cells, skeletal muscle oxidative capacity or maximal oxygen uptake. J Physiol. 2016 Dec 1;594(23):7005-7014.
https://doi.org/10.1113/JP272491

52. Robach P., Bonne T., Fl!ü!ck D., B!ü!rgi S., Toigo M., Jacobs R.A., Lundby C. Hypoxic training: effect on mitochondrial function and aerobic performance in hypoxia. Med Sci Sports Exerc. 2014 Oct;46(10):1936-45.
https://doi.org/10.1249/MSS.0000000000000321

53. Salvadego D., Keramidas M.E., K!ö!leg!å!rd R., Brocca L., Lazzer S., Mavelli I., Rittweger J., Eiken O., Mekjavic I.B., Grassi B. PlanHab* : hypoxia does not worsen the impairment of skeletal muscle oxidative function induced by bed rest alone. J Physiol. 2018 Aug;596(15):3341-3355.
https://doi.org/10.1113/JP275605

54. Serebrovskaya T.V., Xi L. Intermittent hypoxia training as non-pharmacologic therapy for cardiovascular diseases: Practical analysis on methods and equipment. Exp Biol Med (Maywood). 2016 Sep;241(15):1708-23.
https://doi.org/10.1177/1535370216657614

55. Saghiv M.S., Sagiv M.S. Basic Exercise Physiology. Clinical and Laboratory Perspective. Springer. 2020. 582.
https://doi.org/10.1007/978-3-030-48806-2

56. Bonetti D.L., Hopkins W.G. Sea-Level Exercise Performance Following Adaptation to Hypoxia. A Meta-Analysis. Sports Medicine, 2009. 39 (2). 107-127.
https://doi.org/10.2165/00007256-200939020-00002

57. Bonetti D.L., Hopkins W.G. Sea-level exercise performance following adaptation to hypoxia: a meta-analysis. Sports Med. 2009;39(2):107-27.
https://doi.org/10.2165/00007256-200939020-00002

58. Hamlin M.J., Lizamore C.A., Hopkins W.G. The Effect of Natural or Simulated Altitude Training on High-Intensity Intermittent Running Performance in Team-Sport Athletes: A Meta-Analysis. Sports Med. 2018 Feb;48(2):431-446. doi: 10.1007/s40279-017-0809-9. Erratum in: Sports Med. 2017 Nov 30;: PMID: 29129021.
https://doi.org/10.1007/s40279-017-0809-9

59. Humberstone-Gough C.E., Saunders P.U., Bonetti D.L., Stephens S., Bullock N., Anson J.M., Gore C.J. Comparison of live high: train low altitude and intermittent hypoxic exposure. J Sports Sci Med. 2013 Sep 1;12(3):394-401. PMID: 24149143; PMCID: PMC3772580

60. Cai M., Chen X., Shan J., Yang R., Guo Q., Bi X., Xu P., Shi X., Chu L., Wang L. Intermittent Hypoxic Preconditioning: A Potential New Powerful Strategy for COVID-19 Rehabilitation. Front Pharmacol. 2021 Apr 30;12:643619.
https://doi.org/10.3389/fphar.2021.643619

61. Aralova A.A., Aralova N.I., Klyuchko O.M., Mashkin V.I., Mashkina I.V. Information system for the examination of organism adaptation characteristics of flight crews’ personnel // Electronics and control systems .2018.2.106-113.
https://doi.org/10.18372/1990-5548.56.12944

62. Aralova N. I. Information technologies of decision making support for rehabilitation of sportsmen engaged in combat sport. J. Automation Information Sci. 2016, V. 3, P. 160-170.
https://doi.org/10.1615/JAutomatInfScien.v48.i6.70

63. Aralova N.I., Shakhlina L.Ya.-G., Futornyi S.M., Kalytka S.V. (2020) Information Technologies for Substantiation of the Optimal Course of Interval Hypoxic Training in Practice of Sports Training of Highly Qualified Sportswomen Journal of Automation and Information Sciences pp 41-55.
https://doi.org/10.1615/JAutomatInfScien.v52.i1.50

