<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">General Chairs</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
				<date type="published" when="2015-05">May, 2015</date>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sotiris</forename><surname>Batsakis</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Heinrich</forename><forename type="middle">C</forename><surname>Mayr</surname></persName>
							<email>heinrich.mayr@aau.at</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vitaliy</forename><surname>Yakovyna</surname></persName>
							<email>vitaliy.s.yakovyna@lpnu.ua</email>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Nikitchenko</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Grygoriy</forename><surname>Zholtkevych</surname></persName>
							<email>g.zholtkevych@karazin.ua</email>
						</author>
						<author>
							<persName><forename type="first">Vyacheslav</forename><surname>Kharchenko</surname></persName>
							<email>v.kharchenko@khai.edu</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff97">
								<orgName type="department">Department of Automatic Control Systems</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff108">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff129">
								<orgName type="department">System and Software Evaluation Center</orgName>
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<addrLine>Via Moruzzi</addrLine>
									<postCode>1, 56124</postCode>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff132">
								<orgName type="laboratory">Centre for Safety Infrastructure-Oriented Research and Analysis</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff135">
								<orgName type="institution">National Aerospace University &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff97">
								<orgName type="department">Department of Automatic Control Systems</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff108">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff129">
								<orgName type="department">System and Software Evaluation Center</orgName>
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<addrLine>Via Moruzzi</addrLine>
									<postCode>1, 56124</postCode>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff132">
								<orgName type="laboratory">Centre for Safety Infrastructure-Oriented Research and Analysis</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff135">
								<orgName type="institution">National Aerospace University &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hennadiy</forename><surname>Kravtsov</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vitaliy</forename><surname>Kobets</surname></persName>
							<email>vkobets@kse.org.ua</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vladimir</forename><surname>Peschanenko</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vadim</forename><surname>Ermolayev</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Yuriy</forename><surname>Bobalo</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Aleksander</forename><surname>Spivakovsky</surname></persName>
							<email>spivakovsky@kspu.edu</email>
						</author>
						<author>
							<persName><forename type="first">Aleksander</forename><surname>Spivakovsky</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Aleksander</forename><surname>Spivakovsky</surname></persName>
						</author>
						<author>
							<persName><roleName>DataArt</roleName><forename type="first">Mikhail</forename><surname>Zavileysky</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Russian</forename><surname>Federation</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Grygoriy</forename><surname>Zholtkevych</surname></persName>
						</author>
						<author>
							<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Karazin</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Grygoriy</forename><surname>Zholtkevych</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Aleksander</forename><surname>Spivakovsky</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Dmytro</forename><surname>Fedasyuk</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Nataliya</forename><surname>Kushnir</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Eugene</forename><surname>Alferov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Aidemark</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Nick</forename><surname>Bassiliades</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Lukas</forename><surname>Chrpa</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Michael</forename><surname>Cochez</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Anatoliy</forename><surname>Doroshenko</surname></persName>
						</author>
						<author>
							<persName><roleName>TECHFORCE, Spain</roleName><forename type="first">David</forename><surname>Esteban</surname></persName>
							<email>desteban@techforce.eu</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Wolfgang</forename><surname>Faber</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Anna</forename><surname>Fensel</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Vladimir</forename><surname>Gorodetsky</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Brian</forename><surname>Hainey</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Mirjana</forename><surname>Ivanovic</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Jason</forename><forename type="middle">J</forename><surname>Jung</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Samia</forename><surname>Kamal</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Natalya</forename><surname>Keberle</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Kolgatin</surname></persName>
						</author>
						<author>
							<persName><forename type="first">H</forename><forename type="middle">S Skovoroda</forename><surname>Kharkiv</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Christian</forename><surname>Kop</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Vladislav</forename><surname>Kruglik</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Sergey</forename><surname>Kryukov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Vladimir</forename><surname>Kukharenko</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Vira</forename><surname>Liubchenko</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alexander</forename><surname>Lyaletski</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Dmitry</forename><surname>Maevsky</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Frederic</forename><surname>Mallet</surname></persName>
						</author>
						<author>
							<persName><roleName>MINRES</roleName><forename type="first">Wolf-Ekkehard</forename><surname>Matzke</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Technologies</forename><surname>Gmbh</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Heinrich</forename><surname>Germany</surname></persName>
						</author>
						<author>
							<persName><surname>Mayr</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Tope</forename><surname>Omitola</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Simon</forename><surname>Parkinson</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Gary</forename><surname>Pratt</surname></persName>
						</author>
						<author>
							<persName><roleName>playence, Spain</roleName><forename type="first">Carlos</forename><surname>Ruiz</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Abdel-Badeeh</forename><surname>Salem</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Wolfgang</forename><surname>Schreiner</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Pavlo</forename><surname>Serdyuk</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Vladimir</forename><forename type="middle">A</forename><surname>Shekhovtsov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Mariya</forename><surname>Shishkina</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Martin</forename><surname>Strecker</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ville</forename><surname>Tirronen</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Nikolay</forename><surname>Tkachuk</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Mauro</forename><surname>Vallati</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Leo</forename><surname>Van Moergestel</surname></persName>
							<email>leo.vanmoergestel@hu.nl</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maxim</forename><surname>Vinnik</surname></persName>
							<email>vinnik@kspu.edu</email>
						</author>
						<author>
							<persName><forename type="first">Paul</forename><surname>Warren</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Yulia</forename><surname>Nosenko</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Iryna</forename><surname>Zaretska</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Klaus-Dieter</forename><surname>Schewe</surname></persName>
							<email>kd.schewe@scch.at</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Aleksandr</forename><surname>Spivakovsky</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Maksim</forename><surname>Vinnik</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Yulia</forename><surname>Tarasich</surname></persName>
							<email>yutarasich@kspu.edu</email>
						</author>
						<author>
							<persName><forename type="first">Sarah</forename><surname>Stevens-Rayburn</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Ellen</forename><forename type="middle">N</forename><surname>Bouton</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Olena</forename><surname>Semenikhina</surname></persName>
							<email>e.semenikhina@fizmatsspu.sumy.ua</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marina</forename><surname>Drushlyak</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jyoti</forename><surname>Chauhan</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anita</forename><surname>Goel</surname></persName>
							<email>goel.anita@gmail.com</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><roleName>Cor./</roleName><forename type="first">Incor</forename><surname>No</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Tkachuk</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Konstiantyn</forename><surname>Nagornyi</surname></persName>
							<email>k.nagornyi@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rustam</forename><surname>Gamzayev</surname></persName>
							<email>rustam.gamzayev@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nadezhda</forename><surname>Baklanova</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jon</forename><forename type="middle">Haël</forename><surname>Brenas</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rachid</forename><surname>Echahed</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Christian</forename><surname>Percebois</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hanh</forename><forename type="middle">Nhi</forename><surname>Tran</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tetiana</forename><surname>Hovorushchenko</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andriy</forename><surname>Krasiy</surname></persName>
							<email>andriy-krasiy@yandex.ua</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Igor</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
							<email>atamanyukip@mnau.edu.ua</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yuriy</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
							<email>yuriy.kondratenko@chdu.edu.ua</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Fedir</forename><surname>Geche</surname></persName>
							<email>fgeche@hotmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vladyslav</forename><surname>Kotsovsky</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anatoliy</forename><surname>Batyuk</surname></persName>
							<email>abatyuk@gmail.com</email>
							<affiliation key="aff97">
								<orgName type="department">Department of Automatic Control Systems</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff108">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff129">
								<orgName type="department">System and Software Evaluation Center</orgName>
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<addrLine>Via Moruzzi</addrLine>
									<postCode>1, 56124</postCode>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff132">
								<orgName type="laboratory">Centre for Safety Infrastructure-Oriented Research and Analysis</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff135">
								<orgName type="institution">National Aerospace University &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sandra</forename><surname>Geche</surname></persName>
							<email>sandra.geche@gmail.com</email>
							<affiliation key="aff98">
								<orgName type="department">Department of Economic Theory</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff109">
								<orgName type="institution">National University of Life and Environmental sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykhaylo</forename><surname>Vashkeba</surname></persName>
							<email>vashkebam1991@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrey</forename><surname>Kupin</surname></persName>
							<email>kupin@mail.ru</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anton</forename><surname>Senko</surname></persName>
							<email>antonysenko@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Kseniia</forename><surname>Ilchenko</surname></persName>
							<email>ilchenko@wdc.org.ua</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Pyshnograiev</surname></persName>
							<email>pyshnograiev@wdc.org.ua</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Erik</forename><surname>Puik</surname></persName>
							<email>erik.puik@hu.nl</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Daniël</forename><surname>Telgen</surname></persName>
							<email>daniel.telgen@hu.nl</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">John-Jules</forename><surname>Meyer</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Medzhybovska</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Kussul</surname></persName>
							<email>nataliia.kussul@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Shelestov</surname></persName>
							<email>andrii.shelestov@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff98">
								<orgName type="department">Department of Economic Theory</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff109">
								<orgName type="institution">National University of Life and Environmental sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ruslan</forename><surname>Basarab</surname></persName>
							<email>basarabru@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff98">
								<orgName type="department">Department of Economic Theory</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff109">
								<orgName type="institution">National University of Life and Environmental sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sergii</forename><surname>Skakun</surname></persName>
							<email>serhiy.skakun@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olga</forename><surname>Kussul</surname></persName>
							<email>olgakussul@gmail.com</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Lavreniuk</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff97">
								<orgName type="department">Department of Automatic Control Systems</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff108">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff129">
								<orgName type="department">System and Software Evaluation Center</orgName>
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<addrLine>Via Moruzzi</addrLine>
									<postCode>1, 56124</postCode>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff132">
								<orgName type="laboratory">Centre for Safety Infrastructure-Oriented Research and Analysis</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff135">
								<orgName type="institution">National Aerospace University &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andriy</forename><surname>Skrypnyk</surname></persName>
							<email>avskripnik@ukr.net</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Olhaholiachuk</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tetiana</forename><surname>Paientko</surname></persName>
							<email>tpayentko@mail.ru</email>
						</author>
						<author>
							<persName><forename type="first">Maryna</forename><surname>Nehrey</surname></persName>
							<email>marina.nehrey@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Valeria</forename><surname>Yatsenko</surname></persName>
							<email>valeriayatsenko@rambler.ru</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maksim</forename><surname>Poltoratskiy</surname></persName>
							<email>max1993poltorackii@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Karine</forename><surname>Mesropyan</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Alexander</forename><surname>Weissblut</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Anastasiia</forename><surname>Kolesnyk</surname></persName>
							<email>anastacia_kolesnik95@mail.ru</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ihor</forename><surname>Lukianov</surname></persName>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mariya</forename><surname>Shyshkina</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Grygoriy</forename><surname>Zholtkevych</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Alexander</forename><surname>Letichevsky</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Letychevskyi</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrei</forename><surname>Alexandru</surname></persName>
							<email>andrei.alexandru@iit.academiaromana-is.ro</email>
						</author>
						<author>
							<persName><forename type="first">Gabriel</forename><surname>Ciobanu</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Bogdan</forename><surname>Aman</surname></persName>
							<email>baman@iit.tuiasi.ro</email>
						</author>
						<author>
							<persName><forename type="first">Oksana</forename><surname>Nytrebych</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Gordieiev</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mario</forename><surname>Fusani</surname></persName>
							<email>mario.fusani@isti.cnr.it</email>
							<affiliation key="aff97">
								<orgName type="department">Department of Automatic Control Systems</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff108">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff129">
								<orgName type="department">System and Software Evaluation Center</orgName>
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<addrLine>Via Moruzzi</addrLine>
									<postCode>1, 56124</postCode>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff132">
								<orgName type="laboratory">Centre for Safety Infrastructure-Oriented Research and Analysis</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff135">
								<orgName type="institution">National Aerospace University &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olga</forename><surname>Yanovskaya</surname></persName>
							<email>o.yanovskaya@csn.khai.edu</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maria</forename><forename type="middle">Anna</forename><surname>Devetzoglou</surname></persName>
							<email>m.devetzoglou@interceg.com</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Max</forename><surname>Yanovsky</surname></persName>
							<email>m.yanovsky@csn.khai.edu</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Bogdanvolochiy</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Mulyak</surname></persName>
							<email>mulyak@prom-technoservice.com</email>
							<affiliation key="aff75">
								<orgName type="institution">Johannes-Kepler-University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff82">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution" key="instit1">Dyal Singh College</orgName>
								<orgName type="institution" key="instit2">University of Delhi</orgName>
								<address>
									<addrLine>Lodhi road</addrLine>
									<region>New Delhi</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff89">
								<orgName type="institution">Université de Toulouse / IRIT</orgName>
							</affiliation>
							<affiliation key="aff92">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff94">
								<orgName type="institution">Petro Mohyla Black Sea State University</orgName>
								<address>
									<addrLine>68 th Desantnykiv Str. 10</addrLine>
									<postCode>54003</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff96">
								<orgName type="department">Department of Information Management Systems</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff102">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff104">
								<orgName type="institution">Utrecht University</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff107">
								<orgName type="institution">National Technical University of Ukraine &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff114">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>90-A, Vasulkivska st</addrLine>
									<postCode>03022</postCode>
									<settlement>Kiev</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff118">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60, Volodymyrska Str</addrLine>
									<postCode>01601</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff123">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff128">
								<orgName type="institution">National Aerospace University «KhAI»</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff131">
								<orgName type="department">International Creativity Engineering Group</orgName>
								<address>
									<settlement>Athens</settlement>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
							<affiliation key="aff134">
								<orgName type="institution">RPC &quot;PromTechnoServis Ukraine&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff140">
								<orgName type="institution">Poltava National Technical University named after Yurij Kondratyuk</orgName>
								<address>
									<settlement>Poltava</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Alex</forename><surname>Drozd</surname></persName>
							<email>drozd@ukr.net</email>
						</author>
						<author>
							<persName><forename type="first">Miroslav</forename><surname>Drozd</surname></persName>
							<email>miroslav_dr@mail.ru</email>
						</author>
						<author>
							<persName><forename type="first">Viktor</forename><surname>Antonyuk</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Kyrylo</forename><surname>Rukkas</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Galyna</forename><surname>Zholtkevych</surname></persName>
							<email>galynazholtkevych1991@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Bohdan</forename><surname>Volochiy</surname></persName>
							<email>bvolochiy@ukr.net</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Bohdan</forename><surname>Mandziy</surname></persName>
							<email>bmandziy@lp.edu.ua</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Leonid</forename><surname>Ozirkovskyy</surname></persName>
							<email>l.ozirkovsky@gmail.com</email>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><surname>Gorbenko</surname></persName>
							<affiliation key="aff74">
								<orgName type="department">Software Competence Center Hagenberg</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff76">
								<orgName type="institution">TECHFORCE</orgName>
								<address>
									<addrLine>Vía Augusta, 2bis planta 5ª</addrLine>
									<postCode>E-08006</postCode>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff77">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<addrLine>Universitätsstrasse 65-67</addrLine>
									<postCode>9020</postCode>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
							<affiliation key="aff80">
								<orgName type="institution">Sumy Makarenko State Pedagogical University</orgName>
								<address>
									<addrLine>Romenska St. 87</addrLine>
									<settlement>Sumy</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff81">
								<orgName type="department">Department of Computer Science</orgName>
								<orgName type="institution">University of Delhi</orgName>
								<address>
									<settlement>Delhi</settlement>
									<country key="IN">India</country>
								</address>
							</affiliation>
							<affiliation key="aff87">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>Frunze str</addrLine>
									<postCode>21, 61002</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff88">
								<orgName type="institution" key="instit1">CNRS</orgName>
								<orgName type="institution" key="instit2">Université de Grenoble</orgName>
							</affiliation>
							<affiliation key="aff90">
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>1 Shevchenko av</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff91">
								<orgName type="institution">Khmelnitsky National University</orgName>
								<address>
									<settlement>Khmelnitsky</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff93">
								<orgName type="institution">Mykolaiv National Agrarian University</orgName>
								<address>
									<addrLine>Commune of Paris str. 9</addrLine>
									<postCode>54010</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff95">
								<orgName type="department">Department of Cybernetics and Applied Mathematics</orgName>
								<orgName type="institution">Uzhhorod National University</orgName>
								<address>
									<settlement>Uzhhorod</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff100">
								<orgName type="department" key="dep1">Department of Computer Systems and Networks</orgName>
								<orgName type="department" key="dep2">Faculty of Information Technologies</orgName>
								<orgName type="institution">Kryviy Rih National University</orgName>
								<address>
									<addrLine>Partzyizdu str., 11</addrLine>
									<postCode>50027</postCode>
									<settlement>Kryviy Rih</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff101">
								<orgName type="department">World Data Center for Geoinformatics and Sustainable Development</orgName>
								<address>
									<addrLine>Peremohy av. 37</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff103">
								<orgName type="institution">HU Utrecht University of Applied Sciences</orgName>
								<address>
									<settlement>Utrecht</settlement>
									<country key="NL">the Netherlands</country>
								</address>
							</affiliation>
							<affiliation key="aff106">
								<orgName type="institution">Space Research Institute NAS Ukraine and SSA Ukraine</orgName>
							</affiliation>
							<affiliation key="aff110">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff112">
								<orgName type="institution">National University of Life and Environmental Sciences</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff113">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya st</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff117">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40-Rokiv Zhovtnya Str</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff120">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff122">
								<orgName type="department">Glushkov Institute of Cybernetics</orgName>
								<orgName type="institution">National Academy of Sciences</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff127">
								<orgName type="institution" key="instit1">University of Banking</orgName>
								<orgName type="institution" key="instit2">National Bank of Ukraine</orgName>
								<address>
									<addrLine>1 Andriivska Street</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff130">
								<orgName type="institution">National Aerospace University named after N.E. Zhukovsky &quot;KhAI&quot;</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff133">
								<orgName type="institution">National University Lviv Polytechnic</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff138">
								<orgName type="department">Department of Theoretical Radio Engineering and Radio Measurement</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff139">
								<orgName type="institution">National Aerospace University KhAI</orgName>
								<address>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department" key="dep1">International Conference on Information and Communication Technolo-gies in Education, Research</orgName>
								<orgName type="department" key="dep2">Industrial Applications: Integration</orgName>
								<orgName type="institution">Harmoniza-tion</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="institution">Zaporizhzhya National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="institution">Alpen-Adria-Universät Klagenfurt</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff5">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff6">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff7">
								<orgName type="institution">Kharkiv National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff8">
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff9">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<settlement>Klagenfurt</settlement>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff10">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff11">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff12">
								<orgName type="institution">Kharkiv National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff13">
								<orgName type="institution">Zaporizhzhya National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff14">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff15">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff16">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff17">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff18">
								<orgName type="institution">Linneaus University</orgName>
								<address>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff19">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff20">
								<orgName type="department">Costin Badica</orgName>
								<orgName type="institution">University of Craiova</orgName>
								<address>
									<country key="RO">Romania</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff21">
								<orgName type="institution">Aristotle University of Thessaloniki</orgName>
								<address>
									<country key="GR">Greece</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff22">
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff23">
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff24">
								<orgName type="institution">University of Jyväskylä</orgName>
								<address>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff25">
								<orgName type="institution">National University of Technology &quot;Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff26">
								<orgName type="institution">Zaporizhzhya National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff27">
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff28">
								<orgName type="institution" key="instit1">STI</orgName>
								<orgName type="institution" key="instit2">University of Innsbruck</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff29">
								<orgName type="department">Institute for Informatics and Automation</orgName>
								<orgName type="institution" key="instit1">St. Petersburg</orgName>
								<orgName type="institution" key="instit2">Russian Academy of Science</orgName>
								<address>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff30">
								<orgName type="institution">Glasgow Caledonian University</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff31">
								<orgName type="department">Sungkook Han</orgName>
								<orgName type="institution">Wonkwang University</orgName>
								<address>
									<country key="KR">South Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff32">
								<orgName type="department">Ville Isomottonen</orgName>
								<orgName type="institution">University of Jyvaskyla</orgName>
								<address>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff33">
								<orgName type="institution">University of Novi Sad</orgName>
								<address>
									<country key="RS">Serbia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff34">
								<orgName type="institution">Yeungnam University</orgName>
								<address>
									<country key="KR">South Korea</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff35">
								<orgName type="institution">Oxford Brookes University</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff36">
								<orgName type="institution">Zaporizhzhya National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff37">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff38">
								<orgName type="institution">National Pedagogical University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff39">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff40">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff41">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff42">
								<orgName type="institution">Southern Federal University</orgName>
								<address>
									<country key="RU">Russian Federation</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff43">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff44">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff45">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Polytechnic University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff46">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff47">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Polytechnic University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff48">
								<orgName type="institution">Universite de Nice-Sophia Antipolis</orgName>
								<address>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff49">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff50">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff51">
								<orgName type="institution">University of Southampton</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff52">
								<orgName type="department">Olga Ormandjieva</orgName>
								<orgName type="institution">Concordia University</orgName>
								<address>
									<country key="CA">Canada</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff53">
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff54">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff55">
								<orgName type="institution">Eastern Washington University</orgName>
								<address>
									<country key="US">USA</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff56">
								<orgName type="institution">Ain Shams University</orgName>
								<address>
									<settlement>Cairo</settlement>
									<country key="EG">Egypt</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff57">
								<orgName type="department">RISC</orgName>
								<orgName type="institution">Johannes Kepler University Linz</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff58">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff59">
								<orgName type="institution">Alpen-Adria-Universität Klagenfurt</orgName>
								<address>
									<country key="AT">Austria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff60">
								<orgName type="department">Institute of Information Technologies and Learning Tools</orgName>
								<orgName type="institution">National Academy of Pedagogical Sciences of Ukraine</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff61">
								<orgName type="institution" key="instit1">IRIT</orgName>
								<orgName type="institution" key="instit2">Paul Sabatier University</orgName>
								<address>
									<settlement>Toulouse</settlement>
									<country key="FR">France</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff62">
								<orgName type="department">Ilias Tachmazidis</orgName>
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff63">
								<orgName type="department">Olga Tatarintseva</orgName>
								<address>
									<settlement>Satelliz</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff64">
								<orgName type="department">Vagan Terziyan</orgName>
								<orgName type="institution">University of Jyväskylä</orgName>
								<address>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff65">
								<orgName type="institution">University of Jyvaskyla</orgName>
								<address>
									<country key="FI">Finland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff66">
								<orgName type="institution">National Technical University &quot;Kharkiv Polytechnic Institute&quot;</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff67">
								<orgName type="institution">University of Huddersfield</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff68">
								<orgName type="institution">Utrecht University of Applied Sciences</orgName>
								<address>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff69">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff70">
								<orgName type="department">Knowledge Media Institute</orgName>
								<orgName type="institution">the Open University</orgName>
								<address>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff71">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff72">
								<orgName type="department">Institute of Information Technologies and Learning Tools</orgName>
								<orgName type="institution">National Academy of Pedagogical Sciences of Ukraine</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff73">
								<orgName type="institution">Kharkiv National University</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff78">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<addrLine>27, 40 rokiv Zhovtnya St</addrLine>
									<postCode>73000</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff79">
								<orgName type="institution">SPAIN Dissertation</orgName>
								<address>
									<postCode>1858, 71656, 16724 3586 Abstract 3532 22882, 23617 18582</postCode>
									<country>UKRAINE, GERMANY, UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff83">
								<orgName type="department">edX</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff84">
								<orgName type="department">Introduction to Computer</orgName>
								<orgName type="institution">Harvard University Health Policy Harvard University</orgName>
								<address>
									<postCode>200, 119</postCode>
									<country key="US">United States</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff85">
								<orgName type="department">Data Analysis For Genomics</orgName>
								<orgName type="institution">Harvard University</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff86">
								<orgName type="department">Professor of Department of Manufacturing Engineering</orgName>
								<orgName type="institution">Machines</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff99">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff105">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Economic University</orgName>
								<address>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff111">
								<orgName type="institution">National University of State Tax Service of Ukraine</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff115">
								<address>
									<addrLine>Chekhova 41 Rostov-on-Don</addrLine>
									<postCode>344006</postCode>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff116">
								<orgName type="institution">Kherson State University</orgName>
								<address>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff119">
								<orgName type="department">Institute of Information Technologies and Learning Tools</orgName>
								<orgName type="institution">National Academy of Pedagogical Sciences of Ukraine</orgName>
								<address>
									<addrLine>Berlinskii Str., 9</addrLine>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff121">
								<orgName type="department">Department of Theoretical and Applied Computer Science</orgName>
								<orgName type="institution">V.N. Karazin Kharkiv National University</orgName>
								<address>
									<addrLine>4 Svobody Sqr</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff124">
								<orgName type="department" key="dep1">Romanian Academy</orgName>
								<orgName type="department" key="dep2">Institute of Computer Science</orgName>
								<address>
									<settlement>Iaşi</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff125">
								<orgName type="department" key="dep1">Romanian Academy</orgName>
								<orgName type="department" key="dep2">Institute of Computer Science</orgName>
								<address>
									<addrLine>Blvd. Carol I no.11</addrLine>
									<postCode>700506</postCode>
									<settlement>Iaşi</settlement>
									<country key="RO">Romania</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff126">
								<orgName type="department">Software Department</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff136">
								<orgName type="department">Institute of Computer Systems</orgName>
								<orgName type="institution">Odessa National Polytechnic University</orgName>
								<address>
									<addrLine>ave Shevchenko 1</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff137">
								<orgName type="institution">N. Karazin Kharkiv National University</orgName>
								<address>
									<addrLine>4, Svobody Sqr</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">General Chairs</title>
					</analytic>
					<monogr>
						<imprint>
							<date type="published" when="2015-05">May, 2015</date>
						</imprint>
					</monogr>
					<idno type="MD5">92180E6B537A584B077B8370FB19CFC2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T06:06+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Business process model, Abstract State Machine, semantics, refinement, exception handling Mathematical Model, Methodology, Formal Method, Process, Integration Information and Communication Technology, Learning Management System, Smart Learning Environment InformationCommunicationTechnology, TeachingMethodology, TeachingProcess, Environment Business process fundamental, business process context, business process modeling language, selection of the modeling approach, customization Process, ProcessPattern, Technology, Methodology, Model Information and communication technology, Education and learning process, ICT infrastructure, Open Science ICT Infrastructure, Research The study of mathematics, computer applications in the study of mathematics, special course, dynamic mathematics software, the McNemar&apos;s test InformationCommunicationTechnology, TeachingProcess, TeachingMethodology Video Lecture, Video Analysis, MOOC, Online Education, Feature Checklist KeyTerms. ICT Component, Characteristic, Academia, Environment, Management Table 1. Video selection for our study Pedagogical measures, Knowledge test control, Measuring scale, Fuzzy logic, Strictness parameter, Test questions ICT Tool, Quality Assurance Process, Teaching Methodology, Teaching Process, Technology post object-oriented technology, effectiveness, crosscutting functionality, knowledge-based approach, fuzzy logic Software Engineering Process, Knowledge Representation, Decision Support, Model, Metric Graph Transformations, Programming Language Semantics, Tableau Calculus, Description Logic ModelBasedSoftwareDevelopmentMethodology, Formal-Method, MathematicalModel, VerificationProcess Search-based software engineering, bi-objective model, next release problem, modularization problem Model, mathematical model, software engineering process Model-Based Software System Development, Software Component, Software System, Specification Process calculation method, medical diagnostics, electrocardiogram, random sequence, canonical decomposition computation, mathematical model Trend, forecasting model, time series, functional, step of forecast, autoregression, neural element, neural network MachineIntelligence, DecisionSupport, MathematicalModel first-order classical logic, refutation search, calculus, soundness, completeness, clash-resolution method, paramodulation, strategy Intellectual control, classification optimization, beneficiation technology, iron ore, magnetite quartzites Intelligence, Control System, Model, Classification MathematicalModeling, Knowledge, Methodology, DecisionSupport agile manufacturing, agent technology, MaaS Industry, Infrastructure, Machine Intelligence Industrial enterprises, business partners, information and communication technology, e-business, e-commerce, Web-site, intercompany interaction, electronic information interchange Development, industry, research Geospatial intelligence, land cover, crop mapping, image processing, satellite imagery, big data HighPerformanceComputing, MachineIntelligence, InformationTechnology, Intelligence, Data risk assessment, hydropower plan, electricity, agriculture, environmental management MathematicalModel, Data, Environment, Infrastructure, Development Financial anomalies, economic behavior, revenue loss, shadow economy deposit, devaluation, portfolio, optimization, return, revaluation, risk Data, DecisionSupport, Development, FormalMethod, Management, MathematicalModel e-commerce, online auction, e-auction, Vickrey auction, social welfare ElectronicAuction, Software, DoubleAuction, SocialWelfare Foreign Exchange, Data, Time Series, Review, Flow DecisionMaking, Management Factor, statistical, econometric, analysis, correlation, decisionmaking Research, Management, Model, Knowledge, Management Process, Knowledge Management Methodology, Mathematical Modeling Multidimensional data model, EBITDA, Рivot table, Management Reporting KnowledgeManagementMethodology, Management, Model, ModelBasedSoftwareDevelopmentMethodology IPO, Warsaw Stock Exchange, Wig-Ukraine Industry, Management, Market, MathematicalModel, Research hybrid model, learning environment, cloud computing, university ICTInfrastructure, Model, TeachingProcess quality management system, electronic educational resources, monitoring of quality, distance learning system «Kherson virtual university» QualityAssuranceMethodology, StandardizationProcess, Knowl-edgeManagementMethodology, KnowledgeManagementProcess, Teaching-Methodology &quot;black box&quot;, deferred responses, sequential processing, premachine, transfer function Computation, Software Component, Specification Process, Mathematical Model Interleaving, predicate transformer, symbolic modeling MathematicalModel Programming language semantics</term>
					<term>Abstraction</term>
					<term>Finite Automata</term>
					<term>Formal Methods</term>
					<term>Verification FormalMethod, VerificationProcess Static program analysis, polynomial invariant of a loop, invariant system of linear inequalities, eigenpolynomial of a linear operator VerificationProcess, Method, FormalMethod Fraenkel-Mostowski set theory, invariant sets, finite support principle, Finitely Supported Mathematics FormalMethod, MathematicalModel, Research dynamical system, switched system, viability, global-in-time trajectories, control system Mathematical Model, Specification Process, Verification Process Natural computing, membrane computing, Turing machines MathematicalModel, Research Software reliability, architecture-based model, high-order Markov chains SoftwareComponent, SoftwareSystem, MathematicalModel software quality model, green software, software reliability, evolution analysis, metrics, ISO/IEC9126, ISO/IEC25010, structure-semantic analysis Model, Reliability, Requirement, SoftwareSystem Distributed Cloud, Peer-to-Peer Network, Data Center, Participatory Business Model, Service Reliability DataCloud, Reliability, Model, Infrastructure, Market Markovian Chains, Automated Reliability Design, Fault-Tolerance System, Version-Structural Redundancy, Common Sliding Standby, Hot Standby, Cold Standby Mathematical Modeling, Method, Software Systems safety-related instrumentation and control system, pipeline digital component, hidden faults, controllability, observability HighPerformanceComputing, ConcurrentComputation, Model, Method, Simulation fault tolerant architecture, 1oo2D, 2oo3, redundancy, complexity, control systems, diversity, common cause failures Process, Technology, Development, Reliability, SoftwareComponent distributed datastore, CAP-theorem, information quality, statistic metrics, simulation DistributedDataWarehousing, ConcurrentComputation Multi-State System, Multiple-Valued Logic, Direct Partial Logic Derivatives, Boundary State Reliability, Model, Approach, Methodology, ScientificField Reliability, Reliability Engineering, Safety, Modeling, Complex System Reliability, MathematicalModel, MathematicalModeling web-system availability, security, vulnerability, Markov&apos;s models, scenario of vulnerability elimination MathematicalModeling, MathematicalModel, SoftwareSystems</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This volume represents the proceedings of the 11th International Conference on ICT in Education, Research, and Industrial Applications, held in Lviv, Ukraine, in May 2015. It comprises 45 contributed papers that were carefully peer reviewed (3-4 reviews per paper) and selected from 119 submissions.</p><p>The volume opens with the abstracts of the keynote talks and tutorial. The rest of the collection is organized in 2 parts. Part I contains the contributions to the main ICTERI conference, structured in four topical sections: ( <ref type="formula">1</ref>) Teaching ICT and Using ICT in Education; (2) Model-Based Software System Development; (3) Machine Intelligence, Knowledge Engineering and Management for ICT; and (4) ICT in Industrial Applications. Part II comprises the contributions of the four workshops co-</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>For the modelling of business processes it is necessary to integrate models for control flow, messaging, event handling, interaction, data management, and exception handling. In principle, all common business process models such as BPMN <ref type="bibr">[14]</ref>, YAWL <ref type="bibr">[13]</ref>, ARIS <ref type="bibr">[11]</ref> or S-BPM <ref type="bibr">[6]</ref> follow such an approach. Though it is claimed that the models have already reached a high level of maturity, they still lack rigorous semantics as pointed out in <ref type="bibr">[1,</ref><ref type="bibr">5,</ref><ref type="bibr">15]</ref>. Furthermore, quite a few aspects such as data management, interaction and exception handling have only been dealt with superficially as pointed out in <ref type="bibr">[12]</ref>.</p><p>The first concern regarding rigorous semantics has been discussed in detail by Börger in <ref type="bibr">[2]</ref> for BPMN, which led to an intensive investigation of BPMN semantics on the grounds of Abstract State Machines (ASMs, <ref type="bibr">[4]</ref>), in particular for OR-synchronisation <ref type="bibr">[3]</ref>. The monograph by Kossak et al. defines a rigorous semantics for a large subset of BPMN leaving out some ill-defined concepts <ref type="bibr">[8]</ref>.</p><p>The second concern can be addressed by means of horizontal refinement. On grounds of ASMs necessary subtle distinctions and extensions to the control flow model such as counters, priorities, freezing, etc. can be easily integrated in a smooth way <ref type="bibr">[12]</ref>. Conservative extensions covering messaging can be adopted from S-BPM <ref type="bibr">[6]</ref>, while events in BPMN have been handled in <ref type="bibr">[7]</ref>. For the event model it is necessary and sufficient to specify what kind of events are to be observed, which can be captured on the grounds of monitored locations in ASMs, and which event conditions are to be integrated into the model. Extensions concerning actor modelling, i.e. the specification of responsibilities for the execution of activities (roles), as well as rules governing rights and obligations lead to the integration of deontic constraints <ref type="bibr">[10]</ref>, some of which can be exploited to simplify the control flow <ref type="bibr">[9]</ref>. In this way subtle distinctions regarding decision-making responsibilities in BPM can be captured.</p><p>In the talk a glimpse of the rigorous, ASM-based semantics for business processes is presented. The focus is on the control flow with specific emphasis on priority handling. This is followed by a discussion of horizontal refinement focusing on the introduction of disruptive events and associated exception handling. A simplified example capturing the effects of external change to a running process is used for illustration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The main catalyst for socio-economic development of a state potential is the ability to create, collect, and effectively manage knowledge that is comes out from the best scholarly research practices. The countries which have made it to their development strategy and implemented the effective interaction with the business enjoy TOP ratings in the World rankings. In the age of information technologies, it takes one not years, but rather days to bear the bell of scientific research and excel the competitors. The companies which are the first in the market are more likely to benefit from a positive effect caused by the introduction of new knowledge. Globalization is adjusting the cooperation between science and industry. More and more funds are invested in scientific research and development to capture the leadership in the market. A modern country's development is stimulated by the transition from a resource-based economy to hi-tech. There is an opportunity to create "intellectual dollars" without any resource, but people. The results of intellectual work become a hard currency. For example, Japan, though it had no natural resources, managed to become the leader in world's economy. The monetary value of the biggest hi-tech (IT) companies is at a scale of the budgets of some developed countries (Apple -$ 711 billion, Microsoft -$ 349 billion, Google -$ 365 billion).</p><p>The Open Science (OS) movement gains popularity in the world of clerisy, aiming to make research results and source data accessible to public at all levels. However, there is a conflict between the desire of scientists to have access to shared resources and make profit by using these resources <ref type="bibr">[1]</ref>. In recent years, many governments try to impose the policy of openness regarding scientific knowledge, especially, if it is funded with public money. One way is the enforcement of providing open access to the results of all research projects performed at public expense. An indicative example is the US, which grant annually about $ 60 billion for research. In 2008, the US Congress imposed the obligation to grant free access in a year after the first publication to all the research papers based on the studies conducted by the National Institute for Health (which receives circa the half of the total public funding for science). Similar measures are now considered by many other countries.</p><p>Today, a lot of research in Ukraine is devoted to the problems of higher education and, in particular, the use of ICT for training students, creating information and communication environments in the universities, etc. However, in the scholarly literature insufficient attention is paid to the development of information and communication models of interaction with ІCT in academic staff training. Moreover, today we are talking about the need for openness and accessibility of scientific activity, whereas a substantial part of the scholarly output never reaches its reader within and even more outside the professional academic community. This problem is particularly acute in the post-soviet countries. Regionalism of entire areas in science, convention, low connection with contemporary scientific trends, low level of foreign language knowledge by scientists, lack of self-developing scientific community, low competition with other countries, lack of motivation, poor funding, brain drain, and a number of other factors result in the continuing archaism of scientific brainpower training in Ukraine.</p><p>Scientometrics is rapidly developing nowadays. Using information technology allows creating new services for the development of scientific and research activity. Many global companies invest billions of dollars in services to support research activity, thereby creating a serious market not for the research results but for the research process support. Herewith the trend shifts toward commercial projects. The examples of such companies are Apple, Microsoft, Google, Elsevier, Thomson Reuters, not to mention many others. The most outstanding services with rapidly growing impact are Google Scholar, Scopus, Orcid, Academia.edu, Research Gate, Mendeley, arXiv.org, cs2n, Epernicus, Myexperiment, Network.nature, Sciencecommunity. These services contribute to satisfying the needs of the scientific community. In fact, these positively influence scientific and technical progress and create a new paradigm of scientific research. A big number of the recently created scientometric services allow assessing the relevance of the research results by a scientist, the number of his publications, citations, storage, etc. Having these measurements at hand opens up new opportunities and prospects. Our time is characterized by the high rates of the accumulation of new knowledge, in particular in the form of research results. Provided that the integration of research activities is currently (and naturally) low, a huge amount of scientific and research information falls out of search visibility and accessibility. Information technology is the only way to arrange and create effective search tools for acquiring the necessary knowledge. The objective of our research is to investigate the transparency of specialized scientific bodies and offer the vision of their supporting ICT infrastructure. Accordingly, the rest of the paper is structured as follows.</p><p>Present article includes such sections, as description of the methodological and experimental parts <ref type="bibr">(2)</ref><ref type="bibr">(3)</ref><ref type="bibr">(4)</ref>, discussion of basic components of DC's ICT infrastructure and main ways and methods of their realization <ref type="bibr">(5)</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>David <ref type="bibr">[2]</ref> mentions that the goal of Open Science is to do scientific research in a way that facts and their distribution is made available at all the levels of the concerned public. The same article states that the movement arose in the XVII century. Due to the fact that the public demand for access to scientific knowledge has become so large that there was a need for a group of scientists to share their resources with each other, so that they could conduct research collectively <ref type="bibr">[2]</ref>.</p><p>The term E-Science (or eScience) was proposed by John Taylor, the Director-General of the United Kingdom Office of Science and Technology in 1999 and was used to describe a large funding initiative, starting from November 2000. E-Science has been interpreted more broadly since as "the application of computer technology to the implementation of modern scientific research, including training, experimentation, accumulation, dissemination of results and long-term storage and access to all materials obtained through the scientific process. These may include modeling and analysis of facts, electronic/digitized laboratory notebooks, raw materials and built-in data sets, handwritten production and design options, preprints and print and/or electronic publications" <ref type="bibr">[3]</ref>.</p><p>Koichiro Matsuura, the President of UNESCO, wrote in his preface to <ref type="bibr">[4]</ref>: "Societies that are based on the knowledge will need to share them to keep their human nature".</p><p>In 2014, the IEEE eScience community proposed a condensed definition <ref type="bibr">[5]</ref>: "eScience encourages innovation in collaborative, computationally or facts intensive research in all the disciplines throughout the research life cycle".</p><p>Michael Nielsen, a physicist and propagandist of Open Science, colorfully describes in <ref type="bibr">[6]</ref> the way the new instruments need to look like to facilitate the dissemination of the culture of cooperation and openness among scientists. One of such tools exists now. This is arXiva site that allows physicists to publish preprints of their works before the official publication of the article. This promotes to get in faster feedback and to disseminate the new discoveries. Nielsen also acts for publishing not only conclusions, but all the original datathis is the thing physicists have been dreaming of for a long time. Journals could help them do that if they wanted to <ref type="bibr">[6]</ref>. The peer review system for scientific papers on one hand offers an opportunity to obtain a (preliminary) critical assessment of a manuscript, but on the other hand it slows down the publication of research results. In this system, a review process is rarely accomplished in less than a month. The reviewers often request authors to revise some parts of the material or conduct additional studies. As a result, the time before the publication stretches for about six months or more. However, Michael Eisen, the co-founder of the Public Library of Science (PLoS), mentioned that according to his experience the "most serious incompletes are detected only after the article is published." The same applies to other scientific works, including dissertations for a degree <ref type="bibr">[7]</ref>. The cases are known in history when after many years after the defense a person was divested a degree and even was fired after the examination of his work regarding qualitative or even plagiarism.</p><p>Tugo Pagano and Maria Alessandra Rossi suggest <ref type="bibr">[8]</ref> that politics aimed at overcoming the disadvantages of excessive privatization of knowledge can play an important role in stimulating the economy. Efforts should be focused to maintain and enhance the role of open science. The institutions of open science have allowed the flourishing of industrial development from the beginning, and should have a much more important role in the architecture of the future post-crisis global economy. This can be achieved through the institute of World Research Organization (WRO) which can master some of the benefits of open science to overcome the well-known free rider problem associated with contributions to the last.</p><p>In 2004, the research group Laboratorio de Internet from Spain, which studies educational and scientific activities on the Internet, started the Webometrics (www.webometrics.info) project with the aim to rate University web sites. The subject of their analysis is the university domain. Webometrics researchers emphasize that the presence of a university website allows to simplify the publication of scientific works by faculty and research staff, compared to the publication in print, and also provides the information the fields of their professional activities. Online publications are much cheaper than paper publications and have broader potential audience. Publishing online facilitates to broadening the access to academic resources for scientific, commercial, political, and cultural organizations both from within a country and abroad. The rating scale is based on the four criteria that take into account the entire Web data within the university domain: Visibility, Presence, Openness, and Excellence. Each criterion has a weight corresponding to its importance <ref type="bibr">[9]</ref>.</p><p>The report by UNESCO on information technology in education <ref type="bibr">[4]</ref> shows that in Ukraine there is a "rapid advancement of ICT into the sphere of education, which needs continuous improvement in the efficiency of use of the new ICT in the educational process, timely updates of educational content, and an increase in the quality of ICT training". However, there are some problems which are primarily associated with the low psychological, methodological, and pedagogical readiness of teachers to the rapid changes in information technology.</p><p>The issue of the openness of an education system and science often comes up in relation to international research funding instruments, such as Tempus, Erasmus, and others, and related projects. Every year, they attract the attention of many Ukrainian and foreign universities, research organizations and structures.</p><p>In 2006-2008 our Kherson State University (KSU) participated in the following European projects: Tempus TACIS CP No 20069-1998 "Information Infrastructure of Higher Education Institutions"; Tempus TACIS МР JEP 23010-2002 "UnіT-Net: Information Technologies in the University Management Network"; US Department of State Freedom Grant S-ECAAS-03-GR-214(DD) "Nothern New York and Southern Ukraine: New Partnership of University for Business and Economics Development", which resulted in the development and implementation of scientific and management processes of analytical information systems and services. More detailed information can be found in the articles by G. Gardner <ref type="bibr">[10]</ref>, V. Ermolayev <ref type="bibr">[11]</ref>, A. Spivakovsky <ref type="bibr">[12]</ref>.</p><p>The results on the interrelation of ICT and educational process and the influence of ICT on professional and information competencies of the future university graduates have been presented in our previous publications <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>. The authors have also conducted the investigation of the technical component of the feedback services implementation in KSU <ref type="bibr">[15]</ref> and their impact on the preparedness of the students to use ICT for educational and non-educational purposes, and forming the ICT infrastructure in a higher educational institution <ref type="bibr">[16,</ref><ref type="bibr">17]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Experimental Settings</head><p>Today, Ukraine possesses a historically established system of scientific training. The foundations of this system were laid in the Soviet Union. This system is very similar to the system of post-soviet countries.</p><p>According to the State Statistics Service, 2011 <ref type="bibr">[18]</ref>, Ukraine had 14 895 "doctors of science" and 84 979 "candidates of science" (the analog of a PhD) covering arts, legal studies, and sciences. Among them 4 417 doctors and 16 176 candidates of science work in sciences. In addition, as reported by the "Voice of Ukraine" newspaper, the National Academy of Sciences of Ukraine employs today 2 564 doctors and 7 956 candidates of science <ref type="bibr">[18]</ref>.</p><p>In the last 19 years the number of researchers in Ukraine, decreased by more than 100 thousand people, while the number of graduate students increased by almost 2 times (Fig. <ref type="figure" target="#fig_0">1</ref> shows an example). The trend similar to the decrease in the research staff members can be observed in the numbers of domestic research and development organizations (Fig. <ref type="figure" target="#fig_1">2</ref> shows an example). In Ukraine there are 988 Dissertation Committees (DC) <ref type="bibr">[19]</ref>. DC are the expert councils in different scientific domains which form the National organizational infrastructure, accepting candidate and doctoral dissertations for examination, doing the expertise, hosting the defenses of dissertations, and further awarding advanced academic degrees. The aim of this infrastructure is to foster the development of the innovative elite of Ukraine which is considered as a driving force for scientific and technological progress. Given the importance of the DC infrastructure, the foci of this study are to:  Assess the openness and accessibility of the preparation of academic staff in Ukraine within the system using the DC.  Specify the requirements for the construction of the ICT infrastructure in this area</p><p>We will analyze the performance of DC based on the following principles:</p><p>1. The availability of information; 2. Openness;</p><p> A university web site provides the information on the DC and a link to its own website  A DC does not have a separate web site, but it has a page on the university web site  A University website provides a brief information about the DC  There is no information about the DC neither on the university website nor in social networks</p><p>2. The openness to the information about a DC for public:</p><p> Any Internet user can see the information  A user can view the data only after registration on the web site  Only the staff and students of the university can see the information</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Feedback facilities:</head><p> Providing a contact phone number;  Providing a contact e-mail address(es);  Providing the list of contact persons;  Providing the Skype ID for contacts;  Providing the schedule of DC works.</p><p>4. The availability of information (pages) in social networks:</p><p> Due to a substantial impact of social networks on the communication among people today, it has been decided to account for the relevant indicators in our study an analysis of the availability of information about DC: the availability of accounts or groups in social networks such as Vkontakte, Facebook, Google+, Twitter  To analyze the availability of video records of defense meetings the analysis of the YouTube content relevant to a DC has been also undertaken 5. The technical characteristics of DC web sites used in our study are detailed in Table <ref type="table" target="#tab_1">1</ref>.</p><p>Table <ref type="table" target="#tab_1">1</ref>. Technical criteria for the analysis and evaluation of DC websites.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Criterion Description Number of Web Pages</head><p>The number of DC-relevant pages on a web site is the indicator influencing the ranking of the site in search results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Frequency of Updates</head><p>The frequency of updating information about the activities of a DC is analyzed using the scale: weekly, monthly or annually Authentication System</p><p>The main elements and authentication mechanism are analyzed under this aspect.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Usability</head><p>The assessment of ease of use and operation of the system is done under this aspect, namely how well, clearly and correctly the interface is implemented and web site is structured. It is also assessed if a user can quickly find the information he or she needs. We conducted a brief analysis of layout. We also checked the availability dynamic elements and search functionality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Platform</head><p>The web sites were categorized as implemented using CMS and handcoded. SEO Under this aspect the ranking of a web site by search engines for specific user requests was analyzed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Validity</head><p>Under this aspect we looked at the number of errors found by the web site validator (http://validator.w3.org/). Multimedia content A study on the website of the libraries of audio and video recordings protections scientific papers, photographs, etc.</p><p>The questionnaire which has been used to survey the use of ICT by graduate students in their preparation to defense consisted of 3 components:  Quantitative indicators of the use of ICT by graduate students in the process of working with their DC.  The availability of training courses for the use of ICT in the preparation to defense  The readiness of the subjects to authorize the open storage of their research results (articles, theses, dissertations) and review materials such as audio, video, etc.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Experimental Results</head><p>The result of the analysis of the websites of the universities of Ukraine regarding the information on DC, personal web pages and sites of DC members is pictured in Fig. <ref type="figure" target="#fig_2">3</ref>. Only 9% of the reviewed DC have their own web sites. 84% of DC related information can be found on University web sites, taking into account that full information concerning the DC activities has been found only for 47% of the reviewed DC. 7% of the reviewed DC have no presence on the Internet. These results pinpoint the major problems in the transformation of the contemporary Ukrainian scientific community into the Open Science community. Only 4 DC web sites exploit a user authentication functionality distinguishing user roles. So, it can be stated that only 1% of the reviewed DC have created some ICT based prototypes for the interaction between the applicants and the Ministry of Education.</p><p>About 30% of the reviewed DC update the information on their web sites every week, whereas 51% of the information on these sites is updated several times per year (Fig. <ref type="figure" target="#fig_3">4</ref> shows an example). Consequently, the question arises on the reliability and relevance of this information. As per the information on the reviewed web sites, the DC have no means to track scientometric indicators of the members of the DC, the candidates for a degree, and persons that had defended their theses in a particular DC, not to mention the presence of analysts defended dissertations and access to them, which makes the qualitative assessment of their activities impossible. 32 websites have usability problems in terms of the ease of use of their interfaces and poorly implemented site (keyword-based) search functionality. The latter is implemented on only 27 of the reviewed resources. Only 17 of the examined web sites provide the information on or references to resources like a "library".</p><p>Regarding the minimally present contact information of a DC (a phone number, address, contact person name, document templates), it is provided only on 4 of the reviewed web sites. Moreover, the contact phone number is mentioned only on 2 of them. Thus, in order to find the information a DC of relevance to a PhD project, one should get their list and addresses in the Ministry of Education and Science of Ukraine (where one also needs to go) and search for a relevant DC at the specified address. This is only the first problem in the application process. The required documents have also to be submitted to a DC by coming in person, since there is not a single web site that allows you to exchange the information and documents with a DC in the process of registration, filing and review of the thesis and so on.</p><p>The results of the review of the availability of information about Ukrainian DC in social networks are shown in Fig. <ref type="figure" target="#fig_4">5</ref>.</p><p>As can be seen in Fig. <ref type="figure" target="#fig_4">5</ref>, 14 DC have a personal group or page in Vkontakte, 11in Facebook, 7in Twitter and 4in Google+. It is also important that YouTube is used, though to a small degree. So, a certain degree of openness of our science may be noted, in particular the openness of the preparation of the scientific staff.</p><p>The analysis of quantitative indicators of the use of ICT by graduate students for working with a DC is shown in Table <ref type="table" target="#tab_0">2</ref>. The study reveals that only 2-3% of the respondents know what is a scientific database (SDB) or a citation index, 7% use these systems from time to time to find the necessary information, and only 4% have their own profiles in such scientometric systems and databases like Scopus, Google Scholar, Mendeley, RSCI or others. It is important that the majority of the respondents are not interested in creating their own profiles in such scientometric systems. The main reason for that is the lack of recognition of their utility. Moreover, some of the profiles were created directly by the organizations where scientists work, or automatically by the systems that store their scientific articles. Thus the majority of respondents did not know whether they have a profile in any of the systems, whether these exist or not. 80% of respondents do not think much about how their scientific publications are stored -in a paper or electronic form, and they believe that it is not of great importance. Thus, the majority of publications are going out of press in a paper form and are not further digitizedso remain unavailable to the scientific world. 93% of respondents answered negatively about attending any course (or lectures) to get prepared for the use of ICT in their dissertation project (SDB, repositories, etc.).</p><p>Analyzing the readiness to the open storage of research results (articles, theses, dissertations) and materials of dissertation defense such as audio or video, we observes the following:</p><p>1. The majority of the respondents (80%) support the publication of electronic copies of their scientific papers on the Internet, but at the same time consider it unnecessary and inconvenient. Further, all the respondents point out that the Ministry of Education and Science of Ukraine (MESU) has the publication requirements (regarding the number of papers and form of publication, paper or electronic) to qualify for a degree which do not motivate providing open access. MESU requires that a qualified candidate has 5 publications at the MESU approved venues, one of which can only be published in an electronic edition and another one in an international or indexed international SDB. Thus, none of the applicants target to publish the electronic copies of their papers on the Internet. In some cases, this problem is solved by posting electronic copies on a digest web site or putting these into an electronic repository of a scientific institution of the applicant. Otherwise the articles remain inaccessible to the outside world. 2. The Problem with open access to the protected dissertations and abstracts is identical to the previous. In addition, the human factor needs to be taken in consideration. Providing free access to abstracts or theses means making these open for further examination after publication, hence the increase of the author's responsibility for its contents and quality. Therefore, open storage of scientific work of this type stimulates quality improvement. We see it in the results of the evaluation of the respondents ' answers to this question. Notably, 80% of the respondents agree that the understanding that their work could be read by any other scientist clearly affects the quality of publications.</p><p>As an example, let us compare the quantities of the full versions of theses and abstracts stored in the repositories in Ukraine to numbers in the repositories in Germany, Great Britain, and Spain (top 30 repositories of each country rated by Webometrics, http://www.webometrics.info, were examined)see Table <ref type="table" target="#tab_21">3</ref>. Ukraine has 38 repositories in total while having more than 400 universities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Our Vision of an ICT Infrastructure for a DC</head><p>As experimentally proven above, the effective implementation of the elements of OS must assume the existence of an appropriate ICT infrastructure as a scientific and educational system as a whole and its component parts (schools, universities, DC, and others) in particular.</p><p>The main elements of the ICT infrastructure of OS are researchers (academic staff), data and processes.</p><p>Speaking of ICT infrastructure DC we can determine its components as follows:  Researcherthe applicants, the members of a DC, the employees of MESU, and other users of the system have access to relevant information and participate in information processing, communication, and computing processes  Datainformation about the work of DC, their employees, applicants, archives of theses, scientific publications, etc. as a tool to open exchange, recombination, and reuse are the important components of the infrastructure;  Processthe procedures, services, tools, and methodologies that are used to collect, perform the transformation, analysis, visualization and storage of data, build models and simulations. The management of these processes is done both on the side of users (researchers) and of the specialized services and systems. As pictured in Fig. <ref type="figure" target="#fig_5">7</ref>, all the user roles have both generic and specific abilities in using the system. All roles can retrieve publicly available information while working with documentation is allowed only to certain roles.</p><p>The workflow of the system is presented in Fig. <ref type="figure" target="#fig_6">8</ref> and proposes almost complete automation of all communication processes. It should be noted that the implementation of a similar service involves not only the functionality described above, but also the implementation of some add-ons and extra features. One of the additional features of interest is related to solving the problem of retrieving the information about the available DC discussed above. The task of collecting correct and complete scientometric data regarding the DC members, candidates, and graduates is of particular importance and interest. It is difficult to compile by hand a report for an individual DC based on the scientometric information even if all the mentioned actors have their profiles, say at Google Scholar. The task of reporting about all relevant DC, or the graduates interested in applying to a relevant DC, is even more complicated. We currently possess a number of modules relevant for the solution of this problem. For example, the problem outlined above may be solved using our publication.kspu.edu service. The main task of this service is automating the collection and processing of information on scientometric indicators of scientist retrieved from his or her Scopus and Google Scholar profiles and building consolidated ratings for departments, institutes, and universities.</p><p>The service provides the possibility to generate the required scientometric indicators and ratings on the DC web site, hence offering an additional degree of openness of their activities. In addition, we assume that this form of presenting information contributes to establishing vigorous competition in the research staff training market, and therefore has an impact on the quality indicators.</p><p>An electronic repository of a DC is also a mandatory component of the system which store all theses and abstracts in electronic form and, if possible, in the public domain.</p><p>The competition on the market puts in front the requirement of using social networks in the activities of a DC. The results of the study presented in Section 4 provide clear evidence about their rare use. We believe that the inclusion of the use of social networks in the workflow will provide a valuable addition to the information and communication services of the architected infrastructure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Concluding Remarks and Future Work</head><p>Building a system of efficient education and science in Ukraine today is complicated by many serious problems. In the last 15 years we observed a decrease in the number of scientists in the country. At the same time, the numbers of postgraduates and doctorates are increasing.</p><p>A system of training of scientific personnel in Ukraine is among the most restrictive and closed ones in the world. A similar trend is observed in the majority of post-soviet countries. The proportion of scientific research results published under a open access is still very small compared to the level of ICT development. The main part of research results still remains inaccessible for an external users.</p><p>The use of ICT in training scientific personnel and representing the results of their research appears to be extremely weak. The preparation, protection and storage of information is done without using ICT, therefore it requires significant time and resource.</p><p>To partly overcome some of the problems, we propose a concept of the ICT infrastructure for the interaction of researchers, a DC, and the Ministry of Education and Science of Ukraine. The main elements of this infrastructure are the following: the web sites and services for supporting the applicants to a DC; the services and systems of interaction between a DC and the Ministry of Education and Science of Ukraine; electronic data storages for publications, theses, and abstracts; decreasing of time spent on a research process without harming its quality; additional expertise; transparency and credibility of research; building qualitatively new communications between scientists; ability to obtain research information swiftly and in required forms (especially government); fighting corruption (decreasing human factor in DC activities).</p><p>An important and influential part of establishing an effective process for training scientists is training researchers to use this process and respective tools based on ICT. Training scientists to use ICT in their research activities creates additional opportunities for scientific and technical progress. This training can be conducted in magistrates, postgraduate and doctorate curricula. In this research we presented the project that is now being realized using the DC in Kherson State University as a case study. The next phase of our research is the investigation of the efficiency of using the described model and its influence on qualitative characteristics of science.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Ukrainian education has always tried to involve leading technologies and tools that have spread in the world and improve the level of education of ordinary Ukrainians. That is why since the end of the last century information technology has started to be actively implemented in the learning process (also in mathematics). Specialized software appeared and the main purpose of them was computational and visual support of solving of math problems. Later the software, that allows to model processes and to observe the changes in constructions, appeared. But the use of such software was limited in schools because of a number of reasons, among which the insufficient technical equipment of schools, the lack of targeted preparation of teachers to use specialized software, the lack of software with a clear (Ukrainian, Russian) interface, a small number of teacher's guides, etc. Now there is a great amount of software which can be used in teaching mathematics. We previously conducted an analisis of the current tendencies of mathematics software use in education in <ref type="bibr">[1]</ref>. But the workload of school teachers does not let them to monitor the appearance of such software, to learn the tools and to use them at their lessons. The main part of Ukrainian math teachers are 40 and more years old. This means that they were not acquainted with mathematics software during their preparation, and they used information technologies on the level of Internet users and Word, Excel, owerPoint. They do not use software consciously, because they believe that chalk-and-Board style is better at studing mathematics.</p><p>These and other reasons have led us not only to enter the Special course of the study of mathematics software in the curricula of preparation of modern teachers, but to study the impact of this course on the willingness and the readiness to use mathematics software in the professional activity of math teachers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Research of the Willingness and the Psychological Readiness of Future Math Teachers to Use Dynamic Mathematics Software</head><p>During 2010-2014, we have investigated the problem of the willingness and the psychological readiness to use mathematics software by future math teachers <ref type="bibr">[2]</ref>.