Lidé
Mgr. Yuliia Prokop
Všechny publikace
Automated Assessment of Student Queries in Redis
- Autoři: Mgr. Yuliia Prokop,
- Publikace: Proceedings of International Conference on Applied Innovation in IT. Kothen: Hochschule Anhalt, 2025. p. 147-154. vol. 13. ISSN 2199-8876. ISBN 978-3-96057-182-7.
- Rok: 2025
- DOI: 10.25673/119227
- Odkaz: https://doi.org/10.25673/119227
- Pracoviště: Kabinet výuky informatiky
-
Anotace:
In recent years, the popularity of NoSQL systems has grown significantly due to their flexibility and high performance when working with large volumes of data. Redis is one of the most popular key-value stores actively used in industry and education. However, automated approaches for NoSQL assignment evaluation, especially those involving advanced Redis modules, remain underdeveloped. This paper presents a web-based system for automated assessment of students’ Redis queries, supporting basic structures (e.g., list, sorted set, and hash manipulation) and advanced features (RedisJSON and RediSearch). The system provides instant feedback on syntax errors, enabling students to correct mistakes and resubmit solutions in real-time. A pilot study with 42 master’s students showed that about 78% successfully mastered the basics of Redis on the first try, while only 39% passed advanced assignments. With repeated attempts and targeted feedback, overall success on advanced tasks increased to 76%, highlighting the importance of continuous, automated guidance. The paper also discusses typical errors logged by the system (inconsistent or incorrect key naming, syntax errors when setting key expiration, incorrect index creation or JSON field references, etc.). The results demonstrate that integrating an automated Redis query assessment into educational programs can significantly enhance student engagement and learning efficiency. The flexible and modular design of the proposed system allows easy extension to other NoSQL databases and provides valuable data for instructors to refine teaching materials.
Impact of a Problem-Based Approach on IT Student Learning
- Autoři: Mgr. Yuliia Prokop, Nestoruk, N., Chykunov, P., Trofymenko, O.
- Publikace: 2024 IEEE 19th International Conference on Computer Science and Information Technologies (CSIT). Lviv: IEEE Ukraine Section, 2024. ISSN 2766-3639. ISBN 979-8-3315-4262-7.
- Rok: 2024
- DOI: 10.1109/CSIT65290.2024.10982647
- Odkaz: https://doi.org/10.1109/CSIT65290.2024.10982647
- Pracoviště: Kabinet výuky informatiky
-
Anotace:
The study of the educational process of university students has revealed their need for more engagement in class. They seem unable to absorb material that does not require a certain level of mental tension, negatively affecting their academic performance and competence. Therefore, there is a need to develop pedagogical technology to optimize the educational process. We analyzed the educational process at the National University “Odesa Law Academy” in 2020-2023. We evaluated the effectiveness of ways and means of enhancing the academic and cognitive skills of 150 full-time IT students during their study of professional-oriented courses. We have improved students' educational and mental activities by optimizing the educational process through personalized problem-based learning, utilizing professionally oriented problem situations, and providing favorable motivational and emotional support. We confirmed the reliability of the research results using descriptive statistics.
Developing students’ code style skills
- Autoři: Mgr. Yuliia Prokop, Trofymenko, O., Zadereyko, O.
- Publikace: 2023 IEEE 18th International Conference on Computer Science and Information Technologies (CSIT). Lviv: IEEE Ukraine Section, 2023. p. 1-4. ISSN 2766-3639. ISBN 979-8-3503-6046-2.
- Rok: 2023
- DOI: 10.1109/CSIT61576.2023.10324182
- Odkaz: https://doi.org/10.1109/CSIT61576.2023.10324182
- Pracoviště: Kabinet výuky informatiky
-
Anotace:
Developing the skills of writing clean code in novice programmers is an urgent and essential task for today’s university teachers. Despite numerous studies of this problem, the optimal solution has not yet been found. The research examines the motivation of students to adhere to the code style without any particular methodological influence. It is shown that students with an average of 2.2 years of programming experience understand code style rules and say they are ready to follow them. However, their code contains numerous style errors, which indicate the need for additional pedagogical efforts. In the second part of the study, we present the results of the experiment with another group of students. We applied the method of penalizing students for violating code style requirements, and it showed a positive impact: the total number of errors decreased. Optimistic results were obtained for many criteria. However, the same approach should be applied in subsequent courses to consolidate a positive impact. The paper proposes a method for developing students’ code style skills.
RESEARCH OF POTENTIAL DATA LEAKS IN INFORMATION AND COMMUNICATION SYSTEMS ДОСЛІДЖЕННЯ ПОТЕНЦІЙНИХ ВИТОКІВ ДАНИХ В ІНФОРМАЦІЙНИХ І КОМУНІКАЦІЙНИХ СИСТЕМАХ
- Autoři: Zadereyko, O., Trofymenko, O., Mgr. Yuliia Prokop, Loginova, N., Dyka, A., Kukharenko, S.
- Publikace: Radioelectronic and Computer Systems. 2022, 2022(4), 64-84. ISSN 1814-4225.
- Rok: 2022
- DOI: 10.32620/reks.2022.4.05
- Odkaz: https://doi.org/10.32620/reks.2022.4.05
- Pracoviště: Kabinet výuky informatiky
-
Anotace:
This article discusses the problem of ensuring the protection of user data in information systems. It is shown that classic information systems are represented by stationary and mobile communication devices focused on data exchange with digital space. The fundamental principles of user data exchange in the digital space are considered. It has been established that leading technology IT corporations collect data from user communication devices. It is shown that the organization of data collection is carried out by redirecting the DNS traffic of the communication device to the DNS servers of IT corporations, followed by its encryption using the DoH protocol. This makes it impossible for authorized services and departments of national states to control the users’ DNS traffic and ensures the monopoly position of IT corporations in the global digital market for collecting and analyzing user data. It is shown that the collection of user data is carried out with the aim of further monetization and influencing decisions made by users. DNS traffic of devices for communication with the digital space of the Internet is fixed. An audit of the recorded DNS traffic was performed, and as a result, specialized Internet resources were identified to be responsible for collecting and processing user data. It has been proved that the identified specialized Internet resources belong to IT corporations. Methods of identification of communication devices in digital space were considered. It is shown that the identification of communication devices is based on the collection of a unique set of data from each communication device. Based on each unique data set, a digital fingerprint of the communication device is formed, which is used for its further identification in the digital space. These approaches allow organizing protection against user data collection in information systems. Software and hardware implementations for protection against data collection from communication devices are proposed. It has been experimentally established that the combined use of the proposed software and hardware models provides the most effective protection against data collection from communication devices and does not affect the functionality of information systems.