64. Aralova N.I.Integrated mathematical model of self-organization of functional systems of the organism for imitation viral diseases. Journal of Automation and Information Sciences . 2020. 4: 127-137. DOI: 10.1615/JAutomatInfScien.v52.i7.50 pages 52-62
https://doi.org/10.1615/JAutomatInfScien.v52.i7.50

65. Shakhlina L.Ya.-G. Aralova N.I. (2018) Forecasting the organism reaction of the athletes on inhibiting hypoxic mixtures on the mathematical model of the functional respiration system Kibernetika i vycislitelnaa tehnika 193: 64-82.
https://doi.org/10.15407/kvt192.03.064

66. Aralova N.I., Shakhlina L.Ya.-G. (2018) The mathematical models of functional self-organization of the human respiratory system with a change pf the hormonal states of organism. Journal of Automation and Information Sciences pages 49-59
https://doi.org/10.1615/JAutomatInfScien.v50.i5.50

67. Richardson A.J., Gibson O.R.. Simulated hypoxia does not further improve aerobic capacity during sprint interval training. J Sports Med Phys Fitness. 2015 Oct;55(10):1099-106.

68. Ferri A., Yan X., Kuang J., Granata C., Oliveira R.S.F., Hedges C.P., Lima-Silva A.E., Billaut F., Bishop D.J. Fifteen days of moderate normobaric hypoxia does not affect mitochondrial function, and related genes and proteins, in healthy men. Eur J Appl Physiol. 2021 Aug;121(8):2323-2336.
https://doi.org/10.1007/s00421-021-04706-4

69. Debevec T., Mekjavic I.B. Short intermittent hypoxic exposures augment ventilation but do not alter regional cerebral and muscle oxygenation during hypoxic exercise. Respir Physiol Neurobiol. 2012 Apr 30;181(2):132-42.
https://doi.org/10.1016/j.resp.2012.02.008

70. Julian C.G., Gore C.J., Wilber R.L., Daniels J.T., Fredericson M., Stray-Gundersen J., Hahn A.G., Parisotto R., Levine B.D. Intermittent normobaric hypoxia does not alter performance or erythropoietic markers in highly trained distance runners. J Appl Physiol (1985). 2004 May;96(5):1800-7.
https://doi.org/10.1152/japplphysiol.00969.2003

71. Onopchuk Yu.N. Homeostasis of functional respiratory system as a result of intersystem and system-medium informational interaction. Bioecomedicine. Uniform information space /Ed. by V.I. Gritsenko. Kiev.2001.59-84 (In Russian)

72. Onopchuk Yu.N. Homeostasis of the functional circulatory system as a result of intersystem and system-medium informational interaction. Bioecomedicine. Uniform information space / Ed. by V.I. Gritsenko.Kiev.2001.85-104 (In Russian)

73. Aralova N. I. Mathematical models of functional respiratory system for solving the applied problems in occupational medicine and sports. Saarbr!ü!cken: LAP LAMBERT Academic Publishing GmbH&Co, KG. 2019, 368 p. (In Russian). ISBN 978-613-4-97998-6

74. Shakhlina L.Ya.-G. The reaction of the body of female athletes to a decrease in the content of oxygen in inhaled air in different phases of the menstrual cycle. Sports medicine. 2008. No 1. P. 78-82. (In Russian)

75. Secondary tissue hypoxia. Ed. Kolchinskaya A.Z. K.: Nauk.Dumka.1983.253 p. (In Russian)

76. Mankovskaya I.M., Lyabah K.G. Oxygen transport in muscle tissue in the process of adaptation to hypoxic hypoxia. Cf. Experiment. Medicine and biology. 2002. 471. 295-306.
https://doi.org/10.1007/978-1-4615-4717-4_36

Received 10.02.2023

Issue 2 (212), article 2

DOI:https://doi.org/10.15407/kvt212.02.017

Cybernetics and Computer Engineering, 2023, 2(212)

Bondar S.O.,
Acting Head of Intelligent Control Department,
https://orcid.org/0000-0003-4140-7985
e-mail: seriybrm@gmail.com

Shepetukha Yu.M., PhD (Engineering), Senior Researcher,
Leading Researcher of the Intelligent Control Department
https://orcid.org/0000-0002-6256-5248
e-mail: yshep@meta.ua