</p><p>We allocate dynamic mathematics software (DMS), that can model and modify mathematical objects interactively. We consider Gran, DG (Ukraine), GeoGebra (GG, Austria), MathKit, Live Mathematics (LM) (Russia), Cabri (France), The geometer's Sketchpad (GS, USA), etc. We allocate these software for the following reasons: 1) software Gran and DG are recommended by the Ministry of Education and Science of Ukraine; 2) software MathKit and Live Mathematics are actively used by Russian teachers, as evidenced by a great number of methodological works of math teachers; 3) software Cabri, The geometer's Sketchpad and GeoGebra are the most popular in the world, as evidenced by the numerous translations of monographs and multi-lingual interfaces of these software.The work with them intuitive and identicalbasic objects are built, then they can be dynamically changed and user can observe certain quality properties and quantitative characteristics. The study of features of these software and recommendations for their use are generalized by us in <ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref>.</p><p>The base of the reaserch was Sumy Makarenko State Pedagogical University. Preparation of math teachers is in accordance with the curricula. The introduction of these software was during the study of methodology of mathematics and during the study of a special course "Computer Applications in the Study of Mathematics" (further Special course). The program of the Special course was described in <ref type="bibr">[11]</ref><ref type="bibr">[12]</ref><ref type="bibr">[13]</ref> and was improved during the years 2008-2014. The experience of the involvement of dynamic mathematics software in support of teaching mathematics in the school was during teaching practice (see Table <ref type="table" target="#tab_1">1</ref>). At the beginning of the teaching practice students learn how to solve mathematical problem with the use of dynamic mathematics software (DMS) at the lessons of Special courses. During the teaching practice they have the opportunity to see (or not to see) and analyze lessons of those teachers who use DMS in their own professional activity.</p><p>We believe that during this period the basis for the motivation of the learning and further use of DMS in professional activities is formed. Therefore, the Special course, which is studied immediately after the teaching practice, becomes the factor of impact on the student, which gives the opportunity to talk about the willingness and the readiness to use DMS in the future professional activity.</p><p>Because these personal characteristics can be formed within the teaching of the Special course, it was natural to involve such statistical methods, that give the opportunity to talk about the dynamics of change based on data about the initial and final state of the object. So we fixed the internal state of the willingness and the psychological readiness of the student to use DMS with the help of questionnaires at the beginning and at the end of the study of the Special course (see Table <ref type="table" target="#tab_0">2</ref>). Specify a priority of DMS, which is better to use at math lessons on Your opinion.</p><p>It was applied the McNemar's test <ref type="bibr">[14]</ref>, because the scale of results in questions 1-3 has two items ("Yes" or "No"). This method is nonparametric and used to compare distributions of objects in two sets according to some property on the scale with two categories (e.g., "like -dislike ", "ready -not ready," "willing -unwilling" and others).</p><p>For a McNemar's test the following conditions are required: 1) random sample; 2) dependent sample; 3) pairs (х і , y i ) are mutually independent (the members of the sample have no effect on each other); 4) the scale has only two categories.</p><p>The research was conducted from 2010 to 2014. Each year we have accumulated the results of the sample with volume <ref type="bibr" target="#b168">37,</ref><ref type="bibr" target="#b166">35,</ref><ref type="bibr">38,</ref><ref type="bibr" target="#b168">37,</ref><ref type="bibr">31</ref>, respectively. The total number of respondents amounted to 178 people. We selected results from them at random.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">The Use of Dynamic Mathematics Software in the Study of Mathematics in Secondary Schools</head><p>The beginning of our research was associated with the study of the status of the use of DMS in the study of mathematics in secondary schools. Through conversations with teachers, graduates, teachers-methodists of our region it was found that the "poor" use of DMS in the learning process is not only due to the limited number of computers in schools, but due to lack of the willingness of teachers to involve such software to the solution of mathematical problems. Although they did not deny the feasibility of this approach, but noted, among other things, about the inability to use DMS (68%), the need for additional time to study them (87%), the small number of methodological literature on the use of DMS (90%) and the lack of collections of tasks, which can be solved by using DMS (36%).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">The research of the Willingness of Future Math Teachers to Use Dynamic Mathematics Software in Their Professional Activities</head><p>Searching for ways to solve the problem, we have suggested that a focused study of the Special course will have a positive impact on the willingness of future math teachers to use DMS in their profession.</p><p>The test of the assumption was carried out according the McNemar's test on taken results in the amount of 30 pieces from 178 at random.</p><p>Hypothesis 0 : the Special course does not impact on the willingness of students to use DMS in the future math teacher's profession. Hypothesis а : the Special course has a positive impact on the willingness of future math teachers to use DMS.</p><p>We had two series of observations: Х={x 1 , x 2 , …, x N } and Y={y 1 , y 2 , …, y N }, where (х і , y i ) are the results of measuring of the willingness to use DMS in the future professional activity of the same object (the willingness of the student before and after the Special course). In our notation, x і or y і takes the value 0 if the object of study does not wish to use DMS at any of the classes (algebra, planimetry, analysis, solid geometry) and 1 otherwise. The results of the dual survey recorded in the Table <ref type="table" target="#tab_21">3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 3. The survey on the willingness to use DMS</head><p>The second surve The first surve y i =0 y i =1 x i =0 а=6 b=10 a+b=16</p><p>x i =1 c=2 d=12 c+d=14 a+c=8 b+d=22 N=30</p><p>In the conditions of the experiment parameter а determined the number of students who both times said "No"; the parameter b was the number of students who the first time said "No" and the second time said "Yes"; the parameter c was the number of students who the first time said "Yes" and the second time said "No"; the parameter d was the number of students who both times said "Yes".</p><p>To apply the McNemar's test we will find Т exper = min(b,c), if n = b + c &lt; 21. For our data Т exper = 2, since n = 10 + 2 = 12 20. Statistics of the criterion for significance level α = 0,05 is р = 0,019. According to the rule of decision <ref type="bibr">[14]</ref> we have 0,019 &lt; 0.025. We have to reject hypothesis Н 0 and accept the alternative one, and since b c, then we consider that the impact of the study of the Special course on the willingness to use DMS is not only statistically correct, but also positive.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">The research of the Readiness of Future Math Teachers to Use Dynamic Mathematics Software in Their Professional Activities</head><p>In parallel with the research of the willingness to use DMS we explore the personal readiness of future math teachers to use DMS in their professional activities (question 3 of the questionnaire).</p><p>The hypothesis H 0 : the Special course does not impact on the psychological readiness of students to use DMS in their professional activities.</p><p>Then the hypothesis а : the Special course impacts on the psychological readiness of future math teachers to use DMS.</p><p>The test of the assumption was carried out according the McNemar's test on taken results in 40 pieces from 178 questionnaires at random (see Table <ref type="table" target="#tab_9">4</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 4. The survey of psychological readiness to use DMS</head><p>The second surve The first surve y i =0 y i =1 x i =0 а=7 b=16 a+b=23</p><p>x i =1 c=6 d=11 c+d=17 a+c=13 b+d=27 N=40</p><p>Since n = b + c = 22 20, the statistics of criterion is calculated according the formula Т exper = (bc)^2 / (b + c) = 4,54. The assumption of the fairness of the null hypothesis is approximated like the χ 2 distribution with one degree of freedom (υ=1). For significance level α=0,05 the critical value of the test is Т critic =3,84. The obtained value of Т exper =4,54 Т critic =3,84, therefore, the hypothesis 0 is rejected and the alternative hypothesis, indicating that the impact of the Special course on the readiness to use DMS in future professional activity is significant and cannot be explained by random variation, is accepted.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4">The research of the Willingness of Future Math Teachers to Use Different Dynamic Mathematics Software in Their Professional Activities in Teaching of Some Subjects</head><p>Because the questionnaire was on the research of the willingness to use DMS at the lessons of algebra, planimetry, solid geometry and analysis, and on the research of the use of different DMS (Gran (Gran1, Gran2Н, Gran3Н), GeoGebra, abri, MathKit, DG, GS), we were able to fix and process results about the willingness to use DMS in teaching of some subjectsalgebra, planimetry, solid geometry, analysis (see Table <ref type="table" target="#tab_3">5</ref>) and about the willingness to use different DMS -Gran, DG, GeoGebra, MathKit, GS, abri (see <ref type="bibr">Table 6)</ref>.</p><p>For each position of the table 5 we have the rejection of the null hypothesis H 0 and the acceptance of alternative hypothesis, i.e., at the significance level α=0,05 we can say about the positive impact of the studing of the Special course on the willingness of future math teachers to use DMS at the lessons of algebra, planimetry, analysis and solid geometry. For indeces of the table 6 we have the acceptance of hypothesis H 0 for the last two rows. This means that at the significance level 0.05, future math teachers wish to use software Gran, DG, GG, MathKit, but we have no reason to say about the willingness to use GS and Cabri. We can explain this because of "poor" interface of GS and the absence of Ukrainian (or Russian) interface of Cabri.</p><p>Visualization of the obtained results during the experiment years is given in Fig. <ref type="figure" target="#fig_217">1-2</ref>. Also we give some information about the "attractiveness" of software according to the survey of future and working math teachers, which was conducted at scientificmethodical seminars (on the basis of physics and mathematics faculty) (see Table <ref type="table" target="#tab_6">7</ref>, Fig. <ref type="figure" target="#fig_220">3-10</ref>).  Because the questionnaire was on the research of the psychological readiness to use DMS at the lessons of algebra, planimetry, solid geometry and analysis, as well as the readiness to use different DMS (Gran (Gran1, Gran2Н, Gran3Н), GeoGebra, abri, MathKit, DG, GS), then we could fix the results of the readiness to use DMS in teaching of different subjects (algebra, planimetry, solid geometry, analysis) (see Table <ref type="table" target="#tab_7">8</ref>). For all items, except the last, we have the rejection of the null hypothesis H 0 and the acceptance of the alternative hypothesis, i.e., at the significance level α=0,05, we can say about the positive impact of studing of the Special course on the psychological readiness of future math teachers to use DMS at the lessons of algebra, planimetry, analysis. However, experimental results do not give grounds to say about the positive impact on the readiness to use DMS at the lessons of solid geometry. Increase in the number of students who feel the readiness to use DMS at the math lessons is presented in Fig. <ref type="figure" target="#fig_9">11</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Conclusion</head><p>Thus, this research allows to state the following.</p><p>1. Future math teachers understand the need to use DMS and welcome the studing of the Special course, since the research of the willingness and the readiness to use DMS demonstrates a positive dynamics. The assumption about the positive impact of the studing of the Special course on the psychological state of students is confirmed at the significance level of 0.05 according to the McNemar's test. In other words, after the studying of the Special course "Computer Applications in Teaching Mathematics" the number of students, who have the willingness and feel the readiness to use DMS in future professional activity, increases.</p><p>2. Most students focused on using DMS at the lessons of algebra, planimetry and analysis. We explain this because of not only a sufficient number of DMS and good tools in such software, but enough number of teacher's guide for their application and free access to DMS with Ukrainian or Russian interface.</p><p>The percentage of students, who are willing to use DMS at the lessons of solid geometry, is too small. We explain this not only because of small number of software and "poor" tools in such software, but of lack of Russian or Ukrainian interface in them. Also there is the lack of methodical material of solving solid geometry problems with the use of specialized software.</p><p>3. Teachers, who work at the school, have the willingness and the inner readiness to use DMS, but face with the limited access to computer classes. The involvement of DMS, as they say, is possible only during extracurricular activities. <ref type="bibr">4</ref>. GRAN and GeoGebra are the most popular in Ukraine. In recent years there has been a decline in the use of the first and great attachment to the second. We explain that because of free access and frequent updating of GeoGebra, the steady growth of its tools (in particular, the version GeoGebra 5.0 with 3d-tools was tested in 2013, and is distributed now).</p><p>5. Russian software athKit finds his supporters (the latest version is license, but the early versions can be found in Internet). It is attractive because of "rich" tools and automated control, which is not provided in other DMS. <ref type="bibr">6</ref>. Students and teachers prefer Gran and DG. We explain that because of the free distribution, the Ukrainian interface, a sufficient number of researches in periodicals, the recommendations of the Ministry of Education and Science of Ukraine (also at the lessons of computer science).</p><p>Note that students prefer GS, MathKit and abri more then teachers. We explain that becourse of the lack of Ukrainian interface, the license and the unwillingness of teachers to work with unfamiliar DMS.</p><p>7. According to the research we note the increasing demand for GeoGebra (it was pointed out by the future and working math teachers). We believe that it is necessary to pay attention just at it, because GG is continuously updated, freely distributed, has interface on 30 languages, that confirms its popularity.</p><p>8. Future research should be conducted towards the creation of methodical support of school math courses based on GG. During the preparation of future math teachers we need to focus not only on traditional for the Ukrainian school software Gran, DG, but also on the other DMS, which are widely distributed in Internet and used by teachers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Online learning uses technology and electronic media for delivering and receiving courses. It is considered as most promising development in education that provides education with technology. With technology globalization, the concept and methodology of learning, and teaching has undergone a change. The technology usage in education provides global learning environment that allows accessing the course material anytime, anywhere, connect other students, and get access to the content without considering any geographical boundary. The significant changes in technology usage in online education has seen emergence of MOOC in 2008. It is a popular way to offer online courses globally by the universities and education providers.</p><p>MOOC uses web-based tools and environments to deliver education <ref type="bibr">[1]</ref>. It provides online courses aimed at unlimited participation and open access via the web <ref type="bibr">[2]</ref>. It is being used across the globe for offering online courses. Some of the popular MOOC providers are -Coursera<ref type="foot" target="#foot_0">1</ref> , edX <ref type="foot" target="#foot_1">2</ref> and Udacity<ref type="foot" target="#foot_2">3</ref> in United States, FutureLearn <ref type="foot" target="#foot_3">4</ref> in United Kingdom, iversity <ref type="foot" target="#foot_4">5</ref> in Germany, FUN <ref type="foot" target="#foot_5">6</ref> in France and MiríadaX <ref type="foot" target="#foot_6">7</ref> in Spain <ref type="bibr">[3]</ref>. The course lectures in MOOC are delivered in different formats, like, text books, lecture slides, academic papers, tutorial notes, video lectures, blog posts, article links, quizzes and assignments.</p><p>In MOOC, video is a primary delivery mechanism to publish the recorded lecture content. It consists of audio (voice of instructor), visual (video of lecture) and text (caption/transcript/subtitles) in one package. The study of edX <ref type="bibr">[4,</ref><ref type="bibr">5]</ref> analyzed that students spend most of their time on video lectures. With the increasing popularity of the video lecture, MOOC providers are continuously improving video lecture content delivery as well as its production.</p><p>A video lecture in MOOC is a combination of several elements like, lecture by the teacher, quiz, and lecture slides. For viewing the video lecture, MOOC provides an interface to the student. The video interface has several controls, using which the student can perform settings for the view of the video lecture. The content in video lecture is delivered in different types and formats. The accessing of the content is possible with video lecture options.</p><p>For offering MOOC, interested institutions have an option to go for self-hosted platforms or use proprietary platform. When using self-hosted platform, the providers have a choice to 1) develop their own MOOC platform, or 2) use open source platform.</p><p>Generally, the open source platform is a preferred choice, which may require modification and customization as per the user needs. When developing a new MOOC platform, there is a need to specify the features that has to be provided to the video lectures presented here. Although video lecture are being delivered by MOOC providers, there is no mention of its feature specifications.</p><p>In this paper, we focus on creation of the requirement checklist for the video in MOOC. It helps during the development, in selecting and specifying the requirements for video lecture to be included in MOOC.</p><p>Here, we present the feature requirement of video lecture that facilitates selecting requirements for functionalities of video in MOOC. The functionality of MOOC video is classified in two components, namely, 1) Video Interface, and 2) Video Lecture Content. It aids the MOOC platform developer during requirement specification phase. The features required for MOOC video can be selected from checklist.</p><p>For formulating the feature checklist of video lecture in MOOC, a study of MOOC platforms was conducted. We chose popular MOOC providers that provide different functionalities for delivered video lecture. We studied Coursera, edX, and Udacity. "Coursera is by far the largest MOOC provider" <ref type="bibr">[6]</ref> reported by Class Central. The most popular MOOC providers as reports by <ref type="bibr">[7]</ref> [8] <ref type="bibr">[9]</ref> are Coursera, edX, and Udacity. Since these are using different platforms, covers diversity in terms of functionalities provided and mechanism used to deliver video content, our analysis can be applied to any video lecture in a MOOC.</p><p>The video feature requirement presented has been used to a few open source platforms to identify the functionality provided by them. The checklist of feature has been applied for the functionality visible to student.</p><p>In this paper, Section 2 is a survey of related work. Section 3 provides an overview of the video lectures in MOOC. Section 4 explains the methodology used for our study. Section 5 discusses the controls of video interface. Section 6 explains the video lecture content. Section 7 describes the analysis of video lecture feature in detail. <ref type="bibr">Section 8</ref> illustrates some examples on which our analyzed features have been applied. Section 9 lists the benefits. Section 10 enumerates the limitation. Section 11 states the conclusion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related Work</head><p>For video in MOOC, much work has been done related to understanding student behavior. In <ref type="bibr">[4]</ref> [10] <ref type="bibr">[11]</ref> [12] <ref type="bibr">[13]</ref>, student behavior is studied in quantitative way. The analysis using edX <ref type="bibr">[4]</ref> and Coursera course <ref type="bibr">[10]</ref> focus on student engagement using action time of students. Student engagement studies using different methods, for example, using clickstream metrics <ref type="bibr">[11]</ref>, navigation study <ref type="bibr">[12]</ref> and use of framework <ref type="bibr">[13]</ref>. The qualitative findings of clickstream are combined with cognitive science <ref type="bibr">[11]</ref> and student's goals <ref type="bibr">[10]</ref>. These studies have not focused on video lecture particularly.</p><p>Some authors <ref type="bibr">[14]</ref> [15] <ref type="bibr">[16]</ref> focuses on different aspects of videos, like, the video interface, its features and properties. Guo et al. <ref type="bibr">[14]</ref> studies the student behavioral on edX platform using different properties of videos like, length, speaking rate, video type, and production type. Guidelines for the video lecture are presented by Chorianopoulos et al. <ref type="bibr">[15]</ref> with the focus on video style, editing, sharing, controlling and analytics. In <ref type="bibr">[16]</ref> Kim et al. define design implication guidelines for video interfaces based on the student engagement, like, providing shorter videos and navigation links.</p><p>Ortega et al. <ref type="bibr">[17]</ref> perform a study based on different ECO MOOC platforms OpenMOOC, Open EdX, iMOOC etc. and external MOOC platforms -Coursera, Udacity, MiriadaX, OpenCourseWare-MIT, Futurelearn, and iversity. Their focus is to study "accessibility" of MOOC platform including the video lecture. The recommendations are about subtitles (vocal or non-vocal sounds), secondary screen integration, downloadable text, possibility of text reader processing, interface navigation by keyboard. However, this study is based on the published literature only and does not cover the different aspects of video lecture.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Video Lectures in MOOC</head><p>Video lectures are the pre-recorded learning material that acts as a medium of communication between the student and lecture. In MOOC, the video lectures are primarily used to deliver lecture content. MOOC video lectures are considered as central to the student learning experience <ref type="bibr">[14]</ref>. The courses are structured as list of video lectures consisting of activities and contents, like, walkthroughs, assessment problems, quizzes etc. Students need to watch the video lectures of the courses for learning. Video provides self-regulated and independent learning. It has transformed the traditional classrooms by replacing "one-size-fits-all" approach with self-paced learning, and from curriculum/teacher centric to student centric learning.</p><p>Video in MOOC provides an interface to the students for managing the delivered lecture. The interface provides different kinds of controls to the students. These controls help to, navigate and view the content by play, pause, stop, increase/decrease speed, volume and toggling to full screen mode etc. It also allows the student to download the video in different formats and view it offline. The video lectures may also be made available to students who are not enrolled in the course, via YouTube <ref type="foot" target="#foot_7">8</ref>and other video sharing websites.</p><p>The video lecture content is the lecture delivered by the teacher which may contain caption and in-video activity like, quiz. The lecture material provided with a video lecture may be presentation slides, transcript of video, related document etc. The lecture material is provided in different formats. According to Clark and Mayer <ref type="bibr">[18]</ref>, the transcript helps in understanding the complex domain-specific video lecture content. Sometimes the text content of video is presented in different languages. Different MOOC providers use different types of video presentation styles, lecture material, video interfaces and activities for the video lecture.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Methodology</head><p>MOOC providers use diverse mechanisms to deliver their video lecture. Videos are different in terms of the available features, delivered content and formats and interface used to display the lecture video. The features not only vary with the provider but even with change in MOOC with the same provider. We gathered the information about video by viewing the video lectures by different MOOC providers.</p><p>For our study, we selected three most popular MOOC providers -Coursera, edX and Udacity. For our sample data set, we identified courses provided by various universities in different areas, for diversity. The courses provided by universities, like, Stanford, Duke and Harvard; in subjects like, medical chemistry, biology and computer science, were selected. We watched more than two thousand videos across the three different providers and manually analyzed them. Our sample set includes videos of short and long duration, interactive and non-interactive with different presentation styles. Table <ref type="table" target="#tab_1">1</ref> shows MOOC providers, courses offered, university offering the course and number of videos viewed, from the selected sample.</p><p>Our experience and observation while watching the video lecture act as the baseline for the extraction of features and their segregation into different categories.</p><p>The long duration videos are time consuming to watch. So it is required to skip some portions of video but not to miss any important feature. For this reason, the frame of the video must be seen at any instant of time to check the relevance of that frame. This kind of provision is provided by the feature named as Poster Frame. But it is not provided by all platforms. As a result, the video need to be watched either by simply play or by fast forwarding the video using speed +. During playing a video lecture in edX, it showed an error once. Since edX provides help support we reported the problem and got it resolved. The reason behind this kind of problem is, at times the video player is not supported by the all browser. Therefore, we may need to change the player which is possible using change player feature as provided by Coursera. The language barrier is also a problem noticed in a few courses. According to nationality of different instructors, accent and vocalization of the lecture instruction varies. So the availability of caption on the video interface panel is very helpful for better understanding of the content. Also, the caption provides multilingual support.</p><p>1) Display time shows the current time during video watching and total duration of the video. 2) View setting is related to playing the video, like, play/pause, change volume or speed of video. By default, the video is displayed in normal mode which can be toggle to full screen mode. View settings allow the student to control the setting for play ( ), pause ( ), speed (+/-), volume (+/-), full screen mode ( ), navigate to previous/next videos ( , ) etc. It also allows setting for rewind and replay ( ) video. 3) Advance setting include are additional controls provided on the video interface. It allows the student to switch to HD mode to watch video lecture with better quality. The poster frames of the video on time bar seen at any time without playing it are part of advance setting. The settings also provide multiple video player facility which allows changing the player. The video text is provided in different languages that can be chosen from the caption option.</p><p>The format of the caption can also be changed like, font and background color, opacity of window. The controls for advance setting may or may not be provided in all video interfaces. 4) Help Support allows reporting of problem faced during the watching of video lecture. Discussion forums are provided for problem reporting. Help for shortcut keys allow interface navigation using the keyboard. Different MOOC providers provide different kinds of controls on their video interface. Display setting and view settings are among the common controls provided on video interface. Fig. <ref type="figure" target="#fig_0">1</ref> shows different controls available in the video interface of a video lecture in Udacity -progress bar, caption text, play/pause, volume slider, current time/total time of video, full screen mode, add to watch later, watch on YouTube, caption on/off and language selection, and setting for selecting speed, video quality, and subtitle options.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Video Lecture Content</head><p>The video lecture content is the lecture delivered by the teacher which may contain caption and in-video activity like, quiz. The support material provided with a video lecture may be presentation slides, transcript of video, related document etc. The support material of the lecture is provided in different formats. The transcript helps in understanding as it provides text of the instruction given by video lecture instructor. Sometimes the text content of video is presented in different languages. Different MOOC providers use different types of video presentation styles, support material, video interfaces and activities for the video lecture.</p><p>The lecture content of the video has some activities embedded in it for better explanation and interaction with the students. The video lectures also have accompanying material that helps in better understanding of the lecture. We categorize the content of video lecture into two parts-1) Lecture Material and 2) Embedded Quiz.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>1) Lecture Material-</head><p>The video lecture content is provided in the form of slides, video of the lecture, transcript of the video etc. The content is available in different formats, for example, mp3/mp4, ppt and pdf. The lecture material can be downloaded to support offline learning which may also be available in different qualities.</p><p>2) Embedded Quiz is the in-video activity that is incorporated to make video lecture session more interactive. Students can attempt the quiz while watching the video lecture. The quiz has several options and parameters, like, question type that may be Multiple Choice Question (MCQ), true-false or descriptive.</p><p>Different types of video lecture content are delivered by the MOOC providers which have diverse features and controls.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Video Lecture Feature Checklist</head><p>The features provided by each MOOC platform vary. Therefore to understand the features of the video lecture in MOOC, the analysis has been performed on video lecture of three popular MOOC providers -Coursera, edX and Udacity. In our study the main focus is to identify the features of the video lecture in MOOC. The video lecture in MOOC consists of two components -Video interface and Video Lecture Content. We arrive at the detailed feature checklist by identifying the features provided by each component of video lecture. We analyzed the features for video lecture components including their presentation style.</p><p>Video Interface provides controls to the student for viewing the video lecture in MOOC. The features provided by video interface are mainly controls that provide control of the interface to a student. A video lecture also provided different types of content to their student. Video lecture content provided several options for accessing the lecture material. The categorization of video interface and video lecture content helps to segregate the provided controls, features and presentation style, from student's perspective.</p><p>For arriving at the feature checklist, the features provided by the component and control identified in previous sections are applied on the chosen MOOC providers of our study. From our analysis we find some of the features are provided by each of the MOOC providers, like, current/total time, play/pause, and video mp4 format support. It suggest that these are the basic features need to be made available for student. The inclusion of some feature provides better functioning but does not affect the basic functioning of the video lecture. For example, availability of HD support, multiple languages for caption, availability of different quality video named as optional or advance features etc. These are named as optional or advanced features.</p><p>The different levels of availability of feature or control from student's perspective, are classified into three catagories- Basicare the most important features that are available in all platforms. It is denoted by weight "3".  Optionalare the features that are not necessary but may be helpful. The feature supported by any of the two platforms is an optional feature. It is denoted by weight "2".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>Advancedare the features that are required for specific purpose. Feature available only by single platform is an advanced feature. It is denoted by weight "1".</p><p>On the basis of availibility of a feature, weights are assighned to each identified feature. The weighted feature checklist of features helps to select the features and options that need to be made available to a student in video lecture of MOOC. Table <ref type="table" target="#tab_0">2</ref> lists the weighted feature checklist of video lecture in MOOC. Each feature is presented in different way by the MOOC providers.</p><p>The Video Interface and its options are provided in diverse styles. It is displayed either as a separate pop-up window or incorporated in the lecture page. Each provider use different presentation style for viewing controls, like, video speed is displayed in terms of range of pixels from .50x to 2.0x. Navigation of the video lecture is control using previous/next control, selecting from the video lecture list or from the progress bar that displays the video lectures. An advance setting control, to change format of the caption allow changing font (family, color, size), background (color, opacity), window (color, opacity), character (edge, style) and text opacity. Help support controls are provided as help, discussion forum, mail etc.</p><p>Video lecture Content is presented in different presentation styles. The activities are displayed in the progress bar. For example, color variation is used to differentiate, invideo activity inclusion, visited, playing video etc. Embedded quiz in the video are incorporated at different places either in between or at the end of video. Quiz further has various parameters that need to be considered. The quizzes differ in types, options available, question types etc. For example, quiz may be graded or non-graded; different controls in quiz; type of questions in quiz -MCQ, descriptive and true/false; correct answer response for the attempted question, and many more. The presentation style of the video interface and video lecture content are summarized in Table <ref type="table" target="#tab_21">3</ref>.</p><p>Table <ref type="table" target="#tab_0">2</ref>. The weighted feature checklist of video lecture of some MOOC providers.  <ref type="table" target="#tab_21">3</ref>. Presentation style of video lecture of some MOOC providers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Case Study</head><p>The features of the MOOC video has been applied to three open source MOOC platforms. Sakai 9 , Open edX 10 , CourseBuilder 11 are MOOC platforms of Sakai foundation, edX and Google respectively, whose video interface have been chosen for our study. Study is focused on the two components of video lecture named, Video Interface and Video Lecture Content, and features provided to a MOOC student.</p><p>Sakai is an educational software platform developed for higher education by University of Michigan. Since its release in 2005, being used by more than 350 world's great colleges and universities organizations of diverse profiles list; over 4 million students worldwide <ref type="bibr">[19]</ref>. It uses video lecture mechanism to offer lecture content.</p><p>Open edX is an open source release of edX platform in 2013. It is founded by Harvard university and Massachusetts Institute of Technology (MIT) <ref type="bibr">[20]</ref>. Universities and educational providers are using it freely to offer their own MOOCs. Many websites and MOOCs are launched on Open edX, listed at <ref type="bibr">[21]</ref>. For our study we analyzed the Stanford OpenEdX <ref type="bibr">[22]</ref> which is running on Open edX platform.</p><p>CourseBuilder is a software used to offer online courses. It provides an opportunity to universities and educational to offer their own MOOCs. It runs on google infrastructure <ref type="bibr">[23]</ref> and is used world wide for offering MOOCs. We studied University of Auckland, New Zealand <ref type="bibr">[24]</ref> that is running on CourseBuilder platform. Evaluation has been performed by student and guest account on their demo site. Our weighted feature checklist is applied to video lecture components for different levels features provided by some open source MOOC platforms. In our case study, we applied our analysis for Video Interface and Video Lecture Content, and their presentation style on three MOOC platforms.</p><p>Table <ref type="table" target="#tab_9">4</ref> and 5 displays a comparative feature checklist for each video lecture component and their presentation styles. Some of the key findings are discussed here. Display time, one of the very common options is not provided by Sakai. Caption is also not present in Sakai. Stanford OpenEdx and University of Auckland CourseBuilder provide advance settings to better control of the video lecture interface while Sakai do not provide this facility. All platforms allow help support control for reporting the problem but in different ways. Downloading of the downloadable transcript is available only in Stanford OpenEdX but limited to text format; While University of Auckland CourseBuilder allows only viewing the transcript. Different quality of the video and progress bar is not supported by any provider studied. CourseBuilder is the only one providing embedded quiz.</p><p>Table <ref type="table" target="#tab_5">6</ref> shows University of Auckland CourseBuilder provide most of the features for MOOC videos to their students for video interface as well as content. Also, the presentation style used for video lecture content that is very limited for platforms other than the University of Auckland CourseBuilder. Table <ref type="table" target="#tab_5">6</ref> and Table <ref type="table" target="#tab_6">7</ref> list the percentage of features supported and their level respectively, by the open source platforms mentioned in our study.. Fig. <ref type="figure" target="#fig_1">2</ref> displays coverage of Video Interface and Video Lecture Content components of video lecture in MOOC in our case study. Some of the key findings are as follows:</p><p> The maximum controls are provided by CourseBuilder.  All view setting options are available in Open edX.</p><p> Each MOOC provider uses a similar number of controls for help support.  Embedded quiz are only present in CourseBuilder video lecture. Fig. <ref type="figure" target="#fig_2">3</ref> shows the provided features by some the providers in different levels. Some of the key observations about these are:</p><p> The maximum basic features are provided by Stanford OpenEdX.  Stanford OpenEdX is the only one that provided advance features or video interface.  Optional features for video interface are not available in Sakai.  The basic and advance features of video lecture content are equally supported by all the platforms, in our case study.  The number of optional features available in University of Auckland CourseBuilder is double, in comparison to the other providers in our study.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9">Benefits</head><p>The features we presented provide aid for including videos in MOOC. For deriving our list, most popular MOOC platforms has been studied. Our list of features benefits the developers of MOOC for incorporating lecture video in their platform. We see that neither of the platforms provides all the features of video to their students. Mostly, ad-hoc approach is used for providing video lecture to their students. Either the existing open source platforms are used which have their own mechanism for video lecture that needs to be extended sometimes or developing a new platform that needs identification of features that need to incorporated in video lecture. In both the cases, there is high probability of generating basic requirements of features. Developer of MOOC may not be able to elicit the options for video lecture.</p><p>The feature checklist presented here can be used by MOOC developers. It lists the features available in MOOC videos that need to be available for the student. During the feature elicitation, the developer can use the checklist to choose the desired options, with less effort. It facilitates the developer to include more options for videos. The video lecture mechanism developed using our checklist provides more interactivity to the interface and make it student oriented.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="10">Limitations</head><p>For our analysis, we studied the most popular MOOC platforms. There may be some options that are provided by other MOOC providers that have not been studied. However the new options can be easily included in the checklist. Also the derived analysis is for video in MOOC. It is insufficient for standalone video interface creation. It may require some for options and features for standalone video interfaces, which are out of scope of this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="11">Conclusion</head><p>In this paper, we present a weighted checklist of features for the videos in MOOC. The checklist covers the features including different presentation styles of components of video lecture that are video interface and video lecture content. The requirement checklist is useful during incorporating videos features in MOOC. It eases the task of requirement specification for video software in MOOC by selecting and choosing the desired requirements of features from the checklist. The checklist presented here is extensible in nature and can be updated easily to add any new feature and option.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Using Fuzzy Logic in Knowledge Tests</head><p>Aleksandr Alekseev 1, * , Marika Aleksieieva 2 , Kateryna Lozova 1 , Tetiana Nahorna 1   1 Sumy State University, Faculty of Technical Systems and Energy Efficient Technologies, Sumy, Ukraine 2 Harvard University, Graduate School of Arts and Sciences, Cambridge, Massachusetts, USA alekseev_an@ukr.net, maleksieieva@fas.harvard.edu, katarina_lozovaya@ex.ua, nagorna-t@mail.ru</p><p>Abstract. An article describes the specialties of nonlinear scale formation of coincidence of standard answer with student's answer, basing on application of fuzzy logic during the test control of knowledge. It is given the detailed exposition of the mathematical apparatus that is used for substantiation the decisionmaking on the formation of the coincidence scale of answers. The author notes that using of the coincidence scale of answers gives the student an opportunity to express doubt and specify any degree of true answer ranging from "False" to "True". In this case test results are measured in the opposite terms from clear to fuzzy logic when the final mark is determined by the match of the answers. For example, if reference answer is equal to student's one it means that he/she knows the materials, and vice versa if the reference answer does not match, student does not know the topic. There are some types of the test tasks in the testing with using the coincidence scale of answers. The article describes the peculiarities off the parameter assignment of strictness the fuzzy-logic system. The results of experimental verification of the proposed innovations' effectiveness are given. These results allow stating the improvement of the measurement capabilities off the test with using the coincidence scale of answers basing on application of fuzzy logical calculations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Fast and accurate evaluation of knowledge formation remains is a relevant task for long-existing forms of learning. Moreover, it has become an increasingly important for the recently emerged distance learning or blended learning (partial implementation of distance learning technologies into classes that are conducted traditionally). The most important characteristics of the different forms of learning remains objective monitoring of students' academic achievements and construction of effective teaching methods based on it. Further development of the theory and practice of the test control gives significant prospects for achievement of such goals. Using the information and telecommunication technologies, the test control successfully completes and improves existing traditional forms and methods of knowledge control. Computerized testing carries out a number of pedagogical functions assigned to knowledge test control, and becomes an effective means of summarizing the results of learning at all stages of education, from an entrance test to a comprehensive final exam.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head><p>Preconditions for using the fuzzy logic in the scaling of students' answers</p><p>Educational measurement technologies are developing in the close cooperation with the achievements of pedagogy, psychology, sociology and other empirical sciences, which are characterized by using the quantitative and quality indicators, differ by levels of manifestation of properties that are not measured directly. Due to this, there is no exception in the development of scaling tools applied to interpret the student's responses in higher education institutions with a computerized test control of knowledge.</p><p>The problem connected to the need in making available for the respondents involved in the questionnaire, or student who participates in the test control of knowledge, scale transfer of their judgments about the object of evaluation in the quantitative description of the level of assessed property has been known for a long time. Currently, there are several solutions proposed by different authors.</p><p>One of the first solutions was proposed by L. Thurstone <ref type="bibr">[9]</ref>. The procedure of constructing the L. Thurstone scale is to provide an opinion about the level of assessed property in the frame of a set of evenly distributed judgments. Text description of each judgment is assigned a value of the level bar graph properties which corresponds to an interval scale. The scale constructed in such way is an interval one and its usage gives the possibility to apply a sufficiently wide range of statistical methods of processing the measurements results. However, a large amount of preparatory work related to the construction of the interval scale, relative equality of intervals, limit the possibilities of its application for the evaluation of students' knowledge.</p><p>The scale, developed by R. Likert <ref type="bibr">[5]</ref>, suggests the existence of the alternative judgments that reflect extreme levels of the assessed properties. These judgments can be formulated as "strongly agree" through "uncertainty" to "strongly disagree" for the test control. In addition, R. Likert scale bar graph set intermediate values associated with the specific levels of the assessed properties. In the text description no more than three of these intermediate values are commonly used, for example, "Somewhat agree", "neither yes nor no," "Somewhat agree". The R. Likert scale is an ordinal scale, and despite the fact that, usually, its construction does not require the time-consuming preliminary work in the practice of educational measurement finds limited application. This is due to the fact that within the ordinal scales we can only arrange objects in ascending or descending order estimates of measurable properties at the lowest possible statistical treatment of the results of evaluations. Besides, the accuracy of pedagogical measurements with the use of scales that were developed due to approaches of R. Likert including numerical grading based scales limited by number of intermediate values, the number of which usually does not exceed 10-15.</p><p>Despite significant progress, reached for the last years in the different field of knowledge in the developing sphere, systematization and the field of analysis the results of practical application the methods of scaling the properties of qualitative and quantitative indicators, we have to realize that new approaches have limited application for the interpretation the student's responses on the knowledge test control.</p><p>To improve the accuracy of the pedagogical measurement, including the empowerment of statistical processing of the measurement results, it is necessary, in our view, to use such benefits in scaling the student responses using the ratio scale (name, by the definition of S.S. Stevens <ref type="bibr">[8]</ref>). The mathematical apparatus of fuzzy logic will help to do things mentioned above.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Basic Provisions</head><p>During a traditionally organized examination the roles of a teacher and a student are allocated in accordance with the objectives of the oral control, when the teacher asks questions in order to identify student's generated knowledge. The student comprehends the questions and gives the answers, based on his/her idea of correctness of an answer. Then the teacher makes a judgment based on the results of such statements about the success of student's answers to particular questions, also evaluates the knowledge of all studied materials considering the total number of answers. Herewith, evaluating student's knowledge the teacher generally takes into consideration not only the formal correctness of the answers, but also how they were given, and whether the student was sure about the answers vs. showed a sign of insecurity, which may indicate instable knowledge. At the same time the student may use interpersonal contacts and consciously or unconsciously formulate the answer in such a way that it would let the teacher trace the causes of the seemingly unsuccessful answer. The doubt expressed in the answer provides an experienced teacher with another information channel that allows proper evaluating of the actual level of student's knowledge.</p><p>During classically organized test control, unlike oral examination, alienation of teacher's individuality occurs. Due to this fact, it is impossible to apply diagnostic capabilities of the teacher during the control process in order to identify the actual knowledge of the students.</p><p>Test control usually requires performing a task by selecting one of the possible answers or giving an unequivocal answer formulated from a limited set of words, letters, numbers, or graphics. In any case, the student should use his/her own experience and make such an answer, which would contain the conclusion of true judgment in terms of strict logic. However, it is not possible to express doubt or indicate how the answer may differ from the correct one.</p><p>Checking results of the written test control the teacher has only a report of a student containing no data about possible difficulties in formulating the response. Therefore, the final evaluation cannot indicate whether the student was sure in the answer, or just speculated it relying only on luck. Computerized test control is more formal and matches the reference answers with the student's ones.</p><p>Concerning that, the developed test control simulation model <ref type="bibr">[1]</ref> proposes to perform computerized control of knowledge by using of an expert system (Fig. <ref type="figure" target="#fig_0">1</ref>) based on fuzzy logic <ref type="bibr">[4]</ref>. Application of this system gives to a student the opportunity to operate not only the classical values of logical variables like "false" and "true", but also to use their intermediate values fading from one extreme value ("false") to an opposite one ("true").</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Fuzzy logic expert system</head><p>The expert system uses piecewise continuous membership functions in order to define how evaluation of student's knowledge and his/her expressed statement relate to fuzzy logic subsets. These functions have transitional areas presented as segments a-b and b-c, connecting zero and one (maximum) levels of reliability (Fig. <ref type="figure" target="#fig_1">2</ref>). Similar situation is with a membership function of a logical variable "Evaluation of student's knowledge" ((y)), where the terms of a base term set are characterized by three gradations -"poor", "average" and "full" (Fig. <ref type="figure" target="#fig_209">2,b</ref>)depending on how the evaluation of the answer is close to one of evaluation scale criteria.</p><p>The presence of unrelated fuzzy logic sets allows to make such relevant fuzzy statements as "if ... then...". For example, clear logic accepts only two extreme statements: "if student's answer does not match the reference answer, then student's knowledge is unsatisfactory" and "if student's answer matches the reference answer, then the student has necessary knowledge". Fuzzy logic accepts both these extreme values, as well as any other intermediate statement linking the certain degree of answer accuracy and the corresponding answer evaluation.</p><p>The matching of subset items of the postulating and stating parts of a statement may apply a control function that is based on either "correlation -product encoding" method or "correlation -min encoding" method <ref type="bibr">[4]</ref>. Currently there are no evidences confirming the preference of using one of these methods in computerized control of knowledge. However, "correlation -product encoding" method is used in the simulation model due to a number of reasons.</p><p>Sum combination method is used for getting a generalized logical statement. Herewith, superposition of membership functions of fuzzy sets is defined as <ref type="bibr">[1,</ref><ref type="bibr">3]</ref> (1) Transformation of a fuzzy set into a single decision taken on the basis of fuzzy logic statements requires using the gravity center of the fuzzy set membership functioncentroid defuzzification method.</p><formula xml:id="formula_0">Θ sum Z =Θ i Z ∀Z, iϵ</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Strictness Parameter</head><p>The application of fuzzy logic relieves the student from necessity to speculate if he/she is not sure in the answer. Clearly indicating the degree of trueness in the answer, the student thereby provides the data giving possibility of mathematically differentiation of his/her academic achievements with high accuracy, and to perform unambiguous evaluation. Mathematical application of fuzzy logic to the test control can also enter a "strictness" parameter. At the oral examination the teacher can somehow "forgive" a controversial answer deviating from his/her idea of trueness. But a stricter teacher will punish this controversial answer by a worse grade. Similarly to a traditional examinations conducted by teachers with different ideas of perfect knowledge of materials, the tests based on fuzzy logic may also be evaluated in different ways.</p><p>Fig. <ref type="figure" target="#fig_2">3</ref> shows an example of control which lets the student to give answers in relatively simple way in terms of fuzzy logic, if it is added to the test software interface. Indicating the degree of student's answer deviation from the reference one requires moving a slider to any position between the leftmost ("False") and the rightmost ("True), and clicking "OK". The slider location is determined and converted into relative coordinates, which are used for further calculations in a fuzzy logic expert system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. Control of a fuzzy logic system</head><p>Rating answers and number of points accrued will depend on how the student indicated the degree of his/her answer matching the reference one. The number of points accrued depends also on the "strictness" parameter, which is indicated by sections in transition areas of membership functions -student's answer matches / does not match the reference answer, and the student learned / did not learn the controlled material. Despite the fact that the coordinating of these segments have quantitative indication, the level of strictness to student's knowledge is measured qualitatively, in such terms as "strict" (S), "stricter" (SS), "less strict" (LS), and "not strict" (NS), filling these concepts with quantitative measurement each time. Thus, if there is a necessity to compare the results of control, then introduction of the "strictness" parameter requires specified adopted coordinate values for transition sections.</p><p>Fig. <ref type="figure" target="#fig_3">4</ref> shows the charts illustrating changes in application rate of control for entering answers when implementing different "strictness" strategies of the fuzzy logic expert system. In the diagrams was considered such datawe applied the information about the students who used the element of fuzzy-logic system in the computerized tests.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 4. Application rate of the control</head><p>The chart in Fig. <ref type="figure" target="#fig_3">4</ref> shows that in case of specified extreme level "Strict" the vast majority of students (over 98%), regardless of degree the preparedness (relatively strong, average and weak students) and degree of their answers matching with the reference ones, rarely use the opportunity to make a statement in terms of fuzzy logic. Absence of effective incentives upon the almost confident answer, and extremely punishable little doubt lead to the fact that students prefer to answer in terms of "False"-"True"." Thus, the fuzzy logic expert system capacities are practically not used. Therefore, it is not recommended to use a "strict" test system for practical purposes.</p><p>Other manifestations of "strictness" are popular enough to use fuzzy logic. It should be noted that the level "Not strict" is often demanded by weak students, as in case of student's answers matching the reference answers (30,5%±3,4%), and to even greater extent in case of answer mismatch (62,5%±4,1%). Therefore, this approach is not recommended to be a priority in order to ensure that all students are in equal conditions and none of them has any preference.</p><p>Table <ref type="table" target="#tab_1">1</ref> shows the coordinates of the membership functions corresponding to the level of "Stricter". According to the chart in Fig. <ref type="figure" target="#fig_3">4</ref>, it is often demanded and can be recommended as the core level in the absence of any other preferences. This recommendation can be confirmed by positive experience of use as the sole strictness parameter in the fuzzy logic system of test software SSUquestionnaire <ref type="bibr">[7]</ref>.  Discussing the data shown in Fig. <ref type="figure" target="#fig_3">4</ref>, it is necessary to underline that they do not directly recommend any of strictness degrees in the test system. So there may be different approaches to setting the "strictness" parameter. However, it is necessary to mention that regardless of the adopted approaches to setting the expert system strictness level, it must be set up prior to the test control. Any changes in the conditions of control through adjusting the strictness parameter for specific students, groups of students or disciplines are unacceptable. Like the oral examination, on the one hand there is contradiction between the desire to set up individual approach to each student and evaluate his/her achievements with the strictness degree that would enhance learning, vs. on the other hand, the requirement of compliance with the general approach to all students. Therefore, differentiating the "strictness" parameter in a fuzzylogic test system can be justified for some special cases, but the general approach requires this parameter to be standardized, and academic achievement of any student should be equally evaluated, regardless of any subjective or objective circumstances.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Types of Tests</head><p>Despite the considerable variety of standardized test questions ([3], etc.), fuzzy logic expert system accepts only two types of tests.</p><p>The first type of tests covers the tasks containing the questions that can be answered using the full range of logical variables from "False" to "True". These are the questions that require to confirm or deny any statement, such as "Fish live in a water", "2 +2 = 4" or "The sun shines at night", "2 +2 = 5", etc.</p><p>When performing the test of the first type a student can move the control slider of a fuzzy logic expert system (Fig. <ref type="figure" target="#fig_2">3</ref>) to any of the positions, which , in his/her opinion, corresponds to the degree of answer trueness. If one of the extreme positions is selected and student's answer matches the reference answer, the highest possible score will be awarded. If the selected extreme position of the slider does not match the reference answer, there will be 0 points. Intermediate position of the slider will allow giving intermediate (between zero and a maximum) number of points.</p><p>Another type of tasks includes the questions that can be answered within a half of the range of logical variables from "Not true" ("Not false") to "Truth". These tasks include questions along with two or more options of possible answers. At least one of them is correct and at least one is wrong. For example, if the task has a question "2 +2 =?" along with three answer options "3", "4" and "5", and it is offered to determine which one is correct, then examinee cannot select the wrong answer "3" or "5" stating that it is false.</p><p>When performing such task, the control slider of the fuzzy logic expert system can be moved within a range from the middle position "Not true" (or "False") to the rightmost position "True". In this case, the maximum possible score will be given if student's answer matches the reference one and the rightmost slider position is selected. In all other cases, the amount of points accrued will be determined by how student's answer matches the reference one (depending on the slider position).</p><p>Table <ref type="table" target="#tab_0">2</ref> shows different scoring options for the two considered types of tests (maximum score for correctly completed task is 100 points). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Measurement Capabilities</head><p>For the evaluation of the impact of a fuzzy logic expert system on the measurement capabilities of test knowledge control was made an experimental research.</p><p>The experiment engaged 228 students divided between the experimental and control groups. The groups were formed on the basis of current students' progress. Mann-Whitney <ref type="bibr">[6]</ref> checks showed that the groups are homogeneous.</p><p>The students in the experimental group were given a fully functional test program SSUquestionnaire, also they had an opportunity to give fuzzy logical answers. Strictness parameter of the fuzzy logic expert system was set up as "Stricter" and did not change throughout the experiment.</p><p>The test program used in the control group differed from the fully functional one, since its fuzzy logic module was disabled. The students could not move the control slider of the fuzzy logic expert system to any intermediate position; they had been forewarned as well.</p><p>Test results of the experimental and control groups were processed mathematically. They helped to estimate the strength of links between successful execution of individual test items and the final estimates the students received for all of the test questions. Pearson correlation coefficient <ref type="bibr">[2]</ref> was calculated for the test results of each group independently. It was believed that the closer the absolute value of Pearson correla-tion coefficient is to one, the tighter are links and measurement capabilities of the relevant test.</p><p>Comparison of the received data showed that the experimental group revealed closer linear dependence between the results of individual tasks and the general test results than the control group. Pearson correlation coefficient in the experimental group increased from 0,52 to 0,65 compared to the control group, that indicates better measurement properties of the test.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>Elimination the identity of the person from the process of control enables using the diagnostic capabilities of the examiner during the test. This disadvantage of test control can be mitigated by use of an expert system developed on the basis of mathematical fuzzy logic. The advantage of the fuzzy logic expert system hides in the fact that its introduction into a test program provides students with the opportunity not only to give the answers based on strict logic, but also to indicate any degree of answer trueness ranging from "False" to "True". A student does not have to give a definite answer, even if he/she is required to go beyond the scope of their own knowledge. He/she can express doubt indicating how an idea of the true answer matches or does not match the reference answer. In this case, the test results are not measured in terms of clear logic (if the reference answer matches student's answer, then the student knows the material, and vice versa), but in terms of fuzzy logic, when the final evaluation is determined by how these answers match.</p><p>The proposed justification of the decisions made by the examiner on the basis of the fuzzy logic expert system mitigates disadvantages of computerized testing as a tool for educational measurements, but does not eliminate these disadvantages entirely. Further efforts in the improving the theory and methods of test control, including methods directed on the fundraising the computer equipment for modeling diagnostic functions of the teacher in the control process will enhance the reliability of results of the evaluation of student's knowledge.  The most part of modern software systems are developed and maintained using object-oriented programming (OOP) <ref type="bibr">[1]</ref>. Well-known and important problem to support such applications are often modifications on many their subsystems and development of new components to implement additional business logic due to new user requirements. In order to emphasize this issue we propose to use in this paper the notion "legacy software system" (LSS), similarly to the terms in software reengineering domain (see, e.g. in <ref type="bibr">[2]</ref>). Permanent changes in LSS lead to design instability which causes a so-called crosscutting concern problem <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>. The OOP actually does not solve this issue, and usage of OOP-tools increases the complexity of an output source code.</p><p>During ten last years some post object-oriented technologies (POOT) were elaborated and became intensive development, especially the most known POOT are: aspect-oriented software design (AOSD) <ref type="bibr">[5]</ref>, feature-oriented software design (FOSD) <ref type="bibr">[6]</ref> and context-oriented software development (COSD) <ref type="bibr">[7]</ref>. All these POOTs utilize the basic principals of OOP, but in the same time they have additional features, which allow solving the crosscutting problem electively. From the other hand the usage of any POOT for LSS maintenance and reengineering is related to additional time and other efforts in software development. That is why many researchers emphasize the actual need to elaborate appropriate approaches to complex estimation of POOT's effectiveness usage in real-life software projects. It is additionally to mention that within the context of this paper we are talking about the POOTs which are focused on programming techniques exactly, but not about such software management trends as Extreme Programming (XP), Rapid Application Development (RAD), Scrum and some others <ref type="bibr">[8]</ref>, which also can be characterized as "post objectoriented" approaches.</p><p>Taking into account the issues mentioned above, the main objective of the research presented in this paper is to propose the intelligent complex approach to effectiveness's estimation of using POOTs in software maintenance. The rest of this paper is organized in the following way: Section 2 analyses some critical issues in OOP and reflects the phenomena of crosscutting functionality in software maintenance. In Section 3 the existing POOT are analyzed and the results of their comparing are shown with respect to software maintenance problems. In Section 4 we present the knowledge-based approach for effectiveness's estimation of POOT, which is based on structuring and analyzing of domain-specific knowledge about interconnected and complex data resources within a software maintenance framework. Section 5 presents first implementation issues and the results of test-case for the proposed approach. In Section 6 the paper concludes with a short summary and with an outlook on the next steps to be done in the proposed R&amp;D approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Some Critical Issues in Object-Oriented Programming and Crosscutting Functionality Phenomenon in Software Maintenance</head><p>To meet new requirements existing LSS have to be refined with new classes, which must implement their new functionality. Standard OOP toolkit "proposes" to support additional associations between already existent and new program objects, to modify inheritance tree for classes, to implement new or additional design patterns, e.g. the Gang-of-Four (GoF) patterns <ref type="bibr">[9]</ref>. Because of permanent modifications on source code and doing software system re-design, developers face with "bottlenecks" of OOP: increase coupling among classes <ref type="bibr">[10]</ref>; increase of depth of inheritance tree (DIT) for class hierarchies <ref type="bibr">[11]</ref>; modification of design pattern instances <ref type="bibr">[12,</ref><ref type="bibr">13]</ref>; emerging lack of modularity in functionality realization <ref type="bibr">[14]</ref>.</p><p>A number of studies investigate problems of OOP mentioned above, and theirs negative influence on LSS maintenance. High dynamic of requirement changes and these critical issues of OOP induce and propagate an additional development problem: this is a crosscutting concern's phenomena. Crosscutting concern (hereby referred as "crosscutting functionality" -CF) is a concern emerges on user requirements level and often crosscuts on design level, this is a part of a business logic, which can not be localized in the separate module on source code view but stays separate on requirement view <ref type="bibr">[15]</ref>. In literature exists a lot of researches related to CF's properties, multiple patterns of CF and it's interaction with the source code of noncrosscutting functionality, and it's further propagation in system's source code (see e.g. in <ref type="bibr">[13 -16]</ref>). There are some widespread examples of software system features which could be consider as CF: exception management, logging, transaction management, data validation <ref type="bibr">[17]</ref>. Nevertheless our own experience in software development and LSS maintenance exposes that almost any system feature, emerged by requirements, on source code perspective could be transformed into CF.</p><p>CF has two main properties <ref type="bibr">[18]</ref>: scattering and tangling. CF's source code scatters among classes (components) of non-crosscutting functions, this happens because of mismatch on end user requirement's level of abstraction, and final realization of this requirement as a feature on the source code level. CF's source code tangles (mixes up) with source code of the other functionality, no matter crosscutting or noncrosscutting. Moreover CF could be divided into several types <ref type="bibr">[19]</ref>: homogeneous and heterogeneous. Homogeneous CF represents the same piece of source code which crosscuts multiple locations in multiple OOP-classes of a software system. Heterogeneous CF represents each time unique piece of source code which crosscuts multiple locations in multiple OOP-classes of a software system (see Fig. <ref type="figure" target="#fig_0">1</ref>). As a result, a presence of the CF in software system increases a complexity of the maintenance process <ref type="bibr">[20]</ref>:</p><p>• CF complicates traceability of various software design artifacts, e.g requirements traceability <ref type="bibr">[21]</ref>; • CF decreases understandability of a source code and functionality it realizes;</p><p>• source code of LSS becomes redundant;</p><p>• Almost impossible to reuse CF solutions, because of lack of modularity. A conceptual approach, which allows to deal with CF, is a separation of concerns (SoC) <ref type="bibr">[22]</ref>. It envisages a decomposition and further non-invasive composition of CF source code with the rest code of LSS. Decomposition mechanism allows to split source code into fragments and to organize them into easy-to-handle CF-modules. Composition mechanism supports reassembling of isolated code fragments in easy and useful way. Usage of SoC principles makes possible to decrease coupling in LSS, to decrease code redundancy, to reuse isolated CF-modules, to configure system by add/remove functionality if needed.</p><p>Finally, the existing POOTs provide SoC principles and offer a lot of toolkits to manage CF-problem in an effective way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Post Object-Oriented Technologies: Main Features and Results of Comparative Analysis</head><p>As already mentioned above (see in Section 1) nowadays there are 3 main welldefined approaches in POOT-domain, namely: aspect-oriented software development (AOSD) <ref type="bibr">[5]</ref>, feature-oriented software development (FOSD) <ref type="bibr">[6]</ref> and context-oriented software development technology (COSD) <ref type="bibr">[7]</ref>. In order to reflect their essential features with respect to the problem of CF it is useful to represent an interaction between basic components of OOA and POOT <ref type="bibr">[20]</ref>.</p><p>AOSD was proposed in Research Center Xerox/PARC and it is now implemented in many programming languages such as Java / AspectJ, C ++, .NET, Python, JavaScript and some others <ref type="bibr">[4]</ref>. AOSD allows to concentrate CF in separate modules called aspects, which should be localized in source code infected with CF using such means as points of intersection (point-cut) and injection (injection). Schematically this interaction is shown in Fig. <ref type="figure" target="#fig_209">2, (a)</ref>, where the white vertical rectangles C1, C2, C3 represent OOP-classes and gray horizontal rectangles A1, A2, A3 represent the aspects. More detailed the structure of aspect is shown in Fig. <ref type="figure" target="#fig_1">2</ref>, (b). Any aspect consists of interconnected point-cut, of a notification (advice), and of an introduction (inner declaration). The task of point-cut is to define a connection point between aspects and basic methods in OOA-classes, in other words, point-cut determines those lines of code in the OOA-methods, were notification code has be introduced. A notification is a peace of code in OOA-language (e.g. in Java), which implements an appropriate CF, therefore notifications can be of three types: before -such a notification is perform before to call a OOA-method; after -a notification is made after this call; and around -a notification is executed instead to call a OOA-method. Also AOSD allows the introduction in OOA-classes new fields and methods that can be defined in aspects.</p><p>In the same way the FOSD and COSD schematically can be represented and analyzed carefully (see in <ref type="bibr">[20]</ref> for more details). The results of this comparative analysis are presented in the Table <ref type="table" target="#tab_1">1</ref>. Even a cursory analysis of this comparison shows that for a decision on the appropriateness and effectiveness of using an appropriate POOT to solve CF-problem in given LSS, it is necessary to take into account a number of other additional factors, which will be considered in the proposed approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Knowledge-Based Framework for Effectiveness's Estimation of Post Object-Oriented Technologies</head><p>Taking into account the results of performed analysis (see Section 2), and basing on some modern trends in the domain of POOT-development (see Section 3), we propose to elaborate a knowledge-based framework for comprehensive estimation of POOTeffectiveness to use them in software maintenance. Thus we proceed from one of possible definition of the term "knowledge" within the knowledge management domain <ref type="bibr">[23]</ref>, namely: a knowledge is a collection of structured information objects and relationships combined with appropriate semantic rules for their processing in order to get new proven facts about a given problem domain.</p><p>Then our next task is to define and to structure all information sources, and to elaborate appropriate algorithms and tools to process them with respect to the final goal: how to estimate usage effectiveness of different POOTs in software maintenance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Multi-dimensional model for POOT effectiveness's estimation</head><p>To implement the proposed knowledge-based approach the multi-dimensional modeling space is proposed in <ref type="bibr">[20]</ref>, and its graphical interpretation is shown in Fig. <ref type="figure" target="#fig_2">3</ref>. According to this model the integrated effectiveness level is depend on two main interplaying factors, namely: 1) what type of LSS has to be modified with usage of an appropriate POOT; 2) what kind of POOT is used to eliminate the CF in this LSS. In order to answer these questions the following list of prioritized tasks can be composed: (i) to define a type of given LSS with respect to its structure complexity and to behavior of requirements, which this LSS in maintenance process is facing with; (ii) to calculate an average effort values for different POOT, if this one is used to eliminate CF in an appropriate LSS; (iii) to elaborate the metrics for CF assessment before and after LSS modification using a given POOT; (iv) to propose an approach to final effectiveness estimation of POOT's usage taking into account the results provided by activities (i) -(iii). Below these tasks are solved sequentially, using knowledge-based and expertcentered methods and tools.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Definition of legacy software system types</head><p>To solve task (i) from the their list given in Section 4.1 the approach to analyzing and assessments of LSS's type proposed in <ref type="bibr">[24]</ref> can be used, which is based on the following terms and definitions.</p><p>Def#1. System Type (ST) is an integrated characteristic of any LSS given as a tuple:</p><formula xml:id="formula_1">&gt; =&lt; tRank Requiremen , Complexity Structural ST<label>(1)</label></formula><p>The first parameter estimates a complexity level of a given LSS, and the second one represents status of its requirements: their static features and dynamic behavior.</p><p>To calculate structural complexity (SC) the following collection of metrics was choused: Cyclomatic Complexity (V), Weighted Method Complexity (WMC), Lack of Cohesion Methods (LCOM), Coupling Between Objects (CBO), Response For Class (RFC), Instability (I), Abstractness (A), Distance from main sequence (D). The final value of SC can be calculated using formula <ref type="bibr">(2)</ref>, where the appropriate weighted coefficients for each metric were calculated in <ref type="bibr">[24]</ref> with help of Analytic Hierarchy Process method <ref type="bibr">[25]</ref>.</p><formula xml:id="formula_2">avgD K avgA K avgI K avgRFC K avgCBO K avgLCOM K avgWMC K avgV K SC D A I RFC CBO LCOM WMC V + + + + + + + + = (2)</formula><p>To evaluate the final value of SC of given LSS in terms of an appropriate linguistic variable (LV):"Low", "Medium", "High", the following scale was elaborated <ref type="bibr">[24]</ref>:</p><formula xml:id="formula_3">3 * 2 Max Min Min SC SC Low SC + &lt; ≤ 3 * 2 3 * 2 Max Min Max Min SC SC Medium SC SC + ≤ ≤ + Max Max Min SC High SC SC ≤ &lt; + 3 * 2 (3)</formula><p>To define the second parameter given in formula <ref type="bibr">(1)</ref>, two relevant features of any requirement were considered <ref type="bibr">[24]</ref>, namely: a grade of it's Priority and a level of it's Complexity.</p><p>Def#2. Requirements Rank is a qualitative characteristic of LSS defined as a tuple:</p><formula xml:id="formula_4">&gt; =&lt; Complexty Priority, tRank Requiremen<label>(4)</label></formula><p>In <ref type="bibr">[24]</ref> is mentioned that in modern requirement management systems (RMS) like IBM Rational Requisite Pro, CalibreRM and some others, the Priority and Complexity of requirements are usually characterized by experts in informal way, e.g. using such terms as: "Low", "Medium", "High". The real example of such interface in RMS is presented in Fig. <ref type="figure" target="#fig_3">4</ref>, with requirement's attributes "Priority" and "Complexity" (or "Difficulty" in terms of RMS-technology).</p><p>Taking into account the definition for linguistic variable (LV) given in <ref type="bibr">[26]</ref>, the appropriate term-sets for LVs Priority and Complexity respectively were defined in <ref type="bibr">[24]</ref> as follows: </p><formula xml:id="formula_5">Complexity X : ; } " " , " " , " {" ) ( high medium low Complexity T =<label>(6)</label></formula><p>Basing on definitions ( <ref type="formula" target="#formula_1">1</ref>) -( <ref type="formula" target="#formula_5">6</ref>), the mapping procedure between 2 attribute spaces was elaborated in <ref type="bibr">[24]</ref>. These attribute spaces are defined with apprpopriate LVs, namely: the space "Requirements Rank" with axes "Priority" and " Complexity"; the space "System Type" with axes "Requirements Rank" and "Structural Complexity". This mapping procedure in details is presented in <ref type="bibr">[24]</ref>, and the final result of this approach is shown on Fig. <ref type="figure" target="#fig_4">5</ref>. It illustrates the main advantages of the proposed approach, namely: 1) we are able to estimate current state of system requirements w.r.t. their static and dynamic features; 2) basing on this estimation, we can define an appropriate type of investigated software system (e.g., some LSS in maintenance process), taking into account it's structural complexity and dynamic requirements behavior as well. In order to solve task (ii) from their list given in Section 4.1 it is proposed to analyze basic architectural frames, which can be constructed for different POOT with usage of their OOP-specification. In <ref type="bibr">[20]</ref> the following definition is proposed for this purpose. Def#3. Enhanced architectural primitive (EAP) is a minimal-superfluous component-based scheme, which is needed to implement an interaction between basic OOP-elements (class, field, method) and specific functional POOT-elements.</p><p>Obviously, to perform the comparative analysis of different EAP in the correct way, they preliminary have to be represented in some uniform notation. As a such notation the architecture description language (ADL) should be used, because: 1) this notation is not depend on any specific programming tools; 2) in this way static and dynamic features of AP both can be described and analyzed.</p><p>The most important modeling abstracts of ADL (see e.g. in <ref type="bibr">[27]</ref>) are components, ports and connectors, and there are such additional ADL -features as role and interaction. They have the following definitions within the context of this paper.</p><p>Def#4. Component is a complex of functional items, which implements a certain part of a business logic in LSS, and which is supposed to have special interfaces (ports) for communication with other entities in an operating environment.</p><p>Def#5. Port is an interface to provide an interaction between several components. Def#6. Connector is a special architectural item to join ports of different components.</p><p>Def#7. Role is a special feature of a given connector to identify its communicating ports.</p><p>Def#8. Interaction is a special feature of given connector defined using its roles. More detailed the notion port can be characterized in the following way: 1) there is so-called single port -this is an interface of any component to communicate with some another one via exactly one connector; 2) furthermore there is a case-portthis is an interface of any component to communicate with another components via more then one connectors (e.g., using an appropriate Boolean variable as a flag to switch communication, etc.). Similarly, the notion connector can be classified as follows: 1) a binary connector -this is a connector with 2 fixed roles only; 2) a multiply connector -this is a connector, which has exactly 1 input role and more then 1 output roles; 3) a case connector -this kind of connectors can have a lot of input and output role as well.</p><p>Using the definitions Def#3 -Def#8 the appropriate EAP for all mentioned above POOT were elaborated <ref type="bibr">[20]</ref>. As one example the EAP for AOP is shown on Fig. <ref type="figure" target="#fig_38">6</ref>, which reflects how the specific AOP-features such as advice and inner declaration (they are shown as rectangular icons in grey color) are interacting with basic OOPelements, namely: class, field and method (they are represented as crosswise icons in white color). Fig. <ref type="figure" target="#fig_38">6</ref>. ADL-specification for the aspect-oriented EAP To calculate the complexity coefficients (CC) of the elaborated EAP the following formulas are proposed in <ref type="bibr">[20]</ref>, namely:</p><formula xml:id="formula_6">OOP POOT Component *# 4 . 0 *# 6 . 0 + = ,<label>(7)</label></formula><p>where a Component is the CC of an appropriate EAP, OOP # is a number of architectural OOP -components, and POOT # is a number of POOT -components included in this EAP. These values are multiplied with the weight coefficients: 0,6 and 0,4 respectively, and these coefficients can be defined using some expert methods (see in <ref type="bibr">[20]</ref>  , <ref type="bibr">(7)</ref> where a Connector is the CC of connectors included in an appropriate EAP, which is calculated using the number of binary connectors:</p><formula xml:id="formula_7">ector BinaryConn # , the number of multi-connectors ctor MultyConne #</formula><p>and the number of case-connectors:</p><p>tor CaseConnec # , with respect to the appropriate weight coefficients 0.2, 0.3 and 0.5, which also are defined by some experts <ref type="bibr">[20]</ref>;</p><formula xml:id="formula_8">CasePort SinglePort Port *# 7 . 0 *# 8 . 0 + = , (<label>8</label></formula><formula xml:id="formula_9">)</formula><p>where Port is the CC of ports included in an appropriate EAP, which takes into account the number of single ports: SinglePort #</p><p>, and the number of case ports:</p><p>CasePort # with appropriate weigh coefficients.</p><p>Using formulas ( <ref type="formula" target="#formula_6">7</ref>) -( <ref type="formula" target="#formula_70">9</ref>) the summarized value Complexity of an appropriate EAP, measured in so-called architectural units (a.u.) <ref type="bibr">[20]</ref> can be calculated as follows:</p><formula xml:id="formula_10">Port Connector Component Complexity + + = (9)</formula><p>The final values of CC for all POOT were calculated using formula <ref type="bibr">(10)</ref>, and they are represented in Table <ref type="table" target="#tab_0">2</ref> (see in <ref type="bibr">[20]</ref> for more details). Basing on the estimation values aggregated in Table <ref type="table" target="#tab_0">2</ref> it is possible to make conclusions about average implementation efforts by usage of appropriate POOT to solve CF-problems in legacy software systems within their maintenance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Quantitative metrics for crosscutting in legacy software</head><p>There are different ways to characterize a nature of the CF and it's impact to software source code. A number of studies are dedicated to a classification, qualitative and quantitative description of CF problem <ref type="bibr">[3,</ref><ref type="bibr">[14]</ref><ref type="bibr">[15]</ref><ref type="bibr">[16]</ref>. The aim of our research is to assess an impact, which CF makes to a structure of OOP-based software system during it's evolution in maintenance; therefore we are focusing on quantitative facet of crosscutting nature. To reach this goal it is proposed to perform next three steps.</p><p>Step 1: Localize source code belonged to a particular CF in a given LSS. Although exists several source code analysis tools for CF localization, e.g., tool CIDE <ref type="bibr">[28]</ref>, this problem remains really complicated for autoimmunization and demands an expert in code structure and business-logic of an appropriate LSS.</p><p>Step 2: Calculate a specific crosscutting weight ratio of a particular CF in the system indicated as CF ratio <ref type="bibr">[20]</ref>. This coefficient shows a ratio between OOP-classes, "damaged" by a particular CF and all OOP-classes in the system, or it's projection, e.g. business logic realization without subordinate classes of a framework. This coefficient possible to represent as</p><formula xml:id="formula_11">cf ratio cf C CF C C = + , (<label>10</label></formula><formula xml:id="formula_12">)</formula><p>where cf C -number of classes in LSS, "damaged" with CF, C -number of classes free of CF. Obviously, that [0;1] ratio CF ∈ , and if ratio CF = 0, it means a particular functionality is not crosscutting; and if ratio CF = 1, it means all classes are "damaged" with a particular CF.</p><p>Step 3: Calculate a residual crosscutting ratio indicated as RCR ratio . This metric, based on DOS (Degree of Scattering) value, proposed in <ref type="bibr">[14]</ref>, namely "…DOS is normalized to be between 0 (completely localized) and 1 (completely delocalized, uniformly distributed)". Nevertheless this metric does not allow to asses "damage" degree, done by a particular CF, therefore we propose to refine DOS-metric in following way ratio ratio</p><formula xml:id="formula_13">RCR DOS CF = ⋅ ,<label>(11)</label></formula><p>where DOS -Degree of Scattering; ratio CF -specific crosscutting weight ratio of a particular CF. Similarly to</p><formula xml:id="formula_14">ratio CF , [0;1] ratio RCR ∈ , if</formula><p>ratio RCR = 0, it means that CF is localized in a separate module and it is no more crosscutting; if ratio RCR = 1, it means that CF effects a whole system and is uniformly distributed.</p><p>Thus the proposed quantitative metrics ( <ref type="formula" target="#formula_13">11</ref>) - <ref type="bibr">(12)</ref> give to an expert a possibility to assess a distribution nature of a CF, and to estimate a "CF-damage" for a given LSS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5">Fuzzy logic approach to complex effectiveness estimation of POOT</head><p>Based on assessment of POOT average implementation efforts (see Chapter 4.3), and assessment for residual crosscutting ratio (see Chapter 4.4) it is possible to estimate an integrated effectiveness of POOT usage. Although because of different scale and units of measurement for proposed assessments, it is hard to evaluate them within a single analytical method. Therefore, for further evaluations it is proposed to use one of algorithms of the fuzzy logic <ref type="bibr">[26]</ref>, namely the Mamdani's algorithm, which consists of 6 steps. According to this algorithm to estimate effectiveness of POOT usage it is necessary to compose fuzzy production rules (FPR). In this paper a verbal description for these rules is omitted, instead of this the widespread symbolic identifiers for short description of FPR are listed in Table <ref type="table" target="#tab_21">3</ref>. The whole system of elaborated FPR consists of 20 definitions (see in <ref type="bibr">[29]</ref> for more details), and the fragment of this FPR-system is listed below:</p><formula xml:id="formula_15">1. RULE_1: If " 1 β is PS" and " 2 β is Z", then " 3 β is Z"; 2. RULE_2: If " 1 β is PM" and " 2 β is Z", then " 3 β is Z"; 3. … 4. RULE_9: If " 1</formula><p>β is PS" and " 2 β is PM", then " 3 β is PM";   β (see FPR-system above). The visual interpretation is similar to the graphic depicted in Fig. <ref type="figure" target="#fig_5">7</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">The Test-Case and Result Discussion for the Proposed Approach</head><p>To illustrate the proposed approach the real LSS for personal data management was analyzed <ref type="bibr">[29]</ref>. It consists of 15 java-classes, and it contains a homogenous realization of "logging" crosscutting functionality. Accordingly to the LSS -type definition method (see Section 4.2) this application belongs to the III-rd system type with rank: {"Low structural complexity"; "High requirement rank"}. The source code of this LSS was sequentially modified using 3 POOT: AOSD, FOSD, and COSD respectively. The final results of POOT effectiveness estimation are shown in Table <ref type="table" target="#tab_9">4</ref>. The first column lists all LSS -modifications to be compared: an initial OOPversion, which has to be re-structured wit respect to CF-problem, and its 3 modifications done with usage of different POOT. In the second column the summarized efforts needed for these modifications with respect to architecturalcentered complexity are calculated (see <ref type="bibr">Section 4.3)</ref>. The data given in the third column of Table <ref type="table" target="#tab_9">4</ref> show the level residual crosscutting ratio which is presented (for initial OOP-version) or which is remained after its redesigning with the appropriate POOT. The forth column indicates the final effectiveness's estimation values for all LSS-versions. The results achieved show, that OOP actually is not enough effective to solve crosscutting problem (done with 6.7% only). The most preferable approach to eliminate this issue in the given type of LSS (as mentioned above, this is the III-rd system type according to LSS-classification proposed in Section 4.2), is an AOSD which provides effectiveness level over than 70%.</p><p>It is also to mention, although an effectiveness level of COSD and FOSD is lower than AOSD, over 30% for homogenous CF, it is still much better result than OOP. Taking into account a qualitative advantage of these two another technologies, namely: a possibility to implement a heterogeneous CF also (see Table <ref type="table" target="#tab_1">1</ref>), it can be reasonable to use one of them for LSS-maintenance to deal with such kind of CF in much effective way than AOSD.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions and Future Work</head><p>In this paper we have presented the intelligent approach to effectiveness's estimation of modern post object-oriented technologies (POOT) in software development, which aims to utilize domain-specific knowledge for this purpose. This knowledge base includes such important and interconnected data resources as: 1) structural complexity of legacy software; 2) dynamic behavior of user's requirements; 3) architecturalcentered implementation efforts of different POOT. To process these data the quantitative metrics and expert-oriented estimation algorithms were elaborated. The final complex estimation values of POOT's effectiveness assessment are defined using fuzzy logic method, which was successfully tested on some real-life legacy software applications.</p><p>In future we are going to extend a collection of metrics for POOT-features assessment, and to apply some alternative (to fuzzy logic method) approaches to final decision making. Besides that it is supposed to develop an appropriate software CASE-tool for expert's data handling in the proposed knowledge-based estimation framework.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">References</head><p>Provably correct graph transformations with small-tALC ⋆</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Provably correct transformations of graph structures become increasingly important, for example for pointer manipulating programs, model driven engineering (such as EMF <ref type="bibr">[1]</ref>) or the Semantic Web (with representation formats such as RDF <ref type="bibr">[2]</ref>).</p><p>Contributions: This paper presents a new language, called small-tALC, and accompanying programming environment for executing graph transformations and reasoning about them. Let us characterize in a few words what our work is about and what it is not about:</p><p>-The primary aim of our development is to be able to reason about graph transformations in a pre-/ post-condition style: can we ensure that any graph satisfying the pre-condition is transformed into a graph satisfying the post-condition? Essential ingredients of such a setup are a language for describing the transformations, and an assertional formalism for specifying the pre-and post-conditions.</p><p>⋆ Part of this research has been supported by the Climt project (ANR-11-BS02-016).</p><p>-The transformation language is an imperative programming language with special operations for manipulating graphs. This language is endowed with traditional control flow constructs (selection and loops) and elementary statements for adding and deleting arcs of a graph. There is a select statement that can be understood as a generalized, non-deterministic assignment operation and whose purpose is to perform matchings of rules in a target graph.</p><p>After a high-level overview of small-tALC (Section 2), we will give a more detailed account of the program logic (in Section 3.1) and transformation language (in Section 3.2). Our transformation language is by no means a full-fledged programming language: for example, arithmetic operations are excluded.</p><p>-The transformation language is not graphical, but textual. We do not question the utility and appeal of a graphical notation, but this issue is orthogonal to our concerns. We can imagine to couple small-tALC with existing graphical editors, such as Henshin <ref type="bibr">[3]</ref>, in the sense of translating a graphical description of a rule to our textual format. The usefulness of the inverse direction is less evident, because the textual format is more expressive (offering, among others, nested loops and branching statements). -The transformation language is executable, by a translation to Java (see Section 4): a code generator translates small-tALC to Java code, which can then transform graphs specified in an appropriate format.</p><p>Altogether, we are thus primarily interested in proofs of correctness of graph transformations, for which two major approaches have emerged:</p><p>1. Model checking of graph transformations: given an initial graph and a set of transformation rules, check whether the graph can eventually evolve into a graph having certain properties, or whether specific properties can be ascertained to be always satisfied. This kind of reasoning is possible in principle (the initial graph can be specified by a pre-condition, invariants can be specified as loop conditions, eventuality properties as post-conditions), but our approach is clearly not geared towards this activity. 2. Full correctness proofs: given an arbitrary graph satisfying the pre-condition, verify that it evolves into a graph satisfying the post-condition. This is the kind of verification we are aiming at.</p><p>Full correctness proofs are hard, and undecidability of the generated proof obligations is a major concern for rich logics <ref type="bibr">[4]</ref>. We propose to use a relatively simple logic, ALC, belonging to the family of Description Logics (DLs). We summarize the logic in Section 3.1, and the fine-tuned interplay of the logic and the transformation language (among others: branching and loop conditions are formulas of this logic) brings it about that the proof obligations extracted from programs are decidable, as argued in Section 5. We are currently working on extending this approach to more expressive description logics, with the purpose of being able to tackle realistic problems in the areas of UML-style model transformations and RDF graph database transformations.</p><p>The work described here has reached the state of a sound prototype. In the corresponding sections, we will make precise which parts of the development are completed to which degree, and indicate which missing parts still have to be filled in. The small-tALC environment is available from the following web page, where it will be regularly updated: http://www.irit.fr/~Martin.Strecker/ CLIMT/Software/smalltalc.html.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Related work:</head><p>Hoare-like logics have already been used to reason on graph transformations (see, e.g. <ref type="bibr">[5]</ref>) but, as far as we are aware, no tool has been implemented. small-tALC, which is also based on a Hoare-like calculus, allows one to decide the verification problem, of programs operating on graphs, when the properties are expressed in the ALC logic. Some implementations of verification environments for pointer manipulating programs exist <ref type="bibr">[6]</ref>, however they often impose severe restrictions on the kind of graphs that can be manipulated, such as having a clearly identified spanning tree.</p><p>Other tools dedicated to reasoning on graph transformations have been proposed. For example, the GROOVE <ref type="bibr">[7]</ref> system implements model-checking techniques using LTL or CTL formulas and thus departs from small-tALC techniques.</p><p>The computation of weakest preconditions from a graph rewriting system is described by Habel, Pennemann and Rensink <ref type="bibr">[8,</ref><ref type="bibr">9]</ref>. This work is concerned with extraction of weakest preconditions, but no proof system for the formulas is given. Pennemann <ref type="bibr">[10]</ref> then describes a method of translating the extracted formulas to a resolution theorem prover. Radke <ref type="bibr">[11]</ref> uses a more expressive logic: MSO. The spirit of the work described in this paper is similar, but we explicitly restrict the expressiveness of the logical framework to obtain decidable proof problems.</p><p>In a similar vein, Asztalos et al. <ref type="bibr">[12]</ref> describe the verification of graph transformations based on category-theoretic notions and by translation to a logic for which no complete calculus is provided.</p><p>Raven<ref type="foot" target="#foot_8">3</ref> is a tool suite designed to handle and manipulate graph automata. In some sense Raven tends to generalize model-checking techniques from word to graph processing. Therefore techniques behind Raven tool are not directly comparable to small-tALC.</p><p>Alloy <ref type="bibr">[13]</ref> is a popular framework for specifying and exploring relational structures, and it has been used to analyze graph transformations <ref type="bibr">[14]</ref> written in the AGG transformation engine. Alloy interfaces with model checkers and can display counter models in case a transformation does not satisfy its specification. For verification, Alloy uses bounded model checking: errors for graphs of a certain size are systematically detected, but has the disadvantage that graphs beyond that size are not covered. As opposed to this, the proof method presented here is exhaustive, being based on a complete, decidable calculus.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">System Description</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">User's View</head><p>To explore the perspective of a user of small-tALC, we will walk through processing a simple program, but before, let us take a look at the kind of graphs we will be transforming, such as the example graph in Figure <ref type="figure" target="#fig_217">1a</ref> (displayed with RDF-Gravity<ref type="foot" target="#foot_9">4</ref> ). We will be processing graphs in RDF <ref type="bibr">[2]</ref> format. These graphs consist of nodes and typed edges. The graphs are simple: there cannot be multiple edges of the same type between two nodes, but several edges, each of different type. In the example, there is only one type of relation (also called role): r. Here, instance node a0 is linked with nodes a1, a2 and a3; similarly b0 with b1 and b2. Nodes can be typed. In our example, we have two types (also called concepts) A and B. Nodes a i are of type A, and nodes b j of type B. It is a matter of display to represent concepts as (meta-)nodes in Figure <ref type="figure" target="#fig_217">1a</ref>, and also the (meta-)relation type as arc linking a node to its type, but these meta-entities are subject to a different treatment than object nodes and relations. Let us now turn to transformation programs, as the one depicted in Figure <ref type="figure" target="#fig_1">2</ref>. A program is composed of one or several parameterized rules; and a parameterless main rule whose purpose is to specify the input-and output graph to be transformed and to identify the root nodes of the input graph. Rules can be assimilated to non-recursive procedures or macros. Procedural abstraction is so far not fully developed in our framework, so the analysis presented in the following concentrates on rule bodies.</p><p>The rule ex_rule has a precondition (pre) saying that node a is only connected (via arcs of type r) to nodes of type A, and that b is only connected to is connected to, we non-deterministically pick a node c and introduce an arc r between a and c. For example, the program might introduce an arc between a0 and b1 in the graph of Figure <ref type="figure" target="#fig_217">1a</ref> (or between a0 and b2). We can now assert that after running this program, the node that variable a points to is connected via r to at least one element of type B, as expressed in the postcondition.</p><p>Suppose the example program is in file example.trans. Running the verifier as follows confirms that the program is correct, i.e. that any graph satisfying the precondition is transformed into a graph satisfying the postcondition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>&gt; graphprover example starting proof ...formula valid</head><p>Let us modify the post-condition, claiming that a is exclusively connected to elements of type B: post: (a : ([!] r B));</p><p>When running the verifier again, we see that the property is incorrect, and that a counter-model has been created (see Figure <ref type="figure" target="#fig_217">1b</ref>, here displayed with Graphviz 5 ). This counter-model describes the state at the beginning of the program, namely a graph with four nodes, where c 1 is of type A and not of type B, and c 2 of type B. Clearly, when connecting a with c 2 , the post-condition is violated.</p><p>We correct the post-condition, saying that a is only connected to elements of type A or B: post: (a : ([!] r (A [||] B))); Running the verifier again convinces us that this property is satisfied.</p><p>How does the verifier validate or invalidate a program? The approach is classic: from the annotated program, we extract a proof obligation by computing weakest pre-conditions (see Section 3.2). This is an ALC formula that is sent to a tableau decision procedure (described in Section 5.2). A failed proof attempt produces a saturated tableau from which a counter-model can always be extracted. Fig. <ref type="figure" target="#fig_2">3</ref>: Schema of formal development</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Developer's View</head><p>Major parts of small-tALC have a strong formal basis and are being developed in a proof assistant. We use Isabelle <ref type="bibr">[15]</ref>, but the formalization is easily adaptable to related proof assistants. Essential ingredients (see Figure <ref type="figure" target="#fig_2">3</ref>) are the formalization of the program logic, the semantics of the programming language and a decision procedure of the extension of ALC we use (the latter has currently not been completely verified yet). This formalization (written in Isabelle's own functional and proof language) is automatically extracted to a general-purpose programming language, which is Scala in our case. We therefore obtain a highly reliable program prover, which is coupled with interface functionality (such as parsers and viewers) provided by Eclipse / Xtext to obtain the verifier described in Section 2.1. The transformation engine, described more in detail in Section 4, is so far unverified, but at least the Java code generator (Section 4) could be formally verified with by now standard compiler verification techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Foundations</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Logic</head><p>Our logic is a three-tier framework, the first level being Description Logic (DL) concepts, the second level facts, the third level formulas (Boolean combinations of facts and a simple form of quantification). Formulas occur not only in assertions (such as pre-and postconditions), but also in statements (Boolean conditions and select statement).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Concepts:</head><p>In this paper, we concentrate on the description logic ALC <ref type="bibr">[16]</ref>. For a being atomic concept names and r role (or relation) names, the abstract syntax of concepts C can be defined by the grammar: The last constructor, explicit substitution <ref type="bibr">[17]</ref>, is a particularity of our framework, required for a gradual elimination of substitutions, as further described in Section 5.5. We have three kinds of substitutions τ :</p><formula xml:id="formula_16">C ::= ⊥ (empty concept) | a (atomic concept) | ¬ C (complement) | C ⊓ C (intersection) | C ⊔ C (union) | ([?] r C) (some) | ([!] r C) (all) | Cτ (explicit</formula><p>-Replacement of a variable by another variable, of the form [x := y], -Adding a node v to / removing a node from an atomic concept a, of the form [a := a + {v}] respectively [a := a − {v}], -Adding an edge (v 1 , v 2 ) to / removing an edge from a role r, of the form</p><formula xml:id="formula_17">[r := r + {(v 1 , v 2 )}] respectively [r := r − {(v 1 , v 2 )}].</formula><p>Facts: Facts make assertions about an instance being an element of a concept, and about being in a relation. The grammar of facts is defined as follows:</p><formula xml:id="formula_18">f act ::= i : C (instance of concept) | i r i (instance of role) | i (¬r) i (instance of role complement) | i ≡ i (equality of instances) | i ≡ i (inequality of instances)</formula><p>Please note that since concepts are closed by complement, facts are closed by negation (the negation of a fact is again representable as a fact), and this is the main motivation for introducing the constructors "instance of role complement" and "inequality of instances".</p><p>Formulas: A formula is a Boolean combination of facts. We also allow quantification over individuals i (but not over relations or concepts), and, again, have a constructor for explicit substitution. We overload the notation ⊥ for empty concepts and the Falsum.</p><formula xml:id="formula_19">f orm ::= ⊥ | f act | ¬f orm | f orm ∧ f orm | f orm ∨ f orm | ∀i.f orm | ∃i.f orm | f orm τ</formula><p>In Figure <ref type="figure" target="#fig_1">2</ref>, we use the Ascii notation !, &amp;&amp;, || for negation, conjunction and disjunction. The extension of interpretations from facts to formulas is standard. As usual, a formula that is true under all interpretations is called valid.</p><p>When calculating weakest preconditions (in Section 5.1), we obtain formulas which essentially contain no existential quantifiers; we keep them as constructor because they can occur as intermediate result of computations. We say that a formula is essentially universally quantified if ∀ only occurs below an even and ∃ only below an odd number of negations. For example, ¬(∃x. x : C ∧ ¬(∀y. y : D)) is essentially universally quantified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Programming Language</head><p>The programming language is an imperative language manipulating relational structures. Its distinctive features are conditions (in conditional statements and loops) that are restricted formulas of the logic ALC, in the sense of Section 3.1. It has a non-deterministic assignment statement select ... with allowing to select an element satisfying a fact. Traditional types (numbers, arrays, inductive types) and accompanying operations are not provided; the language is thus only targeted at transformations of graphs.</p><p>Statements of our language are defined by the following grammar:</p><formula xml:id="formula_20">stmt ::= Skip (empty statement) | select i with f orm (assignment) | delete(i : C) (delete element from concept) | add(i : C) (add element to concept) | delete(i r i) (delete edge from relation) | add(i r i) (insert edge in relation) | stmt ; stmt (sequence) | if f orm then stmt else stmt | while f orm do stmt</formula><p>Please note that the keywords add and delete are overloaded for nodes and for edges. There is no direct support for creating or deleting nodes in a graph, only for "moving" them between concepts. We intend to simulate node creation and deletion by providing a predefined concept heap such that add(n: heap) corresponds to creating node n and delete(n: heap) to deallocating node n. Details still have to be worked out.</p><p>The semantics is a big-step semantics with rules of the form (st, σ) ⇒ σ ′ expressing that executing statement st in state σ produces a new state σ ′ .</p><p>The rules of the semantics are given in the Figure <ref type="figure" target="#fig_3">4</ref>. Beware that we overload logical symbols such as ∃, ∧ and ¬ for use in the meta-syntax and as constructors of f orm.</p><p>We do not enter into the details (also see the Isabelle formalization). Intuitively, the states σ manipulated by the operational semantics are the same as the interpretations of formulas, and they describe the current structure of a graph: which nodes are contained in each concept; which pair of nodes are contained in a role; and which variables are bound to which nodes. We write σ(b) to evaluate the condition b (a formula) in state σ.</p><p>Most of the rules are standard, apart from the fact that we do not use expressions, but formulas as conditions. The auxiliary function delete_edge modifies the state σ by removing an r-edge between the elements represented by v 1 and v 2 , and similarly for generate_edge. There are analogous functions for adding / deleting in concepts.</p><formula xml:id="formula_21">(Skip) (Skip, σ) ⇒ σ (Seq) (c1, σ) ⇒ σ ′′ (c2, σ ′′ ) ⇒ σ ′ (c1;c2, σ) ⇒ σ ′ (EDel) σ ′ = delete_edge v1 r v2 σ (delete(v1 r v2), σ) ⇒ σ ′ (EGen) σ ′ = generate_edge v1 r v2 σ (add(v1 r v2), σ) ⇒ σ ′ (SelAssT) ∃vi.(σ ′ = σ [v:=vi] ∧ σ ′ (b)) (select v with b, σ) ⇒ σ ′ (IfT) σ(b) (c1, σ) ⇒ σ ′ (if b then c1 else c2, σ) ⇒ σ ′ (IfF) ¬σ(b) (c2, σ) ⇒ σ ′ (if b then c1 else c2, σ) ⇒ σ ′ (WT) σ(b) (c, σ) ⇒ σ ′′ (while b do c, σ ′′ ) ⇒ σ ′ (while b do c, σ) ⇒ σ ′ (WF) ¬σ(b) (while b do c, σ) ⇒ σ</formula><p>Fig. <ref type="figure" target="#fig_3">4</ref>: Big-step semantics rules</p><p>The statement select v with F (v) selects an element vi that satisfies formula F , and assigns it to v. For example, select a with a : A ∧ (a r b) selects an element a which is and instance of concept A and being r-related with a given element b.</p><p>select is a generalization of a traditional assignment statement. There may be several instances that satisfy F , and the expressiveness of the logic might not suffice to distinguish them. In this case, any such element is selected, nondeterministically. Let us spell out the precondition of (SelAssT): Here, σ [v:=vi] is an interpretation update for individuals, modifying σ for variable v and assigning it a value vi in the semantic domain. We check whether the formula b would be satisfied under this choice, and if it is the case, keep this assignment. In case no satisfying instance exists, the semantics blocks, i.e. the given state does not have a successor state, which can be considered as an error situation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Executing Graph Transformations</head><p>Generating Java Code: For processing small-tALC programs such as the one in Figure <ref type="figure" target="#fig_1">2</ref> and generating Java code, we use the Eclipse environment and, in particular, the Xtext 6 facilities for parsing, syntax highlighting and context-dependent help. The program prover is currently not fully integrated in this framework, so that the interaction with the prover is performed via shell commands as described in Section 2.1.</p><p>In order to generate Java code for small-tALC programs, we parse the program and then traverse the syntax tree with Xtext/Xtend, issuing calls to appropriate Java functions that manipulate a graph (which is initially the input graph provided in the program's main rule). Here is a glimpse at the Xtend code snippet that translates statements, in particular the add statement for roles: Thus, a small-tALC program fragment add(a r b); is translated to a Java call g.insertEdge(a, r, b);, where the graph g is the current graph.</p><p>Transforming Graphs: Once a Java program has been generated for a given small-tALC program, it can be compiled and linked with a library that provides graph manipulating functions such as the above-mentioned insertEdge. When executing this program, it remains to read an input file containing a graph description, to perform the transformation and to output the new graph. We represent graphs in the RDF <ref type="bibr">[2]</ref> format. Parsing and printing of RDF files is based on the Apache Jena framework <ref type="foot" target="#foot_12">7</ref> .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Reasoning about Graph Transformations</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Weakest Preconditions</head><p>For proving program correctness, we use a standard approach in program verification. For proving that a program prog establishes the postcondition Q if started in a state satisfying the precondition P , we calculate the weakest precondition of prog with respect to Q and then show that P implies this weakest precondition.</p><p>The details are inspired by the description in <ref type="bibr">[18]</ref>: we compute weakest preconditions wp (propagating post-conditions over statements and taking loop invariants for granted) and verification conditions vc that aim at verifying loop invariants. Both take a statement and a DL formula as argument and produce a DL formula. For this purpose, while loops have to be annotated with loop invariants, and the while constructor becomes: while {f orm} f orm do stmt. Here, the first formula (in braces) is the invariant, the second formula the termination condition. The two functions are defined by primitive recursion over statements, see Figure <ref type="figure" target="#fig_4">5</ref> for the definition of wp (and the Isabelle sources for vc). </p><formula xml:id="formula_22">wp(Skip, Q) = Q wp(delete(v : C), Q) = Q[C := C − {v}] wp(add(v : C), Q) = Q[C := C + {v}] wp(delete(v1 r v2), Q) = Q[r := r − (v1, v2)] wp(add(v1 r v2), Q) = Q[r := r + (v1, v2)] wp(select v with b, Q) = ∀v.(b −→ Q) wp(c1; c2, Q) = wp(c1, wp(c2, Q)) wp(if b then c1 else c2, Q) = ite(b, wp(c1, Q), wp(c2, Q)) wp(while{iv} b do c, Q) = iv</formula><formula xml:id="formula_23">Theorem 1 (Soundness). If vc(c, Q) is valid and (c, σ) ⇒ σ ′ , then σ(wp(c, Q)) implies σ ′ (Q).</formula><p>What is more relevant for our purposes is the structure of the formulas generated by wp and vc, because it has an impact on the decision procedure for the DL fragment under consideration here. Besides the notion of "essentially universally quantified" introduced in Section 3.1, we need the notion of quantifier-free formula: A formula not containing a quantifier. In extension, we say that a statement is quantifier-free if all of its formulas are quantifier-free.</p><p>By induction on c, one shows:</p><p>Lemma 1 (Universally quantified). Let Q be essentially universally quantified and c be a quantifier-free statement. Then wp(c, Q) and vc(c, Q) are essentially universally quantified.</p><p>There is one major problem with the definition of function wp: the substitutions, such as C := C − {v} or r := r − (v 1 , v 2 ). When conceiving them as a meta-operations, as is usually done, we see that substitutions would yield syntactically ill-formed formulas. For example, reducing</p><formula xml:id="formula_24">([?] r C)[C := C − {v}] would give ([?] r (C −{v}))</formula><p>, which is not a valid concept expression. There are two ways out of this difficulty: we could either relax our syntax and accept expressions of the form ([?] r (C − {v})). This would induce a rather heavy change on the logic. Alternatively, we can treat substitution as a constructor of our language. This is the approach we have adopted, and therefore, substitutions appear as syntactic elements in the definitions of Section 3.1. It remains to be seen (in Section 5.2) how substitutions can be dealt with by proof methods of ALC.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Tableau Method</head><p>The core of the decision procedure for proving the verification conditions that are obtained as described in Section 5.1 is a tableau calculus which combines the traditional logical rules of a tableau calculus <ref type="bibr">[19]</ref> with rules for progressively eliminating the substitutions which are not part of the logic ALC.</p><p>As a consequence, and departing again from common practice in the DL literature, our tableau procedure does not manipulate facts (in the sense of Section 3.1), but formulas, i.e. Boolean combinations of facts. This extension becomes necessary because elimination of substitutions generates complex formulas. These could in principle be directly decomposed into sub-tableaux, but such a procedure obscures both the presentation and the implementation.</p><p>Preprocessing: The tableau manipulates quantifier-free formulas in negation normal form (nnf ).</p><p>The formulas obtained from function vc do possibly contain quantifiers, but as mentioned before, the formulas are essentially universally quantified. To get rid of these quantifiers, we therefore perform the following steps:</p><p>-We convert the entry formula f to a prenex normal form, i.e. a form ∀x 1 . . . x n .b with quantifier-free body b. -We drop the quantifier prefix; more precisely, we replace the bound variables x 1 . . . x n in b by free variables. This transformation preserves validity. -We start the tableau with nnf (¬b). The procedure is a satisfiability check that either produces an empty tableau (meaning that f is valid) or a model of ¬b that is a counter-example of f .</p><p>In negation normal form, negations only occur in front of atomic concepts (of the form ¬a, where a is an atomic concept). This invariant is maintained throughout the tableau procedure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Tableau Rules</head><p>In the following, we present a high-level description of the tableau procedure. (The reader consulting the Isabelle theories will notice that the formalization is on two levels: a set-based, relational version, aiming at proving essential properties such as soundness and completeness of the rules; and a list-based implementation. The formal proofs of these theories are not yet finalized.)</p><p>A tableau manipulates sets of branches (also called abox es -"assertional boxes" in DL terminology). Each branch Γ is a set of formulas. We first concentrate on a set of rules aiming at decomposing formulas on a single branch. They have the form Γ ֒− → Γ ′ , expressing that branch Γ is rewriten to Γ ′ . We write Γ, f instead of Γ ∪ {f } for adding formula f to Γ . The rules are displayed in Figure <ref type="figure" target="#fig_38">6</ref>.</p><p>Let us comment on the rules: The structural rules conjC, disjCr, disjCl (for concepts) and conjF, disjFr, disjFl (for formulas) should be clear. The rule all allows to conclude y : C if x is only r-connected to elements of type C, and there is an arc (x r y). The rule some inserts an arc (x r z) and a membership z : C for an arbitrary z if it is known that x is r-connected to at least one element of type C. The rule eq propagates an equality x ≡ y in the branch, provided the equality is not</p><formula xml:id="formula_25">x ≡ x. conjC (x : (C1 ⊓ C2)) ∈ Γ not((x : C1) ∈ Γ and (x : C2) ∈ Γ ) Γ ֒− → Γ, (x : C1), (x : C2) disjCr (x : (C1 ⊔ C2)) ∈ Γ (x : C1) / ∈ Γ (x : C2) / ∈ Γ Γ ֒− → Γ, (x : C1) disjCl (x : (C1 ⊔ C2)) ∈ Γ (x : C1) / ∈ Γ (x : C2) / ∈ Γ Γ ֒− → Γ, (x : C2) all (x : ([!] r C)) ∈ Γ (x r y) ∈ Γ (y : C) / ∈ Γ Γ ֒− → Γ, (y : C) some (x : ([?] r C))</formula><p>∈ Γ for all y, not((x r y) ∈ Γ and (y :</p><formula xml:id="formula_26">C) ∈ Γ ) Γ ֒− → Γ, (x r z), (z : C) subst (x : (Cτ )) ∈ Γ nnf (push((x : C)τ )) / ∈ Γ Γ ֒− → Γ, nnf (push((x : C)τ )) eq (x ≡ y) ∈ Γ x = y Γ ֒− → Γ [x := y] conjF f1 ∧ f2 ∈ Γ not(f1 ∈ Γ and f2 ∈ Γ ) Γ ֒− → Γ, f1, f2 disjFr f1 ∨ f2 ∈ Γ f1 / ∈ Γ f2 / ∈ Γ Γ ֒− → Γ, f1 disjFl f1 ∨ f2 ∈ Γ f1 / ∈ Γ f2 / ∈ Γ Γ ֒− → Γ, f2</formula><p>Fig. <ref type="figure" target="#fig_38">6</ref>: Tableau rules</p><p>The rule subst is applicable for concepts with substitutions. As motivated in Section 5.1, substitutions cannot be eliminated at once, but they can be removed progressively, whenever the tableau prover hits on a fact of the form (x : Cτ ). Note that the variable x was possibly not present in the original tableau with which we have started the proof, but may have been introduced by a some-rule.</p><p>If we encounter such a situation, we push the substitution as far as possible. We postpone the details to Section 5.5.</p><p>A branch Γ contains a clash (clash(Γ )) if either of the following holds:</p><p>for x a variable, (x : ⊥) ∈ Γ for x a variable and a an atomic concept, (x : a) ∈ Γ and (x : ¬a) ∈ Γ for x, y variables, (x r y) ∈ Γ and (x (¬r) y) ∈ Γ -for x a variable, (x ≡ x) ∈ Γ -⊥ ∈ Γ</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4">Tableau Procedure</head><p>We can now formulate a depth-first-search function df s exploring a tableau. The function takes a tableau (here implemented as a list of branches) and returns a list of models. Initially, the tableau is just the formula [{f }] to be proved. If the resulting list is empty, f is not satisfiable. Otherwise, the list contains an element which is a model of f .</p><formula xml:id="formula_27">df s[ ] = [ ] df s(Γ :: Γ s ) = if clash(Γ ) then df s(Γ s ) else if reducible(Γ ) then df s({Γ ′ |Γ ֒− → Γ ′ }@Γ s ) else [Γ ]</formula><p>The procedure progressively eliminates all inconsistent branches (with clash(Γ )). If a branch Γ is not inconsistent, but reducible (i.e. , there exists a Γ ′ with Γ ֒− → Γ ′ ), then we expand the tableau and explore the new branches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.5">Eliminating Substitutions</head><p>The push function used in the subst rule of Figure <ref type="figure" target="#fig_38">6</ref> pushes substitutions into formulas, "as far as possible". The remaining tableau rules then decompose formulas until substitutions hidden in subformulas become apparent and the subst rule can be applied again. Intuitively speaking, this process decreases the "height" of the substitutions in a formula, until they eventually disappear.</p><p>For a formula f , we define push(f ) as the formula f ′ which is the result of the rewrite system spelled out in the following. Thus:</p><formula xml:id="formula_28">push(f ) = f ′ iff f * f ′ ,</formula><p>where the rewrite relation is defined in the following. There are numerous cases to consider, and we do not present all of them. Substitution in formulas are pushed into subformulas:</p><formula xml:id="formula_29">-⊥τ ⊥ -(¬f )τ (¬f τ ) -(f 1 ∧ f 2 )τ (f 1 τ ∧ f 2 τ ) -(f 1 ∨ f 2 )τ (f 1 τ ∨ f 2 τ )</formula><p>Substitution in facts: Substitutions of individual variables f [x := y] are carried out as expected. Otherwise, we procede as follows:</p><p>- -For substitutions τ of the form r :</p><formula xml:id="formula_30">(x : ¬C)τ x : (¬Cτ ) -(x : C 1 ⊓ C 2 )τ x : (C 1 τ ⊓ C 2 τ ) -(x : C 1 ⊔ C 2 )τ x : (C 1 τ ⊔ C 2 τ ) -For</formula><formula xml:id="formula_31">= r − {(v 1 , v 2 )} or r := r + {(v 1 , v 2 )}: • (x : c)[r := r − {(v 1 , v 2 )}]</formula><p>x : c, and similarly for r</p><formula xml:id="formula_32">+ {(v 1 , v 2 )} • (x : ([!] r ′ C))[r := r − {(v 1 , v 2 )}] (x : ([!] r ′ C)) for r = r ′ • (x : ([!] r C))[r := r − {(v 1 , v 2 )}] ite ((x = v 1 ) ∧ (v 2 : (¬C[r := r − (v 1 , v 2 )])) ∧ (v 1 r v 2 ), (x : (&lt; 2 r (¬C[r := r − (v 1 , v 2 )]))), (x : ([!] r C[r := r − (v 1 , v 2 )])))</formula><p>Here, ite is for if-then-else:</p><formula xml:id="formula_33">ite(a, b, c) = (a −→ b) ∧ (¬a −→ c).</formula><p>Please note that the logic ALC cannot completely express the effect of substitution, and we have to resort to the more expressive logic ALCQ, which turns out to be complete for substitutions. Thus, the "then" branch of the ite construct expresses that x is r-connected to less than 2 elements of (¬C[r := r − (v 1 , v 2 )]). We have however not yet implemented tableau rules for ALCQ, so we stick to the simpler logic in this presentation.</p><formula xml:id="formula_34">• (x : ([!] r C))[r := r + {(v 1 , v 2 )] ¬((x = v 1 ) ∧ (v 2 : ¬(C[r := r + (v 1 , v 2 )])) ∧ (v 1 (¬r) v 2 )) ∧(x : ([!] r (C[r := r + (v 1 , v 2 )])))</formula><p>• Similar rules for existential quantification (x : ([?] r C)).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>We have presented small-tALC, a framework for executing graph transformations and proving their correctness with a sound and complete calculus. One of the distinctive features of the approach is its formal semantic basis. We are now moving towards application, such as Sparql Query and Update in the knowledge representation world, and model transformations as used in model-driven engineering. The greatest challenge is the development of logics that are more expressive than ALC but remain decidable. Even though a low proof-theoretic complexity is not a major concern for program correctness proofs (these are not executed on a large knowledge base), the concern changes when wanting to execute programs efficiently on a large data set.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Search-Based Software Engineering (SBSE) has become a subfield of software engineering characterized by growing of activity and research interest. SBSE seeks to reformulate Software Engineering problems as 'search problems' <ref type="bibr">[1]</ref> in which optimal or near-optimal solutions are sought in a search space of candidate solutions, guided by a fitness function that distinguishes between better and worse solutions.</p><p>It has been argued that the virtual nature of software makes it well suited for Search-Based Optimization (SBO) <ref type="bibr">[2]</ref>. This is because fitness is computed directly in terms of the engineering artifact, without the need for the simulation and modeling inherent in all other approaches to engineering optimization. This simplicity and ready applicability make SBSE a very attractive option.</p><p>Traditionally SBSE has based on finding the optimal or near-optimal solution to the problem with respect to a single objective. However, single-objective approach often is incorrect because of existing of many incomparable objectives in the framework of one problem. Incomparability of objectives makes inapplicable waiting of the different objectives in order to combine them into a single weighted sum objective.</p><p>This reason has caused applying of multi-objective approaches in SBSE and using SBSE as a tool for decision support. To underpin the focus on decision support, SBO problem should be formulated as multi-objective problems, to which a Pareto optimal approach can be applied <ref type="bibr">[3]</ref>. In Pareto optimal approaches, the outcome is a set of candidate solutions, each of which cannot be enhanced according to one of the multiple objectives to be optimized without a negative impact on another.</p><p>In this paper, we explore existing bi-objective approaches for high-level decision support in software development process. The rest of the paper is organized as follows. Section 2 briefly describes using of bi-objective models for Next Release and Modularization Problems. Section 3 presents SBO on decision-making perspective. Finally, section 4 draws the main conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Bi-Objective Models at the Early Stages of Software Development</head><p>Software engineers have been exploiting many different software development methodologies that recommend different framework of stages. In this paper, we base on the fact that high-level decision most often need support on requirement specification and design stages, which present, more or less, in every methodology. To explore bi-objective models at these stages, we use papers gathered in repository of publications on SBSE <ref type="bibr">[4]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Requirement Specification Stage</head><p>One of the core problems of requirement specification stage in incremental methodologies is Next Release Problem (NRP). Decision maker determines which features should be included in the next release of the product in order to satisfy the highest possible number of customers and entail the minimum cost for the company <ref type="bibr">[3]</ref>. NRP is a form of cost-benefit analysis for which a Pareto optimal approach is attractive.</p><p>In NRP a set of customers, C = {c1, ..., cm}, each customer has a degree of importance for the company that can be reflected by a weight factor, Weight = {w1, ..., wm}, where</p><formula xml:id="formula_35">  1 , 0  w and    m j j w 1 1 .</formula><p>It is assumed that there is the set of independent requirements, R = {r1, ..., rn}, that are targeted for the next release of an existing software system. Satisfying each requirement entails spending a certain amount of resources, which can be translated into cost terms, Cost = {cost1, ..., costn}.</p><p>Satisfaction of requirements provides value for the company. The level of satisfaction for a given customer depends on the subset of requirements that are satisfied in the next release of the software product. The requirements are not equally important for a given customer. Each customer cj (1&lt;j&lt;m) assigns a value to requirement ri (1&lt;i&lt;n) denoted by value(ri, cj) where value(ri, cj)&gt;0 if customer j has the requirement i and 0 otherwise.</p><p>In the formulation of the bi-objective NRP, two objectives are taken into consideration in order to maximize customer satisfaction (or the total value for the company) and minimize required cost. Let the decision vector</p><formula xml:id="formula_36">    1 , 0 ,..., 1   n x x x </formula><p>determines the requirements that are to be satisfied in the next release. In this vector, xi is 1 if the requirement i is selected and 0 otherwise.</p><p>The first objective function is considered for maximizing total value:</p><formula xml:id="formula_37">       n i m j j i j i c r value w x 1 1 , Maximize .</formula><p>The problem is to select a subset of the customers' requirements, which results in the maximum value for the company.</p><p>The second objective function is considered for minimizing total cost required for the satisfaction of customer requirements:</p><formula xml:id="formula_38">   n i i i x cost 1 Minimize .</formula><p>In order to convert the second objective to a maximization problem, the total cost is multiplied by -1. Therefore, the bi-objective model can be represented as follows:</p><formula xml:id="formula_39">                 n i i i n i m j j i j i x cost x c r value w x x 1 2 1 1 1 f Maximize , f Maximize   . (<label>1</label></formula><formula xml:id="formula_40">)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Design Phase</head><p>Software design usually includes low-level component and algorithm design and high-level, architecture design. A high-level software engineering problem that is most related to software architectures is Modularization Problem (MP). Decision Maker finds the best grouping of components to subsystems. For that, structure of software system is transformed into a directed graph G, the main question to be answered is what constitutes a good partition of the software structure graph. The goodness of a partition is usually measured with a combination of cohesion and coupling.</p><p>Cohesion is a measure of the degree to which the components of a single subsystem belong together. A high cohesion indicates a good modularization arrangement because the components grouped within the same subsystem are highly dependent on each other. A low cohesion, on the other hand, generally indicates a poor modularization arrangement because the components grouped within a subsystem are not strongly related.</p><p>The cohesion Ai of subsystem i with Ni components is defined as:</p><formula xml:id="formula_41">2 i i i N A   ,</formula><p>where µi is the number of intra-edge dependencies (relationships to and from components within the same subsystem), 2 i N is the maximum number of possible dependencies between the components of subsystem i.</p><p>Coupling is a measure of the connectivity between distinct subsystems. A high degree of coupling is undesirable because it indicates that subsystems are highly dependent on each other. Conversely, a low degree of coupling is desirable because it indicates that individual subsystems are largely independent of each other.</p><p>The coupling Eij between subsystems i and j, each consisting of Ni and Nj components respectively, is defined as:</p><formula xml:id="formula_42">        j i N N j i E j i ij ij if 2 if 0  ,</formula><p>where ij is the number of inter-edge dependencies (relationships to and from components of subsystems i and j).</p><p>In the formulation of the bi-objective MP, two objectives expresses the tradeoff between cohesion and coupling are taken into consideration in order to create highly cohesive subsystems and penalize the creation of too many dependencies between subsystems.</p><p>Given software structure graph G partitioned into k clusters, modeled partition of software system into subsystems, we define MP as:</p><formula xml:id="formula_43">               n i k j ij k i i E k k x A k x 1 1 2 1 1 2 1 f Maximize 1 f Maximize   . (<label>2</label></formula><formula xml:id="formula_44">)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">SBO as Decision Support</head><p>SBO can be applied to situations in which the human will decide on the solution to be adopted, but the search process can provide insight to help guide the decision maker. This insight agenda, in which SBO is used to gain insights and to provide decision support to the software engineering decision maker, has found natural resonance and applicability when used at the early stages of the software engineering lifecycle, where the high-level decisions made can have far-reaching implications.</p><p>Many of the values used to define a problem for optimization, particularly at the early stages of the software development process, come from estimates. In these situations, it is not optimal solutions that the decision maker requires, as much as guidance on which of the estimates are most likely to affect the solutions. Therefore, SBO is not merely a research program in which one seeks to 'solve' software engineering problems; it is a rich source of insight and decision support.</p><p>Bi-objective problems stated above are NP-hard, and, therefore, cannot be solved using exact optimization techniques for large-scale problem instances. That is why metaheuristic search techniques are usually applied to find approximations of Pareto optimal set (or front) for the bi-objective problem. Decision maker selects the solution from the found set according to his (her) preferences.</p><p>Restriction on SBO approach connected with the point at which the problem becomes too small. For NRP, limitation is a function of the number of requirements, which should exceed about 20 requirements. By contrast, there is no number of customers that is too small for the problem to be worthwhile. For MP, limitation is a function of the number of components, which should exceed about 20 components.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>Vital errors in software engineering such as too many requirements being realized in release and poor quality of software architecture are caused by false intuition of the decision maker. SBO can address this problem, it automatically scour the search space for the solutions that best fit the human assumptions in the objective functions. However, it has been widely observed that search techniques are good at producing unexpected answers. Automated search techniques effectively work in tandem with the human encapsulating human assumptions and intuition.</p><p>Future work will consider modification of SBO for including dependency relationship between requirements in NRP, between components in MP, and exploring the integrated model for both problems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Statistics of success of software projects implementation according to The Standish Group International <ref type="bibr">[1]</ref> showed that the rate of challenged projects (that late, over budget, and/or with less than the required features) is the constant value (42-46% projects). These statistics reflect the high rate of non-quality (the failed and the challenged) software projects in terms of interpretation of software quality <ref type="bibr">[2]</ref>. As shown in <ref type="bibr">[3]</ref>, the errors of requirements formulation are 10-25% of all errors. The analysis of errors of embedded and application software, which were made at the stage of the requirements formulation, is given in <ref type="bibr">[4]</ref>. In <ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref> the fact is confirmed, that the causes of many incidents and accidents through software are in the SRS, rather than in coding. In <ref type="bibr">[6]</ref> the experiment is described, which showed that the software versions written by different developers for the same requirements, contain the joint errors associated with errors of SRS. These experimental statements leads to the need to deepen of the SRS analysis. So the actual and important is the skill of evaluation of the success of project implementation on the basis of SRS. The aim of this research is the prediction of the characteristics and evaluation of success of implementation of software project based on the SRS analysis.</p><p>The success of software project implementation is timely execution of software project within the allocated budget and with realization of all necessary features and functionality. It can be estimated at the design stage based on the predicted values of the main project characteristics <ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref> -duration, cost, complexity, cross-platform, usability and quality. Duration is the sequence of the project stages based on the needs of project management. The relative duration is evaluated as compared to other software projects. Cost is difficult to assess at the early stages because it is highly dependent on the number of lines of code (the cost of one line is 0.5$). At the early stages of the life cycle we can evaluate the relative cost (as compared to other projects). Complexity is determined by the number of interacting components, the number of connections between the components and the complexity of their interactions. Cross-platform is the ability of software to run on more than one hardware platform and/or operating system. Usability is effectiveness, profitability and satisfaction of users by software project. Quality is the degree of compliance with the software characteristics of requirements. From the determinations of characteristics it is clear that none of them are part of other characteristic, that justifies this choice <ref type="bibr">[9,</ref><ref type="bibr">10]</ref>.</p><p>Analysis shows, that the existing methods and tools <ref type="bibr">[9,</ref><ref type="bibr">10]</ref> of characteristics determination are not suitable to evaluation of their values at the stage of requirements formulation, since they focus on the ready source code. The known methods (Using natural language processing technique, Using CASE analysis method, QAW-method, Using global analysis method, O'Brien's approach, Method to discover missing requirement elicitation, Selection of elicitation technique, Comparison and categorization of requirements elicitation techniques, Techniques for ranking and prioritization of software requirements) and tools (OSRMT, Tools by LDRA, Sigma Software, DEVPROM, CASE.Analytics) of SRS analysis and existing technologies of risk management (SEI, SRE, CRM, TRM, FSI, ERM) <ref type="bibr">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr">[11]</ref><ref type="bibr">[12]</ref><ref type="bibr">[13]</ref> are not suitable for quantitative evaluation of the project characteristics, because all are targeted to control over compliance with requirements of SRS, but none of them define the predicted values of characteristics on the SRS analysis.</p><p>Then for prediction of success of software project implementation on the analysis of SRS the task of research is development of method of evaluating the success of software project implementation based on analysis of specification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Method of Evaluating the Success of Software Project Implementation Based on Analysis of Specification Using Neuronet Information Technologies (MESSPI)</head><p>values of the software project characteristics; 3) evaluation of the degree of success of the software project implementation; 4) testing of the stability and acceptability of compensations of software project characteristics.</p><p>Let the software project is specified by the SRS <ref type="bibr">[14]</ref> in the next formalized form:</p><formula xml:id="formula_45">SRS=&lt;R1,R2,R3,R4&gt;,<label>(1)</label></formula><p>where R1the set of indicators of section1 of the SRS, R2indicators of section2, R3indicators of section3, R4indicators of section4. Selection and possible values of SRS indicators from the sets R1-R4 were detailed in <ref type="bibr">[9]</ref>. The first stage of MESSPI is prediction of software project characteristics on the SRS analysis, result of that is determining of the relative values of characteristics:</p><formula xml:id="formula_46">SCH={Cs,Dsp,Cx,Cp,Ub,Qs},<label>(2)</label></formula><p>where Cssoftware project cost, Dsp -duration, Cx -complexity, Cpcrossplatform, Ubusability, Qsquality. Some indicators of specification <ref type="bibr">[9]</ref> affect the above characteristics, but equations is not known, by which can calculate the characteristic value on the basis of the sets of SRS indicatorsall available formulas of characteristics evaluation is oriented to ready source code <ref type="bibr">[9,</ref><ref type="bibr">10]</ref>. Hecht-Nielsen's theorem proves the possibility of solving the task of representation of multidimensional function of arbitrary form on the artificial neural network (ANN). Therefore, ANN will be used to implement of the unknown functions of dependence of the project characteristics on SRS indicators. In <ref type="bibr">[9]</ref> the ANN was developed, which processes and approximates the set of SRS indicators and provides the predicted quantitative values of characteristics -Fig. <ref type="figure" target="#fig_0">1</ref>. Selection and possible values of ANN inputs, equations for ANN functioning and forming of ANN outputs (predicted relative values of the characteristics) were detailed in <ref type="bibr">[9]</ref>, so this information is not represented in this paper.</p><p>ANN of characteristics prediction based on the SRS analysis was trained so that all values of characteristics are the values of the interval (0, 1]. The value of each characteristic nearly to 0 negative affects on the success of project implementation (high cost, duration and complexity; low quality, usability, cross-platform). The value nearly to 1 positive impacts on the success of the project implementation (low cost, duration, complexity; high quality, usability, cross-platform). The developers and customers are difficult to comprehensively assess the success of software project implementation on the basis of the ANN's relative values of main characteristics. Therefore, the second stage of MESSPI is the interpretation of the received relative values of the project characteristics.</p><p>For this we introduce the integrative indicator of software project. Integrative indicator Iip Spis the quantitative indicator of project implementation success based on the set SCH ANN . We cannot to establish mutual dependence of them and to determine their impact on the integrative indicator of software project -these formulas and functions are not available. Therefore, we assume that all six predicted characteristics are equally important to the success of the project, and the integrative indicator of project depends equally on all six characteristics. In the absence of formulas and functions the simplest and the most obvious way of definition of integrative indicator of project is the using of its graphic presentation (in the classic radar chart, the axes of which there are six characteristics of the project -Fig. <ref type="figure" target="#fig_1">2</ref>). Then the integrative indicator of project is area of figure, which are shaped the predicted (by ANN) values of the project characteristics. Because ANN predicts the values of 6 characteristics, the coordinate system (Radar chart) will have 6 axes (the angle between the axes is 60°), and in accordance the integrative indicator of project is area of the hexagon Cs ANN Cx ANN Dsp ANN Ub ANN Cp ANN Qs ANN highlighted thick line on Fig. <ref type="figure" target="#fig_2">3</ref>. </p><p>The order of hexagon axes was selected taking into account of features of ANN training and for reasons of inability of compensation of the low values of some characteristics by high values of other characteristics (as all six characteristics are important for the software project). Formula <ref type="bibr">(5)</ref> shows that pairwise multiplication of the characteristics values can allow these compensations. Therefore, the upper part of the coordinate system has three axes for characteristics Ub, Cp, Qs, and the lower part consists of three axes for characteristics Dsp, Cx, Cs, for which the rule of ANN training is: the value of characteristic nearly to 0 means high cost, duration, complexity and low quality, usability, cross-platform. The junction of axes for characteristics from different categories was selected in pairs exactly as low value of cost (Cs→1) shall not compensate low value of quality (Qs→0), short value of duration (Dsp→1) can not compensate low value of usability (Ub→0).</p><p>We will need also the maximum possible value of integrative indicator of project: Iip maxis the area of hexagon CsCxDspUbCpQs highlighted dotted line on Fig. <ref type="figure" target="#fig_2">3</ref>. ANN was trained so that maximum possible value of each characteristicis 1. Then:</p><formula xml:id="formula_48">Iip max =0.5*0.866*( 1*1+ 1*1+ 1*1+ 1*1+ 1*1+ 1*1)=2.598<label>(6)</label></formula><p>By itself, the integrative indicator of project is uninformative to the developer and customer due to the difficulty of interpretation of its value, therefore the third stage of MESSPI is the evaluation of the degree of success of project implementation based on the integrative indicator of project. The value Iip max =2.598is the best value of integrative indicator, then the degree P Iip of success of project implementation is: P Iip =Iip Sp /Iip max =Iip Sp /2.598=0.385*Iip Sp <ref type="bibr">(7)</ref> The value of the degree of success of the software project implementation nearly to 0 indicates the low success of software project implementation.</p><p>As mentioned above, the compensation of values of the characteristics with the same value of integrative indicator is not always correct. Then the fourth stage of MESSPI is the testing of the stability and acceptability of characteristics compensations. If the hexagon Cs ANN Cx ANN Dsp ANN Ub ANN Cp ANN Qs ANN (area of which is the integrative indicator) will be convex, the characteristics of software project is considered the stable, and their compensatory effects are acceptable (valid). We introduce the indicator Ace Sp of stability and acceptability of compensatory effects of the characteristics. This indicator will take the value "True", if characteristics are stable, their compensatory effects are acceptable (i.e. hexagon is convex).</p><p>Criterion of convexity of hexagon is the simultaneous fulfillment of two conditions: 1) the same sign of sines of all angles of the hexagon; 2) the sum of all the angles of hexagon is 720° (by theorem about sum of the angles of convex polygon).</p><p>Here are the steps to determine of the angles of the hexagon (by Fig. <ref type="figure" target="#fig_2">3</ref>): 1) calculate the unknown third side for each triangle by law of cosines; 2) find one unknown angles in each triangle by law of cosines; 3) find second unknown angle in each triangle by theorem about the sum of angles; 4) find the angles of the hexagon.</p><p>After finding of the angles of the hexagon we should find sines of obtained angles and compare their signs. And we should find the sum of the obtained angles and compare this sum with 720°. If the sum of the angles of hexagon is 720° and sines of angles have the same signs, then hexagon is convex, accordingly indicator of stability and acceptability of compensatory effects of the characteristics Ace Sp =True.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Experiments</head><p>We performed experiments on the practical use of the MESSPI. For this we considered four alternative software projects, developed by different teams of developers to solve the same taskdevelopment of support system (web-portal) for practices of students of IT-specialties. Each development team consists of three IT professionals: project manager, requirements engineer and web-developer. Specialists from different teams had the same level of qualifications and the same experience in similar projects: project manager and requirements engineer of each team previously worked in three similar successful projects, web-developer of each team previously worked in two similar successful projects. All four development teams represented the different software companies of Khmelnitsky. Each development team had the equal opportunity to communicate with the customer for identification of customer requirements. Three joint meetings of all developers of four teams and representatives of the customer were organized. In addition, individual meetings of team representatives and representatives of the customer took place. As a result of working together with customer representatives all four development teams offered their SRS.</p><p>The sets R1-R4 of SRS indicators were formed for the each of four SRS and submitted for processing to the ANN. The results of ANN (predicted relative values of the characteristics), the calculated by MESSPI integrative indicators and degree of success of these projects implementation are in Table <ref type="table" target="#tab_1">1</ref>.  <ref type="table" target="#tab_1">1</ref> demonstrate that Project1 has the greatest predicted degree of success of implementation (71%) and Project2 has the smallest predicted degree of success of implementation (about 4%). Therefore the Project1 (SRS of Pro-ject1) was proposed to the developer and the customer for solution of their task.</p><p>If we will not take into account the compensation of low values of some characteristics by high values of other characteristics in the calculation of integrative indicator of the project, there is a risk for the obtaining of following results. Let the ANN gived certain values of characteristics for five different software projects. We show these values and the corresponding values of integrative indicators in Table <ref type="table" target="#tab_0">2</ref>.</p><p>The data of Table <ref type="table" target="#tab_0">2</ref> show that all five software projects have the same integrative indicator Iip Sp =0.894, but have significantly different relative values of characteristics. We need to check the convexity of the hexagons for all examined software projects for determination of value of indicator Ace Sp -Table <ref type="table" target="#tab_21">3</ref>. The testing of the stability and acceptability of compensations of characteristics of software projects showed that for Project6 and Project8 the characteristics are unstable, i.e. compensations of these characteristics are unacceptable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>This paper shows: the need of deepening of the SRS analysis; the dependence of quality and success of software project implementation on the SRS; the actuality and importance of the skill of evaluation of software project implementation success based on the SRS; the need of support of the choice of the best SRS for the project. The authors first proposed the method of evaluating the success of software project implementation based on analysis of specification using neuronet information technologies. MESSPI differs from the known methods (analysed in <ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr">[11]</ref><ref type="bibr">[12]</ref><ref type="bibr">[13]</ref>) that provides the prediction of the success of software projects implementation based on only SRS. The practical significance of the proposed method is the support in the comparison of software projects on the basis of SRS, the choice of the best SRS of project, and control for SRS quality also (SRS quality is very importance, as known <ref type="bibr">[14]</ref>). The proposed method is suitable only for software projects, for which SRS are existing and available. This method helps to "cut off" the software projects with failed SRS, because, as shown above, the software projects with failed requirements and specifications can not be successfull at the implementation.</p><p>The authors have following perspectives for future researches: 1) increasing of the veracity of ANN functioning for increasing of the MESSPI veracity; 2) selection of variant component for ANN; 3) providing recommendations about that is necessary to be changed in the SRS, that project became successful; 4) development of information technology for prediction of characteristics and evaluation of success of software project implementation based on the SRS analysis; this information technology should support: the SRS indicators collection, the processing of this data by ANN, the collection of the relative values of characteristics, the calculation of the integrative indicator and the degree of success of the software project implementation, and testing of the stability and acceptability of characteristics compensations. Introduction At present, cardiovascular diseases head the list among the most widespread and dangerous diseases of modernity <ref type="bibr">[1]</ref>. According to the data of the world Health Organization the death rate because of heart diseases in Ukraine reaches 64%, in the USA heart disease affects more than 800 000 people annually. At present the number of heart diseases among capable of working population sharply increased (quite often the age of the sick person with cardiac infarction doesn't exceed 23-25 years).</p><p>As heart diseases belong to the diseases which course and results of treatment directly depend on timely detection and elimination of pathological deviations the reliable diagnostics is the most important and primary task in the problem of cardiovascular diseases. As of today a great number of approaches <ref type="bibr">[2]</ref><ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr">[11]</ref><ref type="bibr">[12]</ref> for the solving of the given task with the usage of different mathematical methods including statistical methods, methods of computational intelligence, fuzzy logic, neural network modeling algorithms and others are worked out.</p><p>Let us consider some related works concerning the methods for analysis of electrocardiograms using automated techniques, modern information technologies and computer systems. For example, such investigations were started at the University of Glasgow (Uni-G), United Kingdom more than 40 years ago and are continuing as Uni-G ECG Analysis Program <ref type="bibr">[13]</ref> based on development of different approaches, in particular: methods for processing waveforms recorded in groups of three leads simultaneously, 12-lead ECG analysis program, optional approaches to computing the average QRS cycle including a simple mean, a weighted mean and a median beat, rhythm analysis, Brugada pattern, neural networks, rule based criteria, software diagnostic criteria based on age, sex, race, clinical classification, drug therapy and so on.</p><p>A dynamic hybrid architecture is descripted in <ref type="bibr">[14]</ref> for ECG data analysis, combining the fuzzy with the connectionist approach. The data abstraction is performed by a layer of Radial Basis Function (RBF) units and the upcoming classification is carried out by a classical two-layer feedforward neural network. For the evaluation a large clinically validated ECG database is explored, but a more detailed description of the input space using a larger number of RBF units does not grant sufficient improvements.</p><p>Leiden ECG Analysis and Decomposition Software (LEADS) was developed <ref type="bibr">[15]</ref> at the Leiden University Medical Center, The Netherlands as a MATLAB program for research oriented ECG/VCG analysis. LEADS focuses on the determination of a lownoise representative averaged beat (QRST complex), in which multiple parameters can be measured, paying special attention to the T wave. LEADS generates a default selection of beats for subsequent averaging.</p><p>The paper <ref type="bibr">[16]</ref> presents the current status of principal component analysis (PCA) for ECG signal processing and describes the relationship between PCA and Karhunen-Loeve transform.</p><p>Several ECG applications based on PCA techniques have been successfully employed, including data compression, ST-T segment analysis for the detection of myocardial ischemia and abnormalities in ventricular repolarization, extraction of atrial fibrillatory waves for detailed characterization of atrial fibrillation, and analysis of body surface potential maps.</p><p>Advances in sensor technology, personal mobile devices, wireless broadband communications, and Cloud computing are enabling real-time collection and dissemination of personal health data to patients and health-care professionals anytime. This approach was proposed in <ref type="bibr">[17]</ref> for creating an autonomic cloud environment for hosting ECG data analysis services.</p><p>A solution in <ref type="bibr">[18]</ref> leverages the advance in multi-processor system-on-chip architectures, and is centered on the parallelization of the ECG computation kernel.</p><p>The article <ref type="bibr">[19]</ref> reviewed time domain, frequency domain, premature complexes detection, heart rate variability, and nonlinear ECG analysis based methods.</p><p>Several different approaches for ECG analysis are based on a chaos theory <ref type="bibr">[20]</ref>, a combination of statistical, geometric, and nonlinear heart rate variability features <ref type="bibr">[21]</ref>, a semantic web ontology and heart failure expert system <ref type="bibr">[22]</ref>, learning system based on support vector machines <ref type="bibr">[23]</ref>, signal averaging method, multivariate analysis <ref type="bibr">[24]</ref>, RPCA -recursive principal component analysis <ref type="bibr">[25]</ref>, nonlinear PCA neural networks <ref type="bibr">[26]</ref>, cluster analysis, SPSA -simultaneous perturbation stochastic approximation method <ref type="bibr">[27]</ref>, ABT -Amplitude Based Technique, FDBT -First Derivative Based Technique, SDBT -Second Derivative Based Technique <ref type="bibr">[28]</ref>, Hilbert transform <ref type="bibr">[29]</ref> and so on.</p><p>At the same time each from above-mentioned methods has its disadvantages and limitations. Just therefore the necessity of the working out of new effective methods of medical diagnostics didn't lose its actuality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Statement of the problem</head><p>One of the most widespread methods of diagnostics and detection of cardiovascular diseases is an electrocardiography, a method of graphic registration of the characteristics of the electric field of a heart and their changes in the process of heart contractions. Electrocardiogram is characterized with a set of teeth by time and amplitude parameters of which the diagnosis is done. Taking into account that changing of the parameters of electrocardiogram has accidental character the problem of the classification of the realization of random sequence (some disease or absence of a disease correspond to every class) is the mathematical content of heart diseases diagnostics.</p><p>For the purpose of the increase of the reliability of the diagnostics of cardiovascular diseases it is necessary to work out on the basis of the theory of random sequences the method of electrocardiogram recognition with taking complete account of their stochastic qualities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Solution</head><p>The object of investigation is the random consequence</p><formula xml:id="formula_49">          1 , 2 ,..., 12 X X X X </formula><p>with twelve elements each of which corresponds to some the most informative parameter of the electrocardiogram Fig. <ref type="figure" target="#fig_0">1</ref> (as appropriate the number of parameters can be increased):   1 X is the width of the tooth P;   2 X is the height of the tooth P;  </p><formula xml:id="formula_50">3 X is the interval P-Q;   4 X is the height of the tooth Q;   5 X is the interval QRS;   6 X is the height of the first tooth R;   7 X is the height of the second tooth R;   8 X is the height of the tooth S;   9 X is the interval Q-T;   10 X is the height of the tooth T;   11 X</formula><p>is the duration of the first cycle of the cardiogram;   x i i  about which it is known a priori that it is generated by one of the ran-</p><formula xml:id="formula_51">dom sequences   () , 1,12, 1, j X i i j J </formula><p>( 1 J  of diseases and normal state) is obtained. It is necessary to define to which of these sequences exactly (to which of J classes) relates to given realization. Formulated in such a way the problem of recognition completely comes to standard Bayes approach but during the usage of Bayes criterion improbable (and that is why especially dangerous) diseases can not be recognized. Thereupon for solving of the problem of medical diagnostics the most acceptable is the criterion of the maximum of probability according to which during the observation of the realization</p><formula xml:id="formula_52">        1 , 2 ,..., 12 x x x x </formula><p>that hypothesis is taken which meets the condition:</p><formula xml:id="formula_53">    * 12</formula><p>arg max / ,</p><formula xml:id="formula_54">j j f x j  (<label>1</label></formula><formula xml:id="formula_55">)</formula><p>where</p><formula xml:id="formula_56">  12 / , 1, f x j j J </formula><p>is the relative density distribution of the symptoms x provided that the realization belongs to the given class. The problem of the recognition of random sequence realization comes to the determination of the belonging of the realization x to one of J given distributions</p><formula xml:id="formula_57">  12 / , 1, f x j j J  .</formula><p>Thus the following stage is the assessment of the unknown densities</p><formula xml:id="formula_58">  12 / , 1, f x j j J </formula><p>that in its turn taking into account the great number of the results of  , 1,12   x i i  observations is quite difficult and laborious procedure. Given problem in the context of linear relations is essentially simplified <ref type="bibr">[30]</ref> during the transition from sequence  , 1,12   x i i  to the analysis of the set of uncorrelated values</p><formula xml:id="formula_59">, 1, i v i I </formula><p>, which are determined from the canonical model of random sequence <ref type="bibr">[31]</ref> presentation:</p><formula xml:id="formula_60">    1 , 1,12, i X i V i i      <label>(2)</label></formula><formula xml:id="formula_61">    1 1 , 1,12, i i V X i V i i         <label>(3)</label></formula><formula xml:id="formula_62">            1 1 1 , 1, , , . j j j j i M X X i D i I i I D                           <label>(4)</label></formula><p>   </p><formula xml:id="formula_63">1 2 2 1 , 1,12 , i i D M X i D i i           <label>(5)</label></formula><p>where  , , 1,</p><formula xml:id="formula_64">i i I    is nonrandom coordinate function:     1, 0 i      , if i  </formula><p>. In this case the substitution of x for vector v taking into account</p><formula xml:id="formula_65">    12 1 1 / / , 1, Ii i f v j f v j j J   </formula><p>allows to put down the criterion of decision making in the following form:</p><formula xml:id="formula_66">  12 * 1 1 arg max / , 1, . i j i j f v j j J          <label>(6)</label></formula><p>The problem of recognition thus comes to consecutive approximation of twelve one-dimensional densities of distribution. The stochastic algorithm of diagnostics becomes simpler essentially but the transition from the vector x to the vector v is possible provided that the random sequences</p><formula xml:id="formula_67">    / , 1,12, 1, X i j i j J </formula><p>have only linear relations. Taking down of the limitations of the random sequences</p><formula xml:id="formula_68">  () , 1,12, 1, j X i i j J </formula><p>normal distribution is possible as a result of the usage of the corresponding nonlinear canonical decomposition <ref type="bibr" target="#b163">[32]</ref><ref type="bibr" target="#b164">[33]</ref><ref type="bibr" target="#b165">[34]</ref><ref type="bibr" target="#b166">[35]</ref>:</p><formula xml:id="formula_69">      1 1 ( ) ( ) ( ) ( ) () 1 1 1 , 1,12; iN j j j j i i i j j V X i V i V i i                     (7)                 1 1 2 2 ( ) ( ) 2 1 1 1 , 1,12; iN j j j j i j j D i M X i D i D i i i                        (8)                   1 ( ) ( ) ( )<label>11 1 ( ) ( ) 1 1 () , 1, , 1,</label></formula><p>.</p><formula xml:id="formula_70">N jj h j h h j jj j h j i M X X i D i D D i N i                                              <label>(9)</label></formula><p>Taking into account different qualities of random sequences</p><formula xml:id="formula_71">    / , 1,12, 1, X i j i j J </formula><p>parameters of the canonical decomposition ( <ref type="formula" target="#formula_6">7</ref>)-( <ref type="formula" target="#formula_70">9</ref>) are unique for each of the investigated sequences. The advantage of the decomposition ( <ref type="formula" target="#formula_6">7</ref>)-( <ref type="formula" target="#formula_70">9</ref>) usage is that their independence follows from noncorrelatedness () , 1,</p><formula xml:id="formula_72">N i V i I </formula><p>as all stochastic relations of much lower order are removed from the given coefficients. Thus the same as in the previous case the conversion of the problem of recognition from twelve measured space of the characteristics </p><formula xml:id="formula_73">     </formula><formula xml:id="formula_74">N i j i j f v j j J           (<label>10</label></formula><formula xml:id="formula_75">)</formula><p>The absence of the assumptions about the kind of the density distribution of the random values  </p><p>,..., NN VV comes to the necessity of the usage of nonparametric methods for their description. The simplest and the most effective approach under given conditions is the usage of nonparametric assessments of Parzen-type <ref type="bibr" target="#b167">[36]</ref>:</p><formula xml:id="formula_77">    () 1 1 , L N Ll i l f v g u dL    (11) where   ( ) ( ) 1 , NN l i il u d v v    , () , , 1, N il v l L </formula><p>are the realizations of the random value</p><formula xml:id="formula_78">() N i V ,   l gu is a certain weigh function (kernel); d is a constant (coefficient of blurriness).</formula><p>The choice in the capacity of the function of the kernel of   gu of steady density distribution allows to write down the expression for the assessment of the density distribution of () N i V in the following form:</p><formula xml:id="formula_79">    ( ) ( ) 1 1 , L NN Ll ii l f v g v dL    where   ( ) ( ) ( ) , ,<label>() ( ) ( ) , 0,5, , 1, ; 0,</label></formula><p>,</p><formula xml:id="formula_80">N N N i i l i l N l i NN i il v d v v d g v l L v v d             ( ) ( ) ( ) ( ) , ,<label>1 , , 1 0,5sup , , 2, .</label></formula><formula xml:id="formula_81">N N N N i l i l i l i l l d v v v v l L      </formula><p>The method of diagnostics of cardiovascular diseases on the basis of the offered algorithm and criterion of making decisions presupposes the fulfillment of the following phases: The scheme of the functioning of the system of cardiovascular diseases diagnostics is represented in Fig. <ref type="figure" target="#fig_1">2</ref>.</p><p>In modern medicine more than one hundred different cardiovascular diseases are classified <ref type="bibr">[1]</ref>. Developed six-stage algorithm is tested on five the most widespread diagnoses: "healthy heart"is a random sequence  Recognition of the diagnoses was done on the basis of 200 different cardiograms for each disease. Comparative results of recognition of the diagnoses (a) on the basis of the developed by the authors calculating method, (b) on the basis of neuronic network <ref type="bibr" target="#b168">[37]</ref> synthesized with the usage of Daubechies wavelet function of the 4th degree and Levenberg-Marquardt algorithm (for training) and (c) on the basis of the usage of fuzzy logic in medical diagnostics <ref type="bibr">[3,</ref><ref type="bibr">4]</ref> during the realization of the systems of fuzzy logic inference of Mamdani-type are presented in Table <ref type="table" target="#tab_0">2</ref>.</p><formula xml:id="formula_82">    /1 , 1,12 X i i  ; "hypertrophy of myocardium" -     / 2 ,</formula><p>Neuronic network that was used in calculating experiment (Table <ref type="table" target="#tab_0">2</ref>) has the following pecularities.</p><p>1. Expressions for the determination of approximation coefficients and detailing of discrete wavelet transform are of the form <ref type="bibr" target="#b168">[37]</ref>:</p><formula xml:id="formula_83">      0 0 , 1 , , jk x W j k f x x M           , 1 , , jk x W j k f x x M     where     ,, , j k j k xx </formula><p>is a family of basic functions. In calculating experiment of the diagnostics of cardiovascular diseases on the basis of the realization of the mechanism of fuzzy logic inference <ref type="bibr">[3,</ref><ref type="bibr">4]</ref> the following input parameters were used: 1</p><p>x -age of the sick; 2 x -double product of pulse on arterial tension; 3 x -tolerance to physical activity; 4 x -increase of double product per one kilogram of the body weight of the sick; 5</p><p>x -increase of double product per one kilogram of physical exertion; 6</p><p>x -adenosinetriphosphoric acid; 7 x -adenosine diphos- phoric acid; 8</p><p>x -adenylic acid; 9</p><p>x -coefficient of phosphorilation; 10 x -maximal consumption of oxygen per one kilogram of the body weight of the sick; 11</p><p>x -in- crease of double product in the response for submaximal physical exertion; 12</p><p>xcoefficient of the ratio of lactic and pyruvic acid content.