International Research and Training Center for Information
Technologies and Systems of the National Academy of Science
and Ministry of Education and Science of Ukraine.
40, Acad. Glushkov ave., 03187, Kyiv, Ukraine

CHOOSING AN UNMANNED AIRCRAFT FOR IMPLEMENTATION THE METHOD OF COMBINED CONTROL OF ITS MOVEMENT WITH THE PURPOSE TO CREATE DIGITAL MODELS OF INFRASTRUCTURE OBJECTS

Introduction. Among the current tasks of digitization of built immovable infrastructure objects, the task of building digital models of external and internal parts of such objects, creating electronic passports of objects, SMART models of cities, etc. is highlighted. During the surveying of streets and objects to create digital models of cities and maintain a database of these objects, there is a need to use unmanned aerial vehicles (UAVs), but. not all types of aircraft are suitable for performing combined digitization tasks

The purpose of the paper is to justify of the type and model choice of an unmanned aerial vehicle as a means of creating digital models of the investigated infrastructure objects and the development of a method for combined control of the movement of such an apparatus to perform the tasks of obtaining visual data for the construction of digital 3D models of the investigated immovable infrastructure objects.

The results. In order to make a justified choice of the type of UAV as a tool for the implementation of digitalization tasks, an ontological model was built based on the defined technical and structural characteristics of various types of UAV. The analysis of the created ontological model made it possible to determine the hybrid type of UAV based on the largest number of relationships “type of UAV – task conditions” as links between technical characteristics and the possibility of flight modes with certain features of the digitalization tasks.

For the most common data collection tasks for the digitization of infrastructural objects, a method of combined UAV motion control has been developed, which combines the stages of sequential use of control of two hybrid UAV motion modes: helicopter and airplane, depending on the characteristics of the specific task.

Conclusions. The developed ontological model has a hierarchical nature and covers such structural elements as the type and subtype of an unmanned aerial vehicle, its technical and structural characteristics, possible flight modes and characteristics, types of digitization tasks, and relationships/connections between them. The analysis of the created ontological model and the results of simulations and test flights of the UAV made it possible to choose a hybrid type of UAV.

The developed method of combined UAV motion control is based on control models for the main channels, combines autonomous and operator control modes and provides for the sequential application of the capabilities of aircraft and helicopter flight modes, which provides the possibility of using different models of hybrid UAVs to perform the tasks of collecting visual data for construction digital models of immovable infrastructure objects.

Keywords: unmanned aerial vehicle, ontological model, combined control method, models for main control channels, visual data, digital object models.

Download full text! (ua)

REFERENCES
1. Reyes-Pena C., Tovar-Vidal M. Ontology: Components and Evaluation, a Review. Research in Computing Science , 2019, 148(3), pp. 257-265.
https://doi.org/10.13053/rcs-148-3-21

2. Hlomani, H., Stacey, D.: Approaches, methods, metrics, measures, and subjectivity in ontology evaluation: A survey. Semantic Web Journal, 2014, 1(5).

3. Martinez-Gil, J., Alba, E., Aldana-Montes, J.F. Optimizing ontology alignments by using genetic algorithms. In: Proceedings of the workshop on nature based reasoning for the semantic Web. Karlsruhe, Germany, 2008.

4. Bittner T. From Top-Level to Domain Ontologies: Ecosystem Classifications as a Case Study. Proceedings of 8th International Conference: Spatial Information Theory, , COSIT 2007, Melbourne, Australia, September 19-23, 2007, pp 61-77.
https://doi.org/10.1007/978-3-540-74788-8_5

5. Dwivedi S.R., Kumar A. Ontology Exemplification and Modeling for aSPOCMS in the Semantic Web. International Journal of Computer Information Systems and Industrial Management Applications, 2013, Vol.5, pp. 542-549;

6. Palagin O.V., Petrenko M.G. A model of the categorical level of the linguistic ontological picture of the world. Mathematical machines and systems. 2006. No. 3. P. 91-104. (in Ukrainian)

7. Ren, S., Lu, X., Wang, T. Application of ontology in medical heterogeneous data integration. In: Big Data Analysis (ICBDA), 2018 IEEE 3rd International Conference, pp. 150-155.
https://doi.org/10.1109/ICBDA.2018.8367667