</p><p>Expressions for the determination of the diagnosis are of the form:</p><formula xml:id="formula_84">  1 , , , d d f x y z    2 3 4 5 10 11</formula><p>, , , , , ,</p><formula xml:id="formula_85">y y f x x x x x x    6 7 8 9 12</formula><p>, , , , ,</p><formula xml:id="formula_86">y z f x x x x x </formula><p>where values d (diagnosis), y , z are determined with the help of the knowledge base mentioned in the works of professor A. P. Rotstein <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>. The results of numerical experiment confirm high effectiveness of the developed calculating method in the comparison to the methods of artificial intelligence at the expense of the usage of optimal parameters during the formation of the criterion of making decision.</p><p>The choice of Daubechies function of the 4th degree from the existing limited set of wavelet functions in the capacity of the parameter of neural network is not optimal for solving of the problem of cardiovascular diseases diagnostics (usage of other functions leads to the worsening of quality of problem solution <ref type="bibr" target="#b168">[37]</ref>).</p><p>The results of the experiment on the basis of A. P. Rotstein's approach <ref type="bibr">[3,</ref><ref type="bibr">4]</ref> indicate that the absence of strict mathematical apparatus of fuzzy equation analysis doesn't allow to form optimal structure of fuzzy rules that naturally restricts the accuracy of cardiovascular diseases classification.</p><p>On the whole the basis of statistic data can be expanded by the way of the introduction of cardiogram information about wider class or about all existing types of cardiovascular diseases. This will allow to form on the basis of developed calculating method highly efficient information systems of cardiovascular diseases diagnostics for their actual usage in medical cardiologic centers, clinics and diagnostic establishments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>Therefore in the work the calculation method for a computer system of cardiovascular diseases diagnostics on the basis of the canonical decomposition of the random sequence of electrocardiogram change is offered. The use of the mechanism of canonical decompositions allowed to formulate the decisive rule of the maximum of the combined density distribution in the form of the production of one-dimensional densities of distribution that gives the possibility to use for diagnostics random quantity of electrocardiogram parameters. Besides canonical decomposition doesn't impose any essential limitations (linearity, stationarity, Markovian property etc.) on the class of investigated random sequences. Thereby the offered approach to the solution of the problem of cardiovascular diseases diagnostics allows to take into account the maximum stochastic characteristics of the electrocardiograms belonging to different cardiovascular diseases. The given results of modeling show the high reliability of cardiovascular diseases diagnostics on the basis of the offered method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Synthesis of Time Series Forecasting Scheme Based on Forecasting Models System 1 Introduction</head><p>At the present stage, for effective management of enterprises it is necessary to be able to predict the major trends in social and economic systems, the main economic indicators characterizing financial position and efficiency of the use of companies' production resources.</p><p>Estimates and forecasts of the financial condition of the company make it possible to find additional resources, to increase its profitability and solvency.</p><p>Problems of the analysis and the forecast of financial condition of the company by means of corresponding indicators are an actual task, because on the one hand this is the result of the company, on the other it defines the preconditions for the development of the company. Qualitative forecast gives us an opportunity to develop reasonable strategic plans for economic activity of enterprises.</p><p>Under market conditions, the adequate forecasting and capacity planning of enterprises are impossible without working out economic and mathematical models that describe the use of available resources during the operation of enterprises.</p><p>To determine strategies for enterprise development, calculation of forecasts of economic indicators and factors of organizations plays an important role. If there is reliable information about the company in the past, mathematical methods can be applied to obtain necessary forecasts. These methods depend on the objectives and detailed forecast factors; they also depend on the environment.</p><p>Various aspects of the theory, practice, and forecast of financial condition of a company have been the subject of research of many domestic and foreign scientists, such as Blank I.A <ref type="bibr">[1]</ref>, Heyets V.M. <ref type="bibr">[2]</ref>, Zaychenko Y.P. <ref type="bibr">[3]</ref>, Ivakhnenko V.M. <ref type="bibr">[4]</ref>, Ivakhnenko O.G. <ref type="bibr">[5]</ref>, Yarkina N.M. <ref type="bibr">[6]</ref>, Tymashova L. <ref type="bibr">[7]</ref>, Stepanenko O.P. <ref type="bibr">[8]</ref>, Tkachenko R.O. <ref type="bibr">[9]</ref>, Matviichuk A.V. <ref type="bibr">[10]</ref>, Hanke J.E. <ref type="bibr">[11]</ref>, Lewis C.D. <ref type="bibr">[12]</ref>, Box G.E. <ref type="bibr">[13]</ref>.</p><p>When forecasting the indicators by which the financial position or efficiency of the company's production resources use are determined, it is impossible to point out a single "the best" method of prediction because the internal laws (trends) of various indicator systems are different and there arises the problem of choosing the method of forecasting the studied indicator system.</p><p>Therefore, the development of new forecasting models of corresponding systems of indicators is an actual and important problem.</p><p>The aim of the study is to develop an efficient scheme of time series prediction that automatically (in the course of its training) adjusts to the appropriate system of economic, social, environmental, and engineering parameters, and it can be successfully used in the development of high-quality strategic plans in the branch of economy, environment, and for forecast of different natural processes.</p><p>The research methodology includes the method of least squares, exponential smoothing method, iterative techniques of minimization of functionals, and methods of synthesis of neural-network schemes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Synthesis of Forecasting Schemes of Time Series</head><p>Let 12 , ,..., ,..., t n v v v v be a time series. Prognostic value t v ~ of the element t v at the instant of time t can be written as follows [14-16]   ) , ,..., , ,..., (</p><formula xml:id="formula_87">~1 1 t v v a a f v k t t r t    ,<label>(1)</label></formula><p>where 1 ,..., r aa are the model parameters, k is the depth of prehistory. To find the parameters a 1 ,...,a r , we constructed the functional</p><formula xml:id="formula_88">  , ) ,..., ( 2 1 1     n t t t r v v a a L (<label>2</label></formula><formula xml:id="formula_89">)</formula><p>which is usually to be minimized. Let </p><formula xml:id="formula_90">       n v v a a f v k t t r n (3)</formula><p>where  is the step of the forecast. Depending on the type of the function f with the parameters ** 1 ,..., r aa , we have different optimal forecasting models of time series. To build a predictive scheme, at the beginning let us consider the autoregression method by means of which we define the optimal step of the prehistory * k  for the given time series t v with the fixed step of the forecast  . In the autoregression model, it is assumed that the indicator value t v at the instant of time t depends on 11 , ,...,</p><formula xml:id="formula_91">t t t k v v v      ,</formula><p>where k  is the parameter of the prehistory with fixed  . The prognostic value   n v ~ by the autoregression method is found according to the following model .</p><formula xml:id="formula_92">... ~1 ) ( 1 ) ( 2 ) ( 1               k n k n n n v a v a v a v (4)</formula><p>To determine the optimal values of the parameters ) ,..., 2 , 1 (</p><formula xml:id="formula_93">) *(   k t a t  for a fixed  t = t 0 ( ) , we minimize the functional   , ... ) ,...., (<label>2 1 )</label></formula><formula xml:id="formula_94">( ) ( 1 ) ( ) ( 1            n k t k t k t t k v a v a v a a L           <label>(5)</label></formula><p>i.e. we solve the system of equations . ,..., 2 , 1 , 0</p><formula xml:id="formula_95">) (   k t a L i     (6) Let ) *( ) *( 1 ,...,    k a a</formula><p>be a solution of the system <ref type="bibr">(6)</ref>. Then, according to (4) we have , ... ~1 ) *( <ref type="formula" target="#formula_1">1</ref>) *( <ref type="formula" target="#formula_43">2</ref>)</p><formula xml:id="formula_96">*( 1                   k t k t t t v a v a v a v (7)</formula><p>where .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>    k t</head><p>It is obvious that the variable t v ~ for a fixed value of   </p><formula xml:id="formula_97">0    depends on the parameter ) 1 (       n k k</formula><p>. To determine the optimal value of the prehistory parameter  k for 0    for the given time series t v , let us consider the variables </p><formula xml:id="formula_98">      2 1 ) ( * ) ( * 1 2 2 1 ) ( * 2 ) ( * 1 2 2 1 ) ( * 1 1 ... , 1 1 , 1 v a v a v v a v a v n v a v n n n n n n t t t t n t t t                                                       </formula><formula xml:id="formula_99">v 1 *    k n v 2 *    k n v  n v 1 M ) 1 ( 1 * ~   k n v ) 1 ( 2 * ~   k n v  ) 1 ( ~n v 2 M ) 2 ( 1 * ~   k n v ) 2 ( 2 * ~   k n v  ) 2 ( ~n v      q M ) ( 1 * ~qk n v    ) ( 2 * ~qk n v     ) ( ~q n v In each column n k n k n v v v ,..., ,<label>2 1 *</label></formula><formula xml:id="formula_100">*      </formula><p>of Table <ref type="table" target="#tab_1">1</ref>, we can find the least squared difference of the prognostic and the actual values of the corresponding time series terms. Mathematically this can be written as following:</p><formula xml:id="formula_101">let 1 * 1     k n j and  , ) ( ,..., ) ( , ) ( min 2 ) ( 2 ) 2 ( 2 ) 1 ( 1 1 1 1 1 1 1 q j j j j j j v v v v v v      2 * 2     k n j and   2 ) ( 2 ) 2 ( 2 ) 1 ( 2 ) ( ,..., ) ( , ) ( min 2 2 2 2 2 2 q j j j j j j v v v v v v      , ……………………………………………………… n j k  *  and  . ) ( ,..., ) ( , ) ( min 2 ) ( 2 ) 2 ( 2 ) 1 ( * q n n n n n n k v v v v v v       Define the sets * ,..., , 2 1  k I I I as follows             2 ) ( 2 ) ( 2 2 2 ) ( 1 1 ) ( ,..., 2 , 1 , ) ( ,..., 2 , 1 , ) ( ,..., 2 , 1 * * 2 2 1 1 i n n k k i j j i j j v v q i I v v q i I v v q i I                                </formula><p>and draw the table <ref type="table" target="#tab_162">Table 2</ref>. Parameters for Determining the Weighting Coefficients of the Model Forecasting Models</p><formula xml:id="formula_102">1 j 2 j  *  k j Resultant Column 1 M 11 a 12 a  * 1  k a 1 S 2 M 1 2 a 22 a  * 2  k a 2 S       q M 1 q a 2 q a  *  qk a q S where ). ,..., 2 , 1 , ,..., 2 , 1 ( ,<label>1 0 , , , 0 , , * 1 *</label></formula><formula xml:id="formula_103">*      k s q p a S I s if I s if a k j pj p s s s k ps                 With the help of ) ( p p S S  and    q p p S S 1 ) ( ) (</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> </head><p>we determine the weighting coefficients of the forecasting models ) ( q p M p  , with which these models are included in the following forecasting scheme .</p><formula xml:id="formula_104">... ~) ( ) ( ) ( ) 2 ( ) ( ) ( ) 1 ( ) ( ) ( 2 1 q n S S n S S n S S n v v v v q                   (8)</formula><p>The coefficients of the forecasting models in the scheme (8) depend on the parameter  that determines the influence of the element t v upon the prognostic value</p><formula xml:id="formula_105">  n v ~. The more remote element t v is from the prognostic point   n v ~, the less is its influence on the prognostic value ). 1 0 (   </formula><p>In the case of 1   , all points of time series t v are equivalent, i.e. in the model ( <ref type="formula" target="#formula_8">8</ref>) the distance of the element t v from the prognostic point</p><formula xml:id="formula_106">  n v ~</formula><p>is not taken into account. Synthesis of the predictive scheme (8) will be completed in the course of training its concerning  . For this purpose, we construct the functional</p><formula xml:id="formula_107">), ( , ) ... ( ) ( * 2 1 ) ( ) ( ) ( ) 1 ( ) ( ) ( * 1 i k n j v v v L i k i q j S S j S S j i r q i i                 </formula><p>and minimize it by varying the value  . The interval (0,1] we divide into m equal subintervals and find the value</p><formula xml:id="formula_108">) ( i L  at the points ) ,..., 2 , 1 ( m i m i i   </formula><p>. It is obvious that m gives the accuracy of the finding the minimum of the functional ) (</p><formula xml:id="formula_109">L . Let ) ( min * i m L   </formula><p>. Then the forecast of time series we conduct according to the scheme <ref type="bibr">(8)</ref>, substituting * m  for  .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Implementation of Forecasting Schemes of Time Series in Artificial Neural Basis</head><p>The basis of all forecasting methods is an idea of extrapolation of patterns of the development of the process, which was formed by the time when the forecast came true for future period of time.</p><p>Let</p><formula xml:id="formula_110">n t v v v v</formula><p>,...., ,..., , 2 1 is time series. For the synthesis of artificial neural-network forecasting scheme, there must exist a method (methods) of synthesis of neural elements that implement appropriate forecasting models, on whose basis a neural scheme should be constructed. For example, the following artificial neural element with linear activation function implements the autoregression model . After the development of methods for the synthesis of neural elements that implement the optimal forecasting models in the corresponding classes of models, to predict the values ) ,..., 2 , 1</p><formula xml:id="formula_111">.. ~1 ) ( 2 ) ( 1      n n n v w v w v    1 ) ( * * ...       k n k v w , with the</formula><formula xml:id="formula_112">( n i v i  at instants of time    n t</formula><p>, let us design the following neural-network scheme *  k k  ) of the 2 nd layer contains as much neurons as in Block 1. m . In Block 2. m each neuron has two inputs and a weight vector (1,1), where the value</p><formula xml:id="formula_113">m k n v  </formula><p>is given to the first input, and the prognostic value</p><formula xml:id="formula_114">) ( , ~ i m k n v  </formula><p>is given to the 2 nd input, which is the output signal of the і th neuron of Block 1.m. Activation function of the і th neuron of Block 2. m is set as follows</p><formula xml:id="formula_115">) ) ( exp( 2 ) ( ,  i m k n m k n v v      </formula><p>. The neuron of the serial number i of Block 2. m is related to i th neuron of the 3 rd layer in the following way: from the i th neuron of Block 2. m to the m th input of the i th neuron of the 3 rd layer there is given the signal ) ( ,</p><formula xml:id="formula_116"> i m f , where            otherwise. ), ) ( max(exp( arg if , , 0 1 2 ) ( , ) ( ,   i m k n m k n i m v v i f</formula><p>Neurons of the 3 rd layer have the linear activation function, and each of the weighting coefficients of each neuron is equal to 1. At the output of the i th neuron of the 3 rd layer for the fixed  we obtain the number ) ( i w . The 3 rd layer, except for neurons with linear activation function, has one more BlokPROG containing exactly as many neurons as a Block of the 1 st layer contains. Neurons of this block implement corresponding forecasting model with the depth  and their serial numbers coincide with the numbers of neurons of Blocks of Layer 1.</p><p>The 4 th layer contains two linear neurons. The first neuron has s inputs, all its weighting coefficients are equal to 1, and it has activation function</p><formula xml:id="formula_117">) ( ) ( 2 ) ( 1 ...    s w w w    .</formula><p>The second neuron of this layer has weighting coefficients </p><formula xml:id="formula_118">) ( )<label>( 2 )</label></formula><formula xml:id="formula_119">( ) ( ) 1 ( ) ( 1         s s n s n n w w w v w v w v          Blocks 2. m ( * ,...., 2 , 1  k m <label>( 2 ) ( 1 )</label></formula><p>) determine the most effective basic forecasting models. At the output of the scheme we have a convex linear combination of the best forecasting models.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Effectiveness of the Constructed Forecasting Scheme</head><p>Following types of errors are often used in the implementation of forecasting time series forecasting</p><formula xml:id="formula_120">МАЕ -Mean Absolute Error     n t t t v v n MAE 1 1 (9)</formula><p>where  t v is the values of the time series at time t;</p><formula xml:id="formula_121"> t v ~ predictable value t v .</formula><p>The average absolute error of prediction ( <ref type="formula" target="#formula_70">9</ref>) is an absolute measure of the quality of forecast, estimating it independently of the other predictions. It's enough to set a level of absolute error and compare the value of the specified error calculated by the formula <ref type="bibr">(9)</ref>.</p><p>To compare the quality of forecasting, it is often used the average relative error (MRE -Mean Relative Error) is often used</p><formula xml:id="formula_122">    n t t t t v v v n MRE 1 1 ,<label>(10)</label></formula><p>and the average square error (RMSE -Root Mean Square Error) is also used</p><formula xml:id="formula_123">  , 1 2 n v v RMRE n t t t     (11)</formula><p>where t v are the terms of the time series, t v ~ are the prognostic values of t v . RMSE and MRE are relative errors, i.e. they can be used to compare two (or more) different time series prediction the best is the forecast whose value of MRE <ref type="bibr">(10)</ref> or RMSE <ref type="bibr">(11)</ref> is less. According to the average relative error criterion, the quality of the forecast of the constructed predicting scheme is estimated by comparing its results with the results of main forecasting models on base of which it is synthesized. To perform this, we use data from the following Table <ref type="table" target="#tab_21">3</ref>  <ref type="bibr">[17]</ref>. Having analyzed the data in Table <ref type="table" target="#tab_9">4</ref>, we see that the least average relative error occurs in the constructed forecasting scheme. In the two cases (for 1   ), the error of the scheme coincides with the error of autoregression method. Thus, in general, the scheme developed in this work is the most effective among the methods on which it is based. To obtain the average error (%) of the prediction methods for the given time series in percentage, one should multiply by 100% the corresponding values of quality from Table <ref type="table" target="#tab_9">4</ref>   Note. The constructed forecasting scheme is flexible. This means that a new model can be added to or excluded from basic models (on basis of which the predictive scheme is constructed) at any time. It should be noted that the method of synthesis of the very predictive scheme does not change.</p><p>Here are some results of the program implementation of developed forecasting scheme for determining the share of road passenger transport in Ukraine to all other types of transportation during time span since 1980 to 2013. Table <ref type="table" target="#tab_21">3</ref> contains primary data of passenger traffic volume (period 1980-2013) and projections of passenger traffic (forecast period 2014-2018). On the base of this table it is evident that the average share of road passenger transport in Ukraine was 51.85% over the above mentioned period. Accordingly to the forecast this share will average 45.56% during the prediction period 2014-2018. Thus, the role of road passenger transport in Ukraine over the observable forecast period 2014-2018 is leading. Annual share of road passenger transport in Ukraine during the prediction period is shown on the following diagram:  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>A flexible scheme for forecasting of economic, social, environmental, engineering and technological indicators that can be successfully used in the development of reasonable strategic plans and decisions in the corresponding fields of human activity is worked out.</p><p>This forecasting scheme allows us to include new forecasting models of time series or to exclude a model or groups of models from it at any instant of time.</p><p>As for the models which remain in the scheme, the competition between them is made over a given period of time, and the final forecasting scheme represents a convex linear combination of models -winners with corresponding weighting coefficients.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C-clause calculi and refutation search in first-order classical logic 1 Introduction</head><p>This paper is devoted to the description of special calculi intended for the establishing of the unsatisfiability of a formula F of a certain form or a set S of such formulas in first-order classical logic maybe with equality. The calculi relate to the class of refutation-search methods based on the ideas firstly presented in Robinsin's paper <ref type="bibr">[1]</ref> on the well-known resolution method.</p><p>After the appearance of the resolution method, the main efforts of automated theorem-proving community were concentrated on its development in the direction of the construction of its different modifications and strategies oriented to increasing the efficiency of deduction search. All such attempts based on the use of a clause being a well-formed expression of the resolution method leaving aside the possibility of building efficient methods using modifications of the notion of a clause, to which this paper is devoted. Besides, the problem of the interpretation of the Maslov inverse method <ref type="bibr">[2]</ref> in resolution terms is solved in it.</p><p>Our calculi completely are determined by their (resolution-type) inference rules. The deducibility of a special expression Λ in such a calculus Π is equivalent to the unsatisfiability of F or S. At that, Π is called a sound calculus, if the deducibility of Λ implies the unsatisfiability of F or S; Π is called a complete calculus, if the unsatisfiability of F or S implies the deducibility of Λ.</p><p>If we put certain restrictions on inferences of Λ in a calculus Π, these restrictions are said to determine a strategy for proof search in Π.</p><p>All the above-said takes place for the clash-resolution method <ref type="bibr">[3]</ref> being called the clause calculus below. It deals with clauses and contains the unique inference rule -the latent class-resolution rule. The empty clause plays the role of Λ.</p><p>Let us stop on the way of the construction of an initial set of clauses for a formula F (or a set S of such formulas) being investigated on unsatisfiability. First of all, we can consider that F is a closed formula. Further, let us suppose that F already is presented in Skolem functional form (for satisfiability), all the quantifiers of which are omitted. Then, under the condition that all its variables implicitly are bound by the universal quantifier, the following question is reasonable: Can we refrain from the obligatory presentation F (or S) as a set of clauses and develop a technique similar to the resolution one? Research in this direction is described in what follows. At that, note that the papers <ref type="bibr">[4]</ref> and <ref type="bibr">[5]</ref> are a starting point for the development of the approach presented here.</p><p>We usually give references to the original papers, which laid the foundations for the research in a particular direction, although for the modern description of most of them, one can turn to <ref type="bibr">[6]</ref> or <ref type="bibr">[7]</ref>. QED indicates the end of any proof.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>First-order classical logic with functional symbols and equality is considered.</p><p>The notions of terms, atomic formula, and formulas are assumed to be known. A formula being the result of renaming of variables in a formula F is called a variant of F . A literal is an atomic formula or its negation. For a literal L of the form ¬A, its complementary L is A. If L is an atomic formula A, then its complementary L is ¬A.</p><p>As it was said above, we restrict ourselves by the consideration of only closed formulas F presented in Skolem functional form for satisfiability by means of the elimination of positive quantifiers. That is, F may be considered as a formula of the form ∀x 1 . . . ∀x m G(x 1 , , x m ), where x 1 , , x m all the variables of F , and G(x 1 , , x m ) a quantifier-free formula. I. e. it can be assumed that in the case of reasoning on satisfiability, one has to deal with only quantifier-free formulas, all variables of which implicitly are universally bound.</p><p>We can reduce G(x In what follows, any conjunct is considered to be the set of its literals and any c-clause -the set of its conjuncts. Thus, in the case when any conjunct of a c-clause contains exactly one literal, this c-clause can be considered as a usual clause (see, for example, <ref type="bibr">[1]</ref> or <ref type="bibr">[6]</ref>).</p><p>The introduced definitions allow us to use all the semantic notions of firstorder classical logic for c-clauses and sets of c-clauses under the assumption that every variable in any c-clause is universally bound. The empty clause is considered to be an unsatisfiable formula.</p><p>Our main purpose is to prove that the inferring of in our calculi is equivalent to the unsatisfiability of an initial set of c-clauses.</p><p>An inference from an initial set S of c-clauses in a calculi under consideration is a sequence D 1 , . . . , D n , where every D i (i = 1, . . . , n) is either a variant of an c-clause from S or a variant of a conclusion of a rule applied to some of the c-clauses preceding D i . Therefore, our calculi uniquely are identified by their inference rules. That is why the names of rules will serve as unique names of the calculi under consideration. The deducibility of a c-clause C from a set S of c-clauses in a calculus Π is denoted by S ⊢ Π C. The resolution method first was published in <ref type="bibr">[1]</ref> in 1965. It contained the only resolution rule of the arity 2. In <ref type="bibr">[8]</ref>, J.A.Robinson proposed its modification of this rule under the name of the hyper-resolution. Its further generalization led to the clash-resolution method <ref type="bibr">[3]</ref>. The peculiarity of this generalization is that it contains the only latent clash-resolution rule (denoted by RR below) that can be applied to any finite number of clauses. The corresponding clash-resolution method (being the clause calculus with the RR-rule) is sound and complete <ref type="bibr">[3]</ref>.</p><p>Let us give some necessary notations. A substitution, σ, is a finite mapping from variables to terms that has the form σ = {x 1 → t 1 , . . . , x n → t n }, where variables x 1 , . . . , x n are pairwise different and for any i (1 ≤ i ≤ n), the term t i is distinct from x i . A substitution σ is called a variant substitution if t 1 , . . ., t n from σ are only variables that are pairwise different. In this case, the inverse (one-one) correspondence σ −1 exists and presents itself a (variant) substitution.</p><p>For an expression Ex and a substitution σ, the result of the application of σ to the expression of Ex is understood in the usual sense; it is denoted by Ex • σ.</p><p>The composition of substitutions (as mappings) σ and λ is denoted by σ • λ.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>It has the property that for any expression</head><formula xml:id="formula_124">Ex, Ex • (σ • λ) = (Ex • σ) • λ.</formula><p>For any set Ξ of expressions, Ξ •σ denotes the set obtained by the application of σ to each expression in Ξ. If Ξ is a set of (at least two) expressions and Ξ • σ a singleton, then σ is called a unifier of Ξ. If Ξ 1 , . . . , Ξ n (n ≥ 1) are sets of expressions and for a substitution σ, the set Ξ i • σ is a singleton (i = 1, . . . , n), then σ is called a simultaneous unifier of Ξ 1 , . . . , Ξ n . It is known (see, for example, <ref type="bibr">[6]</ref> or <ref type="bibr">[3]</ref>) that in the case the existence of a unifier σ of sets Ξ 1 , . . . , Ξ n , there exist such substitutions λ and</p><formula xml:id="formula_125">σ ′ that Ξ 1 • λ, . . . , Ξ n • • λ are singletons and Ξ 1 • σ = (Ξ 1 • λ) • σ ′ , . . . , Ξ n • σ = (Ξ n • λ) • σ ′ .</formula><p>The substitution λ is unique up to renaming of its variables. It is called the most general simultaneous unifier (mgsu) of Ξ 1 , . . . , Ξ n .</p><p>Obviously, we can consider that any mgsu σ has the idempotence property that means that σ• σ = σ. This fact will often be used in what follows implicitly.</p><p>Robinson's latent clash-resolution rule (RR). Let clauses C 0 , C 1 , . . . , C q (q ≥ 1) with mutually distinct variables be of the forms</p><formula xml:id="formula_126">C ′ 0 ∨ L 1,1 . . . ∨ L 1,r1 . . . ∨ L q,1 ∨ . . . ∨ L q,rq , C ′ 1 ∨ E 1,1 ∨ . . . ∨ E 1,p1 , . . ., C ′ q ∨ E q,1 ∨ . . . ∨ E q,pq</formula><p>respectively, where C ′ 0 , C ′ 1 , . . . , C ′ q are clauses and L 1 , . . . , L q , E 1,1 , . . . E q,pq literals. Suppose that there exists the mgsu σ of the sets { L1,1 ,. . . , L1,r1 , E 1,1 ,. . . , E 1,p1 }, . . ., { Lq,1 ,. . . , Lq,rq , E q,1 ,. . . , E q,pq }. Then the clause</p><formula xml:id="formula_127">C ′ 0 • σ ∨ C ′ 1 • σ ∨ . . . ∨ C ′ q • σ is said to be deducible from C 0 , C 1 , . . . , C</formula><p>q by the rule RR. The RR-rule with two clauses as its premises will be denoted by RR 2 . The paper <ref type="bibr">[3]</ref> contains the following result (see, also, <ref type="bibr">[6]</ref>).</p><p>Robinson's Proposition. An initial set S of clauses is unsatisfiable if and only if the empty clause is inferred in the RR-calculus.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">C-clause calculi for logic without equality</head><p>Below, we introduce two resolution-type rules in order to define two specific cclause calculi. These calculi have a number of similar properties. That is why their proofs are detailed only for one of them. As to the other calculus, the corresponding proofs for it can be obtained in the same way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">CR calculus</head><p>Let us start with the consideration of the calculus that is based on the analog of Robinson's rule RR.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Clash-resolution (CR).</head><p>Let c-clauses D 0 , D 1 , . . . , D q (q ≥ 1) pairwise without common variables be of the forms</p><formula xml:id="formula_128">D ′ 0 ∨ K 1,1 ∨ . . . ∨ K 1,r1 ∨ . . . ∨ K q,1 ∨ . . . ∨ K q,rq , D ′ 1 ∨ M 1,1 ∨ . . . ∨ M 1,p1 , . . ., D ′ q ∨ M q,1 ∨ . . . ∨ M q,pq</formula><p>respectively, where D ′ 0 , . . . , D ′ q are c-clauses and K 1,1 , . . . , K q,rg , M 1,1 , . . . M q,pq conjuncts. Suppose that K 1,1 , . . . , K q,rq contain literals L 1,1 , . . . , L q,rq respectively and for every j = 1, . . . , q, M j,1 ,. . .M j,pj contain literals E j,1 ,. . .E j,pj respectively such that there exists the mgsu σ of the sets { L1,1 ,. . . , L1,r1 , E 1,1 ,. . . , E 1,p1 }, . . ., { Lq,1 ,. . . , Lq,rq , E q,1 ,. . . , E q,pq }. Then the c-clause</p><formula xml:id="formula_129">D ′ 0 • σ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ</formula><p>is said to be inferred from the nucleus D 0 and electrons D 1 , . . . , D q by the CRrule. Besides, the q-tuple D 0 , D 1 , . . . , D q is called a CR-clash and</p><formula xml:id="formula_130">D ′ 0 • σ ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ its CR-resolvent. Remark. If D 0 , D 1 , . . . , D</formula><p>q are only clauses, the definitions of CR and RR are coincides, which gives a simple way for proving some results relating to CR. Proposition 1. The CR-rule is sound.</p><p>Proof. Since we implicitly consider every variable in any c-clause to be bound by the universal quantifier, obviously it is enough to prove that a CR-resolvent is the logical conclusion of its premises only in the propositional case. For this, it is enough to check the validity of the propositional formula:</p><formula xml:id="formula_131">((D ′ 0 ∨ ( L1,1 ∧ K ′ 1,1 ) ∨ . . . ∨ ( L1,1 ∧ K ′ 1,r1 ) ∨ . . . ∨ ( Lq,1 ∧ K ′ q,1 ) ∨ . . . ∨ ( Lq,1 ∧ K ′ q,rq )) ∧ (D ′ 1 ∨ (L 1,1 ∧ M ′ 1,1 ) ∨ . . . ∨ (L 1,1 ∧ M ′ 1,p1 )) ∧ . . . ∧ (D ′ q ∨ (L q,1 ∧ M ′ q,1 ) ∨ . . . ∨ (L q,1 ∧ M ′ q,pq ))) ⊃ (D ′ 0 ∨ D ′ 1 . . . ∨ D ′ q )</formula><p>, where ⊃ is the implication symbol, which can be made by applying induction on q. QED.</p><p>Let a c-clause D distinguished from be of the form</p><formula xml:id="formula_132">K 1 ∨ . . . ∨ K n . Then ρ(D) is the set {L 1 ∨ . . . ∨ L n : L 1 occurs in K 1 , . . . , L n occurs in K n }.</formula><p>For , we suppose that ρ( ) contains and only it. If S is a set of c-clauses, then ρ(S) denotes the set D∈S ρ(D). It is obvious that for any non-empty set S of c-clauses, ρ(S) is a finite nonempty set and contains only clauses. Moreover, considering D as a formula, we can produce ρ(D) my means of applying the following propositional tautology:</p><formula xml:id="formula_133">A ∨ (B ∧ C) ≡ (A ∨ B) ∧ (A ∨ C),</formula><p>where ≡ is the logical equivalence symbol. Therefore, a set S is unsatisfiable if and only if ρ(S) is an unsatisfiable set.</p><p>Remark. According to the previous remark, we conclude that Robinson's clash-resolution technique is used when we are interested in the establishing of the deducibility of from ρ(S) in the CR-calculus. Thus, for any finite set S of c-clauses, it is true that S is unsatisfiable if and only if ρ(S)</p><formula xml:id="formula_134">⊢ CR . Lemma 1. Let D 0 , D 1 , . . . , D</formula><p>q be c-clauses and A 0 , A 1 , . . . , A q clauses such that</p><formula xml:id="formula_135">A 0 ∈ ρ(D 0 ), A 1 ∈ ρ(D 1 ), . . . , A q ∈ ρ(D q ). If for A 0 , A 1 , . . . , A q , there is the CR- clash A 0 , A 1 , .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>. . , A</head><p>q with A 0 as a nucleus and A 1 , . . . , A q as electrons and A is its CR-resolvent, then there exists the CR-clash D 0 , D 1 , . . . , D q with D 0 as a nucleus, D 1 , . . . , D q as electrons, and D as its CR-resolvent such that A ∈ ρ(D). Proof. Let us consider A 0 , A 1 , . . . , A q from the lemma conditions. Let they be of the form:</p><formula xml:id="formula_136">B 0 ∨ L 1,1 ∨ . . . ∨ L 1,r1 ∨ . . . ∨ L q,1 ∨ . . . ∨ L q,rq , B 1 ∨ E 1,1 ∨ . . . ∨ E 1,p1 , . . ., B</formula><p>q ∨ L q,1 ∨ . . . ∨L q,pq respectively, where B 0 , . . . , B q are clauses and L 1,1 , . . . , L q,rq , E 1,1 , . . . E q,pq literals such that there exists the mgsu σ of the sets { L1,1 , . . ., L1,r1 , E 1,1 , . . ., E 1,p1 }, . . ., { Lq,1 , . . ., Lq,rq , E q,1 , . . ., E q,pq }.</p><formula xml:id="formula_137">Then the clause B 0 •σ ∨ B 1 •σ ∨ . . . ∨ B n •σ is a CR-resolvent of the above-given CR-clash. Since A 0 ∈ ρ(D 0 ), D 0 can be presented in the form D ′ 0 ∨ K 1,1 ∨ . . . ∨ K 1,r1 ∨ . . . ∨ K q,1 ∨ . . . ∨ K q,rq</formula><p>, where D ′ 0 is a c-clause and K 1,1 , . . . , K q,rg conjuncts such that B 0 ∈ ρ(D ′ 0 ) and K 1,1 , . . . , K q,rg contain literals L 1,1 , . . . , L q,rq respectively. Making reasoning in the similar way, we obtain that D 1 , . . ., D q can be presented in the form</p><formula xml:id="formula_138">D ′ 1 ∨ M 1,1 ∨ . . . ∨ M 1,p1 , . . ., D ′ q ∨ M q,1 ∨ . . . ∨ M q,pq</formula><p>respectively, where D ′ 1 , . . ., D ′ q are c-clauses and M 1,1 , . . . M q,pq conjuncts such that B 1 ∈ ρ(D ′ 1 ), . . . , B q ∈ ρ(D ′ q ) and M 1,1 , . . ., M q,pq contain E 1,1 , . . . E q,pq . In accordance with the definition of CR, this means that D 0 , D 1 , . . . , D q form a clash with D 0 as a nucleus and D 1 , . . . , D q as electrons. For this CR-clash, n , this sequence is an inference of satisfying the conclusion of the proposition. QED. Now, it is easy to obtain the soundness and completeness of the CR-calculus.</p><formula xml:id="formula_139">D ′ 0 • σ ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ is its CR-resolvent. Obviously, B 0 • σ ∨ B 1 • σ ∨ . . . ∨ B n • σ ∈ ρ(D ′ 0 • σ ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ). QED</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 1 (Soundness and completeness of CR-calculus). A set S of c-clauses is unsatisfiable if and only if</head><formula xml:id="formula_140">S ⊢ CR .</formula><p>Proof. The soundness of CR is provided by Prop. 1.</p><p>Completeness. If S is an unsatisfiable set of c-clauses, then ρ(S) is an unsatisfiable set of clauses. The calculus RR is complete (Robinson's proposition). Hence, ρ(S) ⊢  (by CR from (8) as a nucleus and ( <ref type="formula" target="#formula_5">6</ref>) and ( <ref type="formula" target="#formula_6">7</ref>) as electrons).</p><formula xml:id="formula_141">1. (A ∧ ¬A) ∨ (B ∧ C) ∨ (E ∧ L) (∈ U ), 2. (A ∧ ¬A) ∨ (B ∧ C) ∨ (E ∧ L) (∈ U ), 3. (B ∧ C) ∨ (E ∧ L) (</formula><p>Therefore, the set U is unsatisfiable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">IR calculus</head><p>Maslov's inverse method (denoted by MIM here) and Robinson's resolution method (the calculus of clauses in our terminology) appeared approximately at the same time: MIM -in 1964 <ref type="bibr">[2]</ref> and RR -in 1965 <ref type="bibr">[1]</ref>.</p><p>After their appearance, the problem of the interpretation of MIM in the resolution terms has arisen. This problem has attracted the attention of a number of researchers in inference search (see, for example, <ref type="bibr">[11]</ref> and <ref type="bibr">[12]</ref>) also because MIM was defined as a special calculus of so-called favorable assortments and its description was made in the terms that did not correspond to traditional logical terminology and resolution one applied at that time.</p><p>In <ref type="bibr">[11]</ref>, S. Maslov gave himself some MIM explanation in the resolution notions for a restricted case. Later, after an attentive analysis of MIM, the author of this paper "discovered" that MIM interpretation was preferable to do in the terms of a special c-clause<ref type="foot" target="#foot_14">1</ref> calculus <ref type="bibr">[5]</ref>, the enough description detailed of which is given below. Also it was found that this calculus has an independent significance. It echoes the CR-calculus and, at the same time, it differs from CR.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Inverse resolution (IR).</head><p>Let c-clauses D 0 , D 1 , . . . , D q (q ≥ 1) pairwise without common variables be of the forms</p><formula xml:id="formula_142">D ′ 0 ∨ K 1 ∨ . . . ∨ K q , D ′ 1 ∨ N 1 1,1 ∨ . . . ∨ N 1 1,p1,1 ∨ . . . ∨ N r1 1,1 ∨ . . . ∨ N r1</formula><p>1,p1,r 1 , . . ., D ′ q ∨ N 1 q,1 ∨ . . . ∨ N 1 q,pq,1 ∨ . . . ∨ N rq q,1 ∨ . . . ∨ N rq q,pn,r n respectively, where D ′ 0 , . . . , D ′ q are c-clauses and K 1 , . . . , K q , N 1 1,1 , . . . , N rq q,pn,r n conjuncts. Suppose that for every j (1 ≤ j ≤ q), K j contains literals L j,1 , . . . , L j,rj and N 1 j,1 , . . . , N </p><formula xml:id="formula_143">{ L1,1 , E 1 1,1 , . . . , E 1 1,p1,1 }, . . . , { L1,r1 , E r1 1,1 , . . . , E r1 1,p1,r 1 }, . . . , { Lq,1 , E 1 q,1 , . . . , E 1 q,pq,1 }, . . . , { Lq,rq , E rq q,1 ,. . . , E rq q,pq,r q }. Then the c-clause D ′ 0 • σ ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ</formula><p>is said to be inferred from the nucleus D 0 and electrons D 1 , . . . , D q by the IR-rule. Besides, the q-tuple D 0 , D 1 , . . . , D q is called its IR-clash and</p><formula xml:id="formula_144">D ′ 0 • σ ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ its IR-resolvent.</formula><p>Having the IR-rule, we can speak about the IR-calculus.</p><p>The comparative analysis of IR and CR shows that the only difference between them is in the ways of the selection of cutting literals for their applications. The following statement contains a more detailed explanation of this observation.</p><formula xml:id="formula_145">Lemma 2. If D 0 , D 1 , . . ., D</formula><p>q is a CR-clash with D 0 an its nucleus and D 1 , . . ., D q as its electrons, then for any its CR-resolvent D, it is possible to construct an IR-clash with D 0 as its nucleus and certain variants of D 1 , . . ., D q as its electrons such that for its some IR-resolvent D ′ and a substitution τ , D = D ′ •τ .</p><formula xml:id="formula_146">Proof. If D 0 , D 1 , . . ., D</formula><p>q is the CR-clash from the definition of CR-rule, then the c-clauses D 0 , D 1 , . . ., D q can be presented as</p><formula xml:id="formula_147">D ′ 0 ∨ K 1,1 ∨ . . . ∨ K 1,r1 ∨ . . . ∨ K q,1 ∨ . . . ∨ K q,rq , D ′ 1 ∨ M 1,1 ∨ . . . ∨ M 1,p1 , . . ., D ′ q ∨ M q,1 ∨ . . . ∨ M q,pq</formula><p>respectively, where D ′ 0 , . . . , D ′ q are c-clauses and K 1,1 , . . . , K q,rg , M 1,1 , . . . M q,pq conjuncts and moreover for literals L 1,1 , . . . , L q,rq , E j,1 , . . .E j,pj from K 1,1 , . . . , K q,rg , M 1,1 , . . . M q,pq respectively, there exists the mgsu σ of the sets</p><formula xml:id="formula_148">Θ 1 = { L1,1 ,. . . , L1,r1 , E 1,1 ,. . . , E 1,p1 }, . . ., Θ q = { Lq,1 ,. . . , Lq,rq , E q,1 ,. . . , E q,pq } such that D = D ′ 0 • σ ∨ D ′ 1 • σ ∨ . . . ∨ D ′ q • σ .</formula><p>Let us take such variant substitutions λ 1,1 , . . ., λ 1,r1 ,. . ., λ q,1 ,. . ., λ q,rq that</p><formula xml:id="formula_149">D 1 • λ 1,1 ,. . ., D 1 • λ 1,r1 , . . ., D q • λ q,1 . . . D q • λ q,rq</formula><p>have no common variables with D 0 and each other. Considering λ −1 1,1 , . . ., λ −1 q,rq as mapping graphs, construct the set λ −1 1,1 ∪ . . . ∪ λ −1 q,rq . Obviously, it is a (variant) substitution. Let us denote it by µ and the c-clause</p><formula xml:id="formula_150">D ′ j • λ j,k ∨ M j,1 • λ j,k ∨ . . . ∨ M j,pj • λ j,k by D k j . Let us consider D 1 1 , . . ., D r1 1 , . . ., D 1 q , . . ., D rq q .</formula><p>Accordantly to their definition and the definition of µ, we have that D k j •µ is the same as D k j •λ −1 j,k and, therefore, it is the same as D j (j = 1, . . . , q; k = 1, . . . , r j ). Thus, we can select literals E 1  1,1 , . . . ,E 1 1,p1 , . . . , E r1 1,1 , . . . , E r1 1,p1 , . . ., E 1 q,1 , . . . ,E 1 q,pq , . . . , E rq q,1 , . . . , E rq q,pq in</p><formula xml:id="formula_151">M 1,1 • λ 1,1 , . . ., M 1,p1 • λ 1,1 , . . ., M 1,1 • λ 1,r1 , . . ., M 1,p1 • λ 1,r1 , . . ., M</formula><p>q,1 • λ q,1 , . . ., M q,pq • λ q,1 , . . ., M q,1 • λ q,rq , . . ., M q,pq • λ q,rq respectively, such that</p><formula xml:id="formula_152">E k i,j • λ −1 i,k = E k i,j</formula><p>• µ = E i,j (i = 1, . . . , q; j = 1, . . . , p q ; k = 1, . . . , r q ). Considering σ and µ as mapping graphs, we conclude that ζ = µ • σ ∪ σ is a substitution. Because σ is the mgsu of the sets Θ 1 , . . . , Θ q , the definition of ζ and the idempotence of σ imply that ζ is a simultaneous unifier of the sets of literals { L1,1 E 1 1,1 , . . . ,E 1 1,p1 }, . . . , { L1,r1 E r1 1,1 , . . . , E r1 1,p1 }, . . ., { Lq,1 E 1 q,1 , . . . ,E 1 q,pq }, . . ., { Lq,rq E rq q,1 , . . . , E rq j,pq }. Therefore, there exists the mgsu θ of these sets, for which ζ = θ • τ , where τ is a substitution.</p><p>As a result, we have that D 0 , D 1 1 , . . ., D r1 1 , . . ., D q 1 , . . ., D rq q can form the IR-clash with D 0 as its nucleus and D 1 1 , . . ., D r1 1 , . . ., D q 1 , . . ., D rq q as its electrons that produces the IR-resolvent</p><formula xml:id="formula_153">D ′ = D ′ 0 • θ ∨ D ′ 1 • (λ 1,1 • θ) ∨ . . . ∨ D ′ 1 • (λ 1,r1 • θ) ∨ . . . ∨ D ′ q • (λ q,1 • θ) ∨ . . . ∨ D ′ q • (λ q,rq • θ). Since θ • τ = ζ and ζ = µ • σ ∪ σ, it is obvious that D ′ • τ = D. QED.</formula><p>This result permits to "simulate" any inference in CR by an inference in IR. Proposition 3. Let S be a set of c-clauses and B 1 , . . ., B n an inference of from S in the CR-calculus. Then there exists an inference B ′ 1 , . . ., B ′ m of from S in the IR-calculus (m ≥ n) such that if B j is a variant of a CR-resolvent of an CR-clash with B r as its nucleus, then for some j ′ and r ′ (j ′ ≥ j, r ′ ≥ r), B ′ j ′ is a variant of an IR-resolvent of the corresponding IR-clash with B ′ r ′ as its nucleus; moreover, B j = B ′ j ′ • τ for some substitution τ . Proposition 4. The IR-rule is sound.</p><p>Proof. As in the case of the CR-rule, it is enough to establish the validity of the following formula, "extracted" from the definition of IR-rule: </p><formula xml:id="formula_154">(D ′ 0 ∨ ( L1,1 ∧ . . . ∧ L1,r1 ∧ K ′ 1 ) ∨ . . . ∨ ( Lq,1 ∧ . . . ∧ Lq,rq ∧ K ′ q )) ∧ (D ′ 1 ∨ (L 1,1 ∧ M 1 1,1 ) ∨ . . . ∨ (L 1,1 ∧ M 1 1,p1,1 ) ∨ . . . ∨ (L 1,r1 ∧ M r1 1,1 ) ∨ . . . ∨ (L 1,r1 ∧ M r1 1,p1,r 1 )) ∧ . . . ∧ (D ′ q ∨ (L q,1 ∧ M 1 q,1 ) ∨ . . . ∨ (L q,1 ∧ M 1 q,pq,1 ) ∨ . . . ∨ (L q,rq ∧ M rq q,1 ) ∨ . . . ∨ (L q,rq ∧ M rq q,pq,r q ))) ⊃ (D ′ 0 ∨ D ′ 1 . . . ∨ D ′ q ).</formula><formula xml:id="formula_155">1. (A ∧ ¬A) ∨ (B ∧ C) ∨ (E ∧ L) (∈ U ), 2. (A ∧ ¬A) ∨ (B ∧ C) ∨ (E ∧ L) (∈ U ), 3. (B ∧ C) ∨ (E ∧ L)</formula><p>(by IR from (1) ac a nucleus and (2) as an electron), 4. ¬B ∨ ¬C (∈ U ), 5. ¬E ∨ ¬L (∈ U ), 6.</p><p>(by IR from (3) as a nucleus and (4) and (5) as electrons).</p><p>We have again proved the unsatisfiability of U . Draw your attention to the fact that this inference in IR is shorter than the inference in CR from Example 1. This situation is more or less standard for these calculi (see the section containing a comparison of CR and IR).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">C-clause calculi for logic with equality</head><p>The CR-and IR-calculi admit equality handling based on a modification of the paramodulation rule that was proposed in <ref type="bibr">[9]</ref> for inference search in first-order theories with equality (denoted by ≃).</p><p>We are needed in the following notions that provide us with a possibility to reduce the establishing of the validity of the first-order statement with equality to the search of the refutation of a certain set of c-clauses.</p><p>Let S be a set of c-clauses. Then S ≃ denotes the set of equality axioms for S in the form of clauses, in which x, y, z, x 0 , . . . , x p are variables (see, for example, <ref type="bibr">[6]</ref>): consists of the following (1 Thus, in the case when we have deals with S requiring equality handling, we must establish the equationally unsatisfiability of the set S, which can be achieved by deducing the empty clause from S ∪ S ≃ . But such approach leads to the extreme large growth of the searching space. For the optimization of such growth, we use a modification of the paramodulation rule <ref type="bibr">[9]</ref>.</p><formula xml:id="formula_156">) x ≃ x, (2) x ≃ y ∨ y ≃ x, (3) x ≃ y ∨ y ≃ z ∨ x ≃ z, (4) x i ≃ x o ∨ R(</formula><p>Paramodulation rule PP. Let we have two c-clauses D and D ′ ∨ (K ∧ s ≃ t), where D ′ is a c-clause and K conjunct (possibly, empty). If there exists mgsu σ of the set of terms {s, u}, where u is a term occurring in D at a selected position, then the c-clause</p><formula xml:id="formula_157">D ′ • σ ∨ (D • σ)[t • σ]</formula><p>is said to be inferred from these c-clauses by the rule P P , where (D • σ)[t • σ] denotes the result of replacing in D • σ the term u • σ being at the selected position by t • σ. At that, the or-</p><formula xml:id="formula_158">dered pair D, D ′ ∨ (K ∧ s ≃ t) is called a PP-clash (w.r.t. s ≃ t) with the P P -paramodulant D ′ •σ ∨ (D•σ)[t•σ], nucleus D, and electron D ′ ∨(K ∧s ≃ t).</formula><p>The set S f of functionally reflexive axioms for a set S of c-clauses consists of all the clauses of the form f (x 1 , . . . , x p ) ≃ f (x 1 , . . . , x p ), where f is a p-arity function symbol occurring in S.</p><p>Adding P P to the CR-and IR-calculi, we get the calculi CR+PP and IR+PP intended for inference search in first-order classical logic with equality.</p><p>Remark. If in the above-given definition, P P is applied to only clauses, we have the usual paramodulation rule from <ref type="bibr">[9]</ref> being denoted by P here.</p><p>Because of the completeness of the inference system "negative hyper-resolution + paramodulation" (see, for example, <ref type="bibr">[6]</ref>), the following result takes place on the basis that a set S of c-clauses is equationally unsatisfiable if and only if ρ(S) is equationally unsatisfiable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Robinson-Wos's Proposition. A set S of c-clauses is equationally unsatisfiable if and only if</head><formula xml:id="formula_159">ρ(S) ∪ {x = x} ∪ S f ⊢ RR+P .</formula><p>Taking into account the well-known result <ref type="bibr">[10]</ref> about the completeness of the system "resolution + paramodulation" without using functionally reflexive axioms, we obtain the further reinforcement of Robinson-Wos's Proposition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Corollary. A set S of c-clauses is equationally unsatisfiable if and only if ρ(S) ∪ {x = x} ⊢</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>RR+P</head><p>. Moreover, RR can denote the only binary rule. Now, we have all the necessary for obtaining the results about the completeness of the calculi CR+PP and IR+PP.</p><p>First of all, the following analog of Lemma 1 for the P P -rule is obvious. Using this lemma and Prop. 2 and 3, it is easy to obtain the following result.</p><p>Proposition 5. Let S be a set of c-clauses and B ′ 1 , . . ., B ′ n an inference of from ρ(S) ∪ {x = x} ∪ S f in the calculus RR+P. Then there exists an inference B 1 , . . ., B n of from S ∪ {x = x} ∪ S f in the calculus CR+PP (IR+PP) such that: (1) if B ′ j is a variant of a resolvent of an RR-clash with B ′ r as its nucleus, then for some j ′ and r ′ , B j ′ is a variant of a resolvent of the corresponding CR-clash (IR-clash) with B r ′ as its nucleus and, additionally,</p><formula xml:id="formula_160">B ′ r ∈ ρ(B r ′ •τ ) for some substitution τ ; (2) if B ′</formula><p>j is a variant of a paramodulant of a P P -clash with B ′ r as its nucleus, then for some j ′ and r ′ , B j ′ is a variant of a paramodulant of the P P -clash with B r ′ as its nucleus and B ′ r ∈ ρ(B r ′ •τ ) for some substitution τ . This proposition, in fact, guarantees the completeness of the paramodulation extensions of the CR-and IR-calculi as well as their methods and strategies, some of which are given in the next section. Note that the soundness of such extensions is provided by Prop. 1 and 4 and the obvious fact that P P -paramodulant is a logical conclusion of the conjunction of all the c-clauses from {N, E} ∪ {N, E} ≃ , where N is a nucleus and E an electron of a P P -rule application.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 3 (Soundness and completeness of CR+PP and IR+PP). A set S of c-clauses is equationally unsatisfiable if and only if</head><formula xml:id="formula_161">S ∪ {x = x} ⊢ IR+P P (S ∪ {x = x} ⊢ CR+P P</formula><p>). Moreover, CR (IR) can be the only binary rule.</p><p>Proof. The soundness of CR+PP and IR+PP is provided by the remark in the preceding paragraph. Completeness takes place for CR+PP and IR+PP due to Corollary and Prop. 5. The completeness of CR+PP with the binary CR-rule is obvious. For proving the completeness of IR+PP with the binary IR-rule, it is enough to note that any binary application of CR can be "decomposed" into r 1 binary applications of IR (see the proof of Lemma 2 for the binary case). QED.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Methods and strategies for CR and IR</head><p>Prop. 5 gives a simple way for transferring most part of the methods and strategies taking place for the usual clash-resolution (RR) to the ones for the CR-and IR-calculi for classical logic both with and without equality. For the demonstration of how it is possible to do, let us consider the usual liner resolution and positive and negative hyper-resolutions in their wording from <ref type="bibr">[6]</ref>.</p><p>Note that they are given for logic with equality. To obtain them for the case without equality, it is enough to delete all parts concerning the P P -rule in the definitions and wordings of the theorems given below. Also note that their soundness is provided by the soundness of the rules CR, IR, and P P . That is why a soundness proof is absent in corresponding theorems.</p><p>Linear strategy for CR 2 +PP and IR 2 +PP. It permits to apply CR 2 (IR 2 ) or P P to the pair of c-clauses when beginning with the second rule application in an inference, any its c-clause is either a CR 2 -resolvent (IR 2 -resolvent) or P P -paramodulant of the previous application of the rule CR 2 (IR 2 ) or P P , and the other c-clause is a variant of either a c-clause from an initial set S of c-clauses or a c-clause that was deduced earlier.</p><p>Theorem 4 (Soundness and completeness of linear strategy for CR 2 +PP and IR 2 +PP). A set S of c-clauses is equationally unsatisfiable if and only if there exists an inference of from S ∪ {x = x} ∪ S f satisfying to the linear strategy for CR 2 +PP (IR 2 +PP).</p><p>Proof. Completeness takes place due to the completeness of the usual linear resolution with paramodulation <ref type="bibr">[6]</ref>, Robinson-Wos's Proposition, and Prop. 5. QED.</p><p>Positive and negative hyper-resolution for CR 2 +PP (IR 2 +PP). An atomic formula is called a positive literal. A literal of the form ¬A, where A is an atomic formula, is a negative one.</p><p>A c-clause is called a positive (negative) if each its conjunct contains at least one positive (negative) literal. Note that there are c-clauses being positive and negative at the same time, for example, ¬A ∧ A.</p><p>A CRor IR-clash D 0 , D 1 , . . . , D q with D 0 as a nucleus and D 1 , . . . , D q as electrons is called positive (negative), if D 1 , . . . , D q are positive (negative) c-clauses and the cut literals L j,k in the definitions of CR or IR respectively are negative (positive).</p><p>For logic without equality, positive (negative) hyper-resolution strategy for CR and IR permits constructing inferences containing only the positive (negative) hyper-resolution clashes with positive (negative) CRor IR-resolvents.</p><p>In the case of logic with equality, we additionally permit to apply the P P -rule only to positive nucleus and electron; moreover, a literal containing the selected occurrence of the term u (see the definition of P P -rule) must be positive.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 5 (Soundness and completeness of positive and negative hyper-resolutions with P P -rule). A set S of c-clauses is equationally unsatisfiable if and only if there exists an inference of from S ∪ {x = x} ∪ S f satisfying to the positive and negative hyper-resolution with CR-(IR-) and P P -rules.</head><p>Proof. Completeness. Since there exists an inference of from ρ(S)∪{x = x}∪S f satisfying to the usual positive (negative) hyper-resolution and paramodulation (see <ref type="bibr">[6]</ref>), this inference can be transformed into an inference of from S ∪ {x = x} ∪ S f satisfying to the positive and negative hyper-resolution with CR (IR) and P P on the basis of Robinson-Wos's Proposition and Prop. 5. QED.</p><p>Remark. In Theorems 9 and 10, the adding of functionally reflexive axioms to the set S is the necessary condition for completeness. Examples demonstrating this for clauses (when CR, IR, and RR are coincided) can be found in <ref type="bibr">[6]</ref>. assortments, while the B rule produces new favorable assortments from the already deduced ones. That is why we treat assortments as clauses and favorable assortments as favorable clauses being produced by the α and β rules (see below).</p><p>If C is a conjunct L 1 ∧ . . . ∧ L r , where L 1 , . . . , L r are literals, then C denotes the clause L1 ∨ . . . ∨ Lr .</p><p>Rule α. Let S be a set of c-clauses and</p><formula xml:id="formula_162">S d = { C : C is a conjunct from a c-clause belonging to S}. If S α = {C : C = C ′ • σ ∨ C ′′ • σ, where C ′ , C ′′ ∈ S d</formula><p>and C ′ and C ′′ contain literals L and L ′ respectively such that there exists the mgsu σ of { L, L ′ }}, then any clause from S α is called a f avorable one deduced from S by the α-rule.</p><p>Obviously, S α is a finite set if S is the same. Besides, each its (favorable) clause contains both a literal and its complementary. That is why S is a unsatisfiable set of c-clauses if and only if the set S ∪ S α is unsatisfiable.</p><p>Rule β. Let S be a set of c-clauses, D ∈ S, D consists of q conjuncts, and C 1 , . . ., C q be favorable clauses. If the IR-rule can be applied to D as a nucleus and C 1 , . . ., C q as electrons, than the IR-resolvent of this application is called a f avorable clause that is deducible from D, C 1 , . . ., C</p><p>q by the β-rule. Note that the requirement that the number of conjuncts in D ids equal to q leads to the fact that any IR-resolvent of β-rule is a clause.</p><p>In these terms, MIM presents itself the following strategy for IR-calculus called a MIM-strategy: First of all, we produce all the possible favorable clauses applying the α-rule; then, we apply only the β-rule attempting to deduce .</p><p>The soundness of the MIM-strategy provides the soundness of IR-rule and the above-given remark about S ∪ S α . As to completeness, the proof of it is omitted here; we simply give the rewording of the main result for MIM from <ref type="bibr">[2]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 6 (Soundness and completeness of MIM-strategy). A set S of c-clauses that pairwise have no common variables is unsatisfiable if and only if there exists an inference of from S satisfying to the MIM-strategy.</head><p>This result seams unexpected because of the requirement that D from the definition of the β-rule must consist of exact q conjuncts. This apparent contradiction is explained by the fact that when using the MIM-strategy, we construct S α containing clauses, the usage of which in an application of the β-rule can be considered as a "latent" way for reducing the number of electrons. The below-given example demonstrates some of the features of inferences satisfying to the MIM-strategy.</p><formula xml:id="formula_163">Example 3. It is easy to see that for U from Example 1, U d = {¬A ∨ A, ¬B ∨ ¬C, ¬E ∨ ¬L, B, C, E, L}. As a result, U α = {¬A ∨ A ∨ ¬A ∨ A, ¬B ∨ ¬C ∨ B, ¬B ∨ ¬C ∨ C, ¬E ∨ ¬L ∨ E, ¬E ∨ ¬L ∨ L}. We have the following MIM-inference: 1. (A ∧ ¬A) ∨ (B ∧ C) ∨ (E ∧ L) (∈ U ), 2. ¬B ∨ ¬C (∈ U ), 3. ¬E ∨ ¬L (∈ U ), 4. ¬A ∨ A ∨ ¬A ∨ A (by α-rule), 5. ¬B ∨ ¬C ∨ B (by α-rule), 6. ¬B ∨ ¬C ∨ C (by α-rule), 7. ¬E ∨ ¬L ∨ E (by α-rule), 8. ¬E ∨ ¬L ∨ L</formula><p>(by α-rule), 9. B ∨ E (by β-rule from (1) as a nucleus and ( <ref type="formula" target="#formula_4">4</ref>), <ref type="bibr">(5)</ref>, and (7) as electrons ), 10 . C ∨ E (by β-rule from (1) as a nucleus and ( <ref type="formula" target="#formula_4">4</ref>), <ref type="bibr">(6)</ref>, and (7) as electrons), 11. E (by β-rule from (2) as a nucleus and ( <ref type="formula" target="#formula_70">9</ref>) and ( <ref type="formula" target="#formula_11">10</ref>) as electrons), 12. B ∨ L (by β-rule from (1) as a nucleus and ( <ref type="formula" target="#formula_4">4</ref>), <ref type="bibr">(5)</ref>, and (8) as electrons), 13 . C ∨ L (by β-rule from (1) as a nucleus and ( <ref type="formula" target="#formula_4">4</ref>), <ref type="bibr">(6)</ref>, and (8) as electrons), 14. L (by β-rule from (2) as a nucleus and ( <ref type="formula" target="#formula_280">12</ref>) and ( <ref type="formula" target="#formula_476">13</ref>) as electrons), 15.</p><p>(by β-rule from (3) as a nucleus and ( <ref type="formula" target="#formula_13">11</ref>) and ( <ref type="formula" target="#formula_478">14</ref>) as electrons).</p><p>We have proved the unsatisfiability of U at the 3rd time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Comparison of CR-and IR-calculi</head><p>One can see that the obtained results on the CR-and IR-calculi "echo" each other. In this connection, it is interesting to know is there any advantages of one of them over the other? Moreover that Prop. 3 states that any inference of in CR can be simulated by an inference of in IR with the same number of rule applications. This section contains an answer on this question when comparison is made w.r.t. inferences being minimal on the number of rule applications. By ψ(Π, ∆, S), denote the number all the c-clauses in an inference ∆ of a c-clause C from a set S in a calculus Π that are deduced by different rule applications. The inference ∆ is minimal on the number of rule applications if for any other inference ∆ ′ of a variant of C from S in Π, the inequality ψ(Π, ∆, S) ≤ ψ(Π, ∆ ′ , S) holds.</p><p>Let ∆ denote an inference of from S in CR. Using Prop. 3, it is easy to construct an inference Γ of from S in IR such that ψ(IR, Γ, S) ≤ ψ(CR, ∆, S). Thus, in the case when ∆ min and Γ min denotes the minimal inferences on the introduced characteristic, we have that ψ(CR, ∆ min , S) − ψ(IR, Γ min , S) ≥ 0. Let us make an attempt to find an upper bound for this difference restricting us by the case when an initial set S contains only c-clauses without variables.</p><p>Let us consider an application of IR-rule to a nucleus c-clause D 0 and electron clauses D 1 , . . . , D n (n ≥ n) with an IR-resolvent D. Its attentive analysis demonstrates that this (n + 1)-arity application can be slitted into n binary applications of CR-rule in the following way: first we make a binary application of CR to D 0 and D 1 , then to an obtained CR-resolvent and D 2 , and so on. That is we can split any n + 1-arity IR-application into n binary CR-applications in such a way that for the result C of such CR-rule applications, C will contain all or some of conjuncts belonging to D.</p><p>This observation leads to the following upper bound for the difference given above:</p><formula xml:id="formula_164">ψ(CR, ∆ min , S) − ψ(IR, Γ min , S) ≤ (m i − 2)</formula><p>, where m i is the arity of the ith CR-rule application in ∆ min and the sum is taken over all of m i . To demonstrate that this upper bound is achieved, let us take the sets</p><formula xml:id="formula_165">S n = {(L 1 ∧ E 1 ) ∨ . . . ∨ (L n ∧ E n ), (A 1,1 ∧ B 1,1 ) ∨ . . . ∨ (A 1,m1 ∧ B 1,m1 ) ∨ L1 ∨ Ẽ1 , Ã1,1 ∨ B1,1 ∨ L1 ∨ Ẽ1 , . . ., Ã1,m1 ∨ B1,m1 ∨ L1 ∨ Ẽ1 , . . ., (A n,1 ∧ B n,1 ) ∨ . . . ∨ (A n,mn ∧ B n,mn ) ∨ Ln ∨ Ẽn , Ãn,1 ∨ Bn,1 ∨ Ln ∨ Ẽn , . . ., Ãn,mn ∨ Bn,mn ∨ Ln ∨ Ẽn }, where L 1 , . . ., L n , E 1 , . . ., E n , A 1,1 , . . ., A n,mn , B 1,1 , . . ., B n,mn</formula><p>are literals. Below we give an inference ∆ of from S n in the IR-calculus. (Thus, S n is an unsatisfiable set.) (by IR from the (n+1)st block c-clauses with the 1st c-clause as a nucleus). Using the ideas from <ref type="bibr">[16]</ref>, we can prove that ∆ is a minimal inference in IR containing n + 1 rule applications with the arities m 1 + 1, . . . , m n + 1, and n + 1. Now, let us convert ∆ into an inference Γ of from S n , but already in the CR-calculus in the following way:</p><formula xml:id="formula_166">⌈ (A 1,1 ∧ B 1,1 ) ∨ . . . ∨ (A 1,m1 ∧ B 1,m1 ) ∨ L1 ∨ Ẽ1 (∈ S), | Ã1,1 ∨ B1,1 ∨ L1 ∨ Ẽ1 (∈ S), | . . . ⌊ Ã1,m1 ∨ B1,m1 ∨ L1 ∨ Ẽ1 (∈ S), . . . ⌈ (A n,1 ∧ B n,1 ) ∨ . . . ∨ (A n,mn ∧ B n,mn ) ∨ Ln ∨ Ẽn (∈ S), | Ãn,1 ∨ Bn,1 ∨ Ln ∨ Ẽn (∈ S), | . . . ⌊ Ãn,mn ∨ Bn,mn ∨ Ln ∨ Ẽn (∈ S), ⌈ (L 1 ∧ E 1 ) ∨ . . . ∨ (L n ∧ E n ) (∈ S), | L1 ∨ Ẽ1 (</formula><p>For each i (i = 1, . . . , n), let us replace the c-clause Li ∨ Ẽi by the sequence of c-clauses</p><formula xml:id="formula_167">(A i,2 ∧ B i,2 ) ∨ . . . ∨ (A i,mi ∧ B i,mi ) ∨ Li ∨ Ẽi , . . ., (A i,mi ∧ B i,mi ) ∨ Li ∨ Ẽi , Li ∨ Ẽi that</formula><p>along with the all c-clauses form the i th block is an inference of Li ∨ Ẽi in CR. Replace the empty clause by the sequence (</p><formula xml:id="formula_168">L 2 ∧ E 2 ) ∨ . . . ∨ (L n ∧ E n ), . . ., . . . (L n ∧ E n ), , being an inference of in CR since (L 2 ∧ E 2 ) ∨ . . . ∨ (L n ∧ E n ) is deduced from (L 1 ∧ E 1 ) ∨ (L 2 ∧ E 2 ) ∨ . . . ∨ (L n ∧ E n ) and (L 1 ∧ E 1 ) by the CR-rule, . . ., (L n ∧ E n ) is deduced from (L n−1 ∧ E n−1 ) ∨ . . . ∨ (L n ∧ E n ) and (L n−1 ∧ E n−1 ) by the CR-rule, is deduced from (L n ∧ E n ) and (L n ∧ E n ) by CR. We have that Γ is an inference of from S n in CR, for which ψ(CR, Γ , S n ) = ( n i=1 m i ) + (n + 1)</formula><p>. Again using the ideas from <ref type="bibr">[16]</ref>, we can conclude that Γ is a minimal inference in CR.</p><p>Finally, we get</p><formula xml:id="formula_169">ψ(CR, Γ , S n ) − ψ(IR, ∆, S n ) = (n − 1) + n i=1 (m i − 1)</formula><p>, that is the upper bound is reachable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusion</head><p>The paper does not touch any practical aspects and is purely theoretical. Nevertheless, the author considers that it may be useful for researchers involved in the implementation of intelligent systems, in particular, e-learning systems requiring tools for proof search in classical logic at least for the following reasons.</p><p>The research demonstrates that the transition to c-clauses being the generalization of the widely-used resolution notion as a clause gave the possibility to construct the calculi possessing different properties in general and not worsening such an important characteristic as the minimum number of rule applications in comparison with the usual resolution methods. Although now it is difficult to say that the "behavior" of provers based on these calculi will be better than the "behavior" of the well-know resolution provers such as Vampire or Prover 9, we may expect that more detailed analysis of the proposed approach will lead to the further improvement of the traditional resolution technique. From this point of view, MIM seems to be a more attractive method, possessing a number of positive features not mentioned in the paper and requiring a separate study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Principles of intellectual control and classification optimization in conditions of technological processes of beneficiation complexes 1 Introduction</head><p>Nowadays the problem of intellectual control of technological processes is considered rather actual. Thus necessity of constant improvement of manufacture, increase of competitiveness, minimization of technological environmental impact demands application of complex automation systems is based on modern information technologies (IT) and intelligent control systems (ICS) <ref type="bibr">[1]</ref>. Let's consider the complex of technological processes of iron ore beneficiation (magnetite quartzites). As the object of control such complex is characterized by sufficient complexity (multichanneling, nonlinearity, non-stationary, illegibility and incompleteness of information along with great value of transport delay of output parameters, presence of noise and disturbance, presence of recycles on the majority of stages, etc.) <ref type="bibr">[2]</ref>. Taking into account these properties, statement of a problem and potential approaches to their decision such complex can be considered as typical <ref type="bibr">[3]</ref><ref type="bibr">[4]</ref>.</p><p>Works of <ref type="bibr">[2]</ref><ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref> are of great importance for the development of intellectual control theory of beneficiation technology objects. At the same time, despite of considerable quantity of research and development, existing systems of automation do not always meet modern requirements and do not provide the effective decision of difficult tasks in actual conditions in beneficiation process line.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Review of existing decisions and task setting</head><p>Taking into account multidimensionality, illegibility and incompleteness of technological information on all levels of control it is necessary to use ICS to support operators' (controllers, technologists and other) decision making and increase their quality <ref type="bibr">[1]</ref>. The further task setting of intellectual control of a process line (a section) can be also conditionally represented by means of classical cybernetics chart "black box" (Fig. <ref type="figure" target="#fig_0">1</ref>). Accordingly, for controlling the beneficiation process set of vectors X, U, Y, V on the basis of can be formed as follows. </p><formula xml:id="formula_170">d 0 SECTION C 1 C 2 C 3 I stage II stage III stage Q 0 Q 1 Q 2 Q 3 Internal</formula><formula xml:id="formula_171">P m 1 ε 1 P m 2 ε 2 P m 3 pp 3 ( 3 ),β k Вm 1 ρ k 1 Вm 2 ρ k 2 Вм 3 ρ k 3 ρ s 1 ρ s 2 ρ s 3 3, k В k 1 В k 2 В k 3 ε 3, ε k Вs 1 Вs 2 Вs 3 х 1 х 2 х 3 х    g   v n V     ,..., , ,<label>3 2 1</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Process line (section) of concentrating as the object of intelligence control</head><p>In Fig. <ref type="figure" target="#fig_0">1</ref> such notations are taken:</p><formula xml:id="formula_172">r N i ... 1 </formula><p>is a number of industrial variety of ore; N r is quantity of industrial varieties;</p><formula xml:id="formula_173">  i    is estimated raw ore grade;   i   </formula><p>is specific gravity of every variety of ore;</p><formula xml:id="formula_174">  i   </formula><p>is an index or a group of indices that characterize physical and chemical properties of ore (for example, density of corresponding varieties of ore, strength, grindability, etc.);</p><formula xml:id="formula_175">  i g g </formula><p>is index that characterizes mineralogical and/or morphological properties of ore (for example, averaged size of magnetite dissemination in ore after varieties); d 0 is averaged ore coarseness before beneficiation; Q 0 is an ore consumption on the first stage of beneficiation;</p><formula xml:id="formula_176">s N j ... 1  is number of beneficiation stage; N s -is quantity of stage;  , j Q Q  is processing output of each stage;   j C C  is circulation load;   j d d  is averaged product coarseness;   j m m P P  is a solid content in pulp;       j s s j k k j m m B B B B B B    , ,</formula><p>are consumption of water to the mill, classifier and magnetic separation respectively;</p><formula xml:id="formula_177">  j k k    is a pulp density in the process of classification;   j p s   </formula><p>is a pulp density before magnetic separation;</p><formula xml:id="formula_178">    j j pp pp     </formula><p>is an estimated grade in the industrial product;</p><formula xml:id="formula_179">  j х х    is loss of a commercial component in tails; k  is a quality of concentrate;   j    is an output of useful component in an industrial product;  k is an output of useful component in concentrate;   j    is an extraction of useful component in an industrial product;  k is an extraction of useful component in a concentrate.</formula><p>Thus distribution of state vector on input and output indexes is conditional enough because most parameters on output, for example, of the first stage will be input for the second, etc.</p><p>For further application of multidimensional model such as Fig. <ref type="figure" target="#fig_0">1</ref> (for example, for decision of identification tasks or synthesis of automated control systems of beneficiation TP) with using artificial intelligence technology a number of typical neural network structures that will be offer by the author here.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The hierarchy scheme of intelligence control system for such complex combining principles of neurocontrol, classification and optimal control</head><p>The results of tests of such intelligent systems have proved the possibility of their application in the beneficiation TP. At the same time, to ensure their operation it is necessary to determine the values of settings and / or trends in their paths. Further studies have shown that the determination of the required setting values it is necessary to carry out by combination of the following <ref type="bibr">[7]</ref>:</p><p>1. Classification control, that is founded on the basis of permanent accumulation of technological parameters history database (DB), their grouping on certain signs (clustering) and determination of value of setting for the measure of similarity to the current values of vectors: input, output and internal parameters <ref type="bibr">[8,</ref><ref type="bibr">9]</ref>.</p><p>2. Optimal control, which requires the design of general purpose functionality for the system and the application of global optimization methods <ref type="bibr">[4,</ref><ref type="bibr">10]</ref>.</p><p>Main advantages of the classification approach are their potentially high fast-acting due to the use of well-known methods of clustering and patterns recognition (for example, neural networks classification). The disadvantage is low accuracy (the chosen decision is not necessarily optimal, and even quasioptimal). Also, application of the approach does not always guarantee the result. In particular, this may be due to such cases:  at the beginning of the system operation, when the database of technological situations parameters is quite small;  in the case when necessary (similar) combination of parameters (cluster) has not been met yet in the process of exploitation of ICS;  in changing of flowsheet, regime map, presence of considerable disturbance of properties of primary raw material (ore, its amount and correlation of mineral varieties, etc.). On the one side, optimization approaches in the case of multidimensional goal function are also characterized by disadvantages that are caused by:  the difficulty of obtaining a sufficiently adequate mathematical model of TP <ref type="bibr">[4]</ref>,</p><p>which is typical for most inertial processes (in particular, the beneficiation);  the bad conditionality of optimization task (presence of great amount of local extremums) that appears in the case of application of well-known identification methods of the multidimensional systems (regressive models, Wiener-Hopf equation, synergetic and self-organizations, artificial neural networks and others in particular) and greatly limits the application of well-known methods of multidimensional optimization;  slow convergence rate of computing process during optimization in large number of cases.</p><p>On the other hand, in the case of the possibility of designing the mathematical model and a good choice of hill climbing algorithm (method) it is possible to solve control task, which allows to define a really optimal (or quasioptimal) settings, with certain limitations. Taking into account well-known advantages and disadvantages of the above-mentioned approaches for the implementation of multichannel ICS of TP of iron-ore beneficiation the approach based on combination of classification and optimization algorithms has been offered. Structure of multichannel hierarchical ICS of TP of beneficiation complex based on the system of coupling of neurocontrol, classification and optimization methods is shown in Fig. <ref type="figure" target="#fig_1">2</ref>.</p><p>In Fig. <ref type="figure" target="#fig_1">2</ref> such notations are taken: OC ij is a control object (channel), j its number (j=1,…,k i ; k i is an amount of control channels), i is a number of the stage for local TP (for example, fragmentation, classification, magnetic separation, etc., i=1,…,N s ; N s is amount of the stages of beneficiation TP); NC ij -intelligence neurocontroller of OC ij ; V ij is a vector of disturbing influences for OC ij ; Y ij -a vector of output characteristics of OC ij ; U ij is a vector of control influences (actions) of OC ij ; X ij is a vector of informative parameters about the state of OC ij ; Y s ij is a vector of settings of output characteristics of ОC ij ; TP * i is the complex of all local TP of the certain stage; V * i is a vector of main influences of disturbing of TP * i ; Y * i is a vector of output characteristics of ТP * i ; X * i is a vector of information parameters about current stat of TP * complex i ; Y *s i is a vector of tasks (settings) for output characteristics of TP * i ; NE* ineuroemulator (predictive mathematical model or predictor) for TP of the corresponding stage.</p><p>Three main control levels 1) of local regime parameters (ore and/or water consumption, pulp density, etc.); 2) quality indices (content of useful component, output, exception, etc.); 3) complex of TP (fragmentation, classification, magnetic separation) are divided in the structure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>First control channel</head><p>First stage of beneficiation TP</p><formula xml:id="formula_180">V 11 V* 1 Y11 OC 11 TP* 1 NC 11    Control channel (k 1 )</formula><p>for TP of first stage</p><formula xml:id="formula_181">   Last stage (n) of beneficiation TP</formula><p>Block of optimization of functioning of complex TP ore-concentrating factory</p><formula xml:id="formula_182">1 k 1 V 1 k 1 Y 1 k 1 OC 1 1k C N 1 k 1 U  X 11 X*1 1 k 1 X Control system of first stage of beneficiation TP of iron ore 11 U Y* 1 Y 11 , X 11 , V 11 , U 11 11 s Y  1 1 1 1 1k 1k 1k 1k U , V , X , Y 1 1k s Y</formula><p>Choice of method of realization of intellectual control of TP:</p><p>-classification; -optimization. So, for example, for a complex of TP of the first stage (supposing that for TP of fragmentation i=1, k 1 =2): the first channel (OC 11 ) is the correlation of "ore-water"; the second channel (OC 12 ) is the mill productivity output (at unloading); V 11 ={coarseness of grading (averaged coarseness) of input product}; V 12 ={physical and chemical and mechanical properties of ore}; Y 11 , Y 12 ={ coarseness of grading (averaged coarseness) of industrial product, productivity after the industrial product, output of the prepared class}; U 11 ={mill water consumption }; U 12 ={ ore input productivity}; X 11 ={content of solid in the middle of the mill}; X 12 ={all regime indices of mill work}. Similarly the formalization for other TP of the first stage (classification, magnetic separation) is carried out. Then the resulting characteristics for a complex of TP (all stages) as a whole are formed as follows: V * 1 =V 11 V 12 ( is the operation of logical combination of vectors); Y * 1 ={quality of industrial product by quality of useful component, productivity on the output stage}; X * 1 =X 11 X 12 . The idea of the approach is in application of combined algorithm with combination of classification and optimal control approaches in order to ensure the acceleration decision-making process in multichannel ICS of TP of magnetite quartzites beneficiation. The main features of the implementation of such a system are as follows <ref type="bibr">[1,</ref><ref type="bibr">7]</ref>.</p><p>The intellectual analysis of current state of control object is carried out constantly at the end of the next step of discrete time by the top level of the system on every stage of beneficiation in the block of optimization of beneficiation complex operation. The determining of settings (tasks) for the control systems of the corresponding stages (middle level) is carried out on the basis of a coherent analysis of indexes of all beneficiation stages. At the same time, in contrast to existing approaches, decisionmaking process (definition of the necessary settings) in the system (Fig. <ref type="figure" target="#fig_1">2</ref>) can be occurred through intelligent classification (classification control) or global optimization (optimal control). Algorithms for the implementation of corresponding computational procedures will be given in the future.</p><p>On the middle level control of TP complex for separate stages is carried out. For this purpose the level is given the value of optimal settings from a top level and it determines a task (proves these settings) for the regulators of all local TP and their corresponding channels of control of every beneficiation stage. From the other side middle level systems collect primary information about the state of every channel (control actions, outputs, disturbing) from the subsystems of the bottom level, carry out its primary processing, prediction of values of input and output indexes of the stage using of neuroemulator (NE*і). Certain data are also passed on the top level for decision making and determination of optimal settings for the purpose of the coordinated control of all stages and complex of beneficiation TP as a whole. The bottom level of the system controls separate local TP of each stage. For this purpose the level contains the number of control channels. Each channel has its own inverse neuroregulator that recreates the inverse dynamics of the process. The task of work of such regulator is maintenance of necessary value of settings, that is determined at the top level of the system and given from the corresponding control subsystem of the certain stage (id est. middle level). In turn, the bottom level subsystem passes information about the state of each channel (indexes of control influences, value of output and information signals, disturbance) to the middle level system at first and then to the top level.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Desired Output and Actual Network Output</head><formula xml:id="formula_183">BM3(U1) BK3(U2) BC3(U3) (U 1 ) (U2) (U 3 )</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Desired Output and Actual Network Output</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>For the hierarchy scheme of ICS of beneficiation technological complex on the basis of combination of principles of neurocontrol, intelligence classification and global optimization contingency approach at forming limit cluster of certain "special technological situations", that allows to control TP automatically in real-time mode, determine and propose corresponding control influences has been offered. The conducted researches, results of computer modeling (Fig. <ref type="figure" target="#fig_2">3</ref>) and industrial tests <ref type="bibr">[1,</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref> proved that application of neural networks schemes on the basis of inverse models and neuroemulators as regulators of separate channels of beneficiation TP has a sufficient dynamics (reasonable time of settings exercise on condition of its presence), the possibility of the proper disturbance rejection at 10% level and operation on the conditions of nonlinear limitations (changes of controller parameters) on the basis of satiation principle. Thus, the task of this work is the verification of possibilities of classification strategy for reliable determination of optimal values of current parameters of TP (in the form of the relevant tasks or setting for controllers), that will provide stable work of local regulators in the above-mentioned terms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The fundamental concept of sustainable development requires the review of the classic studies about the world. Knowledge as a higher value of informational process forces the progress in sustainability. Also, the knowledge is one of the factors of production in modern economy. That is why, the theory about knowledge-based economy and society becomes wide shared among scientists. For example, knowledge society is described as sustainability concept by N. Afgan and M. Carvalho <ref type="bibr">[1]</ref>. M. Kulin studies learning and knowledge influence as a factor of global competitiveness <ref type="bibr">[2]</ref>, the impact of knowledge for society is the main focus of G. Bohme and N. Stehr research <ref type="bibr">[3]</ref>. Thus, the theoretical aspects of Knowledge society are well-studied. At the same time, the questions about applied evaluation of knowledge in a country, comparison of different countries and knowledge dynamics research are still open. Taking into account the complex character of knowledge, it can be presented as the set of indicators which are gathered in a hierarchy model. Therefore, the main idea of the research is to draw out a composite indicator for measurement knowledge as a sophisticated category with a purpose of country development analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">K-society as a New Mode of the World Developing</head><p>Classic economic theory presents three factors of production that are used in a production process, which leads to finished goods. These three basic resources are land, labor and capital. Nowadays this fundamental approach was divided into several complex theories that include additional factors of production, for example, technological progress, human capital and social capital. Basically, those resources can be aggregated into one categoryknowledge. More than this, knowledge and information become the most significant factors of production and form the basis for new technological mode.</p><p>Knowledge society (K-society) is widespread concept, but scientists still investigate its nature <ref type="bibr">[4]</ref>. The mass production of knowledge changes the economy in global world in quite short terms. However, this process is dissimilar in different countries.</p><p>The research of K-society is undertaken by all developed countries for more than 40 years but there are still a lot of controversial question. First of all there is no agreement about terminology. Such terms as "K-society", "Informational society", "Technogeneous society" serve the purpose of science communication in this topic. The term "K-society" was used by M. Zgurovsky to mean a where institutions and organizations give possibilities to people and information to develop without any barriers and open opportunities for mass production and mass usage of all kind of knowledge in global scales. Therefore, the development of technologies is an important part of K-society, but not the main purpose. Thus, the term "Technogeneous society" doesn't describe these processes in full measure.</p><p>The question about links between K-society and information society is more complicated. The first one is based on definition of knowledge, the second one uses information as a basic category. The development of new computing technologies has not influenced to significancy of common paradigm, but the possibility to get, safe, analyze and transfer knowledge was changed cardinally. That led to increasing velocity of information circulation. Moreover, it is difficult to divide information and knowledge. But in the purpose of this research it is assumed that knowledge includes information, and it is a product of information processing.</p><p>According to theoretical research the concept of K-society is ambiguous. On the one hand it is a philosophic theory, which has no practical meaning, on the other hand it is the set of instruments and methods for providing sustainable development of modern society <ref type="bibr">[5]</ref>. In accordance to the second opinion K-society proclaims the active usage of knowledge, which is the main asset.</p><p>The main accent is education, which forms a human capital and guarantees the access to information. But the measurement of educational level cannot give a complete picture of knowledge in society. Therefore, K-society must be formalized more manifold system of indicators. Likely, such system includes the description of current situation in economy, perspectives and information transactions. It is obvious that the development of model for describing K-society is a nontrivial issue.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Methodology</head><p>According to the UNO methodology, the index of K-society should be based on three dimensions: Assets, Advancement and Foresightedness <ref type="bibr">[6]</ref>. The first one describes the level of education, especially, among young people, and the development of information streams. These two main directions include such indicators as: expected schooling, proportion of young people, the diffusion of newspapers, the Internet, main phone lines and cellular phones. The second dimension represents human and informational resources, which are indicated by public health expenditure, research and development expenditure, military expenditure, pupil/teacher ratios in primary education, and a proxy of the "freedom from corruption" indicator. The last dimension shows the external influence on Ksociety dynamics in the state. This dimension consists of low child mortality rates, equality in income distribution (GINI Index), protected areas as percentage of a country's surface, and CO2 emissions per capita indicators. This approach was officially accepted for approximately 45 countries in 2005.</p><p>Taking into account the existent basic specification of the main categories, it becomes possible to continue this research in terms of current informational mode. Thus, new hierarchical model for K-society measurement should be built.</p><p>Therefore, it is necessary to clarify the approaches for drawing out this model. The OECD presented methodology and user guide on constructing composite indicators <ref type="bibr">[7]</ref>. According to this, there are several obligatory steps in models' creation.</p><p>Firstly, the full understanding of processes that can have influence on K-society needs to be represented in theoretical framework. This step concludes with the number of selection criteria. As referred to listed above, the framework is based on UN model.</p><p>Secondly, the very important step is data selection. It includes the availability and quality data checking. In addition, the question about strengths and weaknesses of indicators must be resolved. Not least important is to find the reputable source for each data set. Theoretically, all data must be provided by international world-known organizations.</p><p>In view of these two steps the UN approach has some disadvantages that are caused by following reasons. On the one hand, last ten years have brought significant changes in informational development. As a result of this process some of indicators lost their relevance. On the other hand, not all data sets are still gathered by authoritative organizations. That is why the original model needs revision and modernization.</p><p>Thirdly, the modeling needs complete data sets. Thus, the problem of empty cells that usually appears after the data selection requires imputation of missing data. The various kinds of methods for working with complex models are established in World Data Center for Geoinformatics and Sustainable Development <ref type="bibr">[8]</ref>. Therefore, the recommendation for this case is to augment the empties by previous period information.</p><p>The step includes multivariate analyses. This phase gives the possibility to double check the starting hypothesis about the set of indicators. The significance of sampling should be checked. Other important question is to evaluate relations between indicators. That is why the elements of principal components analysis and cluster analysis influence the final decision about model structure. This step identifies statistically similar indicators. Thus, the additional explanation of internal relations or model's rebuilding can be required. As a result of this issue the model can be amplified by additional explanation.</p><p>Taking into account the miscellaneous nature of indicators the next step is normalization. There are more than ten typical approaches to its implementation. It is necessary to underline that there is no goal to make the estimation more complex. For this reason, the standardization is the optimal variant for this step. The formula of this type of normalization is as below:</p><formula xml:id="formula_184">Valuenorm = (Value -Valuemin)/( Valuemax -Valuemin) .<label>(1)</label></formula><p>In case when it is necessary to represent the inverse coupling this formula converts to:</p><formula xml:id="formula_185">Valuenorm =1 -(Value -Valuemin)/( Valuemax -Valuemin) .</formula><p>(</p><formula xml:id="formula_186">)<label>2</label></formula><p>As a result, all indicators values lie in interval from 0 to 1.</p><p>To express the theoretical framework and relations underlined at the previous stages, the sixth step includes finding out the way of indicators aggregation and their weights establishment. For instance, the model's hierarchy is constructed.</p><p>Each dimensions' index consists of several indicators and can be presented as the average value of its components. In the same manner K-society Index equals to the all dimensions indices aggregation. At the next step uncertainty and sensitivity analysis emphasize the reasons of the differences between results of using variety of aggregation, imputation and normalization methods. This step identifies all possible sources of uncertainty and determines what sources have more influence to the overall score.</p><p>Eighthly, detecting dominant and critical indicators for objects or their groups provides the information about the levels of influence for the assessed system. It is also very important for policy making problems.</p><p>Then, for modeling results validation developed index is compared to others that describe the phenomenon of similar nature. The comparison base consists of wellknown indices that authoritative organizations and institutions provide. Thus, two indices were chosen for purposes of final analysis: Fragile State Index <ref type="bibr">[9]</ref> and Index of Economic Freedom <ref type="bibr">[10]</ref>.</p><p>Finally, the last step is to present the results in a clear and accurate manner. That is why visualization is the part of this algorithm. It is necessary to choose the correct tools that provide total understanding of the obtained results. Thus, the final step of modeling becomes the element of a decision making support system.</p><p>Taking into consideration the UN approach and OECD methodology the new model was drawn out. The indicators, data providers and data sources are presented in Table <ref type="table" target="#tab_1">1</ref>. Data for 87 countries were gathered and complemented in the process of model development. Thus, the results of estimations are described in the next paragraph.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Results</head><p>According to the algorithm each of the dimensions were counted based on their components. It is necessary to mention that it gives the possibility to measure Assets, Advancements and Foresightedness as separate indices. Such evaluation brings an opportunity to additional comparison of countries in terms of the dimensions. But in accordance with the main purpose of the research the K-society Index has to be measured. That is why the procedure of linear convolution is implemented twice.</p><p>Collected data give a possibility to provide the calculations for period from 2008 to 2013.</p><p>The results for 2013 year show that the Top 10 countries for K-society Index consists of Switzerland, Denmark, Netherlands, Sweden, Slovenia, France, Austria, New Zealand, Japan and Finland. The values for the final index and three dimensions are presented in Table <ref type="table" target="#tab_0">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2. Top 10 countries by K-society Index 2013</head><p>The Assets Index</p><p>The Advancement Index</p><p>The Foresightedness Index KS Index Rank Switzerland 0,801 0,827 0,780 0,803 1 Denmark 0,758 0,794 0,785 0,779 2 Netherlands 0,764 0,757 0,789 0,770 3 Sweden 0,722 0,809 0,766 0,766 4 Slovenia 0,670 0,642 0,949 0,754 5 France 0,789 0,636 0,792 0,739 6 Austria 0,703 0,749 0,765 0,739 7 New Zealand 0,744 0,737 0,711 0,731 8 Japan 0,719 0,777 0,687 0,728 9 Finland 0,692 0,773 0,722 0,729 10</p><p>The analysis of representatives shows that Top 10 involves high-developed countries with sustainable economic, ecological and social conditions. The variance between the first and the last states from the list described above equals to 0,074. Moreover, the gap between top possible value of the index, and the value for Switzerland is 0,197. The last 10 countries of the ranking for 2013 year are presented in following table <ref type="table">(</ref>Table <ref type="table" target="#tab_21">3</ref>). The last one, Nigeria, has a high level of Fragile States Index, which is caused by alert meaning of such indicators as Demographic Pressure, Group Grievance, Uneven Economic Development, State Legitimacy, Public Services, etc. Even more, the conflict barometer, which is counted by HIIK <ref type="bibr">[11]</ref>, shows that this country has the value 5. That means the existence of the war in Nigeria.</p><p>According to the same sources Pakistan is under the inter-ethnic violence and conflict with India that were classified as limited war and violent crisis. Also the problems with Demographic Pressure, Refugees, Group Grievance, State Legitimacy Human Rights, Security Apparatus, etc. exist in the state. Moreover, the situation, described by Fragile States Index, is even worse than in Nigeria. Ethiopia is in a group of countries, which have "alert" status. The greatest problems of Ethiopia are Social and Economic Fields, External Intervention and Factionalized Elites. Such tendency has been continuing since 2009.</p><p>Kenya has a limited war, which is connected with inter-ethnic violence. In addition this state is 18 from 178 countries in Fragile States Index. The problems with Political and Military, Social and Economic fields lead to high negative rating.</p><p>The next country is Gambia. It has growing tendency from stable to very high warning assessment in Fragile States Index.</p><p>India is the neighboring country for Pakistan. Thus, problems with conflicts, which were described above, also concern India. Furthermore, India has to worry about Demographic Pressure, Group Grievance, Uneven Economic Development and Security Apparatus. The less number of problems gives India higher value of Ksociety Index. The fact of common knowledge is that India tries to develop IT sphere. But it seems that it is not enough for building K-society.</p><p>Senegal has stable, very high warning assessment since 2006. The long-term tendencies show that the situation in the country becomes more and more dangerous. Madagascar is near Senegal in rating and the common tendencies almost the same, except the reduction of Group Grievance and Refugees. Such situation has been occurred since 2008. However, Paraguay is the only country from the bottom part of the rating that has been increasing in Fragile States Index in terms of improving situation.</p><p>This analysis shows that K-society Index reflects much more information than IT or science alone. It correlates with current political and economic situation in the country. Moreover, it is impossible to build K-society in unsustainable environment.</p><p>It is essential to discover the relations between K-society Index and other wellknown indices. Fig. <ref type="figure" target="#fig_0">1</ref> shows the correlation between Fragile States Index and Ksociety Index.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Correlation between Fragile States Index and K-society Index</head><p>It describes high linear relation between indices. Thus, it is an additional proof of state instability influence to knowledge establishment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 2. Correlation between Economic Freedom and K-society Index</head><p>Probably, more interesting results were obtained from K-society Index and Economic Freedom relations. Fig. <ref type="figure" target="#fig_1">2</ref> shows that the economic component is not fundamental for processes in K-society. The truth is that economy is rather important.</p><p>The results of the research show that K-society can be unequal in neighboring countries. Also there is no dependence between the leading positions in the world and absolute success in K-society creation. For instance, the comparison of Mexico, USA and Canada is a good illustration of mentioned above thesis (Fig. <ref type="figure" target="#fig_2">3</ref>).</p><p>The graph illustrates the North America countries' values. The first place has Canada. The USA shows almost the same tendency but with lower score. Both countries have falling K-society Index tendency in 2012-2013. It is noteworthy that Mexico's tendency corresponds to others but the values of index are much lower on all period of research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. K-society Index for Mexico, USA and Canada</head><p>The challenging issue is to find out Ukraine's situation with K-society development. Ukraine had good infrastructure, science and educational bases but it is necessary to clarify it is still competitive or not in the international area.</p><p>The first step in this direction is to compare Ukraine with neighboring countries. Taking into account that all neighbors are from post-Soviet area, this sample is congeneric. Thus, the results in the index form should describe the Ukrainian success in K-society development. In addition, the qualitative information about neighbors gives a possibility to verify calculations. The existence data let to find values of index for Poland, Russia, Moldova and Hungary. The dynamics of K-society Index for these countries and Ukraine is introduced on one graph. This approach allows demonstrating the differences obviously (Fig. <ref type="figure" target="#fig_3">4</ref>). In the purpose of this analysis all components are described by places rating. This gives the opportunity to show relative measures and ranking. The Advancement dimension shows the worst values in all period. Thus, let's consider from what indicators this dimension consists of. Obviously, Ukraine has a great problem with freedom from corruption indicator. In addition, research and development expenditures, pupil/teacher ratios in primary education and public health expenditure are lower than generally accepted (for example, in Europe) norms. This issue can be an opportunity to significant development of K-society in future. Accordingly, these fields need to be modernized and get all possible funding for improving the situation. Thuswise, this analysis shows the preconditions of strategic planning and decision making in Ukraine in case it is necessary to reach the leading countries. The last hypothesis is based on the fact that the leaders in K-society Index are the most developed countries.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In paper it was shown that K-society is a probable next mode of economy development that leads to changes in institutional and organization structure inside each country and over the world. K-society is a complex category, which can be considered as a strategy goal for country. Therefore, it needs to be measured in quantitate form. The analysis of existence approaches shows that it is possible to use OECD methodologies for creating composite indices and UN methodology for K-society Index. The improvement and combination those two sources give the base for model of K-society Index.</p><p>The K-society Index was drawn out as a combination of three dimensions and 14 indicators. The values of index were calculated for 87 countries that provide all necessary information.</p><p>The analysis of results shows that there is no direct dependence between K-society development and the country leadership in the world.</p><p>The situation for Ukraine was analyzed deeply. Firstly, Ukraine has lower meaning of index than it's neighbor countries Moldova, Poland, Hungary. Secondly, the less developed dimension is "Advancement". Thus, the strategy of its extension must be provided.</p><p>Some common tendencies were found for all countries. The index decreased rapidly its value in 2008. The values of index have high correlation with Fragile State Index and Economic Freedom.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Implementing Manufacturing as a Service:</head><p>A Pull-Driven Agent-Based Manufacturing Grid</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>At the HU Utrecht University of Applied Sciences, an agile manufacturing system has been developed that is capable of so-called multiparallel production of small batches or even one single product. The need for such a manufacturing system comes from the fact that nowadays the demand for custom end-user specified products is increasing. Internet is offering a method to involve the end-user directly into the production. Also the possibilities of additive manufacturing by using 3D printers offers new ways to set up a manufacturing infrastructure with the focus on the manufacturing of small quantities. This paper will focus on the interface to connect the end user to the production process. Before going into detail, the manufacturing system itself will first globally be described.</p><p>In the next section details about the basic design considerations are given. Because the implementation is based on agent technology, a short description of what an agent is, will be given. The architecture and the connection with the end-user will be the treated next. Finally, the results, related work, discussion and a conclusion will end the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Global description of the manufacturing system</head><p>Every product to be made starts its life as a software entity, that contains the information what should be done to make the product. This software entity is a so-called software agent.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Agents</head><p>A common definition of an agent given by Wooldridge and Jennings <ref type="bibr">[13]</ref> is:</p><p>Definition (agent). An agent is an encapsulated computer system or computer program that is situated in some environment and that is capable of flexible, autonomous action in that environment in order to meet its design objectives or goals.</p><p>The manufacturing system that has been designed is based on a group of cooperating agents. A system with two or more agents is called a multiagent system (MAS). In our design the following properties of agents are important:</p><p>goal: an agent is designed to reach a goal. If reaching the goal is complex, subgoals can be defined as states to be reached to finaly come to the end-goal. -action: an action is what the agent can do.</p><p>plan: to reach a goal or subgoal the agent builds or receives a plan. Normally a plan consists of a list of actions to reach a goal or subgoal within a certain role. -role: agents can have different roles. In a multiagent system these roles play an important part in the way agents cooperate. -behaviour: closely related to the role is the behaviour. This the set of actions that an agent will perform in a certain role. -belief: a belief is what the agent expects to be the case in the environment.</p><p>In multiagent technology other aspects can also be important, but the properties mentioned here are specific for the manufacturing system presented in this paper. The main reason for choosing agent technology is that it offers a natural decomposition of responsibilities and tasks to be completed in this complex manufacturing system. It also means that if one agent fails, other agents can continue to fulfil their own goals and even take over actions or tasks from the failing agent.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">The manufacturing grid</head><p>The infrastructure of the manufacturing system consists of cheap reconfigurable production machines that we will call equiplets. These equiplets are capable to perform one or more production steps. The set of steps an equiplet can perform depends on its front-end. An equiplet can be reconfigured by changing its front-end. The equiplets are placed in a grid arrangement. In conventional mass production, a line arrangement is used because for all products the same sequence of production steps should be followed. However in our case every product can have a different path along the equiplets, so a grid arrangement is more natural offering multiple mostly shorter paths in case of an arbitrary sequence of equiplets to be visited.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Agent-based manufacturing</head><p>The equiplet-based manufacturing description will have its focus on the MAS where the equiplet agent is the representative of the equiplet. An equiplet agent will publish its capabilities. This means it will announce its production steps. It will wait for products to arrive to actually perform the production steps.</p><p>The product agent has several roles. It starts with planning the path along the equiplets for the production. Next, it will schedule the production. After successfully scheduling, it will guide the product along the equiplets. At every equiplet it will instruct the equiplet agent what step or steps to perform. It will log the results of a production step and also update a globally shared knowledge base that can be consulted by other product agents to check the reliability of a certain equiplet for a certain step with certain parameters. Having the responsibility for the manufacturing of a product, the product agent is also the entity that should recover from errors during manufacturing. If there is a failure on a certain equiplet, depending on the type of failure (recoverable or severe) the product agent will try to plan the required step on an alternative equiplet for the same reason as why one would not prefer to hire a plumber who previously made mistakes resulting in a flood. By putting the information about the failure (step type and parameters) in a shared knowledge base, the product agents will learn as a group about the reliability of the equiplets for certain steps.</p><p>When the product is finished, the product agent can also have a role in other parts of the life cycle of a product, being a software entity that knows a lot about the product and the actual production. To achieve these roles, the agent could be embedded in the product itself, but being accessible in cyberspace is also a possibility.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">System architecture</head><p>In this section a description of the system architecture as well as the constraints on our type of production will be presented.</p><p>In figure <ref type="figure" target="#fig_0">1</ref> the layered software architecture is given. Only one product agent and one equiplet agent is depicted and the modules in the lower layer of the equiplet depend on the front-end that has been connected to the equiplet. In this case an equiplet with the pick and place capabilities and vision modules is used in this example. For the MAS layer Jade <ref type="bibr">[1]</ref> was used as a platform. Jade is a widely accepted Java-based multiagent environment. The inter-agent communication is implemented by using blackboards. A blackboard is a software entity where agents can publish information that will be available to other agents.</p><p>The software for the equiplet is based on ROS. ROS is an acronym for Robot Operating System <ref type="bibr">[10]</ref>. ROS is not really an operating system but it is middleware specially designed for robot control and it runs on Linux. In ROS a process is called a node. These nodes can communicate by a publish and subscribe mechanism. In ROS this communication mechanism is called a topic. This platform has been chosen for the following reasons: -Wide support by an active community.</p><p>-Huge amount of modules already available.</p><p>-Nodes that are parts of ROS can live on several different platforms, assumed that a TCP/IP connection is available.</p><p>At the lowest layer in figure <ref type="figure" target="#fig_0">1</ref> is a Linux platform running modules that communicate with the underlying hardware. Linux is a stable, portable and versatile platform. In the next section we will take a closer look at the implementation of this architecture in combination with a web interface. Our production model is based on trays that will carry the product to be built. These trays are transparent boxes, so equiplets with a camera can inspect them both from the top and the bottom. In the latter case the workplace of an equiplet should also be transparent, which is the case for the equiplets built so far. The trays are marked with a unique QR-code. During the first production steps the trays are filled with all the components required to make the product. This way a kind of construction box is generated. This means that for all steps to come, the components are available. This is a big advantage over a situation where logistic streams of components within the grid should be taken care of. The disadvantage is that parallel production of sub-parts in complex production paths is not possible. However for the proof of concept this is not a big problem and solutions can be found where the sub-parts are first manufactured in parallel and added to the construction box. Of course within our conceptual model other production models could be used, but the examples given here are based on this model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Connecting the end-user</head><p>To use the manufacturing grid, a webserver has been added to allow end-users to construct products to be made by the grid. This is why it can not happen that a product is requested that does not fit within the capabilities of the manufacturing grid, because the grid itself is offering the webinterface for designing the product. If a product can be made using the webinterface, the grid will be capable to make it. This web interface will be called WIMP as an acronym for Web Interface Managing Production. The addition of a web interface as shown in figure <ref type="figure" target="#fig_1">2</ref> Web browser Web server</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Multiagent system</head><p>Manufacturing grid</p><p>End-user fits neatly in the concept of agile and lean manufacturing <ref type="bibr">[11]</ref>, where the enduser plays a prominent role in the production itself. The end-user specifies the product that will be tailor-made to his or her requirements. This pull-driven type of manufacturing will not lead to overproduction and waste of material.</p><p>The architecture of the software of the manufacturing system is depicted in figure <ref type="figure" target="#fig_2">3</ref> publishes a website where a customer can design his product. This could be a new product if the steps to produce it are within the capabilities of the equiplets in the grid. The webserver will be responsible to offer only those production step possibilities that are present in the grid. By pushing a submit button, a serverside program will create and activate a product agent. This agent will start to plan the production path and communicate with the available equiplet agents to create the product. A more technical picture showing the distributed nature of the system is given in figure <ref type="figure" target="#fig_3">4</ref>. The numbered components in figure <ref type="figure" target="#fig_3">4</ref>  3. The Tomcat server on which the website is hosted. The server can be placed on the grid server, but it can also be located somewhere else. 4. A connection between the gateway server and the Tomcat server is made through a (Java) socket. 5. The gateway server is responsible for spawning a product agent in the jade container. The gateway server acts as a gateway to the outside world, implemented to be able to spawn agents. 6. The Jade container of the grid contains all agents. Agents can communicate with the Tomcat server as will be explained in more detail further on in this paper. 7. The grid information system is a server where the databases and blackboards reside. These are the systems where shared and individual knowledge will be stored.</p><p>Agents have to be able to report back to the user. In order to do so, a software solution was implemented to allow them to send information over a socket. In order to keep the connection alive, a heart-beat system has been developed. This is not shown in detail in figure <ref type="figure" target="#fig_3">4</ref>, but the realisation will be described in the next sections.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Communications with the web interface/Tomcat server</head><p>Once a product agent is created through the web interface, the agent will create a socket behaviour. This socket behaviour is the way for a product agent to communicate with the server and thus to the web interface. To check whether or not the server is still alive and reachable a heart message is sent. If this message is not answered with a beat message it is assumed that the server is down. This is how the socket behaviour is used and implemented: The socket behaviour is used for the communication with the web interface and extends the Jade Waker behaviour which means it will become active after a certain amount of time.</p><p>At the time of writing the wake up period for the socket behaviour is set at 5 seconds. This means that every 5 seconds the socket behaviour will become active and check if it is connected to the WIMP server. If it is connected it will check if there are data in the buffer; if any it will process the data. If the buffer is empty or if all data is processed the socket behaviour will go idle and will become active once the Waker behaviour is fired again after 5 seconds. The socket behaviour can also be used to write messages to the WIMP server even if the socket behaviour is not active, this is because it will be executed within the action method of another behaviour.</p><p>The heartbeat behaviour was created to eliminate a problem we were having with the socket behaviour. The problem encountered was the socket behaviour being unable to see if the socket connection is still alive, if it is not closed properly. The socket behaviour will only know if the connection is closed when either the client closed it properly or when the socket behaviour is trying to write on the socket when it is closed. Because we can receive commands from the WIMP server, we need to be sure the connection is active. If the connection is closed, but the socket behaviour is not aware of this, that would mean that the socket behaviour simply cannot receive messages from the WIMP server. And since the socket behaviour does not know the socket is closed, it will not try to reconnect. The heartbeat behaviour sends a heart message every 5 seconds and sets a timeout timer for 15 seconds. After sending a heart message the heartbeat behaviour expects a response within 15 seconds from the WIMP server. The response should be a beat. If it does not receive a response message within 15 seconds it will report to the socket behaviour that the connection is no longer active and will tell the socket behaviour to reconnect. If it is not possible to reconnect immediately, the socket behaviour will try to reconnect every time it becomes active.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">WIMP capabilities</head><p>At the client side a web-browser receives a web-page in HTML5 format with embedded JavaScript and will display a graphical environment where a product can be designed. This is the user interface of what has been called the WIMP. At this moment 4 typical product design web interfaces are implemented in WIMP:</p><p>1. Pick and place: 2D ball in cradle placement. 2. Paint pixels: pixel-based picture. 3. Pick, place and stack: simple 3D design. 4. Inspection of 3D printing object in STL-format.</p><p>A simple example of the pick and place interface is shown in a screen-shot in figure <ref type="figure" target="#fig_4">5</ref>. A case with compartments of a certain dimension specified by the user is to be filled with coloured balls. The end-user selects a ball of a certain colour and moves the ball to an empty compartment.</p><p>An example of a sceenshot of the paint design interface is given in figure <ref type="figure" target="#fig_38">6</ref>. On a canvas, a pixel-based painting using a combination of several colours can be made. The WIMP software is also capable to build three-dimensional structures. It has some built-in intelligence. For example if a user wants to add a part at a place where adhesive is needed to keep it in place, it will warn the user if he / she did not select the adhesive option for the placement of this part. This part of WIMP is only a basic implementation and in future development all kinds of special provisions should be added. For example when gluing two objects together several points of special interest arise. First of all the location of the objects you want to glue is very important. If the object is glued onto an existing structure it is possible that the existing structure will tip over. The structure must be stable enough and strong enough to support the new object. To determine if those conditions are met you have to know the material of the current structure, how much it weighs, and several other factors. Another important aspect of gluing objects is the type of adhesive. Not all materials can be glued together and not all types of adhesive can be used in combination with all materials. During manufacturing the objects that will be glued must be held together. This must be done until the adhesive is dry. Some adhesive types need heat to function properly, other types can be hardened by using UV-light. At the client side a product is described by JSON. JSON, or JavaScript Simple Object Notation is a popular alternative to XML. XML was the de-facto standard before the existence of JSON. Until HTML 5, you needed to include libraries to encode and decode JSON objects. Now, the JavaScript engine that comes with HTML 5 has built-in support for encoding/decoding JSON objects. For every part placed on the design grid in the webbrowser, the parttype (ball, or block), colour (red, blue, green, yellow) and position (coordinates on the design-grid) is entered in this JSON information. It is also possible to choose whether or not to use adhesive. By clicking the submit button, the JSON information is transferred to the webserver. Every action described in this information is related to and translated into a production step. In figure <ref type="figure" target="#fig_53">9</ref> the internal structure of a production step information block is given. A unique ID is followed by a capability. This is the step action required and will be tied to an equiplet capable to perform this step. The parameters give extra information about the object the action has to work on. For example in a pick and place action, the parameters will specify the coordinates of the final positions and the object that has to move to that position. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ID Capability Parameters</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Webserver and Tomcat-driven Java application</head><p>The web page presented to the client is presented by a Tomcat web server. Tomcat is designed to support Java Servlets. This means that Tomcat is capable to start a Java program at the server the moment the client sends a request for a product. This Java program is capable of spawning a product agent in the Jade environment. To do this a Gateway is used in the Jade environment to achieve this functionality. This newly spawned agent will also receive the JSON information about the product to be made. From this information, the needed product steps are generated by the product agent. An overview of the connection sockets is shown in figure <ref type="figure" target="#fig_89">10</ref>. Every product agent is capable to receive information from the Tomcat server using the Gateway Server. Every product agent can also directly send information to the Tomcat Server. This will create the possibility to inform the end-user in realtime about the progress of the production.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Product agent</head><p>The product agent is created and its goal is to produce the product. Therefore it has to fulfil its sub-goals. The first sub-goal is planning the production path. This means: selecting the equiplets involved, inquire if the steps are feasible and finally scheduling the production. The next sub-goal is to guide the product along the production path and to inform the equiplet about the step or steps to perform. For every step, data aquisition of the production data is possible and should be carried out by the product agent. It depends on the equiplet agent what information will be made available.</p><p>Blackboard and timing The blackboard system as described in the architecture was implemented as actually three separate blackboards (see figure <ref type="figure" target="#fig_2">3</ref>). This</p><formula xml:id="formula_187">Socket A Socket C Socket D Socket B Socket D Socket B Socket A Socket C Agent A Agent B Agent C Agent D</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Gateway Server</head><p>Tomcat Server Fig. <ref type="figure" target="#fig_89">10</ref>. Socket connections between product agents and the user interface has to do with the fact that the performance of the system could be better and also the read and write access permissions become more clear. The BB-steps blackboard is used by the equiplet agents to announce its production steps. This information is under normal circumstances read-only for the product agents. The BB-planning blackboard is read and written by the product agents and a timing process. The information on this blackboard is the planning of timeslots or time steps for every equiplet, and a load of every equiplet.</p><p>To synchronise all agents, a timeserver has been added to the system. The scheduling is done by the product agents. Every newly arrived product agent tries to schedule itself in a way that it will not exceed its deadline. If it fails, it will ask other product agents with a later deadline to temporally give up their scheduling. Next it will try to generate new schedules for all involved agents. If successful, the new schedule will be adopted. If the scheduling fails the old schedules are restored and the new agent reports a scheduling failure.</p><p>The third blackboard in figure <ref type="figure" target="#fig_2">3</ref> (BB-logfile) is used to build a knowledge base about the performance of the individual equiplets and is shared among the product agents. Successful and unsuccessful steps are reported in this blackboard by products agents. This blackboard serves as an extra check when the product agent is planning the set of equiplets to be used for a certain product. The higher the failure rate of a certain equiplet, the more it will be avoided by the product agents. This failure rate can be reset after repair or adjustment of an equiplet.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Equiplet agent</head><p>The equiplet agent is also implemented as a Jade agent and it is the interface to the underlying software and hardware. It depends on the front-end of the equiplet what modules are available. The equiplet agent is also the interface to the product agent. Both types of agents live in Jade containers and can communicate with each other. The communication between the product agents and the equiplet agents as well as other product agents is FIPA-based. FIPA is an acronym for Foundation for Intelligent Physical Agents and the foundation developed a standard for inter-agent communication. The Jade platform is FIPA-compliant. For the implementation of the blackboard, Open BBS has been chosen. This Java-based blackboard was easy to integrate in the Jade environment; it was open-source and tests proved that it performed well enough for our grid.</p><p>The equiplet agent will translate the production steps in front-end-specific sub-steps. A pick-and-place action is composed of movements and control of a vacuum pincer to pick the objects involved. The movements and commands are sent to the ROS-layer that will control the hardware and the commands are actually carried out by the connected hardware.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Results</head><p>The research done so far for this agent-based production system had several milestones. The first milestone was the proof of concept given by a simulation of the multiagent system as described in <ref type="bibr">[5]</ref>. In that system the product agents planned their production path along equiplet agents that used timing delays to mimic the production steps. The equiplet agent was not combined with the equiplet hardware. The next milestone was the implementation of a reliable and fast scheduling algorithm as described in <ref type="bibr">[6]</ref>. The third step was integrating the MAS with the ROS-based equiplet in the system, so the integration with real equiplet hardware has been accomplished <ref type="bibr">[12]</ref>. The latest step is described in this paper. A web front-end has been built to specify the product to be produced. At this moment the given 2D examples can be executed on the three available equiplets. So the total chain from design to production is working. In figure <ref type="figure" target="#fig_9">11</ref> a design in the paint application of WIMP is made. In figure <ref type="figure" target="#fig_7">12</ref> the result of this product is shown. Though this example still is very simple, it shows that the multiagent system is working to our expectations. The 3D example is already implemented at the MAS level and ROS level. The equiplet front-end to perform these steps is under development as a glue dispenser and an extra degree of freedom (rotation capability around the z-axis) of the pick and place robot is needed. However using a dummy equiplet (as in the earlier developed simulation) shows that the software is working to our expectations. This also includes an error recovery system. terms workpiece agents, during the production. Their system focuses on reliability and minimizing downtime in a production line. This approach is used in the production of cylinder heads in car manufacturing. The roles of the agents in this production system differ from our approach. This has to do with the fact that Jennings and Bussmann use agent technology in a standard pipeline-based production system and the main purpose was to minimise the downtime of this production system. Their agents do not perform individual product logging and only play a role in the production phase. In our approach the product logging is done by the product agent for every single product and could be the basis of the other roles of the product agent in other parts of the life cycle. In the model presented by Jennings and Bussmann the workpiece agent is not so much involved in production details as the product agent in our model. Another big difference is also that our model is end-user driven.</p><p>In the field of agent-based production there are several other important publications. Paolucci and Sacile <ref type="bibr">[8]</ref> give an extensive overview of what has been done. Their work focuses on simulation as well as production scheduling and control. The main purpose to use agents in <ref type="bibr">[8]</ref> is agile production and making complex production tasks possible by using a multi-agent system. Agents are also introduced to deliver a flexible and scalable alternative for MES for small production companies. The roles of the agents in their overview are quite diverse. In simulations agents play the role of active entities in the production. In production scheduling and control agents support or replace human operators. Agent technology is used in parts or subsystems of the manufacturing process. We on the contrary based the manufacturing process as a whole on agent technology and we have developed a production paradigm based on agent technology in combination with a manufacturing grid. This model uses only two types of agents and focuses on agile multiparallel production. The design and implementation of the production platforms and the idea to build a manufacturing grid can be found in Puik <ref type="bibr">[9]</ref>. After production the product agents can be embedded, if possible, in the product itself. In <ref type="bibr">[7]</ref> the role of product agents in the whole life cycle of a product is discussed.</p><p>The term industrial internet <ref type="bibr">[2]</ref> is used to describe the possibilities of interconnected machinery, sensors and devices that can be used to enhance production and solving emergent problem on the fly. Research in this field is related to our research. The approach we used however is purely based on the aforementioned cheap reconfigurable equiplets. The introduction of agent technology opens possibilities that go beyond the production phase, as the product agent can play an important role in other parts of the life cycle of a product.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Discussion and future work</head><p>The production approach described here is also applicable to a hybrid system containing human actors as parts of the production system. In this situation human workers take the position of the equiplets. The production steps for a certain product should be translated to human-readable instructions and humans perform the actual production steps. In that model the equiplet agent carries out this translation so the MAS layer is still intact. This approach is useful in the situation where the production tasks are too complicated for an equiplet to be performed, but it can also help in the situation where a new equiplet front-end has to be developed.</p><p>Standard mass production always has the risk of overproduction, especially when new products arrive from other sources offering better performance or a lower price. In the concept of lean manufacturing, this kind of waste should be avoided by so-called pull-driven production. This means that a product will only be made if an end-user is asking for it. This is exactly what has been accomplished in the manufacturing system described in this paper.</p><p>For transport of the products between equiplets, automated guided vehicles (AGV) are being developed. However, the use of AGVs is not implemented yet, but the transport between equiplets can be seen as a step needed in the sequence of steps to make a product. This means that from the point of view of the product agent, an AGV is just another equiplet, offering the product transport step fitting in the total sequence of steps needed for manufacturing the product. There is a difference however. The AGV is reserved for a whole sequence of steps, while equiplets are reserved for just a single step or a set of steps if these steps are consecutive and can be realised by the same equiplet.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusion</head><p>In this paper we described a real production system that has been built as a proof of concept. All software used is based on open standards. Further research on the manufacturing of products with a higher complexity must be done, however the basic techniques for the implementation proved to work.</p><p>The grid is capable to produce several different products in parallel and every product has its own unique production log generated by and embedded in the product agent. This product agent can play an important role in the other parts of the life-cycle of the product. When a product will be disassembled the product agent carries important information about the sub-parts of the product. This can be useful for recycling and reuse of sub-parts. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>ICT and e-business development by the Ukrainian enterprises: the empirical research 1 Introduction</head><p>Nowadays e-business in Ukraine relates mostly to online retail shopping and to searching of relevant information and slightly extended to intra-and intercompany interaction. Moreover, the benefits of e-business are not used by all business sectors in Ukraine. The most developed in terms of Internet penetration are banks, large retail chains, high-tech enterprises, enterprises in leisure activities and entertainment, etc. Unfortunately, the industrythe main and leading sector of material production in Ukrainelags in the context of the use of e-business tools to improve the efficiency and competitiveness of domestic enterprises. The paper is organized as follows. Section 2 elaborates on theoretical underpinnings, and presents an overview of the related works. Section 3 provides the research methodologies and the empirical results. Section 4 concludes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Related works</head><p>International researches show that "there is a growing amount of evidence from developed and developing countries that the adoption of ICTs by enterprises helps accelerate productivity grows, which is essential for supporting income and employment generation. More widespread adoption of ICTs in the productive sectors of developing countries should also accelerate innovation and thus enhance the competitive position of developing countries" <ref type="bibr">[1]</ref>.</p><p>A considerable amount of researches identify the benefits that brings the use of ebusiness tools for industrial enterprises. Researchers stated that "the potential of B2B e-commerce is not captured by merely automating document printing and mailing operations of transactions, but by encompassing all trading steps and collaboration between business partners. Firms need to realize the importance of cross-firm process integration and make determined efforts to integrate B2B e-commerce in critical business processes" <ref type="bibr">[2]</ref>. Several studies concern to barriers to the implementation of B2B e-business solutions <ref type="bibr">[3]</ref>, the conditions necessary for their successful adaptation <ref type="bibr">[4]</ref> and others.</p><p>Importantly, many researches confirm the fact that e-business in B2B is less developed compared with e-business in B2C. Scientists comprehend the reasons for this situation in the differences between B2B and B2C markets. For example, Harrison et al. identified 10 reasons, including more complex decision-making unit and associated with it increased rationality of buyers, the complexity of production, the limited number of buying units, far fewer behavioral or needs-based segments, importance of personal relationships, long-term purchases or at least purchases which are expected to be repeated over a long period of time, etc. <ref type="bibr">[5]</ref>. Wright has identified the following features of B2B: decision-making structure is complex and the process involves a lot of people; decision-making could be delayed, depending on the purchase value; rational reasons for ordering; high value of product/service, contacts, projects and consulting; the final consumer probably will not be a decision-maker; since the process time increases, suppliers have the access to decision-makers <ref type="bibr">[6]</ref>.</p><p>In our opinion, the sufficient reason for backlog of e-business development by the Ukrainian industrial enterprises is also the backwardness of the employees who do not tend to improve their skills in the ICT field, fear of change and therefore limitation themselves to existing business practice. On the other hand, the advance of B2C sector in this area can be explained by the voice of customers who do not satisfied by the old methods of obtaining information and traditional relationships. In other words, the B2C sector is forced to respond to the market needs for maintaining its competitiveness. This need for B2B sector in Ukraine as well as for internal and intercompany automation, in our view, has not formed yet.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Research</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">The methodologies used for e-business development research</head><p>This section presents the methodologies for the evaluation of e-business and ICT in use maturity in Ukraine on the example of the Odessa enterprises. The study was conducted in two directions.</p><p>Within the first direction, we examined the large number of enterprises in Odessa region. These companies were divided into the two groups: the industrial enterprises and companies in other business fields. We analyzed all industrial enterprises listed at the Odessa official site http://www.odessa.ua (in total 161 companies). Enterprises of other business areas were chosen randomly using the Internet handbook "World Gold Page. All Odessa" at www.mercury.odessa.ua and partly on the Odessa official site (total 664 companies).</p><p>Companies were chosen from different fields of business, they have different forms of ownership, scope of activities, etc. Choice of the specific number of companies in each area were dependent on its scale and popularity in Odessa and Odessa region. Odessa is a major business center in Ukraine, therefore the study of the level of ICT in use maturity at the Odessa enterprises is quite representative for Ukraine.</p><p>The purpose of this study is the investigation of these companies' presence in the Internet and a comparison between industrial enterprises and companies of other spheres of activity. We understand that having a Web-site does not fully indicate the involvement in e-commerce and/or e-business, but it is minimal and necessary condition for this purpose. In this context, we determine not only the existence of Web-site, but also make a detailed study of different kinds of Web-pages for named companies.</p><p>The second direction is represented by a detailed study of the level of ICT use and e-business development at the 12 industrial enterprises in Odessa, including 5 engineering companies, 3 food processors, 2 enterprises of fabricated metal products, 1 cable plant and 1 plant for the plastic products production. Research was made on the basis of employees' survey data and state statistical observation (form № 1-ICT "Information and communication technologies and e-commerce in enterprises").</p><p>On the basis of these documents, 18 indicators have been allocated, characterizing the level of ICT in use maturity and e-business development at the enterprise.</p><p>On the basis of the expert survey were identified the levels of: achievement of the objectives of information systems; the Internet use; duties automation; achievement of automation benefits. These indicators were determined based on the frequency of positive respondents' answers to the questionnaire.</p><p>Part of transactions with suppliers / customers / other organizations that are implemented via electronic information interchange (EII), as well as the part of functions that are provided by Web-site, were determined on the basis of form № 1-ICT. In this case we also used the frequency of positive answers to the relevant questions of the state statistical observation.</p><p>It should be noted that we use the term of "electronic information interchange", which assumes the use of computers and communication tools to transmit information. It includes exchange of information through the enterprise Web-site / Web-portals including publication of information, upload / download documents, emails; automated data interchange systems, which exchange data in real time over a coherent structure, format and data transmission standards with minimal or no human intervention (XML, EDIFACT, etc.).</p><p>The author believes that this term adequately reflects the whole spectrum of transactions, which is mentioned in the relevant paragraphs of 1-ICT form.</p><p>Answers to questions of form № 1-ICT allow also to define the part of products which are sold via computer networks; part of material resources purchased via computer networks; availability of personal computers for administrative staff and employees; part of personal computers connected to the Internet. These parameters were defined as the quotient between the corresponding data.</p><p>The quality of the Internet connection is also determined on the basis of form № 1-ICT. The answers to this question are qualitative, so it is necessary to transform them to the quantitative form. For this reason we conducted the survey of the ICT professionals regarding the weights for different variants of Internet connection. It was found that the most relevant criteria for assessing the level of Internet connection is the connection speed, because of other communication quality parameters such as the level of support, the stability of the signal response to faults, etc. depend on the quality of a particular ISP, not on the way the Internet connection. For further calculations we used the arithmetic mean value of the respondents' answers. For each company it was compared with the maximum possible/progressive method (combination of methods) of Internet connection.</p><p>Availability of LAN, wireless LAN access, intranet and extranet were evaluated on the basis of answers to the relevant questions of form № 1-ICT. Answer "Yes" is set to 1, answer "No" is set to 0.</p><p>Assessment of the ICT in use maturity e-business development at the industrial enterprises on the above parameters was carried out using a software package for statistical analysis "Statistical Package for the Social Sciences" SPSS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Comparative analysis of e-business development</head><p>The results of comparison of e-business adoption between Odessa industrial enterprises and enterprises of other business fields are following.</p><p>The research shows that from 161 industrial enterprises only 64 have the Web-site (40%), that indicate an insufficient level of e-business implementation in Odessa industry. We are sure that high quality Web-site can become a gateway for industrial enterprises to attract new business partners, conduct competitive procurement, provide the comprehensive information about its products, offer secure and controlled communication with business partners, etc. From the other hand, 329 companies from the 2nd group (50%) have its own Web-site.</p><p>In both cases, Web-sites often provide information in Russian language (for industrial enterprises -89% that have Web-site, for companies in other fields -93%).</p><p>We discovered the following methods of communication with companies employees through Web-site. For industry each has phone number, 72% contain the mailing address, 87,5%email address (20 of them hosted on free hosting, that indicate a lack of attention to the positive reputation in the e-commerce market), chat, feedback service and sms are not popular (8%, 27% and 8% respectively). For companies in other business fields phone number presented at 94% of Web-sites, email addressat 78%, mailing addressat 53%, feedback serviceat 23%, chatat 8%, smsat 4%. It is logical that availability of free channels of communication for B2B sector is not as critical as for B2C e-commerce, but the presence of multiple communication channels is helpful. Furthermore, in this case it is important that communication channels are personalized (e.g., the purchasing issues should be addressed directly to the sales department, proposals from suppliersto the procurement department, etc.). Moreover, such requests should be fixed in order to monitor the timeliness and completeness of its accomplishment.</p><p>The following results describe the quality of information presented at the companies' Web-sites. Complete information about the products is available at 90% of industrial Web-sites, partialat 8%, no product informationat 2% of Web-sites. Complete information about the products is available at 76% of Web-sites of other business fields companies, partialat 23%, no information availableat 1%. These figures clearly show lack of attention of Ukrainian enterprises to the use of Internet as a cheap and convenient channel for information dissemination. We believe that information about the company's products should be presented at the Web-site with the required level of detail, in some caseswith the drawings and specifications. The companies Web-site is also should have the full information about the enterprise and provide standard contracts forms, business rules, etc.</p><p>Further, the research found that industrial enterprises do not use social networking. We believe that social networks should be used by companies to maintain personal contact with business partners and to create the specific professional communities. The data regarding the presence of other business fields companies in social networks are the following: the Facebook pages have 8% of firms, accounts in Twitter -5%, in YouTube -4%. Moreover, for B2C companies and consumer goods' producers the social networking is critical for increasing the loyalty of existing and attracting new customers.</p><p>We also investigated the availability of information about the companies which do not have Web-sites, on the popular Ukrainian Internet portals such as Prom.ua, Businessua.com, Ua.all.biz. We proceeded from the assumption that if the company does not have a Web-site, it should have an account at the niche portals to implement at least the minimum presence in the Web.</p><p>The research shows the following data: at the Prom.ua we found 9% of the industrial enterprises, which do not have own Web-site, at the Businesua.com -3%, at the Ua.all.biz -26%. There are no information at these portals for 64% of industrial enterprises which do not have its own Web-site.</p><p>For companies of other business areas the data is following: 3% of companies which do not have Web-site, we found at Prom.ua, 0,6%at Businessua.com, 6%at Ua.all.biz. The information about 90% of companies which do not have their own Web-site, we didn't find at these portals.</p><p>Thus, the example of Odessa enterprises shows the unsatisfactory level of ebusiness development for both groups of enterprises. Moreover, it is the obvious gap in the e-business development by the industrial enterprises as compared to businesses of other fields. Many enterprises do not have their own Web-site, most of these companies do not even presented at the most famous Ukrainian portals. Companies that have Web-sites show its insufficient quality. Furthermore, the industry did not use the resources of social networking for disseminating information and supporting its business partners loyalty.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Research of the ICT development at the industrial enterprises</head><p>Evaluation of the ICT in use maturity at the Odessa industrial enterprises of the chosen sample allowed to make following important conclusions.</p><p>On average, the surveyed enterprises use information systems to achieve 2,4±0,2 purposes from 6, and the most popular purpose to use information systems is improving the access to information (78% of enterprises).</p><p>Internet in the surveyed companies is used to perform an average of 4,1±0,4 duties from 11. The most popular direction of Internet usage are message and document transfer to business partners (79% of enterprises), to employees and superiors (67%) and search for suppliers (62%).</p><p>On average, the surveyed enterprises automate 1,9±0,3 duties from 8. The leader among the responses is reporting (45% of enterprises).</p><p>Automation of duties allow to realize an average 4,0±0,4 purposes from 13 at the surveyed enterprises. The most commonly implemented objectives are speeding the paper documents preparing (84% of enterprises) and its transfer to employees and superiors (67%), reducing its number (79%).</p><p>Electronic information interchange with suppliers implemented by 5 enterprises from 12. These enterprises use EII on average 6,0±0,2 transactions with suppliers from 7, and all enterprises use EII for the transferring orders to suppliers, receiving electronic invoices and product information from suppliers.</p><p>Electronic information interchange with customers is implemented on the same 5 companies from 12. They realize an average of 5,9±0,2 transactions with customers from 7, and all these companies send electronic invoices and information about its products to customers.</p><p>Electronic information interchange with other organizations is executed by all enterprises. On average, they realize via EII 5,5±0,2 operations with other organizations from 7, with the most popular such as: obtaining banking and financial services (94% of enterprises), information from government agencies (90%), documents from government agencies (85%), returning of completed forms to government institutions (81%), sending or receiving data to/from government institutions (79%), sending payment orders to financial institutions (60%).</p><p>Level of EII with other organizations for all enterprises significantly exceeds the level of EII with suppliers and customers. From our point of view, this situation is caused by the availability of the relevant proposals and realized possibilities from the government institutions and banks/financial institutions (receiving and returning of electronic documents, executing the administrative procedures, submitting proposals, using the Internet banking, etc.).</p><p>Web-site is available for 6 companies from 12, and it provides on average 2,3±0,4 functions from 6. All Web-sites contain product catalog or price list, but only one company realizes all features listed in the form № 1-ICT.</p><p>Although five companies in the study group show the automation of certain procurement and marketing functions, this automation is very limited and is implemented mainly by sending e-mail notifications to some business partners.</p><p>An indirect proof of this fact is the almost complete lack of material resources and finished products, which are purchased/sold via computer networks. Only one company 75% of its products realize through computer networks. Other company only a very small amount of its production sold this way (0.001081%), and a small part of material resources purchased via computer networks (0.01328%). Therefore, we have no reasons to report about mass and systematic electronic sales and procurement for the study group of enterprises.</p><p>An interesting analysis of the ICT equipment level for the study group of enterprises. Thus, the availability of personal computers for administrative staff indicates the gap in the level of company computerization. One company has this value higher than 5, three of themnear 1, but twoless than 0,1, othersnear 0,5. The study also shows the gap between enterprises in PCs availability for employees. These values vary between 0,022 and 0,572.</p><p>It should be noted that industrial enterprises have different level of Internet connection (four of them -100%, fivenear 70%, threeonly near 30%). Five enterprises apply the most advanced methods of Internet connection, including mobile communications, which increases the efficiency and timeliness of information transfer and processing, but four companies use broadband Internet connection with maximum speed 24 Mbit/s and three still use outdated analog modem or an ISDN connection.</p><p>Almost all companies have local computer network, 5 of them use a wireless LAN access. Two companies have internal computer network (intranet) and extend it for the business partners (extranet). In other words, they have the technical ability for intra-and intercompany collaboration.</p><p>Thus, the results of this research do not allow us to state the mass implementation of ICT and e-business by the Odessa industrial enterprises. In most businesses, despite the relatively high level of technical equipment, only a part of routine operations are automated. Most administrative functions are performed by traditional methods, using only e-mail.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>During the conducted research, we attempted to study, firstly, the level of e-business development by the Odessa enterprises of industry and other spheres of activity, and secondly, the level of ICT usage at the Odessa industrial enterprises.</p><p>Based on this research we can make several important conclusions:</p><p>1. The state of Odessa e-business market does not correspond to the current level of ICT development, nor the needs of the building the information society in our country. More than half of the companies do not have its own Web-sites, they are poorly represented in social networks and in niche portals on relevant topics. Detailed research of existing Web-sites showed its low quality. Web-site content and quality of its services, including on-line ordering and payment, secure communication, etc. require radical restructuring.</p><p>Comparative analysis of presence in Internet of industrial enterprises and companies of other fields of business showed the significant lag of industrial enterprises in terms of providing the information and interaction with customers and business partners. Thus, an urgent task for the Ukrainian enterprises is the most effective implementing of e-business tools into a business practice.</p><p>2. Research of the ICT equipment of the industrial enterprises showed its insufficient use, and failure to obtain the benefits that bears its effective implementation. Automation covers mostly routine paper operations, they have a very primitive mode of electronic communication with business partners and employees (often only e-mails), e-procurement and e-sales are not implemented at all, although the level of technical equipment and Internet connection are relatively high.</p><p>3. The most unfavorable situation is in the field of intercompany electronic interaction of the enterprise with its customers and business partners. The study shows almost complete absence of electronic procurement and sales. Some enterprises realize only electronic information interchange, but only with those organizations that have provide relevant technical and other possibilities for this purpose (government organizations, banks/financial institutions).</p><p>Summarizing, we can note unsatisfactory use of the ICT benefits and e-business development by the Odessa enterprises.</p><p>It should be noted that this study is only the first attempt to analyze the situation in the field of adaptation of e-business tools and ICT by the Ukrainian enterprises, so allow only to formulate the challenges in this business field. Future research should be conducted on a regular basis with the justification of representativeness (typicality) of selected companies. It also should study the companies from all regions of Ukraine, separating them by industry, type of ownership, size, etc. Also limitation of this research is the resistance of most businesses for detailed study of their activity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Geospatial intelligence and data fusion techniques for sustainable development problems Introduction</head><p>Geospatial information is a very important source of data for distributed systems development, education, decision making and competitive business. Due to regular acquisition of satellite data all over the world for the last couple of decades as well as new communication, navigation and crowdsourcing techniques, it has become possible to monitor the current state of the large territories development, estimate trends, analyze available scenarios for future development and manage things to provide sustainability. The approach is based on modern IT, namely geospatial intelligence <ref type="bibr">[ 1]</ref> and data fusion <ref type="bibr">[ 2]</ref> techniques. By geospatial intelligence we consider all aspects of geospatial data processing including intelligent methods and technologies to fuse/integrate data and products acquired by multiple heterogeneous sources using machine learning techniques and emerging big data and geoinformation technologies. In this paper we exploit geospatial technique to address two important applications for Ukraine, in particular land cover/land use mapping and crop mapping. The purpose is to not only show the potential of geospatial intelligence, but to pay attention of the educators to this powerful IT and bridge the gap between market needs for such specialists and professionals.</p><p>Ukraine is one of the main crop producers in the world <ref type="bibr">[ 3]</ref>, so agricultural monitoring is a very important challenge for Ukraine. One of the most promising data sources to solve the underlined tasks at large scale is remote sensing data, namely the satellite imagery <ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr">[11]</ref><ref type="bibr">[12]</ref>. This is mainly due capabilities to timely acquire images and provide repeatable, continuous measurements for large territories. At present, there are only coarse-resolution satellite imagery (500 m spatial resolution), that has been utilized to derive global cropland extend, e.g. GlobCover, MODIS <ref type="bibr">[ 13]</ref>. But, lowresolution maps always underestimate or overestimate certain land cover or crop type areas. Also several global land cover maps have been made using higher resolution data such as from Landsat-series satellites <ref type="bibr">[14]</ref><ref type="bibr">[15]</ref>, but they are not accurate enough at regional level for Ukraine. Therefore, creation of global products, such as land cover maps and crop maps, based on high resolution satellite images (at 30 m) is very important task for sustainable economic development of Ukraine. This paper presents the results of regional retrospective high resolution land cover mapping and large scale crop mapping for Ukrainian territory using multi-temporal Landsat-4/5/7/8 images and also some supporting data and knowledge obtained during our own investigations <ref type="bibr">[7]</ref><ref type="bibr">[8]</ref>. The main results of the work were obtained within EC-FP7 project "Stimulating Innovation for Global Monitoring of Agriculture and its Impact on the Environment in support of GEOGLAM" (SIGMA).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Objective of the study and data description</head><p>The paper covers two different studies: retrospective land cover mapping and crop mapping. These two problems are solved using the same geospatial intelligence approach that encompasses the use of advanced machine learning techniques. In particular, we use a combination of unsupervised and supervised neural networks to first restore missing values in multi-temporal images, and then to provide a supervised classification with an ensemble of multilayer perceptrons (MLPs). One of the advantages of this approach is possibility for automatic processing taking into account of large amount of satellite imagery that need to be processed.</p><p>At the first study, we used atmospherically corrected Landsat-4/5/7 products to produce land cover maps for land cover change detection. This was performed for all territory of Ukraine and required processing of about 500 Landsat scenes to cover it completely for three decades: 1990s, 2000s and 2010s. Also, we manually formed training and test sets for supervised classification using the photo interpretation method. Train and test sets were created with uniform spatial distribution over the territory of interest and proportional representation of all land cover classes, namely artificial surface, cropland, grassland, forest, bare land and water. The second study is the pilot project on large scale crop mapping for JECAM test site <ref type="bibr">[ 16]</ref> in Ukraine for 2013 (Fig. <ref type="figure" target="#fig_0">1</ref>). The Joint Experiment for Crop Assessment and Monitoring (JECAM) is an initiative of GEO Agriculture Monitoring Community of Practice with the intent to enhance international collaboration around agricultural monitoring towards the development of a "system of systems" to address issues associated with food security and a sustainable and profitable agricultural sector worldwide (http://www.jecam.org). The JECAM test site in Ukraine was established in 2011 and covers administrative region of Kyiv oblast with the geographic area of 28,100 km2 with almost 1.0 M ha of cropland. For large scale crop mapping over the study region we used two data sources -remote sensing images acquired by Operational Land Imager (OLI) sensor aboard Landsat-8 satellite and data acquired at ground surveys. We used Fmask algorithm for clouds detection and masking <ref type="bibr">[ 17]</ref>. Ground surveys were conducted in June 2013 to collect the knowledge about crop types and land cover types (Fig. <ref type="figure" target="#fig_1">2</ref>) over the interested area. In this study we used European LUCAS nomenclature as a basis for land cover / land use types.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Method and results</head><p>The main scientific challenges for geospatial intelligence problem solving are geospatial data fusion and correct interpretation of geospatial information. To address them for big data satellite monitoring problems we propose the novel approach, based on combination of three machine learning paradigms for geospatial information analysis: big data segmentation, neural network classification and data fusion. Data fusion is performed at the pixel and at the decision making levels. During preprocessing stage, Landsat-4/5/7 and Landsat 8 scenes were merged to multichannel format for each path, row and date. First, we restore cloudy pixels from timeseries of images using self-organizing Kohonen maps <ref type="bibr">[ 18]</ref> and after provide classification based on the time-series of restored images available for the certain year and required area. Classification was done by using an ensemble of neural networks (MLPs). The method of pixel and decision making level data fusion is proposed in <ref type="bibr">[ 16]</ref>.  To estimate the accuracy of land cover classification for Ukrainian territory, we used two approaches: accuracy assessment on independent test (testing) set and comparison of the class areas in land cover with official statistics. The overall classification accuracy achieved in this study was approximately 95%. Accuracies for each individual class were more than 70%. The lowest classification accuracy was for grassland, because it is difficult to separate grassland from some of spring crops. We also compared (Table <ref type="table" target="#tab_1">1</ref>) our result, taken for Ukraine with global land cover map GlobeLand30-2010 at 30 m resolution. The overall classification accuracy of our land cover map was 5% higher than GlobeLand30-2010. Also accuracy of grassland from our maps was +10% (producer accuracy, PA) and +45% (user accuracy, UA) <ref type="bibr">[ 19]</ref> better than GlobeLand30-2010. Our final land cover map is shown at Fig. <ref type="figure" target="#fig_1">2</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Large scale crop mapping</head><p>The use of multi-temporal Landsat-8 imagery and an ensemble of MLP classifiers allowed us to achieve overall accuracy of slightly over 85% (Table <ref type="table" target="#tab_0">2</ref>) which is considered as target accuracy for agriculture applications.</p><p>Target accuracy of 85% was also achieved for winter wheat, winter rapeseed, maize and sugar beet. For the spring crops, sunflower and soybeans the accuracy is less, than 85%. Soybeans is the least discriminated summer crop with main confusion with maize. In particular, almost 61% of commission error and 71% of omission error was due to confusion with maize. All non-agriculture classes including forest and grassland yielded PA and UA of more than 85%. The final classification map is shown in Fig. <ref type="figure" target="#fig_2">3</ref>.</p><p>Comparison of official statistics and crop area estimates derived from Landsat-8 imagery for Kyiv region described at the Table <ref type="table" target="#tab_21">3</ref>.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Application in education process</head><p>As well as geospatial intelligence is one of the emerging areas of data science, we actively use it in education process. Developed approach to land cover and crop mapping is actively used for education purposes. We incorporate these topics (geospatial intelligence methods and developed software) into a master and PhD program of "Ecological and economic monitoring" specialization at the National University of Life and Environmental Sciences of Ukraine with the main focus on big geospatial data processing and satellite data analysis.</p><p>Also we are actively trying to implement project based education, involving students into scientific projects . Some methods of data fusion are included into laboratory works on intelligent computations. Master and PhD student fulfill their qualification diplomas within international projects. According to our experience more attention should be paid on geospatial data processing and intelligent computations within Bachelor programs on Computer Science in Life Science universities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>This paper presents a novel approach for satellite monitoring based on big geospatial data analysis. The main idea of the proposed geospatial intelligence approach is the use of supervised neural networks in order to classify multi-temporal optical satellite images with the presence of missing data. A supervised classification was performed with the use of ensemble of MLP classifiers to create such global products as retrospective land cover and crop maps for the whole territory of Ukraine. Proposed approach allowed us to achieve the overall classification accuracy of 95% for three different time periods <ref type="bibr">(1990, 2000 and 2010)</ref> and improve quality of maps comparing to other land cover maps available for Ukraine at 30 m spatial resolution, namely GlobeLand30-2010. The same approach was successfully applied for the JECAM test site in Ukraine for large area crop mapping. Now geospatial intelligence is a hot topic in big data analysis, but we observe the lack of experts in the area. Therefore, we would like to pay attention of the IT educators to the gap and build a roadmap to fill it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Before the era of nuclear power, contribution of hydropower in the energy balance of the former Soviet Union was considered indisputable. Thus the negative effects associated with the creation of reservoirs on the plains were not taken into account e.g. flooding of large areas, destruction of towns and historic monuments, increase of the risk of man-made disasters. But time passed and in 1970s in Ukraine were built several nuclear power plants and as a result appeared the need to develop solar, wind and bioenergy and it led to decrease of the share of electricity generation by hydropower plants to 5-7%. Over the past decade, the agricultural sector of the Ukrainian economy has become one of the major players in the global food market and agricultural export of the country has become one of the landmarks of the national economic development. That is why there is an urgent need to use territory of the cascade of Dnieper reservoirsfor agricultural purpose. However, beside inappropriate use of land resources <ref type="bibr">[16]</ref> and deterioration of the quality of water resources there is a high risk of man-made disasters which can be caused by the functioning of the Dnieper cascade hydropower plants.</p><p>A. Pigou <ref type="bibr">[11]</ref>, P.Samuelson <ref type="bibr">[15]</ref>, R. Coase <ref type="bibr">[12]</ref> presented classical approaches to exploration of the impact of externalities on economic performance (environmental management). The main idea of this approach is that the price of products (in this case electricity) does not respond the social price paid by people for violations of the environment <ref type="bibr">[13]</ref> and therefore assessment of economic growth should be calculated taking into account the price of deterioration of the environment <ref type="bibr">[1,</ref><ref type="bibr">2]</ref> .</p><p>English researchers proposed classical approach to the exploration of the causes of destruction of dams, they assert the classical definition of the threats which are connected with creation of artificial reservoirs <ref type="bibr">[16]</ref>. In Great Britain all the artificial reservoirs (more than 25 000 cubic meters of the size 100m * 100m * 2.5m) were under the control of local authorities and then the responsibility to control artificial reservoirs was transferred to National Environment Agency.</p><p>For comparison, Kyiv reservoir has a volume of 3.73 billion cubic meters and it is placed above the level of many districts of Kyiv <ref type="bibr">[9]</ref>. Kurenevka tragedy which happened in 1961 showed that even not significant in volume reservoirs (600 000 cubic meters -400m * 400m * 3,75m) can be extremely dangerous if they are placed above the level of the nearby territories and can lead to generation of artificial tsunami <ref type="bibr">[9]</ref>. During World War II in parts of the Dnieper River below the Dnieper dam the retreating Soviet army tried to destroy the dam. The man-made disaster led to the flood victims among whom were citizens of Zaporozhe and coastal villages and soldiers of the Soviet Army (about 100 000 people ) <ref type="bibr">[6]</ref>.</p><p>Researchers emphasize the negative effects of the creation and functioning of the Dniper reservoirs, besides flooding of large territories the negative effects concern a change of hydrological, hydro chemical and hydro biological regimes and slowing of water circulation <ref type="bibr">[3,</ref><ref type="bibr">6,</ref><ref type="bibr">7]</ref>. In general, there is a great number of scientific papers on significant negative effects connected with creation of the Dnieper reservoirs for the environment of Dnieper, in particular, and for the economy of Ukraine in general. But the issue of quantitative estimation of possible losses caused by artificial tsunami has got little attention among researchers.</p><p>In this article we wish to explore a comprehensive risk assessment of further functioning of Dnieper hydroelectric cascade considering alternative options of usage of flooded areas and possible losses connected with future functioning of reservoirs and to develop the methodology of losses assessment connected with destruction of dams reservoirs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Characteristics of Flooded Areas and Options of Alternative Exploitation</head><p>As we already mentioned, in twenty-first century the hydroelectric power generation ceased to be a decisive factor in the energy balance. The GDP growth in 2000-2007 was not connected with an increase in production of electricity. During this period was an increase in production of cereals for which the usage of electricity was minimal. It is difficult to estimate the total social costs of flooded areas, and overall benefits from the functioning of large reservoirs of water. In addition, it is difficult to assess losses connected with deterioration of water quality due to the lack of flow. There are a lot of other aspects that do not prove the necessity and efficiency of the functioning of reservoirs. However, we will focus on two main aspects: 1) alternative usage of reservoir areas in agricultural production; 2) level of risk connected with further exploitation of reservoirs (dams of the Dnieper reservoirs). Dnieper cascade hydroelectric station was built during the period of planned economy, the first dam was built on Dnieper in 1927 (Zaporozhe) and the last in 1976 (Kanev). General characteristics of reservoirs and power plants are presented in Table <ref type="table" target="#tab_1">1</ref>. The total area of Dnieper reservoirs is 6.9 thousand sq. km, 1.1% of the territory of Ukraine (Table <ref type="table" target="#tab_1">1</ref>). But if we take into account that the territory near rivers area was always the most fertile for agricultural sector, it is necessary to assess the share of reservoirs in the volume of agricultural land, which is 1,7%. Not all agricultural lands are fertile that is why the factual area which is used in agricultural sectoris about 27 million hectares (270 thousand sq. km) with a standard deviation 0.8 million hectares <ref type="bibr">[4]</ref>. In this case, the share of the Dnieper reservoirs increases up to 2.6% of the area used for agriculture.  <ref type="bibr">[4]</ref> Compare the coast of total volume of products available through agricultural production from flooded areas after the creation reservoirs, and the cost of electricity generated by hydroelectric Dnieper cascade. General characteristics of reservoirs and their electricity generation capacity is presented in Table <ref type="table" target="#tab_0">2</ref>. From the total area of reservoirs we extracted the natural are of water surface using natural characteristics of the Dnieper and obtained the size of flooded areas which potentially could be used in agricultural sector.