8. Gritsenko V.I., Gladun A.Ya., Khala K.O., MARTINEZ-BEJAR R. Semantical Similarity Evaluation Method of Concepts for Comparison of Ontologies in Applied Problems of Artificial Intelligence. Cybernetics and Computer Engineering. 2021. N 3 (205), pp 5-25.
https://doi.org/10.15407/kvt205.03.005

9. Pidnebesna H., Stepashko V. Construction of an ontology as a metamodel of the inductive modeling subject area. Advanced Computer Inform. Technologies : ACIT-2018 : 8th intern. conf. : Ceske Budejovice, Czech Republic, June 1-3, 2018, pp. 137-140;

10. Pavlov A., Pidnebesna H., Stepashko V. Ontology application to construct inductive modeling tools with intelligent interface. Control Systems and Computers. 2020. No 4. pp. 44-55.
https://doi.org/10.15407/csc.2020.04.044

11. Stepashko V.S., Savchenko-Syniakova Ye.A., Pidnebesna H.A. Problem of Constructing an Ontological Metamodel of Iterative GMDH Algorithms. Cybernetics and Computer Engineering. 2022. No. 3 (209). pp. 21-33
https://doi.org/10.15407/kvt208.03.021

12. Resource Description Framework (RDF) https://www.w3.org/RDF/

13. Knowledge Interchange Format. URL: http://logic.stanford.edu/kif/dpans.html

14. A free, open-source ontology editor and framework for building intelligent systems. URL: https://protege.stanford.edu/

15. Ambite J.L., Chaudhri V.K., Fikes R., Jenkins Je., Mishra S., Muslea M., UribeT., Yang G. Design and implementation of the CALO query manager. Proceedings of the National Conference on Artificial Intelligence, 2006.

16. Beard R.W., McLain T.W. Small Unmanned Aircraft: Theory and Practice. Princeton University Press, 2012, 320 p.
https://doi.org/10.1515/9781400840601

17. Grytsenko V.I., Volkov O.E., Komar M.M., Bogachuk Y.P. Intellectualization of modern systems of automatic control of unmanned aerial vehicles. Cybernetics and Computer Engineering, 2018. No. 1 (191), pp. 45-59. (in Ukrainian)
https://doi.org/10.15407/kvt191.01.045

Received 16.05.2023

Issue 2 (212), article 1

DOI:https://doi.org/10.15407/kvt212.02.004

Cybernetics and Computer Engineering, 2023, 2(212)

BULGAKOVA O.S., Phd, Associate professor,
Associate professor of the Department of Applied Information Systems,
ORCID: 0000-0002-6587-8573,
e-mail: sashabulgakova2@gmail.com
Taras Shevchenko National University of Kyiv,
Bohdan Hawrylyshyn str. 24, Kyiv, 04116, Ukraine

MAKOVETSKYI M. Ye., MSc in Computer Science
of the Department of Applied Information Systems,
ORCID: 0009-0006-2169-8745,
e-mail: makovetskyi.mykyta@gmail.com
Taras Shevchenko National University of Kyiv,
Bohdan Hawrylyshyn str. 24, Kyiv, 04116, Ukraine

ZOSIMOV V.V., DSc (Engineering), Associate professor.,
Professor of the Department of Applied Information Systems,
ORCID: 0000-0003-0824-4168,
e-mail: zosimovv@gmail.com
Taras Shevchenko National University of Kyiv,
Bohdan Hawrylyshyn str. 24, Kyiv, 04116, Ukraine

APPROACH TO THE INTELLIGENT AGENTS APPLICATION IN E-COMMERCE SYSTEMS

Introduction. This paper presents the analyze of main consumer behavior models in modern e-commerce systems, such as electronic consumer decision process model, research online – purchase offline concept, also shown architectural solutions of e-commerce systems, including microservice architecture. Proposes the application of artificial intelligence (AI) based on large language models in e-commerce. The main functions of these models include text generation, acting as a 24/7 assistant, and analytics. Specifically, the user cases for store owners include the automatic generation of product descriptions, keywords, and categories, as well as analytics in areas such as customer feedback, user requests, searches, and shopping patterns.