</p><p>The area of flooded territory is 6 thousand. sq. km. Dnieper cascade which consists of six hydroelectric power plant produce 10 billion kw * hr. per year, (40% are produced by Dnieper, 15% by Kremenchuk and15% by Kakhovska, 13% by Dniprodzerzhynsk, 10% by Kaniv, 7% by Kyiv. Dnieper hydropower station (HPS) has the best ratio of natural areas to the area of the reservoir -38% and the worst ration has Kyiv HPS -5%. We will explore the possibilities of obtaining agricultural production in flooded areas, we will start from evaluation of the efficiency of agricultural areas during last four years. Due to the high risk of the agricultural sector we use averaged indicator of efficiency during four last the years (Table <ref type="table" target="#tab_21">3</ref>).We obtained the indicator of efficiency of the usage of 1 thousand square kilometer of flooded areas which is equal o 0.89 billion UAH (prices of 2012), with a standard error of 0.03 billion. This means that we can get agricultural products at total value of 5.4 billion UAH (with a standard error of 0.2 billion) from flooded territories which are under Dnieper cascade The value of electricity produced during a year and financial value of potential agricultural products are presented inTable 4.</p><p>We introduce the concept of efficiency of areas of separated reservoirs as the ratio of the value of the annual volume of electricity produced to the potential value of agricultural products that can be grown on flooded areas. The total amount of the value of electricity produced is significantly less than the potential value of agricultural products that can be grown on the flooded areas, the value of electricity is only 60% of the potential value of grown agricultural products relative to the average indicator of Ukraine agricultural productivity. Graphical representation of efficiency for certain reservoirs is shown in Figure <ref type="figure" target="#fig_0">1</ref>. Data in Table <ref type="table" target="#tab_9">4</ref> show that the efficiency of the flooded areas is significantly different for different reservoirs. The most effective reservoir is Dnieper HPS, because it was built in the place where the flow of Dnieper is rather fast (significant differences in levels). Further construction of power hydro stations led to the flooding of large areas that would have greater value if they were used in agricultural sector.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Risks Evaluation of Further Dnieper Cascade Functioning</head><p>All possible losses connected with functioning of reservoirs are not limited to the wastage of flooded areas. The general scheme of the risks evaluation of further functioning of reservoirs is presented in Figure <ref type="figure" target="#fig_1">2</ref>. They can be divided into three groups: economic, technological and environmental.</p><p>We made an attempt to assess the expected total annual losses L which consist of economicalеk L ; ecologicalekol L ; and technological -t L :</p><formula xml:id="formula_188">t ekol еk L L L L    (1)</formula><p>In the first approximation economic losses are equal to the difference between the price of potential agricultural products ap V and the value of producing electric energy Environmental risk in a first approximation must be evaluated on the basis of cost of measures aimed to bring the mass of water in the reservoir (with absence of flow) to state of the river water.</p><p>The most difficult to evaluate are technological (man-made) risks, which present both static (regular repair of dams, measures aimed to support state reservoirs) and stochastic components. The latter is relevant to the possibility of artificial tsunami due to partial or complete destruction of the dam. Taking into account the global statistics the probability of the destruction of the dam is evaluated around 0.01% <ref type="bibr">[14]</ref>. At first glance it is a small probability and it seems that is can be ignored, but the evaluation of the probability of depressurization of the reactor of Chernobyl type was considered lower for two orders of magnitude (0.0001%), which did not prevent this to happen. We evaluate the risk of man-made reservoir functioning for each reservoir. The potential energy that depends of the height of the dam and of the volume of reservoir after the destruction of the dam creates an artificial tsunami (Table <ref type="table" target="#tab_0">2</ref>). We wish to explore the least effective case (Table <ref type="table" target="#tab_9">4</ref>) and the most dangerous in terms of potential losses-Kyiv reservoir.</p><p>The approximate evaluation of the power of the artificial tsunami in case of destruction of the dam of Kyiv HPS can be calculated on the basis of the potential energy of water masses and sludge. The volume of the Kyiv reservoir is 3730 million ton. (Table <ref type="table" target="#tab_0">2</ref>) to which we add 90 million tons of radioactive sludge <ref type="bibr">[8]</ref>. The average depth of reservoir is 4m and the average height of dam is 11.5m, dam reservoir center of gravity is situated at a height of 9.5 m according to the water level of the Dnieper River after the dam. That is why the potential energy of artificial tsunami that threatens Kyiv is: </p><formula xml:id="formula_189">s m g m м м h kg m J g h m E ц                   (3)</formula><p>According to the energetic characteristics the potential tsunami that threatens Kyiv is equal to five nuclear charges dropped during the Second World War on Hiroshima (15-20 kt. TNT) <ref type="bibr">[15]</ref>. Of course, the shock effect of nuclear explosion and artificial tsunamis is difficult to compare because the shock wave in the first case expands at speed exceeding the speed of sound and artificial tsunami speed is determined by the depth of the Dnieper, and taking into consideration the depth of Dniper the speed will not exceed 30 km / h.).</p><p>The situation is complicated by the presence of 90 million tons of radioactive sludge at the bottom of the reservoir, the presence of which can contribute significantly to strengthening of the effects of artificial tsunami and the risk of radioactive contamination of the Dnieper and coastal areas to Kanev reservoir. In the case of this scenario, 10% of Kyiv may be contaminated <ref type="bibr">[9]</ref>. Similar characteristics are calculated for each of the reservoirs (Table <ref type="table" target="#tab_0">2</ref>). Kremenchuk and Kakhovka reservoirs have the highest level of risk connected with emergance of artificial tsunami, it can be explained by volume of the accumulated water.</p><p>Losses caused by artificial tsunami in certain time t due to the violation of the integrity of the dam are proportional to the product of the tsunami energy ( ts E ) and cost values (urban infrastructure) located in the area of artificial tsunami( ots S ):</p><formula xml:id="formula_190">ots ts t S E k L    (4)</formula><p>where, kcoefficient of dimension J -1 , which can be determined only empirically.</p><p>The expected losses:</p><formula xml:id="formula_191">t t L p L   (5) Variance: p L L p p L p t t t           2 2 2 ) 1 ( (6) Losses in confidence level α - ) ) ( (      L L p L [13]: ), ( p x p L p L x L L t t t         (7)</formula><p>where </p><p>x -quantile of the normal distribution.</p><p>We make an assessment of potential losses of Kyiv which can be caused by the potential of artificial tsunami concentrated in the Kiev reservoir.</p><p>Up to 10% of the houses located in Kyiv according to the evaluation of hydrologists are under the tsunami risk. The volume of living area in houses in Kyiv is 62.2 million square meters <ref type="bibr">[5]</ref>. The cost of 10% of Kiev buildings, at an average price of 0.5 thousand dollars per sq. m, is 3.1 billion USD. Hence, the expected losses for a given probability of violating the integrity of the dam is 3•10 5 dollars. Losses in confidence level α: 3</p><formula xml:id="formula_192">) (                   p x p L p L x L L t t t    (8)</formula><p>This means that the annual potential losses from the use of the Kiev reservoir taking into account the risk of man-made tsunami are near 51 million USD.</p><p>After analyzing potential threats and possible damage, which can be caused by artificial tsunami in Kyiv we cannot propose the immediate dismantling of all the dams on the river Dnieper. The data in Table <ref type="table" target="#tab_0">2</ref> on artificial potential energy of the tsunami should be supplemented by information connected with potential losses according expression <ref type="bibr">(8)</ref>. There must be made a forecast of losses caused by the destruction of the reservoirs. After all the calculations, we can evaluate the hazard rank of every reservoir and thus offer the procedure of their disassembling in order to restore the natural state of the Dnieper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>New information technologies and development of the theory of environmental management leads to a revision of the main concepts of the planned economy. Thus it leads to the change of our view on necessity and efficiency of functioning of hydropower stations. We analyzed the energetic efficiency of certain reservoirs on the basis of an alternative use of the flooded territory in agriculture. Energy efficiency of different reservoirs is rather different. A significant share of electricity is produced by Dnieper hydropower station, thus there is an opportunity of gradual transition to use of updating energy sources that do not threaten energy security. Therefore, the final decision about dismantling of hydropower stations should be made on the basis of comprehensive assessment of economic-ecological efficiency and evaluation of losses which can be caused by man-made tsunami.</p><p>We propose a complex approach to risk assessment of use of the Dnieper cascade hydropower station. We use a stochastic method of assessment of potential losses connected with the use of Dnieper reservoirs in order to assess the losses, which can be caused by violation of the integrity of the dam. We evaluated the potential losses of man-made tsunami for Kyiv reservoir. In the research was made evaluation of the potential hazards of each of the Dnieper reservoirs which can be caused by man-made tsunami. On the basis of the achieved results we ranked the reservoirs according to the degree of economic insecurity.</p><p>Transformation of the of the key symbol of the Ukrainian state of rapid flow into the system of stagnated reservoirs has no economic reasons taking into account that hydropower stations produce only 5% of the electricity of the total amount and the flooded areas can be used more efficiently. are more effectively use the flooded areas.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The current state of the Ukrainian economy is most difficult. Government reforms which were decelerated have had a decisive impact on the further development of Ukraine as an independent nation. However, questions arise as to what the mechanism for implementing such reforms should be, and to the usefulness of implementing policies on the basis of foreign experience. The past few years show that most of the changes in the economy of Ukraine were as a result of taking into account foreign experience. However, applying such experience does not always result in the intended manner. One reason is that foreign policy examples were implemented quite imperfectly in the Ukrainian economy. Another reason is the underestimation of the time needed to properly implement reforms. Thirdly, one of the most significant reasons is the unexpected behavioral response of Ukrainian economic agents, which was quite different to reactions in other countries.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Theoretical and Methodological Background</head><p>Groundbreaking research work on understanding the fundamentals of the behavior of economic agents has been published by the leading scientists of institutional theory. In particular, D. North was one of the first who proved the existence of anomalies in an economy and finance that cannot be explained solely on the basis of economic laws (D. <ref type="bibr" target="#b268">North, 1990</ref>).</p><p>J. Buchanan was one of the first who explained the role of social choice in the development of an economy and the reaction of economic agents on political decisions (J. <ref type="bibr" target="#b269">Buchanan and G. Tullock, 1962)</ref>. J. Stiglitz deeply investigated the causes of the global economic crisis of 2008, revealing the behavioral aspects and further consequences for a society (J. <ref type="bibr">Stiglitz, 2011)</ref>.</p><p>Research by Ukrainian scientists on the behavioral aspects of financial anomalies has been essentially unstructured. O. Pruts′ka explains how differences in the development of various societies are marked by reactions by members of the society to different types of externalities (O. Pruts'ka, 2003). A. Gritsenko has described aspects of economic anomalies in the economy of Ukraine and developed a classification of them (A. Gritsenko, 2003). V. Vishnevsky has researched the causes of financial anomalies (V. Vishnevsky, 2006). R. Pustovìjt has investigated the nature of transaction costs in the economy of Ukraine (R. Pustovìjt, 2004). Y. Ivanov and O. Jeskov maintain that one of the reasons for the failures of many reforms are attempts by the government to remedy the mistakes of the past without considering possible reactions by economic agents in the present (Y. <ref type="bibr">Ivanov and O. Jeskov, 2007)</ref>.</p><p>The causes and nature of financial anomalies in the economy of Ukraine have been studied using various methodological principles. Firstly, work was done on the basis of theoretical judgments and generalizations (O. Pruts'ka, 2003, A. Gritsenko, 2003), and secondly, using the tools of economics and mathematical modeling. Here arises another problem, because not all tools can be applied. For example, the use of correlation-regression analysis provides opportunity to describe the behavior of a group of agents (rather than the reaction of one agent) in specific terms for a specified period of time. This means that the use of predictive models based on data correlation for past periods could be incorrect. This explains the miscalculations in the development of state budgets, the failure of the planned indicators of budget, etc.</p><p>In this case, more accurate the results would be reached by fuzzy logic simulation modeling (V. Vishnevsky, 2006; O. Rajevnieva, 2007). However, in my opinion, such research should be complemented by the results of the application of game theory. It is a toolkit game theory and can explain the reasons for the behavior of each economic entity in a relevant situation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Efficiency Estimation Procedure</head><p>The recent stage of development of the Ukrainian economy is characterized by a number of financial anomalies, which have been described in the publications of A. <ref type="bibr" target="#b272">Grytsenko (2003)</ref>, T. Paientko (2013), etc. Among the major financial anomalies are the following:</p><p>1</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>. Deformed structure of economy of Ukraine, in which the dynamic development of the financial sector has not contributed to an increase in the volume of funding to the non-financial corporation sector. This issue is explored in detail in the article by T. Paientko and Y. Syrotiuk (2014).</head><p>The problem lies in the fact that the growth of the assets of financial institutions does not ensure the necessary growth of investments in the non-financial corporation sector of the economy. The crisis in Ukraine has further worsened the situation regarding financing in that sector of the economy. First, bank lending has been actually paralyzed. The increases of the NBU discount rate initially to 19.5%, and then to 30%, have actually robbed banks of real opportunities to inject funds into the economy.</p><p>Secondly, in 2014-2015, 39 banks declared insolvency, and most banks have problems with liquidity and the ability to return deposits to customers. This was one of the causes of the bank panic and the outflow of deposits. The situation involving savers has worsened the steep inflation and devaluation.</p><p>Thirdly, problems with solvency have affected many insurance companies. This happened because they were placing their reserves mainly as deposits in banks, including those who have since become insolvent. Fourthly, mass poverty is developing within Ukraine, and that part of the population which forms the bulk of the depositors now appears on the brink of poverty.</p><p>Thus, the financial sector now finds itself on the brink of survival. The situation exists where the greater part of the population believes there is nowhere to invest. Furthermore, that part of the population that has savings in foreign currency will soon not be willing to inject funds into the financial sector. The behavior of economic agents in such situations can be described by using a toolkit of game theory. These are the possible strategies of a depositor and a bank:</p><p>1. The depositor puts money into a deposit account and the interest rate exceeds the rate of inflation (payout 1).</p><p>2. The depositor invests in a deposit account and the interest rate is lower than the level of inflation (payout 0).</p><p>3. The depositor puts money on deposit and the interest rate is lower than the inflation rate and the rate of devaluation (payout -1).</p><p>4. The bank is ready to return the deposit by the end of the term together with interest (payout 1).</p><p>5. Temporary administration will be introduced in the bank during the term of the deposit. The depositor will receive compensation from the fund of guaranteeing deposits of individuals (payout 0).</p><p>6. Temporary administration will be introduced in the Bank during the term of the deposit. The depositor will not receive compensation (payout -1).</p><p>Then the payout matrix will look this way (table <ref type="table" target="#tab_1">1</ref>):</p><p>Table <ref type="table" target="#tab_1">1</ref>. The matrix of payouts of the depositor and the bank Bank (4) Bank ( <ref type="formula" target="#formula_47">5</ref>) Bank ( <ref type="formula" target="#formula_5">6</ref>) Depositor <ref type="bibr">(1)</ref> (1; 1)</p><formula xml:id="formula_193">(1;0) (1; -1) Depositor (2) (0;1) (0;0) (0; -1) Depositor (3) (-1;1) (-1;0) (-1; -1) N.B. -1, 2, 3, 4, 5, 6</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>are strategies</head><p>As can be seen from the table, there is only one equilibrium strategy which provides a payout for both sides -(1; 1), which is possible with a probability of 1/9. Two strategies (0; 1) and (0; 0) do not provide payout for the depositor, with probability 2/9. The other strategies are without payout for the depositor with the probability of 6/9. Potential depositors are unlikely to trust their savings to a bank because of this combination of circumstances.</p><p>There is a dilemma in such situations: the non-financial corporation sector of the economy requires an increase in funding, and the financial sector cannot provide it as a result of the outflow of funds. To overcome the described abnormalities, the government should take measures to stimulate the growth of personal savings. Reducing real income leads to a lower limit in the propensity to save. The drop in the propensity to save is now faster than the fall in real income.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Lack of correlation between the decrease in the tax burden and the dynamics of foreign investment in Ukraine's economy.</head><p>This situation is also a financial anomaly caused by several institutional factors. Over the past twenty years, the Ukrainian government instituted significant tax benefits and other preferences for foreign investors. However, within the post-socialist space Ukraine remains an outsider in the attraction of foreign investments per capita. In addition, most foreign investment is coming into Ukraine from regions where there exists a more favorable investment climate, offshore entities, and Russia (table <ref type="table" target="#tab_0">2</ref>). As is evident from the data presented in table 2, the largest volume of foreign investment in Ukraine's economy is coming from Cyprus. In its essence it is not an investment, but the return of capital removed previously from Ukraine. In most developed economies, providing tax incentives to foreign investors provides an increase in foreign investment. In Ukraine, this tool does not work. According to the World Investment Report and Ranking, the reduction of business taxation is not a determining factor when deciding on investing in Ukraine. Even before the beginning of the armed conflict, key analysts and potential investors indicated greater concern over the issues of the low level of protection of property rights and the high level of corruption. Domestic investors are also not actively investing in the domestic economy. On the contrary, much of the internal capital has been removed from Ukraine. This is an extra negative indicator for foreign investors.</p><p>Investors (domestic or foreign) make investment decisions taking into account the following probabilities:</p><p>1. The government will change the rules of the game and preferences for foreign investors will be eliminatedp (А).</p><p>2. The prevalence of bribingq (B).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The infringement of ownership rights of the investor -1-(p+q) (C).</head><p>Probable scenarios of the government can be described as follows:</p><p>1. An investor makes a decision about investing in the Ukrainian economy in spite of the existing risks. Investments are long-term. This is an absolute win for the economy, which denotes 2 (if we assume that 0 is the loss to the state in the absence of investment).</p><p>2. The investor does not assume all of the risk, but decides to invest in the economy. However, such investment is generally directed into short term projects intended for a fast return. Under such circumstances the economy would win, but it is smaller than the previous version -1 (B).</p><p>3. The investor takes no risks and decides not to invest in these conditions (C). The described version is a game that will repeat. There is the possibility that a future investor will change his course of action. However, the probability of investor choices changing depends on how the government shapes the business environment. The payoff matrix is presented in table <ref type="table" target="#tab_21">3</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Source: compiled by author</head><p>In this case the probability of investor payout can be described as:</p><p>The probability in a change of rules of the game initiated by the government:</p><formula xml:id="formula_194">p+q+0(1 -(p+q)= p+q</formula><p>The probability of a bribe being requested:</p><formula xml:id="formula_195">p+2q -1 (1 -(p+q)) = 2p+3q-1</formula><p>The probability of infringement on ownership rights: 2pq + 0(1 -(p+q) = 2p -q All three options can be equally acceptable for domestic investors. As in the case of limited foreign investment the cost of domestic investment increases. However, this must be true: p+q = 2p+3q-1 = 2p -q</p><p>Having solved the equation, we obtain: q = ¼, p = ½, (1p -q) = ¼ So, the most decisive factor for investors is a change of the rules of the game by the government. They believe that this risk is the largest. However, you can see that the risk of bribing or infringement of rights is smaller. The risks do not stand alone. Their real impact is expressed only with the risk of changes to the rules of the game. It means that q = (1pq) =¾. Under such conditions the likelihood of foreign investment is preserved. However, it would likely be short-term investments in projects with a fast turn-around period. Therefore, an improvement in the investment climate in Ukraine provides for a stabilization of the rules of the game for the investor. The investor should be guaranteed that the rules of the game would not change within a fixed period of time.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Lack of correlation between the size of the tax burden and the dynamics of the informal sector of the economy.</head><p>One of the greatest problems for the Ukrainian economy is the degree of its shadow economy. According to various experts the volume of the shadow economy in Ukraine constitutes 40% (according to the Ministry of Economic Development and Trade of Ukraine) to 80% (estimated by the Schneider Institute). There is a misconception that the shadow sector of the economy in Ukraine was formed after the breakup of the Soviet Union. However, shadow economic activity existed in the times of the USSR.</p><p>The policy of "war communism" <ref type="bibr">(1918)</ref><ref type="bibr">(1919)</ref><ref type="bibr">(1920)</ref><ref type="bibr">(1921)</ref>, from the outset, carried within elements of shady dealings. It meant that the government resorted to violent methods and centralized administrative pressures to accomplish their own goals. In those times speculation, gangsterism, and robbery developed rapidly (R. Viseberg, 1925, p. 43). In the time of Stalin about 30% of production was embezzled from socialist enterprises, and about a quarter of the resources redistributed centrally was not by intention.</p><p>A sharp reduction in the non-government sector in the late 1950searly 1960s, contributed to the further development of the informal sector of the economy. Commercial cooperatives were eliminated in that period, the final transition from state farms to collective farms happened, prohibitions of individual trade restrictions on keeping personal subsidiary plots were decelerated, as was the ban on the holding of cattle, etc. A trend towards further consolidation of production, an increasing phenomena of monopolies in economics, ideological mandates proclaiming a further transition to communism -all these factors shaped an economy with dual sectors − official and shadow, which interacted with one another. Thus began the emergence of speculative markets, clandestine workshops, black marketeers and speculators in foreign currency. According to modern estimates, the 1960s saw that unofficial production supplied 20% of industrial products, 40% of food products, and about 35-45% of all scarce consumer goods was made available through speculative markets.</p><p>During the era of Brezhnev, the shadow economy flourished and took almost an official color. By the beginning of the 1980s, all regions of the country began to encounter clandestine workshops, using the state's equipment, material, and energy resources, and funds. Production surpassed mandated limits which were set by the State Supply and State Planning Commission, and the income was widely distributed (T. <ref type="bibr" target="#b280">Koriagina, 1990)</ref>. This shadow economy, tolerated by Leonid Brezhnev, yielded by the most generous estimates 10-15% of GDP, and then rose to 50% of GDP in the period before "Perestroyka". The level of corruption between 1980-1985 in the Soviet Union put it in the middle of a ranking of 54 countries, having a larger bureaucracy than Italy, Greece, Portugal, South Korea and virtually all developing countries.</p><p>In the USSR at the beginning of the 1990s, the volume of the shadow sector was assessed to be in the amount of 100 billion rubles by average valuation, 20-25 billion rubles from the most conservative, and some pegged it at 150 billion rubles. In comparison with the beginning of the 1960s, the growth of the scale of the shadow economy across the whole range of ratings was from 4 to 30 times (T. <ref type="bibr" target="#b280">Koriagina, 1990)</ref>.</p><p>With the collapse of the USSR the Soviet shadow economy ended. However, shadow economies began to resurface in the individual independent republics, and the specific conditions and trends within each new country determined the dynamics and scope of illegal operations. According to various estimates the volume of the Ukrainian shadow economy at the beginning of its existence as an independent state (1991) was estimated at 18% of GDP. Thus, the Government had from the outset made an error in believing the tax burden was the main factor in the development of the shadow economy in Ukraine. It ignored other contributing factors for the development of a reducing shadow economy. Therefore, the reaction of the economic agents was not as expected by the government.</p><p>After the collapse of the USSR the shadow sector continued to grow. A decisive role in this was played not only by irrational tax policy. The development of shadow economic activity contributed to hyperinflation, an increase in bartering, and the opportunistic behavior of civil servants, etc. The growth of the tax burden in the period 1991-1996 also played a negative role. However, we are not merely noting the direct interdependence between the sum of money required to pay for the benefit of the government, and the amount of shadow activities. A principle motive of shadow economic relations and tax evasion was that taxpayers did not trust the government to responsibly use tax revenues to the benefit of the greater society. This type of economic agent truly believed that they could better use the savings than had the government had the funds.</p><p>For an explanation of the behavior of economic agents, it is advisable to use a model of expected utility, which was developed by Von Neumann and Morgenstern <ref type="bibr">(Von Neumann and Morgenstern, 1970)</ref>. According to the standard model of choice in conditions of uncertainty for taxpayers, it is also a game. They estimate the payment of taxes in accordance with the expected utility. In conditions of uncertainty, such behavior is described by the prospects theory. In general this theory is as follows: Assume, the taxpayer has to play a lottery (x, p, q; y). This means that the lottery has a result x with probability p and the result y with a probability of q. The taxpayer assesses this lottery this way (1): This theory has three important features. First, the value of winnings and losses are defined separately. This is consistent with the analysis of games and the choice of people in conditions of risk. Second, it is a form of function values. Function is concave in the interval of winnings and convex in the range of losses. This means that taxpayers are shunning risk in the winning area and attaching risk to the losses area. The function values must be 0 at the point of starting. It means there is more extreme sensitivity to losses than to gains. This trait is called avoidance of losses. The third feature is the nonlinear transformation of probability π (p). Unlike probability p, π (p) is a weight that provides an objective probability when making decisions. As a rule π (p) = p, but π (р)&lt;р for large p. Small probability receives a relatively large weight, with π (р)˃р (A. <ref type="bibr">Lukashov, 2004, pp. 40-41)</ref>.</p><formula xml:id="formula_196">π(p) v(x) + π (q) v (y)<label>(1)</label></formula><p>Function definition of weight is also characterized by subcertainty property: for all 0&lt;р&lt;1, π(р)+π(1-р)&lt;1. The principle of incomplete probability describes the attitude of people to probable events. The weight of the two probabilities of complementary events is less than the weight of the one event that must occur with a probability of 100%.</p><p>Taxpayers are more sensitive to the difference in probability at its higher levels. According to experimental data, taxpayers would surely want to hide 10,000 UAH in taxes at 100% certainty than receive social benefits from the state totaling 12,000 UAH with a probability of 80% that they would appear, while taxpayers believe that it is better to have 12,000 UAH with a 20% probability, than 10,000 UAH with a probability of 25%. According to prospects theory:</p><p>(2) So, a 20 point increase in the probability of 0.8 to 1.0 has a greater effect than an increase from 0.2 to 0.25. Therefore, lowering the tax rate on corporate income in 2004 (from 30 to 25%) did not cause a reduction of the shadow economy since the probability of the growth of volumes of goods from the government was less than the amount of unpaid taxes. Lowering the tax rate on corporate income between 2010 to 2014 (from 25% to 18%) also did not contribute to a reduction of the shadow economy. Since the weight of probability of winning from the non-payment of taxes exceeds the probability of a return of government benefits. Based on the foregoing, the key factor in the reduction of the informal sector of the economy is changing the behavior of the government, not the reduction of the tax burden.</p><p>Taking into account the results of research of previous financial anomalies, one can expect businesses to exit from the shadows if the following conditions can be fulfilled:</p><p>1. A change in the behavior of the government. Taxpayers must trust how taxes are being utilized.</p><p>2. Preservation of property rights should be guaranteed and not merely proclaimed.</p><p>The next financial anomaly is closely associated with the above-described situation. It is possible to explain how to use game theory (a zero sum game) by using the model of expected utility and prospects approach. However, the best model in this case would be the principal-agent theory.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Lack of meaningful communication between established punitive sanctions for violations of tax legislation and the level of taxes.</head><p>Low taxes are the problem, which every Government in Ukraine is trying to overcome. To improve the level of payments of taxes administrative methods were mainly applied. In particular, there was an increase in the number of grounds for carrying out unscheduled inspections and increasing the size of penalties. However, this failed to achieve the desired level of tax payments. Also, the activities of tax officials is characterized by low efficiency (tabl. 4). As can be seen from table <ref type="table" target="#tab_9">4</ref>, even in those years when there was a growth in the shadow economy (2012-2013), large increases of revenues to the budget from punitive penalties did not occur. The tax police did not execute one of their main functionsto provide reimbursement of losses by the government.</p><p>Throughout 1997-2015, the government tried to increase the size of penalties for violations of tax legislation several times. However, the discipline of taxpayers has not changed. The approach used by regulatory agencies prior to the imposition of penalties has not changed. Each year, the regulatory agencies set a planned amount of punitive penalties. This means that the same amount of fines would have to be recovered from taxpayers by the regulators. If the amount was less, then the head of the relevant local authority would have to explain why the targets had not been reached. If the amount collected was greater, then the following year the planned penalty targets would be increased.</p><p>Such an approach was borrowed from Soviet times. It is false from the very beginning. It thwarted an opportunity to build partnerships between the government and the taxpayer. It violates clause 4.1.4 Article 4 of the tax code of Ukraine about a presumption of legality. Also, the actions of regulatory authorities often violate clause 4.1.2 c. 4 of the tax code of Ukraine on the equality of all taxpayers. In practice, it has not been uncommon to have cases of selective application of penalties. Such cases discredit the image of the government and are not conducive to an increase in the level of trust.</p><p>The question arises as to why these facts have a place. Indeed, at first glance, this behavior is aberrant. This anomaly can be explained in terms of the theory of agency relations. In this situation, the government is the principle. It sets the rules of the game, based on existing information. However, the information is incomplete. Regulators and taxpayers are agents who in real life have more information on a specific situation.</p><p>It is a situation where both agents, if they want to be profitable, must behave opportunistically. The taxpayer knows that in any case he will have to pay a penalty (a plan of fines). The tax inspector must collect a minimum amount of fines. They are not interested in overfulfillment of the plan. It is easier for taxpayers and a tax inspector to engage in conspiracy and agree on the amount of the penalty. As a result, the taxpayer may violate tax law and not expect a higher responsibility than that agreed. Instead, the inspector receives a bribe and there is a loss of appropriate fines and charges. There is a fairly simple way out of this situation. The government should cancel the plan for punitive sanctions and reduce the number of cases of direct communication of the taxpayer and the controller.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>The described financial anomalies have a serious negative impact on the potential for economic development. In terms of the theory of behavioral finance, the situation is described as abnormal. They are the behavior reactions of economic agents to the challenges of the environment. The economic policy of the government should consider not only the potential economic effects, but also the expected behavioral response of economic agents. During the development of the economic policy of the government must pay attention primarily to such behavioral aspects:</p><p>1. Economic agents make decisions based on available information. Therefore, information about the real economic situation should be fully disclosed. This will reduce the information asymmetry in the relationship of the government to the economic agent.</p><p>2. Economic agents make decisions based on the maximization of value, utility, and the expected probability of receiving benefits. Therefore, the government should ensure the provision of quality public benefits on the basis of tax revenues.</p><p>3. Economic agents invest in the economy if there is a guarantee of preservation of property rights. For the investor, the decisive factor is that the rules of the game remain constant from the government during the term of the investment. Therefore, the government must ensure the stability of conditions for investment over long-term periods.</p><p>In essence, consider behavioral aspects when developing economic policies to overcome existing financial anomalies and to avoid the emergence of new ones.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The unstable macroeconomic situation in Ukraine and the crisis of the banking system caused distrust in the banking institutions. According to the opinion of experts, the Ukrainian population kept at home cash equivalent to $10 billion USA. In recent years was observed the following tendency: in 2014 banks lost deposits in the amount of 126 billion UAH, and around 18 billion UAH during first two months of the current year <ref type="bibr">[3]</ref>. However, storage of money at home has several disadvantages: for example lack of income from capital and high risks, which lead to additional costs for the implementation of the safety of their own homes and significantly decrease the level of living.</p><p>Banking experts usually advise to divide money into three equal parts, two of which are nominated into euros and US dollars according to the current exchange rate, and put on deposit accounts in different banks which can be considered reliable (it is advisable to choose banks which are included in the deposit insurance program NBU) and wait for interests during this period (simple diversification). Unfortunately, this method is connected with difficulties. It is almost impossibile to convert legally the accumulated funds into any reliable currency, besides it is rather difficult to find a reliable bank. This study is limited to two currencies -US dollars and euros, however, presented method can be used to form a deposit portfolio using other currencies.</p><p>There are two approaches to the portfolio optimization problem: risk minimization at a given minimum return and return maximization for a given maximum risk. For portfolio optimization you need to determine in which currency to evaluate the result. We can ask a question: "Why do we save money?" The answer can be the following: "In order to increase consumption during our life (real estate, household appliances, automobiles, traveling)" <ref type="bibr">[2]</ref>. The vast majority of consumed goods in Ukraine are produced outside the country and therefore it is better to measure the cost by the most stable currency, which is now can be considered the US dollar. Alan Greenspan devoted attention to keeping a low dollar inflation level than in the past since such a policy, combined with the larger predictability of monetary policy, contributed to making dollar capital denomination most attractive <ref type="bibr">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Markowitz Problem under Devaluation Condition</head><p>The Markowitz's portfolio optimization problem can be solved using the wellknown term of return and risk (variance of return) components portfolio. If return is measured as the deposit interest, the rate of risk is measured by its dispersion <ref type="bibr">[4]</ref>. Linear model was proposed for credit risks in order to maximize bank profit <ref type="bibr">[6,</ref><ref type="bibr">10]</ref>. However, there is a factor that has a significant impact on the end result -an exchange rate risks, which is more important for unstable economics <ref type="bibr">[3]</ref>. Of course interests on deposit and credit accounts for exchange rate risks, as the interest on UAH deposit twice as much than the dollar deposit <ref type="bibr">[1,</ref><ref type="bibr">12]</ref>. The importance of foreign exchange component in the sustainability of the banking system was emphasized in a number of research <ref type="bibr">[5,</ref><ref type="bibr">13]</ref>. In this study we wish to evaluate the optimal structure of the deposit portfolio during economic turbulence and make a comparison between real and optimal structure deposit portfolio.</p><p>Exchange rate risks can be taken into account, if a devaluation matrix is specified. We will consider the case-study of placing deposits for one year. We assume that three macroeconomic situations, which determine the devaluation processes in the</p><formula xml:id="formula_197">country 3 2 1    ; ;</formula><p>, which are defined probabilities</p><formula xml:id="formula_198">   3 1 3 2 1 1 i i ) p ( p ; p ; p</formula><p>. Each situation corresponds to a certain devaluation factor relative to USD defined as the ratio of the exchange rate in a current moment to exchange rate what will be in a year. We will denote devaluation multiplier for each economic situations</p><formula xml:id="formula_199">) , , i ( i 3 2 1  </formula><p>. If we know the value of a random variable and the corresponding probabilities, we can estimate the expected value of depreciation factor and its variance:</p><formula xml:id="formula_200">            3 1 2 2 2 3 1 i i i ф i i i p ; p (1)</formula><p>Later we will consider the case of uniform distribution of devaluation multiplier.</p><formula xml:id="formula_201">If 1   then dominate devaluation expectations, if 1  </formula><p>then dominate revaluation expectations. There were short periods of revaluation of UAH, but we observe the tendency of devaluation according to results of any year.</p><p>It is supposed to use the share denominated in euro for deposit portfolio, which has currency instability relative to leading world currencies and the objective function is denominated in USD, we need to specify the expected devaluation and its variance in EUR against the USD for the next year. We will denote these parameters:</p><formula xml:id="formula_202">2   ;</formula><p>. In this formulation dollar deposits is completely risk-free, which is rather optimistic assumption. During the year, the interest on dollar deposits was changeable, which can be used as a risk assessment. We denote the variance of interests on USD deposits 2 $  . We assume that the current interest on USD deposits is in the interval 9-11% <ref type="bibr">[8]</ref> and is characterized by a uniform distribution, the dispersion interest is approximately equal</p><formula xml:id="formula_203">5 2 10 3 3     , $ .</formula><p>We consider the standard formulation of the Markowitz problem taking into account the expected devaluation (revaluation) processes.</p><p>We present the particles deposit portfolio in UAH, EUR and USD:</p><formula xml:id="formula_204">) d d d ( d ; d ; d 1 3 2 1 3 2 1    , percentage interests 3 2 1 r ; r ; r ) r r r ( 3 2 1  </formula><p>are ranged under level of risk of deflationary expectations. If an initial investment is t S than in a year the expected amount of the deposit portfolio and its dispersion will be:</p><p>.</p><formula xml:id="formula_205">), 1 ( ) 1 ( ) 1 ( 2 $ 2 2 3 2 2 2 2 2 2 2 1 2 3 3 2 2 1 1 1         t t t t t t t S d S d S d r S d r S d r S d S           (2)</formula><p>There are no members in portfolio variance that appear as a result of presence of the connection between return components of portfolio. The reason is that in this case independent devaluation processes influence on the profitability: euro and US dollar and the processes of devaluation of the national currency because of macroeconomic instability in the country. Therefore, we can assert absence of connection between return of the portfolio shares denominated in different currencies in the proposed formulation.</p><p>If the level of devaluation is high, the depositor will have loses</p><formula xml:id="formula_206">) S S ( t t  1</formula><p>, that is why we will limit the possible risk-free profit according to the interest which is equal to 3 r (the return of dollar deposits):</p><formula xml:id="formula_207">) r ( S ) r ( S d ) r ( S d ) r ( S d t t t t 3 3 3 2 2 1 1 1 1 1 1         <label>(3)</label></formula><p>From the last expression we can get maximum portfolio share of deposits denominated in UAH 1   :</p><formula xml:id="formula_208">      ) r ( r ) r r ( d d 1 3 3 2 2 1 1 1 (4)</formula><p>We estimate the maximum share of UAH deposits in terms of catastrophic devaluation in 2014. The difference in interests denominated in euros and dollars is less than 2%, the maximum value of the numerator is less than 0.01.</p><p>Devaluation multiplier for the previous year is approximately equal to 0.4 (8 USD / UAH 20 = 0.4). Interests on deposits are %; r 25 1  % r 10 3 </p><p>. Therefore, the share of UAH deposits in terms of landslide devaluation should not exceed 2%.   ). Devaluation multiplier EUR/USD has more natural character, when the equilibrium is set under the influence of many non-interrelated reasons and a stable tendency is missing. The stationary hypothesis of the exchange rate of EUR/USD can be proved if we explored a long time period. The same hypothesis for exchange rate of UAH/USD must be rejected because of a full asymmetry of devaluation multiplier relatively to unity level.</p><p>We consider the optimal portfolio structure in three cases: landslide devaluation from 43% to 150% -1 </p><p>); , (</p><formula xml:id="formula_209">7 0   moderate devaluation of 11% to 43% -2  ); , , ( 9 0 7 0   </formula><p>and a devaluation less than 11% -3</p><formula xml:id="formula_210"> ). 0 , 1 9 , 0 (   </formula><p>We regard the distribution of devaluation multiplier at each of the intervals being uniform.</p><p>We consider two possible states in the global financial market for devaluation multiplier for EUR/USD:</p><formula xml:id="formula_211">С 1  ) , , ( 0 1 8 0   </formula><p>and revaluation multiplier:</p><formula xml:id="formula_212">С 2  ) , , ( 2 1 0 1   </formula><p>. We present six possible situations that correspond to two situations of the world finance market (the euro-dollar) and three situations of devaluation in the domestic market (Table <ref type="table" target="#tab_1">1</ref>).</p><p>We have used interests of one-year deposits in banks of first group (the most reliable) to build optimization models. Of course, other banks interests can be significantly higher, but in this case it is necessary to increase the risk measures of bankruptcy probability due to the growth (receiving contributions under the insurance program of NBU connected with the loss of time and interest and primary contribution for more than 200 thousands UAH). We use the current annual deposit interests February 2015: %. 12 %; 13 %; 23 </p><formula xml:id="formula_213">$ 3 2 1       r r r r r r E U</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>); , ( </p><formula xml:id="formula_214">7 0   2  ); , , ( 9 0 7 0    3  ) 0 , 1 9 , 0 (    С 1  ) , , ( 0 1 8 0    3 2 3 2 10 3 3 9 0 10 5 7 55 0               , ; , , ; , 3 2 3 2 10 3 3 9 0 10 3 3 8 0               , ; , , ; ,</formula><formula xml:id="formula_215">              , ; , , ; , С 2  ) , , ( 2 1 0 1    3 2 3 2 10 8 0 05 1 10 5 7 55 0               , ; , , ; , 3 2 3 2 10 8 0 05 1 10 3 3 8 0               , ; , , ; , 2 2 10 8 0 05 1 10 8 0 95 0               , ; , , ; ,</formula><p>We consider the problem of calculation of the share of certain currencies in deposit portfolio that maximizes the return of the portfolio for a given maximum risk level, which is equal to variance of interests on USD deposits: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>. We obtain the following problem to be resolved for finding : ) ; ; ( ,</p><formula xml:id="formula_216">3 2 1 d d d d d  . , j , d , d , ) r ( r ) r r ( d d , S d S d S d max ) r ( S d ) r ( S d ) r ( S d S j n j j $ $ t t t t t t t 3 1 0 1 1 1 1 1 1 1 1 3 3 2 2 1 2 2 2 2 3 2 2 2 2 2 2 2 1 3 3 2 2 1 1 1                               (6)</formula><p>We analyze the results of the calculation of the structure of deposit portfolio with maximum return, depending on the situation in the global and domestic foreign currency markets (Table <ref type="table" target="#tab_0">2</ref>).</p><p>There are six situations according to the number of components in Table <ref type="table" target="#tab_0">2</ref>: (1, 1)moderate devaluation of the euro and the significant UAH depreciation; (1, 2) -moderate devaluation of the euro and the moderate devaluation of the UAH (1, 3) -moderate devaluation of the euro and slight currency depreciation; (2, 1) -moderate appreciation of the euro and the significant currency depreciation; (2, 2) -moderate appreciation of the euro and moderate currency depreciation; (2, 3) -moderate appreciation of the euro and the slight depreciation of the UAH.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2. Optimization of deposit portfolio according to the criterion of profit maximization</head><formula xml:id="formula_217">1  ); , ( 7 0   2  ); , , ( 9 0 7 0    3  ) 0 , 1 9 , 0 (    С 1  ) , , ( 0 1 8 0    12 1 1 0 0 1 , S ) ; ; ( d t    12 1 1 0 0 1 , S ) ; ; ( d t    1685 1 0 0 1 1 , S ) ; ; ( d t    С 2  ) , , ( 2 1 0 1    1685 1 27 0 73 0 0 1 , S ) , ; , ; ( d t    1685 1 27 0 73 0 0 1 , S ) , ; , ; ( d t    1865 1 0 1 0 1 , S ) ; ; ( d t   </formula><p>In cases (1, 1) and (1, 2) optimal portfolio contains only dollar deposits with certain return. In the case (1, 3) portfolio consists only of UAH deposits (the return is corrected to the expected depreciation up to 11.1%).</p><p>In cases (2, 1) and (2, 2) the same return is defined by 73% share of deposits nominated in euros and 27% of deposits nominated in dollars. In the case (2, 3) the return which is equal to 18.65% is defined by 100% share of euro deposit. However, it is better to based the assumptions on mathematical forecast about the structure of portfolio that depends on the probabilities of the external environment:  i p the probabil- ity of devaluation i state (i = 1,2, ..., k) cross currency exchange rate UAH/USD,  j q the probability of the depreciation of the j-th state (j = </p><formula xml:id="formula_218">    k i n j ij ij d p d 1 1 . (<label>7</label></formula><formula xml:id="formula_219">)</formula><p>We calculate the expected portfolio structure, assuming that the devaluation and revaluation expectations of the euro-dollar are equal.</p><p>(</p><formula xml:id="formula_220">5 0 2 1 , p p  </formula><p>), the first basic variant is calculated according to the assumption that all three devaluation states have the same devaluation probability (it is a situation of absolute uncertainty). That is why</p><formula xml:id="formula_221">6 1 / p ij </formula><p>. This is basic structure of the portfolio and its expected return: </p><formula xml:id="formula_222">     Б Б Б r d  .</formula><p>We consider pessimistic option in which the probability of a significant devaluation is twice higher than the probability of low, moderate devaluation and probabilities moderate devaluation is equal to the sum of probabilities of large and small devaluation: </p><formula xml:id="formula_223">        </formula><formula xml:id="formula_224">4 2      r d  .</formula><p>We consider optimistic option in which the probability of a significant devaluation is twice lower than the probability of moderate devaluation but the probability of moderate devaluation is equal to the sum of probabilities of significant and moderate devaluation: </p><formula xml:id="formula_225"> ij p         12 2 12</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>The last option is not different from the basic one. In macroeconomic environment and exchange rate instability, the banking system and its clients replace the unstable assets with stable, and this leads to an increase in dollarization of economy in general and the banking system in particular (this quantitative criteria is measured as the share of dollar deposits to the total amount of deposits <ref type="bibr">[5]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Historical Data Model Verification</head><p>Model verification can be made on the base of currency exchange rate (UAH/USD) measured for a long period of time and tendencies of the exchange rate of two main world currencies (EUR/USD). For model verification we use period of stable growth of Ukrainian economy from 2002 to 2007 year, which coincides with period exchange rate stability. We calculate the optimal portfolio structure for two periods: after-shock period 2002-2005 and pre-shock period 2006-2007 on the base of NBU data. Average annual deposit interests for this period is 10%; 5%; 6% and 14%; 9%; 9% (UAH, EUR, USD).</p><p>Maximum dispersion magnitude has increased in four times in comparison with previous calculations because of possibility of substantial changes in deposit interests for long period. Optimal portfolio structure has not UAH component in all six possible situation (table 3) for 2002-2005.   <ref type="bibr">(10)</ref> The expected portfolio structure, for this probability matrix and optimal structure portfolio for each of six situation: . </p><formula xml:id="formula_226">   r r r Є U 1  ); , ( 7 0   2  ); , , ( 9 0 7 0    3  ) 0 , 1 9 , 0 (    С 1  ) , , ( 0 1 8 0    06 1 1 0 0 1 , S ) ; ; ( d t    06 1 1 0 0 1 , S ) ; ; ( d t    06 1 1 0 0 1 , S ) ; ; ( d t    С 2  ) , , ( 2 1 0 1   <label>0685</label></formula><formula xml:id="formula_227">     r d</formula><p>This result differs from previously obtained for period of crisis. First of all, it concerns the full absence of UAH component, and secondly, much smaller proportion of the contributions in EUR. Both features are explained by ratio of key interests. Difference in interests in UAH was not enough to compensate devaluation risk of national currency, additional interests on USD deposits for EUR provided a small share of EUR deposits.</p><p>Optimal portfolio structure for pre-crisis period 2006-2007 differs in increasing share of EUR contribution because interests on USD EUR deposits were equal, UAH share is still equal to zero (Table <ref type="table" target="#tab_9">4</ref>).</p><p>The expected portfolio structure for 2006-2007 years: </p><formula xml:id="formula_228">   r r r Є U 1  ); , ( 7 0   2  ); , , ( 9 0 7 0    3  ) 0 , 1 9 , 0 (    С 1  ) , , ( 0 1 8 0    09 1 1 0 0 1 , S ) ; ; ( d t    09 1 1 0 0 1 , S ) ; ; ( d t    09 1 1 0 0 1 , S ) ; ; ( d t    С 2  ) , , ( 2 1 0 1    1336 1 2 0 8 0 0 1 , S ) , ; , ; ( d t    1336 1 2 0 8 0 0 1 , S ) , ; , ; ( d t    1336 1 2 0 8 0 0 1 , S ) , ; , ; ( d t   </formula><p>But real structure of bank deposits at that period did not correspond to optimal decision, population prefered UAH deposits because of fixed interests and higher return.</p><p>It was thought that the strategy of the fixed exchange rate provided a decrease in the level of dollarization of economy, which is defined as a ratio of foreign currency deposits to all deposits. At this entire interval optimal strategy without risk accounting consists of two key points: borrowing in foreign currency and placing of savings in the national currency. At that time, nobody knew when the period macroeconomic stability would be over, but now it has become clear that the financial crisis was only a trigger for the system that was ready to collapse. UAH savers and currency borrowers who were unable to complete their operations before 2008 crisis had losses. Banking customer behavior on the interval of economic growth can be considered on the basis of the theory of "focusing illusion" <ref type="bibr">[9]</ref> when banker clients exaggerate the importance of one factor (fixed course), neglecting the influence of other factors, the effect of which may lead to opposite results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>In this research we calculated maximum profitability three components UAH, EUR, USD deposit portfolio structure (targeted function is denominated in US dollars) with risk degree limitations in the economic growth period and periods of macroeconomic instability. The exchange rate instability is regarded as main cause of deposit risks and formalized by the relationship of current currency price to currency price which will be in a year (devaluation multiplier).</p><p>Long time devaluation multiplier factor analysis gave possibility to evaluate probabilities of six possible different devaluation (revaluation) situation for pairs UAH/USD and EUR/USD. The optimal solutions were obtained for each of the six possible different situations and for three interest options (two options during economic growth and one during the period of economic turbulence). Expected deposit portfolio was determined in conditions of macroeconomic instability for three possible choices: basic (probabilities of all states are equal), pessimistic (probability of a significant UAH devaluation is twice higher than the probability of minor devaluation) and optimistic (probability of a significant devaluation is twice less than the probability minor devaluation). For optimistic option the part of UAH deposit must be not more than 17%, in other situation expected UAH part must be not more than 8%.</p><p>Optimal portfolio structure in a period of economic grows has not UAH component because of a small difference in the interests of UAH deposits and EUR, USD deposits. But this difference was enough to provide preferred growth UAH denominated deposits. The reasons of this phenomenon is overconfidence of the clients of banking system in UAH stability caused by fixed exchange rate according to NBU strategy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The current phase of civilization development is characterized by drastic transformations in all spheres of life: from culture and sport to politics and economics. Taking advantage of new methods, changing subject matter of investigations, using neologisms such as digital economy, information economy, infonetworks economy, knowledge-based economy, Internet economy, "new" economy, virtual economy, service economy. The variety of modern categories is typical for the modern stage of evolutionary development of international economy, placing special emphasis on the leading role of the triad of determinants of economic growth and development of today, which includes intellectual capital, creative and innovative factor as the basis for developing of knowledge-based economy.</p><p>Another feature of the modern epoch of human development is asymmetry of socio-economic development of the international economic system, which is deepening due to globalization. Most scientists think that essential determinants of escalation of global asymmetries lie in ICT-sphere: This leads to more considerable disproportion in international economy and increases social polarization <ref type="bibr">[1]</ref>. 'TСe Golden BТllТon' are enjoying their successful development due to unequal relatТonsСТps wТtС perТpСerТes, as tСe number of "profТtable nТcСes" Тn global space Тs СТgСly lТmТted; tСerefore tСe way to tСe cТvТlТzed "floor" can be easТly made due to innovation-information achievements by means of integration the market mechanism into the networked information economy <ref type="bibr">[2]</ref>.</p><p>The technological component of modern economic processes contributes to the development of the networked economy as the synthesis of information and global economies <ref type="bibr">[3]</ref>.</p><p>Works of W. Vickrey, E. Daniel, Gr. Dunkan ,G. Karypis, J. Konstan, P. Cotler, B. Mahadevan, J. Riedl, A. Summer and B Sarwar are devoted to the problems of establishment and development of global and local e-commerce markets in terms of globalization processes. National scientists, namely A. Bereza, A. Berko, V. Vysotska, I. Kozak, F. Levchenko, Y. Lyenshyna, V. Pasichnyk, L. Patramanska, E. Strelchuk, T. Tardaskina do not stand apart of such scientific research. Theoretical and statistical investigations of this category are being conducted by some international organizations such as OECD, UNKTAD, UNISTRAL, WTO аnd ITU, development projects and strategic programs in regard to e-commerce are being elaborated by World Bank and EBRD.</p><p>The paper goal is to ground the impact of e-commerce on tСe partТcТpants' welfare through empirical experiment for electronic auctions, implemented by the means of the relevant transactions via designed software that is economically desirable distribution of goods and payments irrespective of strategic behavior of participants.</p><p>The paper has the following structure: the second part is devoted to literature review; the third one determines auction formats; the fourth part constructs the general model of double electronic Vickrey auction for true type and hidden type agents; the fifth part concludes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>Development of information economy has caused formation of e-society with its integral parts: e-government in politics, e-business in economy, e-education, eecology, e-medicine and others (Table <ref type="table" target="#tab_1">1</ref>). E-trading is deemed to be a part of ecommerce which in its turn together with document control and business management makes e-business <ref type="bibr">[4]</ref>.</p><p>In its narrow sense e-commerce is close to e-trading because its main function is online purchase and sale transactions; in the wide sense the definition of e-commerce covers any transaction effected using computer networks <ref type="bibr">[5,</ref><ref type="bibr">6,</ref><ref type="bibr">7]</ref>.</p><p>So e-commerce is a complex of business operations carried out using computer networks (Internet, Intranet, Extranet), which are connected with the change of material rights and all processes that support this process including Electronic Data Interchange (EDI), Electronic Funds Transfer (EDF), e-trade, e-cash, e-marketing, ebanking, e-Insurance, e-logistics. WTO Specialists E-commerce is a wide array of commercial activities carried out through the use of computers, including on-line trading of goods and services, electronic funds transfers, on-line trading of financial instruments, electronic data exchanges between companies and electronic data exchanges within a company 2 .</p><p>Aspects of e-commerce are considered in Table <ref type="table" target="#tab_0">2</ref> based on <ref type="bibr">[8]</ref>. According to most experts B2B is the largest segment of e-commerce (Table <ref type="table" target="#tab_21">3</ref>). For example, according to UNCTAD data, B2B is a dominant segment in the American market with twice higher volume of sales compared to those of B2C (559 billion dollars against 252 billion dollars).  Internet-shops make an essential part of e-commerce in Ukraine -sector B2C, but B2B segment has great opportunities. For example, International center for electronic trading B2B-center has been successfully functioning for three years in Ukraine, and according to newsb2b.blogspot.com has made it possible to reduce procurement prices for Ukrainian enterprises by 20% on the average as well as procurement labor costs by 70%. The system allows to hold 43 kinds of tender, including more than 172 thousand companies from 110 countries of the world, among them 3500 companies from Ukraine: Group of companies Privat, Ukreksimbank, PUMB, AZOT, Antonov, Ergopak, Rubizhne cardboard mill, Volnogorsk glass, Kolos, Ukrrosmetal, Ukrolia, and international group of companies -JTI, SoftServe, М , AllТanz. The number of tenders held by Ukrainian segment of the B2B-center system annually increases by 60%. As of today there are two B2B trading sites functioning in Ukraine -b2bcenter.ua and b2b-center.uspp.ua, the latter was created by mutual efforts of B2Bcenter and the Ukrainian Union of Industrialists and Entrepreneurs (UUIE), which allowed it to make online purchases.</p><p>The main determinants of insufficient development of e-business and e-commerce are undeveloped technical and technological base. Asymmetric levels of ICTinfrastructure development cause disproportional global development of e-commerce with its traditional key centers in Old and New World -Western Europe and North America, and Asia-Pacific Region (Table <ref type="table" target="#tab_9">4</ref>).</p><p>At the same time the growth rates of B2C sales in the developing countries are essentially falling. The highest level is traditionally demonstrated by China (63.8%) 4 . (Fig. <ref type="figure" target="#fig_1">2</ref>). High growth rate at the level of 20.9% is demonstrated by Central and Eastern Europe, but it is lower than in Asia and North America (Fig. <ref type="figure" target="#fig_2">3</ref>).</p><p>Analysis of commodity composition of e-commerce markets in Ukraine, Russia, Switzerland and the U.S. in 2013 showed disproportional distribution of sales according to segments: e-commerce market in the U.S. is well-balanced and offers a wider range of products than Ukrainian market (Fig. <ref type="figure" target="#fig_3">4</ref>). The range of goods in Swiss e-commerce market is not wide but it is well-balanced in contrast to Ukrainian market where 90% of all orders are distributed between two main sectors.</p><p>Despite the development of e-commerce business in Ukraine, online-orders do not gain a great popularity with the population, the anticipated level in 2014 was about 3% comparing to 90% in the leading countrythe U.S. What makes Ukrainian market special is that people here mostly use the Internet to learn about the goods, to know about tecСnТcal specТfТcatТons of tСe products, to read otСer customers' feedbacks, to compare prices and so on, and only a limited number of users place orders, that is why the level of online-shopping and the number of online buyers remain low.  The results of the research showed the tendency typical for the national markets of all countriesone leading company being in dominant position well ahead of its nearest competitors. Ukrainian e-commerce market is entering the phase of growth because of relatively low volumes of sales of Ukrainian companies (Fig. <ref type="figure" target="#fig_4">5</ref>).</p><p>In spite of rapid development of e-commerce and e-business in Ukraine there are still some certain difficulties and obstacles that reduce the growth rates of online business as a whole (Table <ref type="table" target="#tab_3">5</ref>).  One of the main impacts of e-commerce activity is the formation of certain triad of consequences: product price cutting; speeding up the time and transformation of space (elimination of borders); creation of horizontal links between players and direct contact <ref type="bibr">[4]</ref> (Fig. <ref type="figure" target="#fig_38">6</ref>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Auctions Formats</head><p>In most real markets sellers have no perfect information about the market demand, and know only about its statistical distribution. Only buyers know exactly how much product they want to buy at a definite price. Self-regulating market mechanism is not always able to dТsclose all ТnformatТon about tСe buyers' solvency and sellers' costs.</p><p>The research of decentralized market mechanisms allows us to determine how and why real markets collect and transmit information. Then special mechanisms for the distribution of goods are created, such as auction models.</p><p>Auctions can implement the mechanisms of transformation of private information about the value of goods for buyers into common knowledge. In turn, the rules of the auction can stimulate sellers to disclose private information about their cost of goods. Maximum purchasing capacities of the buyer and seller costs are called agents types.</p><p>Designing economic mechanisms for auctions allows building a model of relevant institutions that determine the conditions and means of achieving the goal of the designer <ref type="bibr" target="#b311">[Kobets, 2014]</ref>. This model is effective if it allows the planner to create incentives for the disclosure of information held by others to achieve private or public purpose.</p><p>To solve these problems auctions mechanisms are designed which motivate the agents to truthfully reveal their private information. Auctions are important for goods that have no natural market, such as bankrupt firms, mobile and radio frequencies.</p><p>Here accurate information about the number of regular buyers is missing, variance of buyers' values can be very large, and pre-sale valuation and transaction costs are significant.</p><p>Operating of Internet-auction is a necessary condition for the development of ecommerce segment and its further growth grounded on <ref type="bibr">[4,</ref><ref type="bibr">12]</ref> (Fig. <ref type="figure" target="#fig_5">7</ref>).</p><p>Effective use of electronic auctions has been confirmed empirically by the most famous giants of global e-commerce such as eBay.com, Sothbys.Amazon.com Yahoo!Auctions and DigiBid.com, which actively use a similar mechanism to promote and sell products and services. Westernbid.com, lotok.com.ua, eTorg.com auctions are gaining their popularity in Ukraine. There are several types of auctions with specific methods of pricing (Table <ref type="table" target="#tab_5">6</ref>):</p><p>If a product is sold to the individual who values it most, the auction is efficient. Auction yielding maximum revenue to the seller is optimal <ref type="bibr">[13]</ref><ref type="bibr">[14]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Vickrey auction</head><p>Agents convey their true type only if it gives them maximum (expected) payoff. RevealТng tСe type means tСe seller's payoff maxТmТzatТon and effТcТent allocation of resources (the buyer who values the product most receives it). Vickrey auction (sealed bid second price auction) best of existing auctions formats reveals the types of participants. True strategy is a dominant for Vickrey auction format (as opposed to the first price auction) <ref type="bibr">[15]</ref>. The winner receives a payoff as the difference between his own purchase capacity and second price. So when one of the agents has a greater solvency than others, he gets a discount equal to the difference between the first and second largest bids. If Vickrey auction has several winners, then it will select one of them with equal probability.</p><p>Then there were 2 extensions of this approach: the revelation principle, which showed that direct mechanisms are similar to indirect ones and implementation theory that helps to built mechanism so that all its equilibria were optimal ones <ref type="bibr">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Double auction</head><p>Theory shows that double auctions, where traders (buyers and sellers) charge their prices can be effective trade institutions, where each agent has private information about his own values of goods.</p><p>With the increasing number of traders, the double auction will more effectively generalize personal information so that eventually all information is reflected in equilibrium prices (as argued WТlson). TСese results are consТstent wТtС F.Hayek's argument that markets efficiently summarize relevant private information.</p><p>Vickrey auction theory gained wide support from the economists; some elements of the theory have been used in the US in B2G(A) type of e-commerce in organizing the trade licenses to use national radio frequencies. The US State Treasury asked FTC to use this type of auction for revenues maximization.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Open English auction</head><p>The main characteristic of the auction is that buyers know about competТtor's offers. TСe prТce starts from a certaТn minimum level mark. The winner pays the highest price.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Dutch auction</head><p>The main characteristic of the auction is that buyers disclose their bids. The maximum price is fixed and reduced until a buyer agrees to accept it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Double auction</head><p>The main characteristic of the auction is that buyers and sellers disclose their bids and asks respectively. The seller and the buyer interact the same time -as a result, the equilibrium market price is fixed.</p><p>The challenges of the market mechanism require creating rules of interaction for bidders, realized by means of transactions on computer platforms with appropriately developed software and leading to economically desirable distribution of goods and payments deprived of collusion or dishonest behavior of participants.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Income Goods</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Internet-auction</head><p>Characteristics: </p><formula xml:id="formula_229"></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Double Electronic Vickrey Auction Model</head><p>To construct the auction model, we introduce the following assumptions. Seller offers one indivisible good to N buyers, who are risk neutral. Buyer i has purchase</p><formula xml:id="formula_230">capacity i v , 1,..., i N </formula><p>. Evaluation of solvency of buyer i is obtained from the interval [1;100]  in accordance with the distribution function ()</p><p>ii Fv and distribution density () ii fv . Buyers' values of good are mutually Тndependent. Every buyer knows his/her own value and does not know the values of other buyers. However, density distribution functions 1 f ,…, N f are common knowledge and are known to both buyers and the seller. Although the seller is uninformed about the exact solvency value of the buyer, he knows the distribution from which each value is received. If the solvency of the buyer who wins the product is i v , and he pays the price p , his consumer surplus equals</p><formula xml:id="formula_231">i i i</formula><p>CS v p . TСe seller's sСort-run profit will change when the auction format changes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Sealed bid first-price auction</head><p>Buyers make sealed bids i b that depend on their ability to pay i v . Buyers' bТds are considered as a strategy in the form of functions mapping their solvency in nonnegative bid: i bR   . Expected payoff of buyer i will be:</p><formula xml:id="formula_232">1 ( ; ) ( ) ( ( )) N CS r v F r v b r     ,<label>(1)</label></formula><p>where r -buyer bid, v -buyer reservation price, 1 ()</p><formula xml:id="formula_233">N</formula><p>Fr  -the probability that the buyer bid on the goods is the highest among all applicants. After first order condition for function maximization (1) and for conditions () F v v  and ( ) 1 fv we get size of equilibrium bid for sealed bid first-price auction:</p><formula xml:id="formula_234">() v b v v N  . (<label>2</label></formula><formula xml:id="formula_235">)</formula><p>So in this auction format, each buyer conceals his true solvency, relying on a lower bid level than its reservation price.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Double electronic Vickrey auction for true type's agents</head><p>Buyers will behave differently in sealed bid first price auction and Vickrey auction. First price auction offers 2 motives for buyer: (i) an incentive to rise his stake to increase his chance of winning; (ii) an incentive to reduce his bid to reduce the price he pays when winning. For Vickrey auction the second motive is not valid, because the winner pays the price which does not depend on his bid. This allows to expect aggressive competition for the good at Vickrey auction. Let B be the second largest bid at the auction, then a winner disclosing his reservation price will win payoff ()</p><formula xml:id="formula_236">CS v v B  .</formula><p>Suppose that M risk neutral sellers operate in the market. The cost distributions for sellers are obtained from the interval [1;100]  in accordance with the known distribution functions. Sellers make sealed asks i a that depend on their costs i c . If tСe seller's cost Тs i c , and he gets the price p , his producer surplus (profit) is</p><formula xml:id="formula_237">i i i PS p c  .</formula><p>Consider our software module for electronic Vickrey auction in Fig. <ref type="figure" target="#fig_6">8</ref>. In general the number of buyers and sellers may differ NM  . TСe buyers' abТlТty to pay is ordered from maximum to minimum and for sellers it is from minimum to maximum.</p><p>The agreement between agents (deal = 1) occurs when a price offered by buyer is not below the price set by the seller ( ( ) ( )</p><formula xml:id="formula_238">i i b v a c </formula><p>), otherwise the agents refuse the transaction (deal = 0). The price for each transaction for each pair of buyer and seller is set at the average level:</p><formula xml:id="formula_239">11 2 ii i vc P    ,<label>(3)</label></formula><p>The auction continues until the highest price offered by a buyer will be lower than the minimum price charged by the seller: ( ) ( )</p><formula xml:id="formula_240">i i b v a c </formula><p>(Fig. <ref type="figure" target="#fig_53">9</ref>). After each transaction the benefits of buyers are defined in the form of consumer surplus CS and sellers gainsas producer surplus PS . The sum of consumer and producer surplus forms social welfare SW as efficiency indicator of Vickrey auction format (Fig. <ref type="figure" target="#fig_89">10</ref>). Fig. <ref type="figure" target="#fig_89">10</ref> shows that functions CS , PS and SW are decreasing in the number of transactions, because during each round of the auction buyers with the highest ability to pay and sellers with lowest cost will benefit. In each round of double Vickrey auction the price of good at first increases and then remains constant, then begins to decrease until it reaches zero (Fig. <ref type="figure" target="#fig_9">11</ref>). VТckrey auctТon agents' underestТmatТng tСeТr abТlТty to pay or overestТmatТng tСeТr costs will result in reducing consumer surplus, producer surplus and social welfare. As soon as agents with larger ability to pay and lower cost can not deal in auction, they will discover during few periods that revealing their true type will allow them to maximize their own surplus.</p><p>Proposed model of double electronТc VТckrey auctТon for true type's agents Тs described by the following algorithm by the means of C#: publicvoid Deal(Auction auction) {intcount_take = 0; intcount_not_take = 0; stringpattern_one="The transaction took place (1)"; stringpatter_second="The transaction did not take place (0)"; for(inti=0;i&lt;auction. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Double electronic Vickrey auction for hidden type's agents</head><p>During the sale of goods through the auction mechanism a buyer tends to undercharge his own ability, while the sellers tend to overvalue their own costs. So electronТc VТckrey auctТon for true type's agents Тs less lТkely tСan e-auction for СТdden type's agents. In tСeory double VТckrey auction motivates participants to fully disclose their types, because they pay the second largest cost. However, the proposed here new model of double VТckrey auctТon for СТdden type's agents demonstrated tСat some of agents can hide their true type, despite the existing incentives for disclosure. According to traditional models of double Vickrey auction agent type is disclosed completely.</p><p>ConsТder software module 'VТckrey auctТon' for double electronТc VТckrey auctТon for СТdden type's agents (FТg. 12). In this module first we enter Numbers of buyers and Numbers of sellers. Consider equal numbers of buyers <ref type="bibr">(15)</ref> and sellers <ref type="bibr">(15)</ref>. After entering the data into the approprТate fТeld (FТg. 12), we obtaТn buyers' real abТlТty to pay real bid (as a random number between 1 and 100) and deviation bias for bid (as a random number in the interval (0, 1)), which reduces percent of real solvency and gives us actual ability to pay actual bid. Therefore the relationship between indicators for buyers looks like: actual bid = real bid * (1-bias for bid). Similarly, we obtain the real costs of seller real ask and deviation bias for ask, percent of which overstates the actual costs, and reported expenses actual ask are received. Thus, the relationship between indicators for sellers is as follows: actual ask = real ask*(1+bias for ask).</p><p>After that reported solvency actual bid is arranged in descending order, and reported costs actual ask is arranged in ascending order. Then pair-wise comparison takes place between the buyer with the highest ability to pay and seller with lowest cost. If ii ba  then there is an agreement (deal=1) between buyer i and seller i at the price of </p><formula xml:id="formula_241">i i i SW CS PS .</formula><p>Otherwise, the agreement between the buyer and the seller does not take place (deal=0). Buyers and sellers who do not deal have the incentive to reveal their true types (solvencies or costs).</p><p>Proposed model of double electronТc VТckrey auctТon for СТdden type's agents Тs described by the following algorithm by the means of C#: publicList&lt;bool&gt; Deal(Auctionauct, List&lt;bool&gt;DealList) {intcountdeal = 0; intcountnodeal = 0; for (inti = 0; i&lt;auct. But the agreement between buyers and sellers is not completed. Those buyers and sellers who have no deals may revise their bids, that is to reveal their real types. They Сave an ТncentТve to do so because tСey Сaven't got tСe desТred unТt of good. After revealing their true type their deviation will be zero: bias for ask = 0, bias for bid = 0. Further agreements will be revised to reflect the new bids. Then those agents who in the first round were able to buy (sell) goods at their bid and concealed their true type in the second round may lose this opportunity. Then they will get an incentive to disclose their true types. This procedure continues until the final round yields no changes in the redistribution of goods compared to the previous round. It means that the double Vickrey auction for СТdden type's agents Тs completed.</p><p>Fig. <ref type="figure" target="#fig_7">12</ref> demonstrates that the buyers' solvency of 2, 6 and 14 remains hidden while the remaining buyers fully reveal their types. Similarly, sellers 1, 4, 8 and 12 did not disclose their true costs, while the rest of the sellers do it. Thus our Vickrey auction model compared with other auctions formats reveals some true types of agents, but this auction format does not motivate all to do as stated in classical Vickrey auction model. In proposed auction model low cost sellers and high solvency buyers can conceal their true types.</p><p>For our example 80% of buyers and 73% of sellers reveal their types (i.e. 76% of all traders). 20% of buyers and 27% of sellers conceal their types (i.e. 24% of all traders).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>To improve e-commerce efficiency there are special mechanisms for distribution of goods and payments such as auctions models that are designed to convert private information about the value of goods for buyers and sellers into common knowledge.</p><p>Vickrey auction (sealed bid second price auction) best of the existing auction formats reveals the types of participants. Software modules for dynamic double electronic Vickrey auction were first developed to generalize this auction format. It is determined that in double electronic Vickrey auction incentives are created for most buyers and sellers to reveal their true solvencies and costs. But for some buyers and sellers these incentives are not enough to disclose their types, which reduces the efficiency of the auction format. The designed program of dynamic double electronic Vickrey auction is closest to perfect competition market and in terms of social welfare ahead of alternative auction formats such as first price auction, English and Dutch auctions, in which the vast majority of agents are hiding and not revealing their types.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The largest and the most influential market for the global and national economies, the foreign exchange market (FX) is opened 24 hours worldwide. According to a regular semi-annual market research an amount of monetary flows traded on the FX in all national currencies (global FX volume) is estimated at 5 trillion US dollar average per day <ref type="bibr" target="#b314">(Bench &amp; Sobrun, 2013)</ref>. The survey of the Bank for International Settlement (BIS survey) is an important source of the FX knowledge as it aggregates semi-annual surveys from FX committees and provides aggregated statistics of the FX market segments <ref type="bibr" target="#b328">(Fratianni &amp; Pattison, 2001)</ref>. The monetary amount of trades in every currency is considered in this research as a segment volume indicator of the FX market.</p><p>The volume dynamics demonstrates variable numbers which affect exchange rates for national currencies and present volatile level of risk for traders and investors. That is why a kind of the FX volume indicator is a part of system of key performance indicators for assets management among FX market participants. This system helps them in planning and decision making processes such as investment, currency diversification in saving, and development of transnational networks. Market volume is also necessary to be evaluated by national market regulators and central banks in order to have current information on global tendency of their currencies volumes and exchange rates as a consequence.</p><p>The concept of volatility is used on financial markets to measure fluctuations of exchange rates by their standard deviation during a taken time interval <ref type="bibr">(Schwartz,</ref> Byrne &amp; Colaninno, 2011; Bubak, Kocenda &amp; Zilkes, 2011). As the volatility of the FX volume is a recognized quantity indicator of the exchange rates dynamics, financial organizations use it in order to estimate their risks on the FX. They usually predict in which extent the exchange rates fluctuate between current level and expiration date.</p><p>In order to construct volatility-based market volume indicator, researcher is aimed to investigate area of electronic statistics which is relevant to the FX volume. Several types of time interval can be taken to construct the indicator, namely day, month, and year. The importance of choosing of the time interval for data was emphasized in previous research (Gill, Perera &amp; Sunner, 2012, p.1): "Over recent years technological developments and the digitisation of information and activity have generated a vast array of electronic data, which can potentially be analysed on a daily basis, or even in real time. Some of these data cover very large numbers of individuals and businesses far more than many traditional surveys used by statistical agenciesand have the potential to be useful for monitoring and measuring aggregate economic conditions."</p><p>The BIS survey cannot provide frequent FX statistics, meanwhile market participants become also more interested in monthly volume indicators <ref type="bibr" target="#b320">(Cerutti, Claessens &amp; McGvair, 2012)</ref>.</p><p>Alternative sources of information are investigated in this paper. The FX electronic communication and settlement infrastructures also aggregate statistics on their transactions. Continuously Linked Settlement Bank (CLS) and Society for Worldwide Inter-bank Financial Telecommunication (S.W.I.F.T. or SWIFT) serve financial organizations by secure settlement of their interests on the FX. Exchange traded funds (ETFs) also widely play on the FX market as investment companies which provide efficient and attractive sets of financial instruments in a variety of currencies.</p><p>With this research we intend to get a better idea of how the FX market can be measured by using globally aggregated electronic statistics of CLS, SWIFT, and ETFs.</p><p>In the first paragraph we state the problem. In the second paragraph we study distinctions and commonality of CLS, SWIFT, and ETFs data regarding to the segments of the FX market. In the third paragraph we investigate relationships between some FX segments volume indicators, namely ETFs in developed currencies and CLS. In the fourth paragraph we discuss methods and our results and in the fifth paragraph we discuss findings and make conclusions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Foreign Exchange Markets in the Last Decades</head><p>Developed in 2000s investment opportunities provide a ground for constant enlargement of trades in developing currencies <ref type="bibr" target="#b318">(Bryan, 2008)</ref>. The latter are reasonably called exotic currencies among the FX practitioners (Tsuyuguchi &amp; Wooldridge, 2008) because they did not find suitable conditions for stable growth worldwide. Thus, from beginning of the post Bretton Woods system in condition of US dollar domination less than 5 % of global trading was made in other local currencies <ref type="bibr" target="#b333">(Pojarliev, 2005)</ref>. "The relative insignificance of these currencies in international markets reminds us of the growing disjuncture between countries and "their" currencies. Most Indianand Chinese-related trade and investment is undertaken in US dollars, with that currency often being used directly without any formal currency conversation (for example, for the purchase of US bonds). Alternatively, for those outside India and China looking for a share of their growth economies, it is possible, using derivatives, to take on exposure to their growth without the need for actual investment in these countries nor for foreign exchange conversion to local currencies." <ref type="bibr">(Bryan, 2008, p. 503)</ref>.</p><p>One could see different environments struggling with implementation of diversification strategies of exchange, saving, and investment in "3 big currencies" and domestic currency. Term of "3 big currencies", namely US dollar, euro, and yen, has become recognized due to trinity's domination in the FX structure <ref type="bibr" target="#b333">(Pojarliev, 2005)</ref>.</p><p>Next, after a crisis of 2008 the global FX market has created a fertile ground for diversification. The post-crisis market conditions have immediately influenced the exchange in a variety of currency pairs, especially in the currencies of developing countries <ref type="bibr" target="#b318">(Bryan, 2008)</ref>: "…with a declining role for the "big 3" currencies in aggregate, perhaps even the status of any leading national currency being treated as a proxy global anchor is being challenged. Consistent with this trend, it is apparent that foreign exchange is itself being treated increasingly as an asset class (a store of value) as well as a means of exchange, so that investors see intrinsic benefit in holding a wider range of currencies in a diversified asset portfolio."</p><p>Nowadays the first candidates to leaders on the FX are Chinese renminbi (yuan) and the Indian rupee which present economies of two members of BRICS (Brasil, Russia, India, China, and South Africa). By World Bank estimation, BRICS contributes a quarter to global domestic product that is more than any other group of developing countries. Although "evolution of the Chinese currency on the FX market remains slow and runs the risk of failing" (Batten &amp; Szilagyi, 2012, p.2), there is an expectation of long-term shift in currency markets. As an evidence of this tendency, New Development Bank (BRICS Development Bank) has been established in 2013 by 5 developing countries as an alternative to International Monetary Fund and World Bank.</p><p>Along with currencies diversification a way of presence at the FX is also important for market players. As BIS survey reported, some participants of the FX communicate for trading by using services of brokers but major players replace such supervision by making over-to-counter operations (OTC) themselves. Such market participants are usually members of CLS or SWIFT.</p><p>CLS bank serves other banks and financial institutions by mitigating a settlement risk that appears when one party of exchange pays the currency it sold but does not receive the currency it bought <ref type="bibr" target="#b327">(Fisher &amp; Ranaldo, 2011)</ref>. This kind of risk is called a settlement risk. CLS executes exchange operations (CLS instructions) through provision of its unique payment operation versus payment settlement service. Owing to its service value the CLS is highly appreciated by international financial community <ref type="bibr" target="#b327">(Fisher &amp; Ranaldo, 2011)</ref>. According to CLS strategy, its large contribution to the developed markets accompanies by absence on the developing ones.</p><p>To serve secure FX transactions, SWIFT plays another role in the industry <ref type="bibr" target="#b338">(Scott &amp; Zachariadis, 2010)</ref>.</p><p>It communicates financial institutions, corporations and their counterparties by SWIFT messages. Their customers are financial institutions, fund managers and brokers, fund managers, settlement members and central settlement systems including CLS members. SWIFT message (MT300) consists of all information about transaction on the foreign exchange such as currency pair, monetary amount, type of trading, and others (SWIFT, 2015).</p><p>Nowadays SWIFT possesses a worthy demand in the industry because of its capacity to operate with high value delivered and relatively lower costs in comparison with rivals on both types of markets (developed and developing). This stable trend implies its importance in the industry which provides the SWIFT data potential contribution to the FX volume measurement. Besides, SWIFT does not limit its custodians by a kind of currency to trade. CLS, on the contrary, executes operations in 17 currencies which are mostly developed.</p><p>Current tendency on the market is an extremely high growth of ETF segment in both developed and developing economies. Nowadays such indices are traded in a number of currencies on the FX due to its attractiveness for investors.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Use of Global Data of CLS, SWIFT and ETFs</head><p>CLS data was usually an adequate way of the FX volume estimation. Its monthly market review indicates dynamics of trades on the developed part of the FX. For instance, recently BIS have leveraged CLS information and own data <ref type="bibr" target="#b314">(Bench &amp; Sobrun, 2013)</ref>. Owing to a mixed approach in monthly numbers measurement, estimated this way FX dynamics was able to explain sources of odd jumps and drops of the market by concrete instruments, which have been described in the BIS survey in a detailed way. Fig. <ref type="figure" target="#fig_0">1</ref> illustrates this first attempt to measure aggregated FX volume for all currencies, including the developed and developing ones owing to the local FX committees' contribution. It makes clear the necessity of the different sources of data combination.</p><p>Meanwhile, being outside of mutual work of CLS and BIS, SWIFT could pretend to be considered as a source of data for the FX volume estimation. Its statistics is usually published only in its annual market review where the FX trends are shortly described and illustrated by SWIFT service activity during the year.</p><p>Resent research <ref type="bibr" target="#b321">(Cook &amp; Soramaki, 2014)</ref> shows that SWIFT data (MT300 message type) is correlated with the FX volume for currency pairs of US dollar and Chinese renminbi (yuan). Authors have found linear relationship between these values (Fig. <ref type="figure" target="#fig_1">2</ref>). Absence of similar research of US dollar and yuan from other data sources (CLS, for example) makes impossible to conclude which data is more useful for market analysts by comparing with results of (Cook &amp; Soramaki, 2014) with others.  As it was reported above nowadays constant growth of the ETF worldwide accompanies by increasing ETF contribution to the financial markets of developing economies. The evolution of financial instruments led to use of ETFs which had provided implementation of extremely successful trading strategies after the global financial crisis in 2008 <ref type="bibr">(Bryan, 2008, p. 502</ref>). As a result, in developed countries, for instance, in the United States ETFs have contributed 40 % of the financial market volume <ref type="bibr" target="#b323">(Guedj &amp; Huang, 2009)</ref>. As for developing countries, ETFs in currencies have contributed 23 % of the FX market (Fig. <ref type="figure" target="#fig_2">3</ref>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Methods and Findings</head><p>We have analysed the FX structure by using information from the BIS Survey (2013). According to the survey, traditionally the largest volumes of trading take place in Europe, USA and Japan. Respectively, this trend is presented by the biggest volumes of the FX trading in the main currency pairs, namely Euro versus US dollar (EUR-USD), US dollar versus Yen (USD-JPY), Euro versus Yen (EUR-JPY).</p><p>Data have been taken from the website of CLS bank, Currencyshares' and Powershares' on-line databases which present three largest global currency ETFs indices, namely ETF FXE (euro), ETF FXY (yen), and ETF UUP (US dollar).</p><p>Data of this research consist of five elements for every month during period from January 2008 till March 2014, namely:</p><p> average number of CLS operations (instructions);  volatility of volume of exchange-traded fund FXE;</p><p> volatility of volume of exchange-traded fund FXY;  volatility of volume of exchange-traded fund UUP.</p><p>We have studied autocorrelations of these volumes. Table <ref type="table" target="#tab_1">1</ref> shows that all levels of tested variable of t-statistics are not statistically significant for CLS. According to these results, there are significant autocorrelations between the nearest levels of lags (from month to month) for each time series of ETFs except the time series of CLS. Significant levels are signed by (*) on the base of t-statistics critical values at the confidence level of 97,5%</p><p>Next step should consist of regression models constructing on the base of the time series by using the results of significant lags' autocorrelation. As we have not found out existence of linear relationship between CLS operations from month to month, we could not estimate regression of the CLS and ETFs volumes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>A lack of frequently available data can negatively affect strategic decisions of businesses. This research has been motivated by industry's willingness to explain sources of the FX market volume dynamics in developed and developing currencies. In this field we found out several results. Owing to international finance transformations, nowadays currencies of developing countries become more often used among deals on the FX market than several years ago. This trend had been appeared in the post-crisis period after 2008. The financial organizations had to struggle between two options by making choice on the FX markets. They could adapt to decreasing trends of US dollar domination or they could seize opportunities relating to currencies of developing economies. In 2013 the BIS survey has concluded that unpredictable trends on emerging currencies markets attract more attention of participants to this FX segment volume measurement.</p><p>We have also studied what kind of time interval should be taken for the FX volume indicator. We have found that market participants are interested in the FX volume indicators to fill absence of monthly data (Cerutti, Claessens &amp; McGvair, 2012, p.2). Our findings are confirmed by existing statistics source, namely the Triennial Central Bank Survey of Foreign Exchange and Derivatives Market Activity. It collects only long-term overall statistics of volume so the survey cannot respond to need of frequent availability of the FX data without additional market information. That confirms the opinion that "while official statisticians are increasingly using electronic data in the production of economic indicators, this is still very much in its infancy." (Gill, Perera &amp; Sunner, 2012, p.1).</p><p>In our review we have concluded that month could be taken as a time interval to make decisions on the FX market by constructing volatility-based volume indicator. Meanwhile, our experimental findings did not provide enough evidence for that.</p><p>Next, we have studied the FX data regarding developed and developing currencies. The FX has a number of participants and nowadays only three infrastructures' performances can indicate its overall activity's performance from month to month. Thus, CLS, SWIFT and ETFs data' features analysis has helped to shed a light to data search for the FX volume estimation.</p><p>On the one hand, as class of major developed currencies has mostly become an area of CLS business. CLS data can help to measure a volume of trading in currencies of developed countries. CLS does not include trades in currencies of the BRICS countries. South Africa is only one exemption in this group of 5 countries as its currency is considered as a major one and it can be traded by CLS members.</p><p>On the other hand, today SWIFT is known as a provider of efficient supply chain for financial organizations in majority of countries including developing ones. SWIFT services are available for all exotic currency pairs on both developed and developing markets. That is why SWIFT membership has become more popular, especially for banks which were not members of CLS.</p><p>Potential role of SWIFT information for the FX volume measurement has not been acknowledged yet. Meanwhile, SWIFT has already presented its contribution to economy forecast which was presented by dynamic models for developed (Gill, Perera &amp; Sunner, 2012), developing, and global economies (Bauwens, Gillain &amp; Rombouts, 2011). Thus, SWIFT analytics are more concentrated on current trends of some developing currencies' internationalization such as Chinese Yuan, RMB <ref type="bibr">(Batten &amp; Szilagyi, 2012)</ref>.</p><p>Finally, in our research we have stated a question: 'To which extent does volume of CLS activities indicate the standard deviation of volume during a month for three major ETF FX segments in developed currencies?' We have calculated the ETF standard deviation on the base of daily volumes in order to aggregate data on the volatility of ETF volume for each month. We have obtained results which have not approved a hypothesis that relation between CLS volumes and ETFs volatility-based estimation of volumes does exist. We were focused on the ETF segment and its three major representatives. These imperfections have affected our research by its inability to extrapolate directly our results for the whole ETF segment of the FX. Next stage of this research could be conducted with more types of ETFs statistics and SWIFT data.</p><p>As CLS bank and SWIFT are rapidly evolving competitors in the industry, they consider promotion of the own business intelligence to the FX volume estimation. It makes possible to start research projects in this field. In future research a question can be stated as following: 'To which extent do SWIFT and CLS activities indicate the volume of the major FX segments?' The research objective can be FX volume indicator constructing. Sources of information for the FX size measurement can come from the website of CLS bank, SWIFT, and ETFs (Currencyshares, Powershares, and others) on-line databases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Econometric Analysis of Educational Process on the Web-Site 1 Introduction</head><p>The site "Lesson pulse" is considered in this article. It is the tool allowing a teacher to obtain the objective information on the results of a lesson in real-time mode. However, adequate interpretation for the results of such interrogations is impossible while we do not separate true students, for which educational process is a considerable part of their life, from those who would prefer to keep far away from it <ref type="bibr">[1]</ref>. Besides, interpretation of the results of interrogations and grounded on them decision-making demand to realize what exactly this specific group means by clearness of explanation, lesson atmosphere, objectivity of the marks, etc. <ref type="bibr">[2]</ref>. For anonymous interrogations it means the necessity of correlation and regression analysis for the results and an estimation of their statistical significance. So these factors require the use of econometric analysis <ref type="bibr">[3]</ref>.</p><p>The site "Lesson pulse" allows a student or a pupil to react to a lesson course at any moment, having answered one or several questions, for example: 1. Is lesson interesting to you? 2. Is the explanation clear to you?</p><p>3. Are you tired? Are you satisfied with the rate of the lesson? 4. Do you have some questions to the teacher? 5. Are marks objective? (Formulations of questions are defined by the teacher) (Fig. <ref type="figure" target="#fig_0">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Lesson pulse</head><p>The site displays average marks on responses on the screen. It is the "pulse" of the lesson in real-time mode. At any moment a teacher can ask to answer such or more profound groups of questions (their examples are given below). So, he (she) can measure the "lesson pulse" just at certain moment. Such interrogations do not demand computer auditorium: they can be carried out on a tablet or on a mobile gadget, and then results can be transferred to a site.</p><p>1) All groups of questions considered further have been chosen in result of "brainstorming", where students of fourth year study of the Faculty of physics, mathematics and informatics at the Kherson State University acted as experts. This expert interrogation has been constructed by a technique of "six hats of thinking" by E. Bono <ref type="bibr">[4]</ref>, which provides the maximal openness and relaxedness of participants. All experts have solidly agreed that this set of questions is full and fair.</p><p>2) Then students of speciailties "Physics", "Mathematics", "Informatics" and "Software Engineering" of Kherson State University have been interviewed under selected questions. The respondents estimated each question from 0 (at firm "no") up to 10 (at firm "yes"). He arbitrarily set a name of the folder containing his interrogation (i.e. his key). The volunteera participant of interrogationcollects all folders in one main folder and sorts them here (i.e. shuffles). Only after that the main folder is transferred to the teacher: this simple and open procedure guarantee to participants anonymity of interrogation. Alternative and technically simpler variants are answers that are seen on the web-site or could be chosen on a tablet: the variant of choice is defined by the kind of interrogation and the level of trust of an audience to the interviewing teacher.</p><p>3) Results of interrogation then are transferred to the site "Lesson pulse", which is realized in PHP language and uses MySQL database (see <ref type="bibr">[5]</ref>). The queries, realizing now on the site, give out results of the econometric analysis of interrogation. They include the plural correlation analysis of factors, the regression analysis and an estimation of the statistical importance of the received results with the use of Student and Fisher criteria ( <ref type="bibr">[6]</ref>).</p><p>The site interface is oriented to the user, generally speaking, knowing nothing about the econometric analysis (Fig. <ref type="figure" target="#fig_1">2</ref>).. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Analysis of Interrogations on the Results of a Lesson and Feedback Interrogations</head><p>Results of interrogation on a lesson and Feedback interrogation are, of course, absolutely various <ref type="bibr">[7]</ref> depending on a lesson, a teacher, an audience, etc (Fig. <ref type="figure" target="#fig_2">3</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 3. Results</head><p>However, the correlation analysis of factors led to similar outcomes (at 20 % of significance level by criterion of Student). Everywhere below we use the interrogations of the group having typical results on a specialty "Mathematics" (Fig. <ref type="figure" target="#fig_3">4</ref>). Here is the histogram for distribution of correlation coefficients between answers to a question "Do you like the lesson?" and following factors:</p><p>1. Is the explanation clear? 2. Is the rate of an explanation good enough for you? The most significant factors had appeared (in decreasing order) 1 (0,91), 4 (0,87), 12 (0,83), 13 (0,75) 5 (0,63), 9 and 11 (0,59). Objectivity of marks is only further (0,51) and inverse correlation -0,39 for 7 specifies that a good lesson for the majority is the one after which there are no questions remained to the teacher.</p><p>The real importance of examined factors for the lesson estimation is finally established by the regression analysis. At first, we use the most essential factors mentioned above. Then we obtain such linear model: Y = 0,845454 x1 + 0,556967 x2 + 0,32442 x3 + 0,19571 x4 + 0,269908 x5 + 0,24677 x6 + 0,19877 x7 , where the variable хi corresponds to the factor i (1 ≤ I ≤ 7). The determination factor for such model is equal to 0, 84572. Using all the factors except insignificant factors 2 and 3, we obtain the following model: Y = 0,657012x1 + 0,282476x4 + 0,1349x5 + 0,01807x6 -0,1097x7 -0,063159x8 + 0,00809x9 + 0,033186x10 + 0,126973x11 + 0,192209x12 + 0,1266x13 with the determination factor 0,93647 (Fig. <ref type="figure" target="#fig_4">5</ref>). Here is the histogram for distribution of coefficients' correlation between answers to a Feedback question "Do you like your teacher?" and following factors:</p><p>1 12. Punctuality (comes in time at lessons). 13. Possession of an audience (students are interested in subject and do not make too much noise at the lessons). 14. Objectivity in the teacher's estimation of the student. Are the criteria of estimation in all subgroups identical? 15. Correspondence of the lesson's material to control tasks. The most significant factors appear (in decreasing order): 8 (0,92), 7 (0,85), 6 (0,775), 4 (0,75), 9 (0,72), 3 (0,675), 13 (0,58). Only further with factor of correlation 0,51 follows 1 -Do you like the lesson? Corresponding linear regression model is: Y = 0,048604x1 + 0,17976x3 + 0,22221x4 + 0,076545x6 + 0,35703x8 + 0,800305x9 + 0,280308x10 + 0,23398x14 + 0,150449x15 , where the variable хi corresponds to the factor i (1 ≤ i ≤ 15). The determination factor for such model is equal to 0,8463.</p><p>And major factors of estimations of the teacher and lesson are considerably differing. Further the histogram of differences between factors of correlation for questions "Do you like your teacher? and "Do you like the lesson?" is resulted (Fig. <ref type="figure" target="#fig_38">6</ref>): The factors much more essential at an estimation of a teacher, than a lesson are 6 (using of various approaches at training) and 7 (teacher's aspiration to interest and motivate students). On the contrary, at an estimation of a lesson it is much more essential factors 14 (accordance of a lesson's material to control tasks) and 10insistence (regular and frequent control of knowledge): probably, according to students, insistence is good at the lesson and it is not so good for the teacher.</p><p>Certainly, the correlation matrix contains decomposition on factors also for each of 15 questions. So it is found out that 5 (explanation filled enough by examples) is most closely connected with 15 (accordance of a lesson's material to control tasks); 3 (are you tired at a lesson) with 7 (questions to the teacher); 13 (possession of an audience) with 14 (objectivity in estimation of the student).</p><p>It is interesting to compare 12 (is it interesting to you at a lesson) with 13 (have you taken out something useful at a lesson) from interrogation about results of the lesson (Fig. <ref type="figure" target="#fig_5">7</ref>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Analysis of Interrogations on the Factors Influencing the Lesson</head><p>Unlike interrogations about results of lesson and Feedback results of interrogations about the factors influencing the lesson course <ref type="bibr">[8]</ref> are close enough in different groups. The histogram for distribution of interrogation requisites on the relation to lesson is below (Fig. <ref type="figure" target="#fig_6">8</ref>, Fig. <ref type="figure" target="#fig_53">9</ref>). Here:</p><p>1. Close interaction with teachers.</p><p>2. Accessibility of the Internet at university. 3. Preparedness of an auditorium for a lesson (working projectors, computers, the software; comfort of an auditorium). 4. Presence of enough points for the centralized feeding. 5. Accessibility of contacts with the future employers. 6. Accessibility of summer recreation. 7. Participation in scientific work. <ref type="bibr">8</ref>. Teaching level at the university. In a correlation matrix under all these factors there are only few factors which correlations are close to 1. These are factors: 1. Do you attend lessons regularly? with factors 1) are you often prepared with your homework (0,87) 2) teaching level at the university (0,84) 3) participation in scientific work (0,63) 4) have you prepared for this lesson (0,59) 5) accessibility of summer recreation (-0,5). 2 Are you often prepared with your homework with factors 1) do you attend lessons regularly (0,87) 2) teaching level at the university (0,815) 3) have you prepared for this lesson (0,66) 4) participation in scientific work (0,56) 5) accessibility of summer recreation (-0,52). 3 Teaching level at the university with factors 1) do you attend lessons regularly (0,843) 2) do you regularly prepare homework (0,815)</p><p>3) have you chosen university and a speciality on your own (0,65) 4) have you prepared for this lesson (0,59) 5) participation in scientific work (0,56) 6) accessibility of summer recreation (-0,55). Besides them correlation factors above 0,7 appear still only twice: between factors Did you have any conflicts with teachers and Were you afraid of an elimination from the university (0,85); and between factors participation in scientific work and Are you satisfied with your teaching level (0,74). Occurrence in such line the factor teaching level at the university is, probably, the best compliment for Faculty of Physics, Mathematics and Informatics of the Kherson State University for all its history. Our main task is to use the mental orientation, fixed thus in the correlation analysis of factors, for separating true students, for which educational process is a considerable part of their life, from those, who would prefer to keep far away from it. Using already cited data and the following table 1: we choose as a differentiating sign between groups the factor regularly of homework preparedness. In this case mutual correlations of defining sign are closer to 1; and the dispersion is more, that testifies about more variability of respondents under this factor. Besides, among others selected it corresponds more to such sign in common sense.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Results of Interrogations about Lesson and Feedback on Subgroups</head><p>To the selected differentiating sign among 20 respondents of group the 12 participants is allocated, who for a question Are you often prepared with your homework have answered with 10 or 9 points. The additional subgroup consists of 8 respondents. Do such subgroups correspond to required division into true students and the others? Below there is the histogram for average results of interrogation on the lesson on the allocated subgroups (Fig. <ref type="figure" target="#fig_89">10</ref>, Fig. <ref type="figure" target="#fig_9">11</ref>). (6,5 -7,62 = -1,12) 3 Is the rate of an explanation good enough to you?</p><p>(5,5 -6,37 = -0,87) Last result seems strange at first sight, but it is steady for all groups and it is easy to explain this phenomenon psychologically: the less the student is adjusted for the study, the more he would like to speed up lesson's time.</p><p>Further there are similar results for Feedback interrogation. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">The Latent Division in Group</head><p>The site "Lesson pulse" offers also group division into classes with a given value of mutual correlation: between two respondents from one class it is possible to find a chain of respondents of this class in such a way, that the correlations of answers between consecutive respondents of this chain is not less than the given value. Such division into subgroups allows finding out distinctions in the group, which are not appreciable directly.</p><p>At mental interrogation about factors of influence on lesson and the set minimum level of mutual correlation 0,6 in test group 421 splitting into 3 classes has turned out: from 4, from 5 and from basic subgroup of 11 respondents. Let's compare averages of the basic class to averages of the first and the second subgroups under those factors in which appreciable differences have come to light (Fig. <ref type="figure" target="#fig_7">12</ref>).</p><p>1) Is the program of training for your speciality satisfying you?</p><p>2) Would you like to change the speciality or enter another university?</p><p>3) Are you willing to take part in scientific work, in Olympiads on your speciality? 4) Do you wish to enter postgraduate study after training end? 5) Participation in scientific work. 6) Preparedness of an auditorium for a lesson. 7) Accessibility of summer improvement. 8) Accessibility of contacts with the future employers. Respondents from classes 1 and 2 much less than the basic group are satisfied by the program of training of the speciality (point 1). They would like to change the speciality or to receive additional higher education much more than the basic group (point 2). Their difference clearly comes to light in point 3: unlike the basic group they do not wish to take part in scientific work or in the Olympiads on the speciality at all. So, apparently, the speciality has lost now its appeal for them. Respondents from class 2 are not interested in the postgraduate study (point 4), however, they are not against taking part in scientific work (point 5). The main thing, they have the most interest in contacts to employers (point 8). Apparently, it is search for their employment out of the speciality. Respondents from class 1 are focused differently: they have a little interest in scientific work and employers (points 5 and 8), but they wish to enter postgraduate study (point 4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The Multidimensional Data Model of Integrated Accounting Needed for Compiling Management Reports</head><p>Based on Calculation EBITDA Indicator The management report, formed on the basis of multidimensional data model is used to determine the profitability of the business units, business processes and enterprises considering the organizational architecture of the entity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The process of the evolutionary development of accounting and reporting in Ukraine has a long history of changes and qualitative transformations, first of all, resulting from the wish to timely provide the various groups of interested users with the reliable data. The accounting and financial reporting is considered by lots of people as a formally obligatory phenomenon approved and regulated by the state legislation. Actually, it is a fundamental basis of the de facto existing accounting and analytical system able to perform the primary functions of a business management.</p><p>The current realia of a business management require expending the boundaries of the existing accounting and reporting systems be means of including the tasks of planning, control and performance measurement regarding the activities, business processes, business units, the company as a whole, and elaborating the strategy of operation and development. Additional "non-standard" for the accounting requests from the information users and different vision of the functional tasks' development essentially enforces the formation of various types of accounting (financial, fiscal, management, strategic, etc.) and the methods of data interpretation in order to define the financial indicators such as (EBIT, EBITDA, ROA, TIER etc). One of the priority trends of the accounting development is creating the accounting and analytical system of a company that can provide all the necessary information to every level of management on a real-time basis. In this paper we present a variant of an integrated accounting data model on a company incomes and expenditures allowing you to create the management report items based on the indicator computation EBITDA, and which is in practice used at Kherson river port.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head><p>The System of Integrated Accounting</p><p>New approaches to shaping the views of the category "accounting" are based on the theory of the system: any system can be represented as a set of the inter-related and linked elements forming a certain unity and value. In addition, it is necessary to emphasize the impact of the system theory on understanding the accounting system as a multidimensional and complex informational space. Determination of the core system features is an important factor allowing seeing the accounting elements in a single accounting system. These features include: the ability to assess data to solve problems in the same monetary units; matching the economic resource cycle model, their origin, and business processes represented in the general Chart of accounts; actuality and retrospectiveness of the data obtained within the framework of accounting; legal (documentary) proofs of business transactions. The system approach to formation of the indicators to draw the various forms of reporting (financial, statistical, fiscal, management) makes it possible to assert of the establishment and operation of an integrated accounting system.</p><p>In recent years, the problem of integration of the accounting information has become particularly relevant for the scientists. A lot of them raise the issue of the necessity to get the information that allows separating the costs not only for the reproducing process as a whole, but also for all types of the core and service processes which is important to identify the most costly processes, develop measures to reduce the costs for their implementation <ref type="bibr">[1]</ref>.</p><p>The integrated accounting is the main element of the accounting and analytical business management and the basis for the accounting system functioning that allows you to transform information in order to draw various forms of reporting and identifying the indicators characterizing the degree of the approved plans implementation.</p><p>Analysis of the possibilities of the special-purpose programs of various decision support systems (DSS) available on the Ukrainian market confirms that the software products meet the requirements put forward by the modern company executives and enable to simulate any business processes with due consideration of the external and internal factors, and can automatically calculate the economically sound company's performance indicators. The main criteria for choosing the software for the Ukrainian companies is the minimum price, usability, compatibility with accounting programs usually on the 1C platform, and preferably not involving any IT experts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Multidimensional Data Model</head><p>Let us give consideration to the real-life experience of the Kherson river port on solving the tasks mentioned.</p><p>Evaluation of the performance of the Kherson river port is based on the EBITDA indicator, which, according to the foreign authors, is the key to determine the profitability, and is used all around the world <ref type="bibr">[2]</ref>.</p><p>The indicator EBITDA (Earnings before interest and tax, amortization and depreciation) means Earnings before interest, taxes, depreciation and amortization <ref type="bibr">[3]</ref>. There are several algorithms for calculating EBITDA. The company in question uses the following order to calculate the analytic indicator, as adapted to the realities of its economic activity:</p><formula xml:id="formula_242">EBITDA = NР + ITE -SIT + IE -EI +АA -DA,<label>(1)</label></formula><p>where NР -net profit, ITE -income tax expense, SIT -satisfied income tax, IEinterest expenses, EI -earned interest, АA -amortization of assets, DA -depreciation of assets.</p><p>Kherson river port maintains the financial accounting and prepares financial statements pursuant to the national Regulations (standards) of accounting (NP(S)A) and the International Financial Reporting Standards (IFRS) in parallel, which meets the requirements of the Law of Ukraine on Accounting and Financial Reporting <ref type="bibr">[4]</ref>. It is clear that the definition of EBITDA is not possible on the basis of the financial accounting data without further transformation.</p><p>The process of accounting and financial reporting at the company in question is automated using "1C: Accounting for Ukraine". Necessary details of the accounting data in "1C Accounting for Ukraine" as the raw data to determine the resulting indicator EBITDA is achieved by constructing a hierarchy of the analytical accounting levels through the structured directories for storing objects that can be hierarchically classified according to selected features. Important for the determination of EBITDA and preparation of management reports is the organizational structure, under which one should understand a complex of the typical elements of accounting in general and some of its parts in particular. Given the category features and integrated accounting, to build a multidimensional data model of EBITDA determination, a basic scheme of the integrated accounting of income and expenses is used at the company in question on the "asterisk" principle (table <ref type="table" target="#tab_1">1</ref>).</p><p>Construction of the model takes into account the complex organizational architecture of the company as well as the details of its activity. The point at issue is that the business units of the company are strongly interrelated and also perform the maintenance functions of the company in general, therefore, it is important to separate the data relating to the internal business volume to prevent any result misrepresentation. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Implementation of the Model in Рivot Table MS Excel</head><p>The process of drawing a management report based on EBITDA for the Kherson river port is realized in the pivot Excel tables, "... one of the most convenient means applying the OLAP technology, the main purpose of which is to process information for analyzing and decision making. The advantage of OLAP is to create queries using flexible ad hoc approaches without involvement of the IT experts. The pivot tables provide using of the multidimensional classifications, detail and integration of the data, identifying trends, patterns, forecasting, analysis, thus representing a weighty tool for operation of the accounting and analytical system of a multi-segment company in the real-time mode" <ref type="bibr">[5]</ref>.</p><p>Formation of items of the management statements based on the multidimensional data model of the integrated accounting and the algorithm for determining the EBITDA indicator in the pivot Excel tables are shown in Table <ref type="table" target="#tab_0">2</ref>,3.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Capabilities of the Model</head><p>A management report implemented in the pivot tables represents the data as to several informational slices -forming a subset of a multidimensional amount of data corresponding to one or more elements of measurement. For example, selecting a subset of values of the company's fixed costs over certain time, as a structural unit in general, and those of a business unit in particular, highlighting the internal business volume (fig. <ref type="figure" target="#fig_0">1</ref>). The model can not only be used for determining EBITDA and making a management reporting form, but can be a basis for implementation of the process of " Data Mining". Therewith, the spectrum of the problem solving by methods of Data Mining can be broad enough, from the sales revenue classification by types and business units to feasibility of a business unit in view of the internal business volume (fig. <ref type="figure" target="#fig_1">2</ref>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>Analysis of practical experience in the construction and operation of management accounting at the company in question, the reporting procedure for management and the algorithm for determining EBITDA are indicative of using the accounting system for the absorption -costing system which is focused on the owners (investors) requests regarding the effectiveness of the funds invested.</p><p>Organization of accounting using "1C Accounting for Ukraine" allows representing accounting as an information system in the form of a multidimensional data model to achieve a number of results, namely the creation of a single integrated accounting system, which meets both, "standard and non-standard" user requests; bridges the gap between the formation of actual financial and management accounting data; summarizes data for the preparation of management reporting forms with a given level of detail.</p><p>Use of the Pivot Tables in MS Excel provide for the appearance of new aspects of actual data usage, introduction of new connections between the data of financial and management accounting, which in turn does not lead to reconstruction of the whole accounting model and accounting database in general. In the pivot tables there are tools of data analysis allowing for the intellectual assessment, that is to summarize, group, delete unnecessary data, or increase the reliability by establishing links and accuracy of calculations. Good design of the tables can significantly facilitate the laborious process of making the management reporting forms and analyzing the company's activities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Statistical Analysis of Indexes of Capitalization of the</head><p>Ukrainian Firms: an Empirical Research</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Warsaw Stock Exchange is the largest national financial instruments exchange in the region of Central and Eastern Europe and one of the fastest-growing exchanges in Europe. The Group offers a wide range of products and services within its trading markets of equity, derivative, debt and structured products, electricity, natural gas, property rights, as well as clearing of transactions, operation of the Register of Certificates of Origin of electricity and sale of market data.</p><p>WSE started operation in 1991 as a company held 100% by the State Treasury. In 2010, the State Treasury arranged a public offering of WSE shares; as a result, shares of the Exchange were newly listed on the WSE Main Market on 9 November 2010. For instance, there are 471 companies represented at the WSE, including 51 foreign companies. Total market value of all companies is about 290 bl. Euro.</p><p>Poland's stock exchange market is growing stronger and becomes more international day by day. Its evolution is supported by the active marketing policy of the Warsaw Stock Exchange working to promote the entire infrastructure of Poland's capital market. These efforts have produced tangible results.</p><p>The Warsaw Stock Exchange conducts trading in financial instruments on three markets:</p><p>The Main List has been in operation since 16 April 1991. This market is supervised by the Polish Financial Supervision Authority and notified to the European Commission as a regulated market. The following securities and financial instruments are traded here: equities, bonds, pre-emptive rights, rights to shares, investment certificates, structured instruments, ETF and derivatives, i.e. futures contracts, options and index participation units.</p><p> NewConnect is a market organised and maintained by the WSE as an alternative trading system. It was designed for startups and developing companies, especially from the sector of new technologies. NewConnect was launched on 30 August 2007. Instruments which may be traded under this alternative trading system include equities, rights to shares, pre-emptive rights, depository receipts, as well as other equity based instruments.  Catalyst is a debt instruments market for municipal, corporate and mortgage bonds Founded on 30 September 2009, it consists of two trading platforms organised by the WSE as a regulated market and as an alternative trading system (ATS) for retail customers, and two analogous markets operated by BondSpot and designed for wholesale clients.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Problem Statements</head><p>If a company wants to be listed on the stock exchange, it should complete Initial public offering (IPO). <ref type="foot" target="#foot_23">1</ref>Initial public offering (IPO) or stock market launch is a type of public offering in which shares of stock in a company usually are sold to institutional investors (that price the company receives from the institutional investors is the IPO price) that in turn sell to the general public, on a securities exchange, for the first time.</p><p>IPO benefits:  Access to capital to fund growth Public placement of shares on a stock exchange allows the company to attract capital to fund both organic growth (modernization and upgrade of production facilities, implementation of capital-intensive projects) and acquisitive expansion. If retained earnings and debt funding are insufficient, IPO becomes one of the most realistic and convenient ways to secure the continuing growth of the business. It provides access to a massive, timeless pool of capital and boosts the investment credibility of the business.</p><p> Creation of liquidity and potential exit for the current owners Formation of a public market for the company's shares at fair price creates liquidity and provides an opportunity to sell the shares promptly with minimal transactional costs. The private owners of the company can dispose of their stakes in the business both during an IPO (this route is often taken by the minority financial investors such as venture or private capital funds) and at a later stage (this is often preferred by the majority shareholders).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> Maximum value of the company</head><p>Normally, an IPO is an offer to a large number of institutional and retail investors to become shareholders of the company. The very multitude of large investors and their confidence in the liquidity of their investment in a public entity assure the current owners of a private company about achieving the maximum possible valuation of the business at the time of an IPO or afterwards.</p><p> Enhancement of the company's public profile</p><p>Listing on a recognized stock exchange means that the business will receive wide media coverage, usually a very favorable one, thus increasing the company's visibility and recognition of its products and services. The company's activities will also be reflected in the reports by professional financial analysts. Such public profile supports liquidity of the shares and contributes to the expansion of the business contacts. It also helps to increase confidence among the company's business partners.</p><p> Improvement in debt finance terms</p><p>For domestic (Ukrainian or other CIS country-based) financial institutionsused to working with the low-transparency businesses and often inadequate financial reportinga company listed on a recognized stock exchange becomes a desirable and reliable partner. Banks are often ready to extend loans to public companies in larger amounts, under smaller collateral, for longer maturities and with lower interest rates. Even the largest and most prestigious banking institutions are keen to work with public companieswhose transparency and corporate governance serve as additional factors of confidence for banks and other suppliers of credit.</p><p> Extra assurances for partners, suppliers and clients</p><p>Partners and contractors of a public company feel more confident about its financial state and organizational capabilities as compared to those of a nontransparent private business. Partners take additional comfort in the fact that the public company has gone through rigorous legal, financial and corporate due diligencesall of which are required for a successful completion of an IPO. Confidence among partners and contractors is a sound foundation for stable and predictable business relations with the public company, and allows the latter to obtain additional leverage in negotiating better terms for doing business.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> Enhanced loyalty of key personnel</head><p>Publicly available information about the share price of a public company allows development of employee motivation schemes based on partial remuneration of staff in the form of participation in the equity capital (for example, share options). Equitybased incentive schemes stimulate the key personnel to become more efficient in their work in order to support the company's growth rates and profitable developmentwhich in turn increase the operational and financial efficiency of the company and its market value.</p><p> Superior efficiency of the business Conduct of various due diligences during the IPO process requires a thorough and comprehensive analysis of the company's business model. During the IPO implementation process, certain internal changes take place, including modification of the organizational structure; selection of the key personnel and delegation of responsibilities; improvement of internal reporting and controls; as well as critical evaluation of the efficiency of the entire business. Normally, such extensive internal efforts result in significant improvements of the communication system, management and controls; they also help eliminate any previously hidden shortcomings in the internal functioning of the business.</p><p>The IPO process can be very complicated. There are certain steps you must take along the way. These steps will help insure that your IPO is successful.</p><p> Planning for the IPO Process</p><p>You need to determine at the beginning whether it's a good time for an IPO. Choosing the ideal time to go public is very important. Plan in great detail what you hope to accomplish. Examine your financial needs and wants.</p><p>It's helpful for a business to act like a public company even before it goes public. This can be done a couple of years in advance of the IPO. Develop a business plan and prepare financial statements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> Choosing Underwriters</head><p>Most companies use underwriters to help them with IPOs. Choosing the right underwriters is key to having a successful offering. They're usually the ones responsible for buying and selling the securities to the public. They're also responsible for investigating your business to verify the financial information given to the investors. You should select the underwriters at least a few months before the IPO date.</p><p> Filing a Prospectus</p><p>Your business must file a registration statement with the US Securities and Exchange Commission (SEC). This statement contains detailed information about the offering. It also includes information about the business, its financial history and its future plans.</p><p>The registration statement becomes the preliminary prospectus once it's filed with the SEC. A prospectus is a legal document explaining the securities offered to the public. The preliminary prospectus is also called the red herring. It's called this because red ink is used on the front page to indicate certain information may change.</p><p>The SEC will examine the registration statement during a "cooling off" period. It informs the business of any necessary changes. The statement becomes the official prospectus once any necessary amendments are made. The prospectus can be used by the public to help them determine whether they want to purchase the securities for sale.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> IPO Promotion</head><p>A business going public has to market the IPO. Representatives from the company and underwriters go on a "road show" around the country. They make numerous presentations to potential investors. Typical stops include New York, Chicago, Boston, Los Angeles and San Francisco. Even international trips may be set up for overseas investors.</p><p> Final Offering Price and Amount</p><p>Choosing the final offering price and the amount of securities to be sold are very important decisions. Market conditions and the expected demand for the securities need to be examined closely. These final decisions are usually made right before the offering.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head> Selling on the Stock Market</head><p>The IPO is normally declared effective a few days after the final prospectus is received by the potential investors. This declaration is usually done after the stock market has closed. The securities will then be available for trade the next day. The IPO will hopefully be successful and provide new capital for the business for their present and future plans.</p><p>Taking into consideration the benefits of being involved in the Warsaw Stock Exchange activities, many Ukrainian companies want to be listed. However, in order to be listed at the WSE, a company is obliged to meet special requirements as follows:</p><p>1. Only a joint stock company may be an issuer of shares listed on the WSE. This does not bar entities operating under any other legal form from listing, but their owners need to transform them into joint stock companies or establish joint stock companies and transfer the entities assets thereto.</p><p>2. As a next step, the General Shareholders Meeting should adopt a resolution approving a public offer of shares and an application for admission of the shares to trading on the regulated market.</p><p>3. The decision to apply for admission to trading in the regulated market may require the preparation of a relevant information document (issue prospectus or information memorandum) so the company will need to work with:</p><p> an auditor who will audit the company's financial statements and convert them into a format comparable year to year;  a brokerage house which will offer the company's shares in a public offer.</p><p>Depending on the issuer's individual needs, the company may need to hire legal and financial advisors. The contents of the issue prospectus are laid down in the Commission Regulation (EC) No. 809/2004 of 29 April 2004 as regards information contained in prospectuses.</p><p>4. Next, the company will need to submit the working draft of the issue prospectus to the Polish Financial Supervision Authority (KNF). KNF may communicate its comments, and once the company has accommodated those in the final draft of the issue prospectus, KNF will decide whether to approve the prospectus.</p><p>5. Before opening the public offer, the issuer will need to execute an agreement with the National Depository for Securities (KDPW) whereby the securities subject to the public offer will be registered by the Depository.</p><p>6. The public offer may now proceed. Before allocated shares of a new issue are registered, rights to shares may be traded on the WSE. <ref type="foot" target="#foot_24">2</ref>7. Once the offer is closed, the company will submit an application for the admission of shares (and possibly also rights to shares) to stock exchange trading on the main or the parallel market. The WSE Management Board will examine the application. The application must include, among others, the final draft of the issue prospectus accommodating all recommendations made by the KNF.</p><p>8. Once all shares introduced to trading are deposited with KDPW, the public offer is closed, and the shares of the new issue registered by the court, the company will file with the WSE Management Board an application for the introduction of shares to trading on the main or the parallel market. The WSE Management Board will indicate the trading system and the date of the first trading session. Some Ukrainian companies have already been listed at the regular market of the WSE. There are some descriptions of such companies:</p><p>Kernel is a leading diversified agribusiness company in the Black Sea region listed on the Warsaw Stock Exchange. Handling about 6 million tons of agricultural commodities per year, Kernel supplies international markets with grain and sunflower oil produced in Ukraine and Russia. The production assets extend from black soil farmland to oilseed crushing plants supported with essential agricultural infrastructure including silos and deep-water export terminals. 2007 marked also a new stage in the development as Kernel became a publicly listed company: listed Kernel on the Warsaw Stock Exchange in November 2007 and new shareholders entered the capital of the Company to participate in the growth story. <ref type="foot" target="#foot_25">3</ref>Founded in 1993, "Astarta-Kyiv" is a vertically integrated agro-industrial holding specializing in sugar and agricultural production. It has proven to be a growing, transparent company, as well as a reliable partner and supplier. Implementing a strategy of vertical integration, ASTARTA created a fully integrated production cycle of sugar from growing the beet to sugar production and sales. Growing sugar beets lowers dependence on the external supply of sugar beets, lowers the cost of produced sugar, and guarantees constant manufacturing and the highest possible yield and quality.  dairy farming IMC is among Ukraine's top-10 agricultural companies (source of ratings: AgriSurvey, "The largest agro holdings in Ukraine", 2014, based on results of year 2013). In May, 2011 the company completed IPO on Warsaw Stock Excange, IMC raised US$ 24,4 mln to finance the development of the company. <ref type="foot" target="#foot_27">5</ref>Milkiland is an international diversified dairy producer with the core operations in the CIS and EU. The Group's total annual milk processing capacity exceeds 1 million tons. The company is proud to produce natural dairy from the best milk: a wide range of fresh dairy, different types of cheese, and butter to satisfy the consumers in their everyday needs for healthy and tasty foods. Milkiland's dry dairy products are exported to over 30 countries. The international Dobryana brand is popular among cheese and dairy consumers in Ukraine, Russia and other CIS countries. Ostankinskoye is a traditional brand for whole-milk products produced by Ostankino Diary Combine, well known by Moscow consumers. Fresh dairy under Ostrowia brand is also well known in Poland. 21.48% of the shares of Milkiland N.V. are in the free float at the Warsaw Stock Exchange. <ref type="foot" target="#foot_28">6</ref>KDM Shipping is one of the leaders of the Ukrainian shipping industry, primarily involved in the niche segment of dry bulk river-sea freight in the Black, Azov and Mediterranean Sea regions. The Group's cargo fleet consists of 10 river-sea, dry cargo vessels of total 29,673 DWT, which due to their shallow draft can access major river and sea ports in Black and Azov Sea regions. The Group also provides passenger river transport services in the Kiev and other regions of Ukraine (operating the fleet of 8 passenger river vessels), as well as ship repair services at its own shipyard located in the city of Kherson. According to International Economic Rating "League of the Bests" in 2012, the Group is ranked as # 1 in river activity and 3rd in maritime activity in Ukraine. <ref type="foot" target="#foot_29">7</ref> The Group has developed a vertically integrated business model. The Group's main activity of dry-bulk shipping is supported by its own ship repair yard, its own ship agency in selected ports as well as its own crewing department. Such business model allows the Group to benefit from certain cost efficiencies and sustain competitive advantages.</p><p>Coal Energy S.A. was incorporated in the Grand Duchy of Luxembourg and has been listed on the Warsaw Stock Exchange in Poland since 08 August 2011. Coal Energy S.A. is a holding company for a group of 12 companies operating in the coal industry in Ukraine which rank the Company as the 3rd largest in terms of coal deposits and the 4th largest in terms of extraction volumes private coal mining enterprise in the country based on the calendar year 2011 data (hereinafter -"the Group" and/or "Coal Energy").</p><p>Principal business activities of Coal Energy are mining, beneficiation and sales of thermal and coking coals as well as dual purposes coal. Companies of the Group are directly cooperating with all the largest heat and power generation plants and metallurgic plants in Ukraine. Due to its favorable geographical location and wide products' palette Coal Energy is able to export produced thermal coal to power producing stations in Turkey, Moldova, Bulgaria, Slovakia and other countries where the Group has established contacts with the largest power generations.</p><p>KSG Agro is one of the most dynamically developing agricultural groups in Ukraine. We take innovative approach for our key business philosophy. The search of non-standard approaches and creative decisions requires professional experience and passion for a native land. Our main values are people and land. Everything we produce is made by people and for people. That is why we highly appreciate your trust and consider it a key factor of the Group's success. Trust is impossible without responsibility. Providing an example of long-term and prosperous cooperation among the state, society, and agricultural business, we create the foundation for leadership.</p><p>Nowadays the Group gained a lot to be proud of; however we still strive for more. Highly-profitable agricultural industry with a high level of diversification and vertical integration gives growth prospects and sense of security. We have got the main factor for this purpose which is our team of like-minded professionals. The core business of the Group is cultivation of land and production of agricultural crops. Complex approaches to farming and focus on intensive development of business ensure high profitability and also create the conditions facilitating high yields.</p><p>The Group focuses on the following business directions:  Crop production  Vegetables production  Fruits production  Food processing business  Supplies of food to retail networks</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Results</head><p>The full list of Ukrainian companies listed at the Warsaw Stock Exchange: WIG-Ukraine is the second national index calculated by WSE. Its portfolio includes companies listed on the Warsaw Stock Exchange, where a company or head office is located in Ukraine, or whose business is conducted to the greatest extent in this country. It has been calculated since May 4, 2011. The historical values were recalculated since December 31, 2010 (the base date). The initial value of the index was 1000 points. WIG-Ukraine is a total return index and thus when it is calculated it accounts for both prices of underlying shares and dividend and subscription rights income. <ref type="foot" target="#foot_30">8</ref>Composition of WIG-Ukraine (as for 24 February 2015) (1) M(t)-capitalisation of index portfolio at session "t" M(0)-capitalisation of index portfolio at base date K(t)-adjustment coefficient for session "t" Now, using application package of MS Excel, we shall determine the effect of Ukrainian companies to index. The following table draws up the results: (2) We shall interpret it as following:  6.079performs, that after zero changes of prices of shares of all companies і к з the index shall be increased by 6%  4.956-performs, that after 1 % increase of prices of shares of Kernel Holding the index shall be increased by 5%  2.686-performs, that after 1 % increase of prices of shares of Astarta Kiev the index shall be increased by 2,7%  0.385-performs, that after 1 % increase of prices of shares of Ovostar Union the index shall be increased by 0,38%  1.379-performs, that after 1 % increase of prices of shares of Industrial Milk Co. the index shall be increased by 1,34%  2.693-performs, that after 1 % increase of prices of shares of Milkiland the index shall be increased by 2,7%  0.889-performs, that after 1 % increase of prices of shares of KDM Shipping Public Ltd the index shall be increased by 0,9%  1.705-performs, that after 1 % increase of prices of shares of Coal Energy the index shall be increased by 1,7%  1.473-performs, that after 1 % increase of prices of shares of KSG Agro the index shall be increased by 1,5%</p><p>Application of Student's t-Tests shows, that almost all companies have an effect on the index. Though, we can point out two of them, namely Kernel Holding, Astarta Kiev, having the most considerable effect on the index. Their shares account for the most considerable percentage, in particular for 67% of Wig-Ukraine index. More importantly, Kernel Holding and Astarta Kiev are the first companies to be listed at the regular market. They have already adapted to the market, having a great superiority as compared to other Ukrainian companies. Moreover, Kernel Holding is also included in composition of WIG30 index which is based on the value of portfolio of 30 major and most liquid companies on the WSE Main List. Both companies are engaged in ag- </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Insignificant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Significant</head><p>Insignificant tkr 1.97 ricultural business, which is the most distinctive feature of the Ukrainian companies, involved in international business activity.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>The following results were obtained in the course of this research:  The primary reason (motive) for the Ukrainian companies to be listed at WSE is the possibility of acquiring access to the capital;  The reputation and credibility of the stock company (market) provides the Ukrainian companies with the possibility of finding new investors or potential financial partners;  As of today, there are 11 Ukrainian companies at WSE and 2 companies at the NewConnect market;  More than two billions Euros were attracted by the Ukrainian companies;  In fact, Warsaw Stock Exchange is the most effective way of entry into the international market for the Ukrainian companies, which, in the meantime, enables the companies to strengthen their positions on the market, raise capital and gain investments in the future.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Progress in the area of ICT and network technology has provided new insights into the problems of the formation and development of the educational environment of the university, showing a need for advanced ICT access, especially with regard to the use of the cloud-based tools and resources. There is a need for modernization of learning technologies, supported by emerging ICT, on the basis of advanced network infrastructures.</p><p>Cloud computing technology (CC) enhances multiple access and joint use of educational resources at different levels and domains. On the basis of this technology, it is possible to combine the corporate resources of the university within a united framework. To achieve this aim, a set of cloud-based learning models should be created for the elaboration and design of learning resources and the learning environment architecture to deliver access to learning resources.</p><p>The purpose of the article is analyse the current trends in the university cloudbased learning environment formation from the perspective of different service models used, and to substantiate and validate the hybrid service model of access to the learning resources.</p><p>The research method involved analysing the current research (including the domestic and foreign experience of the application of cloud-based learning services to reveal the concept of the investigation), examining existing models and approaches, estimating the current state of research development, considering existing technological solutions and psychological and pedagogical assumptions about better ways of introducing innovative technology, and conducting pedagogical experiments, surveys and expert evaluations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Problem Statement</head><p>The progress of ICT has a significant impact on the formation of the educational environment of the university bringing with it new models of the organization of learning activity which arise on the basis of decisions about innovative technology. In this regard, the phenomenon of the cloud-based learning environment has come to the forefront as it has many progressive features including better adaptability and mobility, as well as full-scale interactivity, free network access, a unified infrastructure among others <ref type="bibr">[4,</ref><ref type="bibr">19,</ref><ref type="bibr">20]</ref>.</p><p>The challenges of making the information technology infrastructure of the university setting fit the needs of its users, taking maximum advantage of modern network technologies, and ensuring the best pedagogical outcomes to increase the learning results, has led to the search for the most reasonable ways of organizing tools and services within the framework of this environment. For this purpose, the modelling and analysis of its structure and functions, and determining the possible types and forms of learning activity in the organization have come to the fore. Among the priority issues for ICT infrastructure design is the access to software and electronic educational resources provision <ref type="bibr">[4]</ref>. To choose the best solution there is a need to consider existing approaches and models to reveal possible ways of service deployment, and to analyse the existing experience of its use.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">State of the Art</head><p>According to the recent research <ref type="bibr">[4,</ref><ref type="bibr">9,</ref><ref type="bibr">13,</ref><ref type="bibr">18,</ref><ref type="bibr">19]</ref>, the problems of implementing cloud technologies in educational institutions so as to provide software access, support collaborative learning, implement scientific and educational activities, support research and project development, exchange experience and are especially challenging. The formation of the cloud-based learning environment is recognized as a priority by the international educational community <ref type="bibr">[16]</ref>, and is now being intensively developed in different areas of education, including mathematics and engineering <ref type="bibr">[2,</ref><ref type="bibr">8,</ref><ref type="bibr">11,</ref><ref type="bibr">25,</ref><ref type="bibr">27]</ref>.</p><p>The transformation of the modern educational environment of the university by the use of the cloud-based services and cloud computing (CC) delivery platforms is an important trend in research. The topics of software virtualization and the forming of a unified ICT infrastructure on the basis of CC have become increasingly popular lines of research <ref type="bibr">[8,</ref><ref type="bibr">18,</ref><ref type="bibr">23]</ref>. The problems with the use of private and public cloud services, their advantages and disadvantages, perspectives on their application, and targets and implementation strategies are within the spectrum of this research <ref type="bibr">[7,</ref><ref type="bibr">8,</ref><ref type="bibr">25]</ref>.</p><p>There is a gradual shift towards the outsourcing of ICT services that is likely to provide more flexible, powerful and high-quality educational services and resources <ref type="bibr">[4]</ref>. There is a tendency towards the increasing use of the software-as-a-service (SaaS) tool. Along with SaaS the network design and operation, security operations, desktop computing support, datacentre provision and other services are increasingly being outsourced as well. Indeed, the use of the outsourcing mechanism for a non-core activity of any organization, as the recent surveys have observed happening in business, is now being extended into the education sector <ref type="bibr">[9]</ref>. So, the study of the best practices in the use of cloud services in an educational environment, the analysis and evaluation of possible ways of development, and service quality estimation in this context have to be considered.</p><p>The valuable experience of the Massachusetts institute of technology (MIT) should be noted in concern to the cloud based learning environment formation in particular as for access to mathematical software. The Math software is available in the corporate cloud of the University for the most popular packages such as Mathematica, Mathlab, Maple, R, Maxima <ref type="bibr">[27]</ref>. This software is delivered in the distributed mode on-line through the corporate access point. This is to save on license pay and also on computing facilities. The mathematics applications require powerful processing so it is advisable to use it in the cloud. On the other case the market need in such tools inspires its supply by the SaaS model. This is evidenced by the emergence of the cloud versions for such products as Sage MathCloud, Maple Net, MATLAB webserver, WebMathematica, Calculation Laboratory and others <ref type="bibr">[2,</ref><ref type="bibr">8]</ref>. Really there is a shift toward the cloud-based models as from the side of educational and scientific community, and also from the side of product suppliers. The learning software actually becomes a service in any case, let it be a public or a corporate cloud.</p><p>There are many disciplines where it is necessary to outsource the processing capacity: for example, the computer design for handling vast amounts of data for graphics or video applications. This is also a useful tool used to support the collaborative work of developers, as the modern graphical applications appear to be super-powerful and require joint efforts <ref type="bibr">[7]</ref>. There is a research trend connected to the virtual computing laboratories (VCL) <ref type="bibr">[14,</ref><ref type="bibr">26]</ref> delivered in the cloud-based paradigm. This trend is inherent in the field of informatics, and learning resources for processing and sharing are needed.</p><p>Nowadays there are various universal cloud consumer applications, in particular MicrosoftOffice 365, Google Docs and others which gain an appropriate use in educational process <ref type="bibr">[9,</ref><ref type="bibr">23]</ref>. There is also a wide range of cloud services such as online photo and video editors, web pages processors, services for translation, check spelling, anti plagiarism and many others which are now available <ref type="bibr">[23]</ref>.</p><p>There is a principal transformation of approaches in concern to services supply within the cloud based infrastructure. It is considered to be a new stage of the service oriented models development <ref type="bibr">[10,</ref><ref type="bibr">24]</ref>. There is a branch of research devoted to the service oriented infrastructure in this actual perspective. The issues of service oriented architecture development and are described in <ref type="bibr">[10]</ref>. The problem of turning software into a service is also posed <ref type="bibr">[24]</ref>. For example, more powerful approaches for services integration appear while services compositions are used as building blocks in a process of elaboration of programming code <ref type="bibr">[14]</ref>. The CC development brought the term the service orchestration into scientific discussion while number of web services can be combined to perform the higher level business process to manage and coordinate execution of the component processes <ref type="bibr">[12]</ref>. In this regard the notion of the global software development (GSD) is considered as novel trends overcome geographical limits <ref type="bibr">[12]</ref>. There is a significant revise of approaches to ICT services elaboration and this is concerned to its integration and composition.</p><p>An essential feature of the cloud computing conception is dynamical supply of computing resources, software and hardware its flexible configuration according to user needs. Due to this approach, access to educational software set on a cloud server or in a public cloud is organized. So comparison of different approaches and cloud models of software access is the current subject matter of educational research <ref type="bibr">[7,</ref><ref type="bibr">8,</ref><ref type="bibr">23,</ref><ref type="bibr">25]</ref>. Also the problems of quality criteria for software choice in the learning complexes to be implemented in a cloud arise. Despite of the fact that the sphere of CC is rather emerging there is a need of some comparison of the achieved experience to consider future prospects <ref type="bibr">[23]</ref>.</p><p>Another set of problems is concerned with the hybrid service models and infrastructure solutions combining different public and corporate services on the united platform. This trend is now especially promising for the sphere of education <ref type="bibr">[8,</ref><ref type="bibr">17]</ref>. The challenge regarding novel technological solutions and their impact guide the search for the most reasonable method of implementation.</p><p>Thus, in view of the current tendencies, the research questions are: how can we take maximum advantage of modern network technologies and compose the tools and services of the learning environment to achieve better results? What are the best ways to access electronic resources if the environment is designed mainly and essentially on the basis of CC? This brings the problem of cloud-based services modelling, integration and design to the forefront.</p><p>Along with the emergence of cloud computing, the number of objects, developments and domain applications are continually growing, which indicates the rapid spread of the innovation <ref type="bibr">[20]</ref>. The concept of the cloud-based learning environment is now in line with the wider trend; that is to say, the ICT environment of the university, where some didactic functions as well as some fundamentally important functions of scientific research are supported by the appropriately coordinated and integrated use of cloud services <ref type="bibr">[20]</ref>. The aim of the cloud-based learning environment formation is to meet the users' educational needs. To do this, the introduction of cloud technology in the learning process should to be holistic and carried out according to the principles of open education, including meeting the following needs: the mobility of students and teachers, equal access to educational systems, providing qualitative education, and forming and structuring of educational services <ref type="bibr">[3,</ref><ref type="bibr">20]</ref>.</p><p>The main elements of the cloud computing conception, including the types, application service models, essential features, ICT architecture and others, are reflected in the structure of the modern educational organizational systems <ref type="bibr">[5]</ref>. Therefore, a number of concepts and principles that characterize the development and application of CC-based services are significant in the consideration of the educational environment design.</p><p>The concept of electronic educational (learning) resources (EER) appears to be the centre of attention. In particular, at the Institute of Information Technologies and Learning Tools of the National Academy of Pedagogical Sciences of Ukraine the conception that provided the definition of electronic educational resources (EER) its classification, and the ways it can be applied has been developed and proposed <ref type="bibr">[5]</ref>.</p><p>According to the definition given in <ref type="bibr">[5, p.3]</ref>, "The electronic educational resources are a kind of educational tool (for training, etc.) that are electronically placed and served in educational system data storage devices which are a set of electronic information objects (documents, documented information and instructions, information materials, procedural models, etc.)".</p><p>The elaboration of the electronic learning resources should be considered as a specific activity, which is linked to the mandatory need to take into consideration the psychological and pedagogical aspects of building an educational system methodology, the design of an open computer-based learning environment, and the involvement of the scientific and pedagogical staff, including the best teachers and educators <ref type="bibr">[4]</ref>.</p><p>Cloud Serviceis a service that makes software applications, data storage or computing capacity available to users over the Internet <ref type="bibr">[16]</ref>. These services are used to supply the electronic educational resources that make up the substance of a cloudbased environment, and to provide the processes of elaboration and use of the educational services.</p><p>Electronic resources appear to be both the objects and the tools of activity for a learner; therefore, these resources are used to maintain certain functions that are realized in the learning process. By the educational service we mean a service provided at the request (in response to an inquiry etc.) of a user that meets some service function carried out by the organization or institution (service provider, outsourcer) <ref type="bibr">[4]</ref>.</p><p>Nowadays, the various types of electronic educational resources that may be delivered by the cloud in the learning environment of the university constitute libraries and depositories of EER or those retrieved when open analytical information systems are used. The EER supports different types of learning and research activities, such as theoretical material studies, the search for useful information, translation and grammar checking, task solutions, testing, training, simulation, making experiments and others.</p><p>Along with the development of information and communication technologies for education, the ways and tools of access to electronic resources have changed in an evolutionarily way and its custom properties have improved. There are new types of EER supplied by means of cloud technologies. The EER of the public cloud can occupy the role of software for general purposes such as office applications, systems support processes for communication and data exchange and others, and also the special software designed for educational use <ref type="bibr">[13,</ref><ref type="bibr">23]</ref>. The number of EERs is increasing and this trend is likely to intensify. By means of CC-based tools, a significant lifting of restrictions on the implementation of access to qualitative leaning resources may be achieved. Now, these questions are not a matter of future perspective, they need practical implementation. For this purpose, the problem of the design and delivery of electronic educational resources in the cloud-based environment is a complex one and not only should technological needs be considered, but also the pedagogical aspects.</p><p>With the advance of ICT, CC technologies appear to be a factor in the change in the content, methods and organizational forms of learning and development of the open education models. Now, cloud computing technology is used to improve the educational process through the presentation of a modern learning content adequate to the goals set, the quality monitoring and evaluation of learning results at the various stages, the creation of new organizational forms of learning, the creation of innovative educational and scientific resources and electronic systems and their implementation in the process of students' self-study and classroom study, advances in computeraided and mixed models of training and so on <ref type="bibr">[20]</ref>.</p><p>As noted in <ref type="bibr">[5]</ref>, the necessary measures for the development of the human resources' component of the software industry created in Ukraine that concern the organization of EER access in the educational institutions are as follows: improvement to EER quality, scientific-methodological research on the implementation of innovative technologies and prospective models and methods in education, the development of the normative regulatory framework, strengthening the firms and companies in the IT industry and their participation in providing educational hardware and software and so on.</p><p>Due to the significant educational potential and novel approaches to environmental design, its formation and development, these questions remain the matter of theoretical and experimental studies, the refinement of approaches, and the search for models, methods and techniques, as well as possible ways of implementation <ref type="bibr">[4]</ref>.</p><p>To carry out research and experimental activities and the implementation and dissemination of the results, the Joint research laboratory of the Institute of Information Technologies and Learning Tools of the NAPS of Ukraine and the Kherson State University was created in 2011 with the focus on issues of educational quality management using ICT <ref type="bibr">[29]</ref>.</p><p>As part of the programme of joint research work, the Kherson State University was approved as an experimental base for research on the definition and experimental verification of the didactic requirements and methods of evaluating the quality of electronic learning resources in the educational processes of the pilot schools <ref type="bibr">[29]</ref>. The purpose of the experiment carried out was to identify and experimentally verify the requirements and methods of evaluating the quality of the electronic learning resources used in the educational process in secondary schools <ref type="bibr">[29]</ref>.</p><p>The quality evaluation of EER in the cloud-based learning environment is a separate line of work in the Laboratory's research. In this case, there are different approaches and indicators. The access organization has been changed so the models of learning activity have been changed also. There are the following questions: What features and properties have to be checked so as to measure the pedagogical effect of the cloud-based approach? With regard to the pedagogical innovation, what are the factors influencing pedagogical systems, their structure and organization? Is the improvement in learning results achieved due to the cloud-based models? In this context, the quality of EER is a criterion for estimating the level of organization and functioning of the cloud-based learning environment.</p><p>With regard to this, the following hypothesis is to be posed: the design of the learning environment on the basis of cloud models of access to learning resources contributes to the improvement of the quality of these resources and the improvement of the processes in this environment and their organization and functioning, resulting in an improvement in learning results.