The purpose of the paper is to consider the possibility of use intelligent agents such as chatbots in an e-commerce system to meet customer needs, increase sales and provide personalized information.

Results. The proposed approach demonstrate  that that AI models based on large language models can be applied to automate the generation of product descriptions, keywords, categories, and to gain insights into customer feedback, user requests, searches, and shopping patterns. In summary, this paper provides a comprehensive analysis of various consumer behavior models, architectural solutions, and the potential benefits of implementing AI-based solutions in the e-commerce industry.

Conclusions. The results of using intelligent agents in an e-commerce system include the ability to handle a large volume of customer queries simultaneously, provide support, and improve customer satisfaction and retention rates. The use of an intelligent agent in the sales process can also help to recommend products based on the customer’s preferences and browsing history, increasing the likelihood of a sale. The use of microservice architecture in a web application for an online store allows for independent scalability of components and the ability to build a system using different programming languages.

Keywords: e-trade, intelligent agents, consumer behavior model, e-commerce system.

Download full text!

REFERENCES

1 Liao C. Chen J. L. Enhancing consumer engagement in e-commerce websites: An integrated model of e-service quality, customer value, and switching costs. Journal of Retailing and Consumer Services. 2019, Vol. 50, pp. 23-32.

2 Berghausen E. M., Backhaus C. When do consumers choose same-day versus next-day delivery in online shopping? An investigation of the underlying decision-making processes. Journal of Retailing and Consumer Services. 2020, No 55, pp. 102-109.

3 Wagner T., Benlian A., Hess, T. The concept of digital affordances revisited: An exploratory study in the context of business-to-consumer electronic commerce. Journal of Business Research, 2019, 98, pp. 365-376.

4 Faradivah Dwi Azizah et al. Impulsive Buying Behavior: Implementation of IT on Technology Acceptance Model on E-Commerce Purchase Decisions. Golden Ratio of Marketing and Applied Psychology of Business, 2022, 2(1).
https://doi.org/10.52970/grmapb.v2i1.173

5 Se Hun, Lim.; Sukho, Lee., Dan J., Kim. Is Online Consumers’ Impulsive Buying Beneficial for E-Commerce Companies? An Empirical Investigation of Online Consumers’ Past Impulsive Buying Behaviors. Information systems management, 2017, Vol. 34(1), pp. 85-100.
https://doi.org/10.1080/10580530.2017.1254458

6 Wen, Chao. The Impact of Quality on Customer Behavioral Intentions Based on the Consumer Decision Making Process as Applied in E-Commerce. Doctor of Philosophy (Management Science), 2012, P. 144.

7 “https://www.igi-global.com/affiliate/mehdi-khosrow-pourdba/24/” Mehdi Khosrow-Pour, D.B.A. Consumer Behavior, Organizational Development, and Electronic Commerce: Emerging Issues for Advancing Modern Socioeconomies. 2009.
https://doi.org/10.4018/978-1-60566-126-1

8 A. B. Ayoade., A. T. Adigun., B. A. Ojokoh. Towards a Platform-Based Ecosystem for e-Commerce. Proceedings of the 13th International Conference on ICT Applications and Management (ICTAM), 2021, pp. 66-75.

9 WooCommerce system. URL: https://woocommerce.com/

10 Shopify e-commerce system. URL: https://www.shopify.com/

11 OpenCart e-commerce system. URL: https://www.opencart.com/

12 Saleor e-commerce system. URL: https://quintagroup.com/cms/python/saleor

13 Understanding and Selecting a Tokenization Solution, 2020. URL: https://securosis.com.

14 JSON Web Tokens, 2021. jwt.io

15 Password stealing from HTTPS login page and CSRF protection bypass with reflected XSS, 2020. URL: https:// medium.com/@MichaelKoczwara/password-stealing-from-https-login-page-and-csrf-bypass-with-reflected-xss-76f56ebc4516

16 Cross-Site Request Forgery Prevention Cheat Sheet, 2021. URL: https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html

17 Bulgakova O., Mashkov V., Zosimov V., Popravkin P. Risk of Information Loss Using JWT Token CEUR Workshop Proceedings, 2021, 3101, pp. 292-299.

Received 27.02.2023