</p><p>In the cloud-based learning environment, new ways of EER quality control arise. There are specific forms of the organization of learning activity related to quality estimation. For example there are e-learning systems based on the modelling and tracking of individual trajectories of each student's progress, knowledge level and further development <ref type="bibr">[28]</ref>. This presupposes the adjustment, coordination of training, consideration of pace of training, diagnosis of achieved level of mastery of the material, consideration of a broad range of various facilities for learning to ensure suitability for a larger contingent of users. The vast data collections about the students' rates of learning are situated and processed in the cloud <ref type="bibr">[28]</ref>. There are also collaborative forms of learning where the students and teachers take part in the process of resource elaboration and assessment; this is possible in particular by means of the SageMathCloud platform <ref type="bibr">[2]</ref>.</p><p>The prospective way of the estimation of the quality of learning resources is by means of the cloud-based environment. As the resources are collectively accessed, there is a way to allow experts into the learning process so they may observe and research their functioning. This is a way to make the process of quality estimation easier, more flexible and quicker. The process of estimation becomes anticipatory and timely. The estimation may be obtained just once along with the process of EER elaboration, and it is very important to facilitate the process. This method of estimation was developed and used in the Joint laboratory of EER quality control <ref type="bibr">[29]</ref>. In this case, the different quality parameters will be detailed and selected. It is important that the psychological and pedagogical parameters are estimated in the experimental learning process, while the other types of parameter such as technological or ergonomic may be estimated out of this process.</p><p>The indicator of accessibility is also included in the focus of this investigation <ref type="bibr">[15]</ref>. This property is essential because it is prior to other features such as scientific correctness, clarity, consistency and others, which may be researched only if this resource is available and feasible. The accessibility is characterized in turn by such features as convenience of the access organization, ease of use, interface consistency, advisability and others.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">The Types of Service Models for Learning Resources Access</head><p>According to recent research, a unified storage architecture is an advantage of cloud based settings allowing application virtualization <ref type="bibr">[18,</ref><ref type="bibr">19]</ref>. This architecture is designed for the large complex data sets retrieving and management and it has the following features:</p><p> different storage protocols are maintained in the same system (FC, NFS, FcoE, CIFS, iSCSI);  various storage functions are implemented within the same device (storage, security, backup, recovery);  storage space is scaled and modified without interruption of usual operations;  data are integrated in a standard pool, which can be controlled over a network and managed via standard software package;  data are used for different range of applications while storage area is not necessarily separated to enable saving computing capacity through virtualization.</p><p>Application virtualization is a technology for software access and development without installing it on a personal computer of a user. Data processing and storage is fulfilled in a data centre, and working with applications is not different for a customer from the working with applications installed on his (her) own desktop.</p><p>There are three main types of service models <ref type="bibr">[16]</ref> that correspond to different ways the ICT outsourcing used to provide software and computing resources access <ref type="bibr">[4]</ref>. In particular, SaaS (Software-as a Service) is to deliver software applications of a provider via the Internet; PaaS (Platform as a Service) is to develop and implement software applications created by a user via the Internet; IaaS (Infrastructure as a Service) is to provide on-line infrastructure where a customer may develop whatever software applications <ref type="bibr">[19]</ref>.</p><p>P.Mell and T.Grance define various service models of the cloud-based architecture (Fig. <ref type="figure" target="#fig_0">1</ref>) <ref type="bibr">[16]</ref>. These models may be purposefully used for providing software access in educational institutions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Fig. 1. Service model architectures (After P.Mell, T.Grance [16]).</head><p>There are also four service deployment models for cloud computing application that reflect the mode of the cloud infrastructure set up in a particular organization: the corporate cloud is owned or leased by the organization; the cloud community is a shared infrastructure used by a community; the public cloud is a mega-scale infrastructure that may be used by any person under some payment terms; the hybrid cloud is a composition of one or more models <ref type="bibr">[4,</ref><ref type="bibr">16]</ref>.</p><p>In view of the different models for cloud service architecture, when choosing the most appropriate solution that is suitable for a particular organisation, both collective and individual users should be considered. Selecting the SaaS model in this respect can be justified by the fact that these services are the most accessible, although a thorough market analysis and educationally prudent choice of the necessary application that could fit learning or scientific purposes is to be made. This kind of service may be purposefully used by an individual and also a collective user.</p><p>At the same time, for the settlement of the ICT infrastructure of the institution by the PaaS or IaaS model, the selection and approval of the relevant cloud platform is necessary. This solution is concerned with a number of organisational issues, such as the formation of a special unit of ICT personnel skilled in setting up and deploying this infrastructure, configuring the hardware and software complexes, planning and working out the environmental design tasks, testing and approving its modules and components, filling it with the necessary resources, monitoring its implementation,  <ref type="bibr">[4]</ref>. In this case, given the results of recent research and the current trends in IT sector development, the use of hybrid service models appears to be a promising and prospective solution. The hybrid solutions are reported to be well-embedded into existing settlements provided by leading cloud suppliers, and this tendency is growing <ref type="bibr">[9]</ref>. The hybrid cloud incorporates public and corporate cloud tools that do not necessarily exclude the involvement of software-as-a-service applications <ref type="bibr">[19]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>SERVICE MODEL ARCHITECTURES</head><note type="other">Cloud</note><p>As shown in Fig. <ref type="figure" target="#fig_0">1</ref>, there are three approaches to implementation of learning software access in the SaaS architecture. In the first case (directly SaaS) the cloud platform deployment is not necessary in the educational institution this work is undertaken by a service provider. In both other cases the corporate or hybrid cloud deployment is needed. In this case the appropriate cloud platform (eg, Amazon Web Services, Microsoft Azure, Eucaliptus, Xen, WMWare etc.) is used to deploy the certain service model. In the process of cloud infrastructure configuration the guidelines are usually supplied by the vendor <ref type="bibr">[1]</ref>. These guidelines contain a number of basic deployment scenarios that can be implemented. It is possible to build the cloud by means of different software and services but the basic notions are to be considered. One of the basic concepts of the cloud based learning environment configuration is the concept of a corporate cloud or a virtual private cloud (VPC). Sometimes the term is used not very clearly so as to describe the corporate cloud that may include a public and also a private part so being the hybrid one. Depending on the scenario chosen the certain model of software access is considered.</p><p>As a rule the cloud provider may propose services of several types. For example, it is possible to rent additional disk space (S3); the virtual machine (EC2), with certain parameters of the processor, memory, and disk capacity, it may be with some installed operational system and software; remote database (SimpleBD, RDS) and others <ref type="bibr">[1]</ref>. Depending on the chosen scenario these resources are configured within the cloud infrastructure.</p><p>There are four types of scenario for the cloud infrastructure configuration that are mostly proposed by the provider <ref type="bibr">[1]</ref>:</p><p>Scenario 1: VPC with only public subnet. The configuration of the virtual cloud under this scenario contains a single public subnet and Internet gateway so as to enable communication over the Internet. This configuration is recommended if it is necessary to run the single level, public web applications such as blogs, web sites <ref type="bibr">[1]</ref>.</p><p>Scenario 2: VPC with public and corporate subnets. The configuration for this scenario includes a public and corporate (private) subnet. This configuration is recommended if it is necessary to run a public web application, while internal servers are not publicly available. An example is a multi-website with the web servers situated in a public subnet, and the database servers to be in a corporate subnet. It is possible to configure the security services and routing so that the web servers could interact with the database servers <ref type="bibr">[1]</ref>.</p><p>Scenario 3: VPC with the public and corporate subnet components and virtual private network (VPN) access. The configuration for this scenario includes the virtual hybrid cloud with the public and corporate subnets and the virtual corporate gateway namely the VPN connections. In an educational institution may be own subnet, which should be expanded by augmented cloud services, such as additional disk space, databases, virtual machines, network gateways, additional "desktops" and so on. VPN-connection is used to enable communication with this subnet. You can also create the virtual cloud subsystem (subnet virtual machine) with access to the corporate subnet via the Internet <ref type="bibr">[1]</ref>. For this scenario, the multi-level applications with scalable web services may be run, some parts of these applications are in the public subnet, and another parts are in the corporate subnet, which is connected to own subnet through the VPN channel <ref type="bibr">[1]</ref>. This allows you to keep some data in the limited access.</p><p>Scenario 4: VPC subnet with the corporate VPN access components. The configuration for this scenario includes the virtual corporate subnet and the virtual gateway to allow communication with own subnet through the VPN channel. This scenario is recommended if there is a need to expand own subnet into the cloud, as well as to provide direct access to the Internet from this subnet without making it "visible" from the Internet <ref type="bibr">[1]</ref>.</p><p>On the stage of environment design all the possible configurations were considered and the model of the Scenario 3 was chosen so as to provide the hybrid infrastructure were the corporate and public components were used (Fig. <ref type="figure" target="#fig_1">2</ref>). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">The Hybrid Service Model of Learning Software Access</head><p>To research the hybrid service model of learning software access, a joint investigation was undertaken in 2013-2014 at the Institute of Information Technologies and Learning Tools of the NAPS of Ukraine and Drohobych State Pedagogical University named after I.Franko. At the pedagogical university, the experimental base was established where the cloud version of the Maxima system (which is mathematical software), installed on a virtual server running Ubuntu 10.04 (Lucid Lynks), was implemented. In the repository of this operational system is a version of Maxima based on the editor Emacs, which was installed on a student's virtual desktop <ref type="bibr">[21]</ref>. In this case, the implementation of software access due to the hybrid cloud deployment in Scenario 3 was organised. In Fig. <ref type="figure" target="#fig_2">3</ref>, the configuration of the virtual hybrid cloud used in the pedagogical experiment is shown. The model contains a virtual corporate (private) subnet and a public subnet. The public subnet can be accessed by a user through the remote desktop protocol (RDP). In this case, a user (student) refers to certain electronic resources and a computing capacity set on a virtual machine of the cloud server from any device, anywhere and at any time, using the Internet connection.</p><p>In this case, a user's computer is the RDP-client, while the virtual machine in the cloud is the RDP-server. In the case of a corporate (private) subnet, a user cannot apply to the RDP-server via desktop because it is not connected to the Internet directly. Computers in the corporate subnet have Internet access via the VPNconnection, i.e. the gateway. Thus, these computers cannot be accessed from any device, but only from the specially configured one (for example, a computer in the educational institution or any other device where the VPN-connection is set up) (Fig. <ref type="figure" target="#fig_2">3</ref>).</p><p>The advantage of the proposed model is that, in a learning process, it is necessary to use both corporate and public learning resources for special purposes. In particular, the corporate cloud contains limited access software; this may be due to the copyright being owned by an author, or the use of licensed software products, personal data and other information of corporate use. In addition, there is a considerable saving of computational resources, as the software used in the distributed mode does not require direct Internet access for each student. At the same time, there is a possibility of placing some public resources on a virtual server so the learner can access them via the Internet and use the server with the powerful processing capabilities in any place and at any time. These resources are in the public cloud and can be supplied as needed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Implementation and Empirical Evaluation</head><p>In the joint research experiment held at Drohobych State Pedagogical University named after I.Franko, 240 students participated. The aim was to test the specially designed learning environment for training the operations research skills on the basis of the Maxima system. During the study, the formation of students' professional competence by means of a special training method was examined. The experiment confirmed the rise of the student competence, which was shown using the χ 2 -Pearson criterion <ref type="bibr">[21]</ref>. This result was achieved through a deepening of the research component of training. The experiment was designed using a local version of the Maxima system installed on a student's desktop.</p><p>The special aspect of the study was the expansion of these results using the cloud version of the Maxima system that was posted on a virtual desktop. In the first case study (with the local version), this tool was applied only in special training situations. In the second case study (the cloud version), the students' research activity with the system extended beyond the classroom time. This, in turn, was used to improve the learning outcomes.</p><p>The cloud-based electronic learning resource used in the experiment has undergone a quality estimation. The method of quality estimation in the joint laboratory of educational quality management with the use of ICT was used for this study <ref type="bibr">[29]</ref>. The 25 experts were specially selected as having experience in teaching professional disciplines focused on the use of ICT and being involved in the evaluation process. The experts evaluated the electronic resource with such parameters as "Ease of access", "Ease of use" and "Usefulness". These parameters were chosen as they contribute to the accessibility of the cloud resource and the cloud-based learning in order to determine its feasibility and availability.</p><p>The problem was: is it reasonable and feasible to arrange the environment in a proposed way? There were three questions part of the access realisation mode (Table <ref type="table" target="#tab_1">1</ref>): A four-point scale (0 (no), 1 (low), 2 (good), 3 (excellent)) was used for the questions. The 25 experts estimated two parameters, "Ease of access" and "Ease of use", and were invited to examine the resource. Experience using this resource in the learning process was not mandatory. The third parameter, "Usefulness", was estimated only by the seven experts who used the resource in the learning process. The results of the evaluation are shown in Fig. <ref type="figure" target="#fig_3">4</ref>. The resulting average value was calculated for every parameter: "Ease of access" = 2.2, "Ease of use" = 1.86 and "Usefulness = 2.1. All criteria were weighted as one, and the total value was 2.1. This characterises the resource accessibility as sufficient for further implementation and use.</p><p>The advantage of the approach is the possibility to compare the different ways to implement resources with regard to the learning infrastructure. Future research in this area should consider different types of resources and environments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="8">Conclusion</head><p>The introduction of innovative technological solutions into the learning environment of educational institutions contributes to unified learning infrastructure formation and the growth of access to the best examples of electronic resources and services. ICT use is promising regarding learning settings that can advance and develop the tendencies of CC progress. For example, using the cloud-based models of environment design, virtualising applications, unifying infrastructure, integrating services, increasing the use of electronic resources, expanding collaborative forms of work, widening the use of the hybrid models of ICT delivery and increasing the quality of electronic resources.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Electronic educational resources (EER) is object of quality management system of the educational process with the use of ICT <ref type="bibr">[1,</ref><ref type="bibr">2]</ref>. There are two main approaches to the concept of quality EER: compliance with standards and customer requirements. Therefore it is necessary to take into account two aspects: compliance with educational standards and meeting the requirements of students and teachers of the university. The compatibility with international standards IMS, SCORM can be chosen as a criterion for EER quality.</p><p>Improving the EER quality is the main purpose of the quality management system (QMS) <ref type="bibr">[3]</ref>. Implementation of QMS in institutions can improve processes by establishing the effective and efficient management systems. Thus, EER quality management provides tools, methods and technologies for the continuous improvement of the educational process. This improves performance, reduces the costs and ultimately increases the competitive advantages of the institution.</p><p>Standards ISO 9000/9001 and ISO 29990 represent one of the models of management of the institution to ensure the quality of the educational process <ref type="bibr">[4]</ref>. Monitoring is an essential tool of evaluating the quality of the educational process, in particular the quality of the EER. The EER quality monitoring is understand as continuous process of observation and recording EER parameters and their subsequent evaluation. Quality monitoring provides expert advice according to the estimating procedure of the EER.</p><p>Because EER are classified as electronic educational editions and at the same time they are software products then EER quality monitoring should be multilevel taking into account their classifications.</p><p>The basic types of electronic educational resources for EER quality monitoring should be assigned. For each EER type the weight factors and quality indicators should be offered. The general criterion of quality electronic resources should be used to assess their quality. It is average weighted characteristic of quality and takes into account the weights of resource types and their relative quality indicators. The assessment of EER quality monitoring is given by a corresponding university commission of experts <ref type="bibr">[1]</ref>.</p><p>Task of the present work is the analysis, calculation and optimization of parameters of EER quality management system with use of methods for the analysis of complex systems <ref type="bibr">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Model of EER Quality Management System</head><p>The EER quality management system is a structural element of architecture of education quality management system in the higher educational institution. It plays a feedback role in EER quality management system of educational process.</p><p>The structure of EER quality management system is presented on figure 1 <ref type="bibr">[1]</ref>. Let's list the basic elements of quality management system of electronic resources of learning.</p><p>Assessment of EER quality underlies a quality management system of electronic resources of learning. For an assessment of EER quality it is necessary:</p><p> to carry out monitoring for control of EER quality on a fixed basis;  to have a feedback with users of EER for the account of wishes in their improvement from positions methodical and program-technology requirements. It is necessary to develop these criteria of EER quality for carrying out of monitoring of quality. The university council of experts confirms the criteria of EER quality developed by the methodical commissions. The university council of experts also confirms the recommendations about improvement qualities of EER received as a result of the analysis of users' responses in Feedback system.</p><p>Results of an assessment of EER quality should be used on the one hand for improvement of their substantial part and satisfaction to technology requirements, and on the other hand for publication of a rating of electronic learning resources that also promotes the increase of their quality. Monitoring of EER quality has a leading role at their assessment of quality. The analysis of electronic resources of learning shows, that they have the following classification: to a functional character they can be referred to learning editions, under the form of representation they belong to a category of electronic editions, on the technology of creation they represent software product <ref type="bibr">[5]</ref>. Therefore the monitoring of quality of electronic educational resources should be multi-criterion and multilevel according to their classification. The satisfaction requirement to the universal international standards that are IMS, SCORM <ref type="bibr">[6]</ref> is the uniting attribute of multilevel monitoring of EER quality.</p><p>At monitoring of EER quality it is necessary to consider, the certain typological model of system of educational editions for high schools which includes four groups of the educational information resources differentiated to a functional sign, defining their value and a place in educational process has affirmed <ref type="bibr">[7]</ref> Training of teachers and employees standardized set of information blocks which contains data about an educational resource. The IMS-package which contains educational object consists of two main elements <ref type="bibr">[6]</ref>:</p><p> the IMS-manifestoa special file which describes the base resources, the maintenance and the organization of educational object (it is represented in language XML);  the physical files which make educational object.</p><p>At monitoring of EER quality it is necessary to consider their typical classification: electronic textbooks and methodical manuals, practical and virtual laboratory works, tests and training simulators, etc.</p><p>Among all EER the special role is played by a distance learning course. It is the basic educational object which is used in distance learning. It is compound training object which unites various EER for the purpose of the organization of learning process with use of special program environments -Distance Learning System (DLS). The example of such program environment which allows to create, keep and use distance courses, is DLS «Kherson Virtual University» <ref type="bibr">[7]</ref>.</p><p>The criterion of EER quality is considered as the average factor of quality K = (α1k1 + α2k2 + … + αnkn)/n, where αiaverage value of quality indicators, kivalue of weight factor of i-type resource.</p><p>The general relative average criterion of EER quality can be calculated under the formula <ref type="bibr">[</ref></p><formula xml:id="formula_243">1]    N i i i t a K 1 .</formula><p>(</p><p>Here ai = ni•γithe quality metrics,</p><formula xml:id="formula_245">   i m j ij i k 1 </formula><p>/kiMaverage factor of quality, niweight factor, miquantity of metric indicators of quality, kijj-indicator of quality, kiMthe maximum value of an indicator of quality, tithe generalized factor of quality of i-type resource, Nquantity of EER.</p><p>The Feedback system serves as the tool for the organization of flexible and all-round polls of opinions of students and teachers of university. Usually the system takes questioning in an automatic mode. The generalized assessment of EER quality was received after statistical processing of results of questioning of users, it gives the opportunity to consider the degree of their demand at quality monitoring.</p><p>Standards and certification ISO 9000/9001. Certification is a documentary acknowledgement of conformity of production to certain requirements, concrete standards or specifications. It is necessary to notice, that conformity to standard ISO 9000/9001 does not guarantee high EER quality. However conformity to requirements and recommendations of these standards is a necessary condition of high quality of resources of training. The certificate of conformity ISO 9001 is acknowledgement of satisfaction to standard requirements.</p><p>Standard ISO 9000/9001 is fundamental, the terms and definitions accepted in it are used in all standards of a series 9000. This standard is a basis for understanding of base elements of QMS according to ISO standards.</p><p>Requirements of standard ISO 9000/9001 can be used as criteria at the organization and carrying out of monitoring of EER quality. University council of experts. In the control system of EER quality the university advisory council is the body which is responsible for adequacy assessment of EER quality taking into account all criteria and indicators of quality. It adopts the Regulation about ERR quality management system, defines the criteria of their quality, forms rules of carrying out and confirms results of an assessment of quality, and also plans actions for improvement of EER quality.</p><p>The university advisory council defines the procedure of carrying out of monitoring of EER quality. It confirms the list of criteria of quality, their weight factors and values of indicators of quality according to <ref type="bibr">(1)</ref>.</p><p>Support and upgrade of EER is the important part of work in QMS for improvement and optimization of EER software at its use in educational process. Support EER is one of the phases of the software lifecycle. The software logs the detection correction, and add new functionality to increase efficiency. Support software is defined by standard IEEE Standard for Software Maintenance (IEEE 1219), and the life cycle standard is specified ISO 12207.</p><p>The important factor of increase of efficiency usage of EER is training of users and maintenance them with regular support at work with the current software version.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Integrated and differentiated approaches in modeling and use of EER quality management system</head><p>The control system of EER quality is a model which describes the business process including actions and activity of services of university according to functionality of structure described above the scheme of EER quality management (fig. <ref type="figure" target="#fig_1">2</ref>). It is necessary to notice, that some elements of this system possess the property of close interrelation and have various degrees of influence on it. Thus some elements of the system (for example, «University Advisory Council» and «Standards and Certification ISO 9000/9001» at monitoring of EER quality) can be united in groups which we will name services. Therefore for the purpose of allocation of major factors of a quality control system, influencing quality of its work, on the basis of its structure (fig. <ref type="figure" target="#fig_1">2</ref>) we form three main places of maintenance of EER quality: service of quality monitoring, service of quality assessment and EER support and upgrade service. We will define structure, primary goals, requirements and expected results of work of these services.</p><p>The Service of quality monitoring is intended for the organization and carrying out of EER quality monitoring which are used in educational process, by criterion of their conformity to the international educational standards. The University advisory council defines the order and rules of carrying out of monitoring of EER quality.</p><p>Service tasks: the coordination of parameters and development of criteria of EER quality, taking into account the requirements of standards, carrying out of analysis of EER by the developed and coordinated criteria.</p><p>Requirements: carrying out monitoring on fixed basis, completeness of coverage of all kinds of EER, objectivity of application of criteria of quality.</p><p>Expected results: data of the analysis of EER characteristics for their assessment of quality.</p><p>The Service of an assessment of quality makes EER assessment on the basis of the confirmed criteria taking into account the opinion of usersboth students, and teachers. Feedback system can be used for automation of carrying out polls and processing of results.</p><p>Service tasks: to assess of EER quality by the developed and coordinated criteria on the basis of the analysis of their characteristics for maintenance of formation of rating.</p><p>Requirements: objectivity, publicity, competitive character.</p><p>Expected results: on the basis of quality assessment to generate the list of reclamations to electronic resources of learning for performance of works on their elimination and to make rating of EER for increasing of motivation of authors of resources for improvement of their quality.</p><p>The Service of EER support and upgrade carries out the organization, planning and performance of works on improvement of their quality by correction of the noticed lacks, realization of new didactic properties and possibilities of electronic resources of learning. Experts of this service give consulting services in acquiring new EER, and also take part in training of teachers and employees to use them.</p><p>Service tasks: on a constant basis taking into account an assessment of EER quality to perform works on their upgrade and as much as possible to satisfy inquiries of users.</p><p>Requirements: operatively, qualitatively and full performance of works.</p><p>Expected results: upgrade and introduction new and improved EER in educational process of university.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Analysis EER QMS by criteria of its elements importance</head><p>Services of control system of EER quality provide the consecutive process of their monitoring, assessment of quality and support. Thus Feedback system plays a feedback role in this process. On fig. <ref type="figure" target="#fig_1">2</ref> the function chart of work of services of EER QMS is presented.</p><p>According to methods of the theory of automatic control we will designate through Wi(p) -transfer functions of EER quality of corresponding services (i = 1,2,3) and Feedback system (i = 4) <ref type="bibr">[8]</ref>. According to rules of calculation of consecutive connection of links of system and taking into account Feedback system transfer function of opened system W(p) is expressed through the transfer functions of corresponding links Wi(p) under the formula</p><formula xml:id="formula_246">) ( ) ( ) ( 1 ) ( ) ( ) ( ) ( 4 3 2 3 2 1 p W p W p W p W p W p W p W       . (<label>2</label></formula><formula xml:id="formula_247">)</formula><p>It is necessary to notice, that the Feedback system can play a role both local negative (-), and local positive (+) feedback. Thus the role of a negative feedback is more significant and more often is used in work of EER QMS as the main mission of EER QMS consists in revealing of resources of poor quality and their upgrade. At the same time the system can be in a status of action of a local positive feedback in case of a mode of popularization of the best practices on creation qualitative EER. With sufficient degree of generality it is possible to consider the model of ideal strengthening of links of system. Then Wi(p) = ki (i = 1,2,3,4), where ki-factors of improvement of EER quality of corresponding i-links of system. Generally for factor k improvement of EER quality of all the QMS from (2) we have expression</p><formula xml:id="formula_248">4 3 2 3 2 1 1 k k k k k k k       . (<label>3</label></formula><formula xml:id="formula_249">)</formula><p>Considering, that the control system of EER quality is a global feedback in architecture of control system of learning quality, the condition performance suffices for maintenance of improvement of electronic resources quality k &gt; 1 or</p><formula xml:id="formula_250">k1• k2• k3 &gt; 1 ± k2• k3• k4. (<label>4</label></formula><formula xml:id="formula_251">)</formula><p>The correlation (3) together with a condition (4) allows to apply the differentiated approach to the account of degree of importance of elements of EER QMS, and also to optimize parameters of this system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Methods of calculation and optimization of parameters of EER QMS</head><p>For the purpose of optimization of parameters of EER QMS we will apply the method of consecutive allocation of the major elements of system by criterion of their influence on system from the point of view of EER quality. In considered above the model of ideal strengthening of links of system the factors of improvement of EER quality can act as weight factors of the importance of elements of EER QMS of learning. The optimum combination of values of these factors will promote the optimization of operating modes of all control system by quality of electronic resources. In practice factors k1, k2, k3 and k4 are not the determined parameters, and have properties of random variables with the known law of distribution therefore at modeling of optimum statuses of EER QMS it is necessary to apply statistical methods of calculation and optimization of parameters of system.</p><p>As example of use of statistical methods of calculation and optimization of parameters of system the calculation of an average of distribution of factor k improvement of EER quality depending on average of distributions of factors ki can serve. Optimization of dispersion of values k is realized by imposing of restrictions on known values of average of distributions and mean square deviations of factors ki.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head><p>Implementation and Empirical Evaluation of EER quality management system</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Method of expert evaluations of EER quality</head><p>In assessing the EER quality by the form of organization the method of collective estimation is used with collective expert opinion. This method is used to obtain quantitative estimates of the quality characteristics, parameters and properties. Analysis of expert assessments involves filling each individual expert appropriate form, the results of which are a comprehensive analysis of the problem situation and possible solutions. The results of peer reviews are issued as a separate document.</p><p>The purpose of peer reviews of EER quality is an evaluation of EER quality indicators with international, national and industry standards, the EER quality monitoring, quality of the learning process through the use of qualitative EER and processing methods, criteria and forms for certification e-learning.</p><p>Objects and parameters of EER assessment:  Classification of EER types.  The weight factors of EER types (EER relative priority for their type).  Factors and criteria of EER quality for their types.</p><p>The following forms of expertise processing of EER quality are: 1. Definition of the competence of experts and the formation of the expert committee.</p><p>2. Evaluation of weight factors ranging of EER types.</p><p>3. Parameterization of EER quality indicators. 4. Expertise processing of EER quality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Study the adequacy of the results of expertise.</head><p>Expert committee is created for the EER expertise with use of peer reviews method. Delphi method is used in the formation of the expert committee and expertise processing <ref type="bibr">[9]</ref>. Top teachers, methodologists and researchers of higher education institutions are involved in the commission of experts.</p><p>Since EER are classified as electronic publications for educational purposes and they are software products, the examination of the quality of electronic educational resources should be layered with regard to their classifications. Therefore, the EER quality should be analyzed by the software and technological, psychological, pedagogical and ergonomic features. EER quality indicators are derivative of the requirements for them. Meeting the requirements of program-technological, psychological, pedagogical and ergonomic ones are a measure of EER quality assessment in determining their quality indicators</p><p>In this case the development of tools is based on modern fulfilled hygiene, ergonomic and technical and technological standards to the use of computer technology and is governed by existing regulations or standards. You can ask to have developed technology expertise of EER quality indicators that can be fully regulated in detail. However, there are problems of evaluating these indicators related to obsolescence of existing standards and the fact that definition of quality are not further developed.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">The EER quality monitoring in educational institutions</head><p>Monitoring and evaluation (M&amp;E) is a process that helps improving performance and achieving results. Its goal is to improve current and future management of outputs, outcomes and impact <ref type="bibr">[10]</ref>. Consider the EER quality monitoring by the example of DLS «Kherson Virtual University» <ref type="bibr">[7]</ref>.</p><p>Formation of the commission of experts. Determining the validity of each of the three subjects of the educational process was made by expert evaluation method. 25 qualified experts (university teachers, graduate students, methodologists) was joined the independent expert committee.</p><p>To define a point of evaluation for each subject Delphi method (for members of the expert committee conditions for an independent individual work were created) was used. The statistical processing of the results, which were presented to experts for final approval, had been conducted.</p><p>Construction of weights ranging of EER types. The weight factor of EER type is a numerical coefficient, a parameter that determines the value, the relative importance of this EER type than other types that are classified EER on functional grounds. Table <ref type="table" target="#tab_1">1</ref> shows an example of a possible evaluation of EER weighting coefficients values according to their types. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Parameterization of EER quality indicators</head><p>The EER quality indicator is a numerical parameter that determines the evaluation the EER under its qualitative characteristic (can be used a five point Likert's system). Also the EER types are specified, which are measured by this indicator. Filling out the list of EER quality indicators and their attachment to the EER types is held after approving the list of EER types.</p><p>Parameterization of EER quality indicators means evaluation of quality by scaling method <ref type="bibr">[11]</ref>. Table <ref type="table" target="#tab_0">2</ref> shows an example of evaluation of EER quality indicators under their quality point scale. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The study of the adequacy of experiment results</head><p>Expert evaluation of the EER quality can be considered sufficiently reliable only when a good consistency of expert answers. Therefore, the statistical processing of the results of experts evaluations should include an analysis of consensus of experts. Concordance method is used to assess the degree of consensus of experts on the factors: weights of EER types, parameterization of EER quality indicators, and average factor of EER quality <ref type="bibr">[12]</ref>.</p><p>Experts were asked to complete the table 1 for peer review weighting factors of EER types. The values of the weighting factors were selected from 100 point scale. The results of the survey of experts are presented in Table <ref type="table" target="#tab_21">3</ref>. Concordance coefficient W is calculated according to the formula proposed by Kendall <ref type="bibr">[12]</ref> ) (</p><formula xml:id="formula_252">12 3 2 n n m S W   . (<label>5</label></formula><formula xml:id="formula_253">)</formula><p>Here</p><formula xml:id="formula_254">  2 1 1 1 2 ) 1 ( 2 1            n i m j ij n i i n m x S</formula><p>, mnumber of experts, nthe number of objects of examination (e.g., EER types), xijassessment of the i-object by j-expert. Coefficient of concordance may vary between 0 and 1. If W = 1, all experts gave the same evaluations for all objects, if W = 0, the evaluations of experts are not coordinated.</p><p>Using the formula ( <ref type="formula" target="#formula_47">5</ref>) we calculated that coefficient W = 0,872 and it is significantly different from zero, so we can assume that among experts there is objective concordance. Given that the value of m(n -1)W is distributed according to χ 2 with (n -1) is the degree of freedom, then Thus, the results of pedagogical experiment confirmed the assumption that the method of expert evaluations can be the basis for the EER quality monitoring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions and Outlook</head><p>The system of EER quality monitoring is based on the multi-criterion analysis of conformity of these resources to the educational standards. Criterion of EER quality compatibility with standards IMS, SCORM can be chosen.</p><p>Criteria of EER quality are described on a basis the multi-criterion analysis taking into account EER compatibility with the international standards.</p><p>The basic types of electronic resources of educational appointment for carrying out of monitoring of EER quality are allocated. For each type of EER their weight factors and quality indicators are offered. The criterion of quality of an electronic training resource which is the average characteristic of quality is developed.</p><p>Technologies for EER quality monitoring is based on the method of expert evaluations. The criterion of EER quality is considered as the weighted average value of quality indicators. The weights of EER types and indicators of EER quality for their types are evaluated in pedagogical experiment. Results of experiment confirmed the assumption that the method of expert evaluations can be the basis for the EER quality monitoring. Concordance method is used to assess the degree of consensus of experts on the factors: weights of EER types, parameterization of EER quality indicators, and weighted average criterion of EER quality. The model of quality management system is shown in the example of assessing the quality of the distance learning system resources.</p><p>The offered system of an assessment of ERR quality is not unique and supposes additions and updating. The assessment of monitoring of EER quality is given by a corresponding commission of experts of university.</p><p>The method of testing is used for the experimental verification of the results of expert evaluation of the ERR quality. Electronic educational resources are subject to testing by means of their actual use in the educational process. As a result of comprehensive testing, a system of adjustments is formed to improve the ERR. The process of testing and further development of electronic educational resources is an iterative cyclical process. It should continue until achieving compliance with the ERR quality requirements. Therefore, the process of testing is an element of the quality management system of electronic educational resources. That study of ERR quality management system with their testing in educational process is the prospect of further work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Realisation of "Black Boxes" Using Machines 1 Introduction</head><p>Let us suppose that two finite alphabets X and Y are given. The first of them we identify as the alphabet of stimuli and the second one as the alphabet of responses. Following to the general cybernetic concept <ref type="bibr">[1,</ref><ref type="bibr">Chapter 6]</ref> we can consider any mapping M : X ω → Y ∞ as the transfer function of some "black box", whose inputs belong to the set X ω of infinite sequences of stimuli and outputs belong to the set Y ∞ of finite or infinite sequences of responses. The realisation problem of such a mapping using a machine is the principal problem that is solved by a system engineer. In other words a system engineer transforms a "black" box into a "white box" or "glass box".</p><p>The realisation problem had been studied in detail (see, for example, <ref type="bibr">[6]</ref>) for the mapping M : X ω → Y ω holding the following non-anticipation property</p><formula xml:id="formula_255">1 if M (ux ′ ) = y ′ , M (ux ′′ ) = y ′′ for some finite sequence of stimuli u = u 1 u 2 . . . u n and x ′ , x ′′ ∈ X ω then y ′ = vz ′ and y ′′ = vz ′′ for some finite sequence of responses v = v 1 v 2 . . . v n and z ′ , z ′′ ∈ Y ω . (<label>1</label></formula><formula xml:id="formula_256">)</formula><p>In this case there exists a Moore machine whose transfer function coincides with the mapping M <ref type="bibr">[4,</ref><ref type="bibr">6]</ref>.</p><p>We should note the following: the previous formulation for the non-anticipation property implicitly implies that the "black box" responds immediately on each stimulus. However there are systems having another reaction type. It is quite possible such a system behaviour that requires to defer a response for as long as the sufficient amount of the information will be received. For example, complex event processing systems (see <ref type="bibr">[7]</ref>) have such a reaction type. Therefore processes of the specification and analysis for such systems require another models or at least models, which generalise already existing ones. This paper is an attempt to solve the realisation problem for "black boxes" with transfer function that satisfies the generalisation being defined below of the non-anticipation property.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Prerequisites and Notation</head><p>The aim of this section is to give brief survey of some matters and explain the basic notation used below.</p><p>At the paper we use the denotation N for the natural series with 0 . For a set X (it is usually finite) we use the notation: X * denotes the set of all finite sequences (words) whose elements belong to X ; ε denotes the empty word; X + denotes the set X * {ε} ; X ω denotes the set of all (infinite) sequences whose elements belong to X ; X ∞ denotes the union of the sets X * and X ω . Further, we use the denotation |u| for the length of the word u ∈ X * and assume that |x| = +∞ for any infinite sequence x ∈ X ω .</p><p>To refer to the k-th member of a word u ∈ X * (or a sequence x ∈ X ω ) the denotation u[k] (or x[k] respectively) is used.</p><p>For a word u ∈ X * whose length is equal or greater than n (or a sequence x ∈ X ω ) by u[1 : n] (or x[1 : n] respectively) we denote the word u <ref type="bibr">[1]</ref> </p><formula xml:id="formula_257">. . . u[n] (or x[1] . . . x[n]).</formula><p>Similarly, for a word u ∈ X * whose length is greater than or equal to n (or a sequence x ∈ X ω ) by u </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Non-anticipation Property</head><p>In Sec. 1 we have given the definition of the non-anticipation property for a transfer function from X ω into Y ω under condition that the corresponding "black box" reacts on each stimulus. Our nearest goal is to generalise the previous definition for the case when a "black box" is capable to decide whether the accumulated information is sufficient for the correct response and generates the response if the decision positive otherwise postpones the response generation.</p><p>Firstly, it is needed to say that in this case the class of studied transfer functions are being extended up to the class of mappings from X ω into Y ∞ . Further, we should specify that the identity of prefixes for streams of stimuli guarantees the identity of prefixes for the corresponding streams of responses. The sequential character of processing streams of stimuli by a "black box" requires that there exists a correspondence between word of stimuli u (as prefix of the corresponding streams) and length N (u) of the response word (see Fig. <ref type="figure" target="#fig_0">1</ref>).</p><formula xml:id="formula_258">"Black box" u = x[1]x[2] . . . x[n] y[1]y[2] . . . y[N (u)] N (u) ≤ n Fig. 1. A sequential "black box"</formula><p>The following definition is our attempt to present these considerations as a formal specification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 1. We shall say that the non-anticipation property holds for a mapping</head><formula xml:id="formula_259">M : X ω → Y ∞ if the following is true: there exists a funtion N : X * → N such that 1. N (u) ≤ |u| for any u ∈ X * ; 2. if u ′ ∈ X * and u ′′ = u ′ x for some x ∈ X then N (u ′ ) ≤ N (u ′′ ) ≤ N (u ′ ) + 1 ; 3. if x ′ , x ′′ ∈ u • X ω for some u ∈ X * then (M x ′ )[1 : N (u)] = (M x ′′ )[1 : N (u)] ; 4. for any u ∈ X * there exist x ′ , x ′′ ∈ u • X ω such that (M x ′ )[1 : N (u) + 1] = (M x ′′ )[1 : N (u) + 1] .                                          (2)</formula><p>Remark 1. Informally, jump points for the function N introduced in Def. 1 determine response instants of the "black box". Items 3) and 4) ensure this interpretation.</p><p>Remark 2. Item 2) ensures that the "black box" corresponding to a mapping that holds the non-anticipation property generates at most one response at a stimulus.</p><p>Remark 3. Item 3) and 4) of Def. 1 guarantee also that the existence of function N for the mapping M : X ω → Y ∞ implies the uniqueness of N . Y that is defined as follows</p><formula xml:id="formula_260">µ(u) ↑ iff N (u) = N (u[1 : |u| − 1]) µ(u) ↓= M (uz)[N (u)] iff N (u) &gt; N (u[1 : |u| − 1]) .</formula><p>Item 3) of Def. 1 ensures the uniqueness of determining µ(u) . To determine the significance of the mapping µ let us consider the following algorithm and proposition.</p><p>Require: a sequence of stimuli x ∈ X ω Ensure: to print the corresponding sequence of responses</p><formula xml:id="formula_261">n = 1 while True : while µ(x[1 : n]) ↑ : n + = 1 print(µ(x[1 : n])) n + = 1</formula><p>Algorithm 1: "Black box" algorithm for a mapping M : X ω → Y ∞ that holds the non-anticipation property Proposition 1. For any x ∈ X ω Algorithm 1 prints the sequence M x .</p><p>Proof. Taking into account (2) one can easy see that new response is printed only</p><formula xml:id="formula_262">if N (x[1 : n − 1]) = N (x[1 : n]) . In this case the printed symbol is (M x)[n] . ⊓ ⊔ Definition 2.</formula><p>Let M : X ω → Y ∞ be a mapping that holds the non-anticipation property then the corresponding partial mapping µ : X + Y we shall call its reaction function.</p><p>Conversely, we can consider a partial mapping µ : X + Y and use Algorithm 1 to define the mapping M : X ω → Y ∞ . Proposition 2. Let µ : X + Y be a partial mapping then the correspondence x ∈ X ω → y ∈ Y ∞ , when y is the sequence printed by Algorithm 1 under handling x , determines the mapping M : X ω → Y ∞ that holds the non-anticipation property.</p><p>Proof. The key idea of the proof consists in the following recursive construction of the function N : X * → N : base of recursion: N (ε) = 0 ; step of recursion:</p><formula xml:id="formula_263">N (ux) = N (u), if µ(x) ↑ N (u) + 1, if µ(x) ↓ .</formula><p>Now, easy seen that the mapping M holds the non-anticipation property. ⊓ ⊔</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Automata and Pre-automata</head><p>In this section we remind the definition of automata as the simplest discrete systems that respond on external stimuli by changing their states. Automata are actions of free finitely generated monoids on the state sets from the mathematical standpoint. In <ref type="bibr">[3]</ref> authors have introduced the notion of a pre-automaton using a generalisation of the notion of an action known as a partial action. Taking into account that these notions is used below and they are not widely used we include this section to give the information necessary for understanding of the further text.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Automata</head><p>We start our consideration reminding the definition of an automaton.</p><formula xml:id="formula_264">Definition 3. A triple A(X, S A , δ A ) is called an automaton if X is a finite alphabet of stimuli, S A is a set of states of the automaton, δ A : S A × X → S A is a</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>mapping, which is called the transition function of the automaton.</head><p>An automaton behaviour is determined by a right action of the monoid X * on the state set S A <ref type="bibr">[2]</ref>.</p><p>Proposition 3. Let A(X, S A , δ A ) be an automaton then the defined recursively defined mapping δ * A :</p><formula xml:id="formula_265">S A × X * → S A δ * A (s, ε) = s for any s ∈ S A ; (3) δ * A (s, ux) = δ A (δ * A (s, u), x) for s ∈ S A , u ∈ X * , x ∈ X (4)</formula><p>is a right action of monoid X * on the set S A .</p><p>Proof. To prove the proposition it is sufficient to check the equality</p><formula xml:id="formula_266">δ * A (s, u ′ u ′′ ) = δ * A (δ * A (s, u ′ ), u ′′ ) for any s ∈ S A , u ′ , u ′′ ∈ X * .</formula><p>Checking is a simple exercise in the application of mathematical induction on the length of u ′′ . ⊓ ⊔</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Pre-automata</head><p>The notion of a pre-automaton had been introduced in <ref type="bibr">[3]</ref> by replacing the action with the partial action in the definition. (5)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Interrelations between Automata and Pre-automata</head><p>In this section we describe some method that allows us to construct a preautomaton using an automaton. Suppose that we have taken some automaton A(X, S A , δ A ) .</p><p>Let us define the pre-automaton P(X, S P , δ * P ) in the following manner: 1. choose as S P an arbitrary subset of S A ; 2. define the partial mapping δ * P : S P × X * S P as follows for s ∈ S P and u ∈ X * let assign that</p><formula xml:id="formula_267">δ * P (s, u) ↑ if δ * A (s, u) / ∈ S P and δ * P (s, u) ↓= δ * A (s, u) if δ * A (s, u) ∈ S P .         <label>(6)</label></formula><p>Proposition 4. The triple defined by construction ( <ref type="formula" target="#formula_5">6</ref>) is a pre-automaton.</p><p>Proof. Indeed, item (3) ensures that item 1) of ( <ref type="formula" target="#formula_47">5</ref>) is satisfied. Further, Prop. 3 implies that items 2) and 3) of ( <ref type="formula" target="#formula_47">5</ref>) are satisfied.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>⊓ ⊔</head><p>The assertion just proved demonstrates that the method to obtain preautomata consists in hiding part of the states.</p><p>The converse assertion proved in <ref type="bibr">[3]</ref> as Globalisation Theorem ensures that the method considered above is the most general method to obtain pre-automata.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Moore Machines and Pre-machines</head><p>In this section we discuss the question about how a Moore machine or its generalisation, which we call a Moore pre-machine, can realise a "black box".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Moore Machines</head><p>Usually, automata associate with "black boxes" in the following manner.</p><p>Firstly, the class of Moore machines is defined.</p><p>Definition 5. Let A(X, S A , δ A ) be an automaton then the corresponding Moore machine is a pentacle M A (X, S A , δ A , s 0 M , λ M ) where s 0 M is some fixed state of A called the initial state of the machine and λ M : S A → Y is a mapping called the output function of the machine.</p><p>Then for a Moore machine is determined its reaction function. Definition 6. Let M A (X, S A , δ A , s 0 M , λ M ) be a Moore machine then its reaction function µ M : X * → Y is determined by the formula</p><formula xml:id="formula_268">µ M (u) = λ M (δ A (s 0 M , u)) .<label>(7)</label></formula><p>Finally, we define the transfer function M M : X ω → Y ω for the machine M A using its reaction function µ M and Algorithm 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Moore Pre-machine</head><p>Here we repeat all constructions from the previous subsection substituting a pre-automaton for an automaton.</p><p>Firstly, the class of Moore pre-machines is defined.</p><p>Definition 7. Let P(X, S P , δ * P ) be a pre-automaton then the corresponding Moore pre-machine is a pentacle M P (X, S P , δ * P , s 0 M , λ M ) where s 0 M is some fixed state of P called the initial state of the pre-machine and λ M : S P → Y is a mapping called the output function of the pre-machine.</p><p>Then for a Moore pre-machine is determined its reaction function. Definition 8. Let M P (X, S P , δ * P , s 0 M , λ M ) be a Moore pre-machine then its reaction function µ M : X + Y is determined in the following manner</p><formula xml:id="formula_269">1. µ M (u) ↑ if δ * M (s 0 M , u) ↑ and 2. µ M (u) ↓= λ M (δ * P (s 0 M , u)) if δ * M (s 0 M , u) ↓ . (<label>8</label></formula><formula xml:id="formula_270">)</formula><p>Finally, we define the transfer function M M : X ω → Y ∞ for the pre-machine M P using its reaction function µ M and Algorithm 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Posing of Synthesis Problem</head><p>The preceding arguments show that machines and pre-machines can be considered as "glass boxes". It is known that machines are "glass boxes" for a proper subclass of the class of all "black boxes" <ref type="bibr">[4,</ref><ref type="bibr">6]</ref>. Therefore we pose the following problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Problem 1 (Synthesis Problem</head><p>). Suppose we have a mapping M : X ω → Y ∞ that holds the non-anticipation property. It is required to describe the properties of the mapping that ensure the existence of a pre-machine M P such that M M ∼ = M .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Solving Synthesis Problem</head><p>Solving the problems posed at the end of the previous section is given in three stages: firstly, some solution of the problem is constructed, secondly, this solution is reduced, and, finally, the minimality of this reduced solution is proved.</p><p>Taking into account the fact that the hypothesis of the problem includes the non-anticipation property for the mapping M we can consider the reaction function µ of the "black box" instead its transfer function.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1">Existence of Solution</head><p>Thus we assume that two alphabets (the input alphabet X and the output alphabet Y ) and a partial mapping µ : X + Y are given. Let us choose</p><formula xml:id="formula_271">S F = X * ; δ F (u, x) = ux for x ∈ X and u ∈ X * . (<label>9</label></formula><formula xml:id="formula_272">)</formula><p>Now consider the triple F(X, S F , δ F ) .</p><p>Lemma 1. The triple F(X, S F , δ F ) is an automaton such that the right action δ * F : S F × X * → S F associated with it satisfy the equation</p><formula xml:id="formula_273">δ * F (u, v) = uv (<label>10</label></formula><formula xml:id="formula_274">)</formula><formula xml:id="formula_275">for all u, v ∈ X * .</formula><p>Proof. Checking is reduced to a simple application of the mathematical induction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>⊓ ⊔</head><p>Now let us choose S µ F ⊂ S F in the following manner:</p><formula xml:id="formula_276">S µ F = {u ∈ X * | µ(sequ) ↓} {ε} .</formula><p>Now applying construction <ref type="bibr">(6)</ref> and we obtain the pre-automaton F µ (X, S F , δ µ F ) . Theorem 1 (Existence of Solutions for the Synthesis Problem). Let us consider the Moore pre-machine M µ F (X, S µ F , δ µ * F s 0 F , λ µ F ) , where</p><formula xml:id="formula_277">s 0 F = ε ; λ µ F (u) = µ(u) if µ(u) ↓ ; λ µ F (ε) is defined arbitrary , then µ M µ F ∼ = µ .</formula><p>Proof. Really, M µ F is a Moore pre-machine. Hence we need to prove that µ M µ F (u) ↓ if and only if µ(u) ↓ and the equality µ M µ F (u) = µ(u) holds on the common domain. But this follows immediately from Lemma 1 and the specification of the pre-machine M µ F . ⊓ ⊔</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2">Indistinguishability and Syntactic Pre-Machine</head><p>The solution that is given in the previous subsection for the Synthesis Problem is too redundant because the state set of the corresponding pre-machine contains too many indistinguishable states. In this subsection we demonstrate the method to eliminate the lack of the construction.</p><p>Our consideration refers to some concepts of the theory of ordered sets. The necessary information can be found in <ref type="bibr">[5,</ref><ref type="bibr">Chapter 1]</ref>. Definition 9. We shall say that u ′ ∈ X * can not be distinct from u ′′ ∈ X * using µ (this assertion is below written as u ′ µ u ′′ ) if µ(u ′ w) ↓ implies µ(u ′′ w) ↓= µ(u ′ w) for any w ∈ X * .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 5. The relation "</head><p>µ " is a quasi-order on X * satisfying the following condition: if u ′ µ u ′′ and w ∈ X * then u ′ w µ u ′′ w . Proof. Reflexivity and transitivity of the relation is evident. Now suppose that u ′ ∈ X * , u ′′ ∈ X * , w ∈ X * , and</p><formula xml:id="formula_278">u ′ µ u ′′ . If µ((u ′ w)v) ↓ for some v ∈ X * then u ′ µ u ′′ ensures µ(u ′′ (wv)) ↓= µ(u ′ (wv)) and, therefore, µ((u ′′ w)v) ↓= µ((u ′ w)v) . ⊓ ⊔</formula><p>The following simple property of " µ " is used below. Proposition 6. The assertions u ′ µ u ′′ and µ(u ′ ) ↓ imply µ(u ′′ ) ↓= µ(u ′ ) . Proof. To verify the validity of the proposition it is sufficient to put w = ε in Def. 9.</p><p>⊓ ⊔ Definition 10. Let u ′ , u ′′ ∈ X * then we say that u ′ and u ′′ are µ-congruent (this assertion is below written as u ≡ µ u ′′ ) if both u ′ µ u ′′ and u ′′ µ u ′ are true.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 7. The relation " ≡</head><p>µ " is a right congruence on X * that satisfies the following property: if u ′ , u ′′ ∈ X * and u ′ ≡ µ u ′′ then µ(u ′ ) ↓ if and only if µ(u ′′ ) ↓ and in this case µ(u ′ ) = µ(u ′′ ) .</p><p>Proof. The fact that " ≡ µ " is an equivalence relation follows from the properties of a quasi-order <ref type="bibr">[5,</ref><ref type="bibr">Sec. 1.3]</ref>. Its stability relative to the right multiplication follows immediately from the similar property for the relation " µ ". Finally, the last assertion of the proposition follows from Prop. 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>⊓ ⊔</head><p>Let us define</p><formula xml:id="formula_279">S µ A = X * / ≡ µ ; δ µ A ([u] µ , x) = [ux] µ ,<label>(11)</label></formula><p>where <ref type="bibr">[•]</ref> µ denotes a class of the µ-congruence, u ∈ X * , and x ∈ X . Note that the property to be a right congruence for the equivalence " ≡ µ " ensures the correctness of the definition of δ µ A . Now consider the triple A µ (X, S µ A , δ µ A ) . Lemma 2. The triple A µ is an automaton such that the right action associated with it δ µ * A : S µ A × X * → S µ A satisfies the equation</p><formula xml:id="formula_280">δ µ * A ([u] µ , v) = [uv] µ (<label>12</label></formula><formula xml:id="formula_281">)</formula><p>for all u, v ∈ X * .</p><p>Proof. The lemma is easy proved by induction on the length of v .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>⊓ ⊔</head><p>Now we can note that Prop. 7 ensures one of the alternatives:</p><formula xml:id="formula_282">either [u] µ ⊂ {v ∈ X * | µ(v) ↓} or [u] µ {v ∈ X * | µ(v) ↓} = ∅ .</formula><p>This remark allows us to choose S µ S ⊂ S µ A in the following manner:</p><formula xml:id="formula_283">S µ S = {[u] µ | u ∈ X * and µ(u) ↓} {[ε]</formula><p>µ } . Hence we can again apply construction ( <ref type="formula" target="#formula_5">6</ref>) and obtain the pre-automaton S µ (X, S µ S , δ µ * S ) . Theorem 2 (about Syntactic Pre-machine). Let us consider the Moore premachine M µ S (X, S µ S , δ µ * S , s 0 S , λ µ S ) , where</p><formula xml:id="formula_284">s 0 S = [ε] µ ; λ µ S ([u] µ ) = µ(u) if µ(u) ↓ ; λ µ S ([ε] µ ) is defined arbitrary , then µ M µ S ∼ = µ .</formula><p>Proof. Let us note that Prop. 7 ensures the correctness for the definition of the mapping λ µ S . Further, Lemma 2 guarantees the validity of µ M µ S ∼ = µ . ⊓ ⊔ Remark 6. We shall call the Moore pre-machine built in the theorem the syntactic pre-machine.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3">Syntactic Pre-machine as Minimal Solution of Synthesis Problem</head><p>To complete the program indicated above, we need to establish the minimality of the pre-machine M µ S in any sense. First of all, we note that the pre-machine M µ S holds evidently the following property called the reachability: one can obtain any state of the pre-machine applying its partial action to the initial state. Now let us formulate the main result.</p><p>Theorem 3 (about Minimality of Syntactic Pre-machine). For any reachable Moore pre-machine M P (X, S P , δ * P , s 0 M , λ M ) such that µ M ∼ = µ there exists a mapping ψ : S P → S µ S satisfying the following conditions 1. for any s ∈ S P and u ∈ X * the assertion δ * P (s, u)</p><formula xml:id="formula_285">↓ implies δ µ * S (ψ(s), u) ↓= ψ(δ P (s, u)) ; 2. ψ(s 0 M ) = s 0 S ; 3. µ ∼ = µ S µ • ψ .</formula><p>Proof. The key item of the proof is the construction of the mapping ψ . Let s ∈ S P and u ′ , u ′′ ∈ X * such that δ * P (s 0 M , u ′ ) ↓= s and δ P (s 0 M , u ′′ ) ↓= s then we can show that u ′ µ u ′′ . Indeed, suppose that µ(u ′ w) ↓ for some w ∈ X * . Taking into account that</p><formula xml:id="formula_286">µ M ∼ = µ we can write µ(u ′ w) = λ M (δ * M (s 0 M , u ′ w))</formula><p>. Note that the previous equality ensures δ * M (s 0 M , u ′ w) ↓ and therefore (5) leads to the conclusion that δ * P (δ * P (s 0 M , u ′ ), w)) ↓ . Using the supposition δ * P (s 0 M , u ′ ) ↓= s and ( <ref type="formula" target="#formula_47">5</ref>) we obtain</p><formula xml:id="formula_287">µ(u ′ w) = λ M (δ * P (δ * P (s 0 M , u ′ ), w)) = λ M (δ * P (s, w)) .</formula><p>This equation ensures δ * P (s, w) ↓ . Hence the supposition δ * P (s 0 M , u ′′ ) ↓= s implies δ * P (δ * P (s 0 M , u ′′ ), w) ↓= δ * P (s, w) . Thus µ(u ′′ w) ↓= µ(u ′ w) and, therefore, u ′′ µ u ′ . Similar reasoning gives u ′ µ u ′′ and, therefore, u ′ ≡ µ u ′′ . Now we can define ψ in the following manner:</p><formula xml:id="formula_288">ψ(s) = [u s ]</formula><p>µ where s = δ * P (s 0 M , u s ) . Checking the validity of items 1)-3) for the constructed mapping ψ is a simple exercise now. ⊓ ⊔</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>Thus, we can summarize that the paper gives the algebraic analysis for the problem of realisation "black boxes" by machines. The main results of the analysis are the generalisation of the non-anticipation property for "black boxes" that accumulate information for decision; -the complete solution of the synthesis problem for such "black boxes".</p><p>The machines that realise the corresponding transfer functions are based on pre-automata. The class of such algebraic structures had been introduced by author jointly with Prof. M. Dokuchaev and Prof. B. Novikov in earlier papers.</p><p>It should be emphasized that issues dealing with computational properties of pre-machines has not considered in the paper. The coverage of these issues requires a separate study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Usually the multiagent distributed systems are high level non-deterministic. The nature of this non-determinism is symbolic nature of models and concurrency (choice of parallel process which should operate at each time of modeling). One of the main problem of reachability checking in verification is exponential explosion of states number. Some of the sources of such explosion is the number of parallel processes in model and their interleaving <ref type="bibr">[1]</ref> .</p><p>There are two different approaches for modeling: model checking and symbolic modeling <ref type="bibr">[2]</ref>. The model checking tool works with concrete states where state is represented by values of its variables. A transition is occurred by assignment of new values for the variables. The problem of exponential explosion could be solved by using well known model checking methods: methods that introduce partial order to reduce interleaving <ref type="bibr">[3]</ref>, methods for determining the symmetry when verifying the equivalence of states <ref type="bibr">[4]</ref>, techniques of abstraction <ref type="bibr">[5]</ref>, approximation <ref type="bibr">[6]</ref>, data-flow analyses <ref type="bibr">[7]</ref>, McMillan's algorithm of unfolding <ref type="bibr">[8]</ref>.</p><p>A state of environment in symbolic modeling presents some formula in corresponded theory (first order logic etc) which covers some set of concrete states. A transition is occurred with a help of predicate transformers (weakest precondition, strongest postcondition <ref type="bibr">[9]</ref>) <ref type="bibr">[10]</ref>. Unfortunately not all methods of model checking for 2 Alexander Letichevsky1, Oleksandr Letychevskyi1, Vladimir Peschanenko2 reducing states space could be applied for symbolic case. The problem which was described previously could be solved with a help of the next symbolic methods: narrowing <ref type="bibr">[11]</ref>, unfolding concurrent well-structured transition systems <ref type="bibr">[12]</ref>.</p><p>This paper continues the work <ref type="bibr">[13]</ref> where an algorithm with some restriction of symbolic model was described. Here we present the algorithm for full symbolic case. The algorithm bases on the McMillan's algorithm adopted to symbolic modeling in notion of insertion modeling <ref type="bibr">[14]</ref>. This algorithm bases on notion of permutability which is defined with help of predicate transformer (strongest postcondition, pt function below). It was described in <ref type="bibr">[10]</ref>. So, the paper is devoted to the solution of the problem of interleaving reduction in insertion models with infinite number of states.</p><p>The algebra of behaviors is presented in chapter Behavior Algebras, the verification environments, corresponding insertion function, and predicate transformer are considered in chapter Verification Environments. The normal form of behavior is defined in chapter Behaviors Over Basis B. The problem of reachability of the states is described in chapter Verification. The notion of partial unfolding is examined in chapter Partial Unfolding. The optimization of partial unfolding by statically permutable operators is reviewed in chapter Static Permutability Property. The incremental algorithm for reducing of interleaving for transition systems is presented in chapter Main Interleaving Reduction Algorithm. The static algorithm of interleaving reduction is described in chapter Static Interleaving Reduction Algorithm. The statistic of applying of such algorithm to few examples is presented in chapter Examples of Application.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Behavior Algebras</head><p>One of the main notions of insertion modeling, which is used for describing algorithm of interleaving reduction is behavior algebra. Behavior algebra [14] is a kind of process algebra; it is used to express the behavior of agents (transition systems) considered up to bisimilarity or trace equivalence. To make economic unfolding we need to distinguish sequential and parallel behaviors. So we consider the following modification of the notion of behavior algebra-it is a multisorted algebra with three components: the algebra of actions, the algebra of sequential behaviors, and the algebra of parallel behaviors.</p><p>The algebra of sequential behaviors has operations of prefixing: &lt;action&gt;.&lt;sequential behavior&gt; and one internal operation of nondeterministic choice (()+()), which is associative, commutative, and idempotent operation with neutral element 0. We also consider the constant behavior  (successful termination), which is a common element of the algebra of sequential and the algebra of parallel behaviors. The operations of action algebra will be considered later.</p><p>The algebra of parallel behaviors has the parallel composition ()||() of sequential behaviors as the main binary operation. It is associative commutative (but is not idempotent) and has the neutral element  . It also has the prefixing operation and nondeterministic choice. The algebra of sequential behaviors is implicitly included to the algebra of parallel behaviors by the identity</p><formula xml:id="formula_289">  || u u</formula><p>(parallel composition with one component). Unfolding of parallel composition by interleaving will be considered only after inserting of agents that are formed by parallel composition into the environment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Verification Environments</head><p>Verification environments of the form ) , , (</p><formula xml:id="formula_290">B P U E E </formula><p>are defined by the following parameters: the set of conditional expressions U, the set of operators P, and the set of basic behaviors B. The set of conditions and the set of operators are used to define actions (it is a union of these two sets). The set of basic behaviors is used to define the behaviors of agents inserted into environment in the way which will be explained later. We also suppose that some logic language (first order or temporal) called basic language is fixed to define the states of environment and checking conditions for verification. The conditional expressions also belong to this language.</p><p>The state of environment is represented as ] [u E , where E is a statement of basic language and u is a parallel composition of sequential behaviors of agents inserted into environment. We suppose that operators are divided into the set of conditional and unconditional operators. Conditional operator has the form a </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>where  is a condition and a is an unconditional operator. Unconditional operator a is identified with conditional operator a  1</p><p>. The associative product ()*() and the function</p><formula xml:id="formula_291">U P U pt   :</formula><p>(predicate transformer) are defined by the set of actions so that the following identities are valid:</p><formula xml:id="formula_292">) ( ) , ( a pt a pt         ) * , ( ) ), , ( ( b a pt b a pt pt    ) , ) , ( ( ) ( * ) ( b a pt pt b a               *</formula><p>Here  and  are conditions, a and b are unconditional operators.</p><p>Predicate transformer pt is supposed to be monotonic:</p><formula xml:id="formula_293">) , ( ) , ( a pt a pt       </formula><p>In general case, the pt function is defined by some concrete syntax. An example of such pair (syntax, pt) can be found in <ref type="bibr">[16]</ref>.</p><p>Example. The basic language is a first order language. Conditions are formulae over simple attributes -symbols that change their values when a system changes its state. Formally they are considered as function symbols with arity 0. Unconditional operators are assignments (parallel assignments, sequences of assignments, if-thenelse operators, loops with finite number of repetitions, etc.). As usually in this case,</p><p>))</p><formula xml:id="formula_294">) ( ) ( ( ) ( ( )) ), ( : ), ( : ( ), ( ( 2 2 1 1 2 2 1 1            z t x z t x z z x t x x t x x pt  </formula><p>Actually this is the strongest postcondition for precondition  .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Example of conditional operator. Let x be an integer variable</head><formula xml:id="formula_295">, ) 1 : ( ) 5 (      x x x u be an operator, 3  x is statement in basic language, u u || is a behavior. For this case, )} 1 : ( ) 5 ( { }, { ,         x x x u B u P U . The equation ) 1 : ( ) 5 (      x x x u</formula><p>considered here as a basic behavior and it used for definition of agent behavior u u || .</p><p>In insertion modeling environment considered as agent with insertion function. So, Insertion function is defined by the following identities and rules of operational semantics.</p><p>1.</p><formula xml:id="formula_296">] || [ ] , [ v u E v u E </formula><p>, u,v are agents with sequential behavior (see sec. 1). Identities for conditions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">]</head><formula xml:id="formula_297">[ ] . [ v E v u E    , if 0 ) (   E . 3. ] . [ ] . . [ v u E v u E         , if 0 ) (   E (merging conditions). 4. ] . [ ] . . [ v u a E v u a E           , if 0 ) (     </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>E</head><p>. Special cases of these identities are obtained when v=0 or 1   .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">]</head><formula xml:id="formula_298">[ ] . [       E E , if 0 ) (   E . Identities for operators. 6. ] [ ] . [ v E v u a E   , if 0 ) , (  a E pt . 7. )] , ( || )[ , ( . ] . [ E a u a E pt a u a E   , if 0 ) , (  a E pt , ) , ( E a  is a parallel composition of sequential behaviors (it generates some new parallel branches). If   ) , ( E a  , then u u E a u    || ) , ( || and u remains unchanged. Nondeterministic choice. 8. ] ) .( [ ] . . [ w v u a E w v a u a E     </formula><p>. The use of left distributivity means that environment considers behavior expressions up to trace equivalence. It also means that a system uses delayed (angelic) choice.</p><p>9. </p><formula xml:id="formula_299">] [ ] [ ] [      E u E u E .</formula><formula xml:id="formula_300">i  it is true that 0 ) (   i E </formula><p>. Each component that is degenerated relatively to the state E is equivalent to 0 relatively to this state.</p><p>11.</p><formula xml:id="formula_301">] [ ] [ ] [ v F v F u E  </formula><p>, if parallel composition u contains degenerated component relative to E. So all states of environment with degenerated components are equivalent to 0.</p><p>12. composition, then the corresponding state is a dead lock state. All dead lock states are equivalent to 0, but it is useful to distinguish them as well as terminal constants. The rules ( <ref type="formula" target="#formula_70">9</ref>), <ref type="bibr">(12)</ref>, and ( <ref type="formula" target="#formula_476">13</ref>) are called unfolding of nondeterministic choice.</p><formula xml:id="formula_302">] [ ] || [ ] || [ v E v u E v u E     . 13.        ] || . [ ] || . [ ] . . [ 2 2 1 1 2 2 1 1 v u a E v u a E u a u a E , if</formula><formula xml:id="formula_303">14.        n i i i i i i i n n u a u u a a u a u a E 1 1 1 1 1 1 1 ) || . || || . || .( ] . || || . [    , if all</formula><p>components of parallel composition are non-degenerated. This relation is called a full unfolding algorithm for a parallel composition. This is a complete unfolding and the main result of this chapter shows that it is not needed to make the complete unfolding at each step of verification. Let</p><formula xml:id="formula_304">n n u a u a u . || || . 1 1   , ) || . || || . || .( ) , ( 1 1 1 1        i i i i i i u a u u a a i u unfold</formula><p>then identity ( <ref type="formula" target="#formula_478">14</ref>) can be rewritten as 14a.</p><formula xml:id="formula_305">   n i n n i u unfold u a u a E 1 1 1 ) , ( ] . || || . [  .</formula><p>Environment does not distinguish trace equivalent behaviors and consequently, bisimilar states of environment are trace equivalent <ref type="bibr">[14]</ref>. The identity ( <ref type="formula" target="#formula_478">14</ref>) defines the main transition rule for the system:</p><formula xml:id="formula_306">] [ ] [ u E u E i a     ,</formula><p>if u is a parallel composition with non-degenerated components and ] [u E   is defined by the identity <ref type="bibr">(7)</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Behaviors over Basis B</head><p>The set of symbols is given for the set B of behavior basis. These symbols are called basic sequential behaviors. The expression of the algebra of sequential behaviors constructed from these symbols and termination constants is called sequential behavior over basis B. Suppose that for each symbol B v  an equation of the form ) , , (</p><formula xml:id="formula_307">2 1  v v F v v </formula><p>is given with sequential behavior over basis B as a right hand side. This equation is called the definition of a basic behavior v. The application of this definition (the substitution of the left hand side by the right hand one) is called the unfolding of this behavior. System of basic behaviors is called non-degenerated if each path in the tree representation of the expression ) , , (</p><formula xml:id="formula_308">2 1  v v F v v </formula><p>contains at least one operator.</p><p>Normal form of sequential behavior is an expression of the form </p><formula xml:id="formula_309">     n n u a u a u a . . . 2 2</formula><formula xml:id="formula_310">    I i J j i i i u E a ] [ . or 0.</formula><p>Each environment state with non-degenerated system of basic behaviors is a trace equivalent to some normal form.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Verification</head><p>A property  of environment state is said to be correct if it does not distinguish equivalent states. A property  of environment state is monotonic if (here a,b are some processes, " ||" is parallel composition, " ; " is sequential composition and "+" is non- deterministic composition). From other side this non-determinism could produce additional paths from 1 S to 2 S and additional states. So, let call interleaving reduction problem an answer to the question how to reduce non-determinism of the model M to find the path from 1 S to 2 S as quickly as possible. For a given set  of correct and monotonic checked properties, defined on the set of environment states, the set of initial states defines which properties are reachable (not reachable) from the initial states for a finite number of steps or a number of steps bounded by some constant. It is supposed that the set of properties to be checked contains the property of a state "to be a dead lock" and a property "to be a state of successful termination".</p><formula xml:id="formula_311">]) [ ( ]) [ ( u E u E E E        .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Verification problem in terms of insertion modeling</head><p>The simplest verification algorithm is exhaustive unfolding of initial states up to saturation or depletion of a given number of steps. It uses the following formula of unfolding:  </p><formula xml:id="formula_312">n i i u unfold E 1 )] , ( [</formula><p>. Such algorithm was described in <ref type="bibr">[14]</ref>. It builds all states space for reachability checking which isn't possible always. The properties to be checked are checked in the process of unfolding and the states that satisfy checked properties are collected. More economic unfolding algorithm can be constructed using the following partial unfolding algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>6</head><p>Partial Unfolding </p><formula xml:id="formula_313">a a E    ) if 0 ] * [ ] * [     a a E a a E . Let ] . || || . [ ] [ 1 1 n n u a u a E u E  </formula><p>is a state of the environment.</p><p>Let's select the component</p><formula xml:id="formula_314">i i u a s .  and build )} ( | { ) , ( j E i j i a a j i a a E nonp      </formula><p>. We obtain:</p><formula xml:id="formula_315">) , ( ) , ( ) ( ) , , ( i E C i E B i A i u E punfold    ) || . || || . || .( ) ( 1 1 1 1        i i i i i i u a u u a a i A ...) || . || || . || .(... ) , ( 1 1 ) , ( ) , ( 1 1          j j j s E nonp a a j i j j j u a u u a a i E B j i ...) || . || ) ); ; (( || . || .(... ) , ( 1 1 ) , ( ) , ( 1 1              k k a a a E nonp a a i k k w k k k u a u a p u a a i E C w E k i i k</formula><p>In the last formula</p><formula xml:id="formula_316">k k w u u a p   ) ); ; ((</formula><p>and p are sequences of compositions of actions (behavior). Function punfold is called partial unfolding of parallel composition. Let's consider the following algorithm of reachability checking: we need to check the properties on a current state of the environment and each state that is reachable from this in one step. Partial unfolding is used for main function of unfolding states. This algorithm is called partial unfolding algorithm of reachability checking.</p><p>In general, the punfold uses the notion of dynamic permutability of operators, but it is not optimal, because it uses 4 times application of function predicate transformer pt for each pair of operators. Using punfold can be optimized by using the concept of static permutability of operators. Algorithm which uses punfold with some optimization is considered in section 6.3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1.">Optimization of partial unfolding of states. Theorem 1. If two operators</head><formula xml:id="formula_317">b q a p       , are permutable regarding the states     1 E ,      2 E ,      3 E</formula><p>then they are permutable regarding any state <ref type="bibr">[13]</ref>.</p><p>The sufficient condition of permutability of two operators</p><formula xml:id="formula_318">b q a p       , is valid under the following conditions: 1. ) ), , ( ( ) ), , ( ( b a pt pt a b pt pt            ; 2. 0 ) ), , ( (     a b pt pt    ; 3. 0 ) ), , ( (     b a pt pt    . Example 1. Let a,b:int and )] . . || . .( [ 1 1 0 1 good b bad b good a init </formula><p>is initial state and behavior, where init, 1 a , 0 b , 1 b -operators. Agent's behavior could be represented by the following list of equations: ), ( ||</p><formula xml:id="formula_319">1 0 1 b b a AndFork   ), 1 ) 1 (( 1    a a ), 1 ) 0 (( 0    b b ) 1 ) 1 (( 1    b b</formula><p>. Sufficient condition of permutability for operators 1 a , 0 b , 1 b is performed in this case, but there can be a case in the simulation where the state of the environment includes some formula, which combines predicate memory of various parallel processes (a=b). So, one of the operator will not be applicable, ie a pair of operators</p><formula xml:id="formula_320">, ). 1 ) (( AndFork b a init   </formula><p>will be dynamically permutable regarding this state. Thus, the notion of sufficient conditions of permutability of operators need to be strengthened.</p><p>To improve the usage of permutability for this example, we need 1</p><formula xml:id="formula_321">) (      E sat</formula><p>, otherwise operators will be dynamically permutable regarding state E. Let's try to obtain a sufficient condition for dynamic permutability of two operators regarding some condition E.</p><p>The notion of dynamic permutability of two operators p, q regarding some state E uses a condition:</p><formula xml:id="formula_322">0 ] * [ ] * [   p q E q p E So, let 0 ) ), , ( ( ) ), , ( (         b a pt pt a b pt pt E      </formula><p>and try to apply backward predicate transformer to the state E. We obtain:</p><p>) , ( <ref type="formula" target="#formula_1">1</ref>) , ( <ref type="formula" target="#formula_1">1</ref> </p><formula xml:id="formula_323">q p p q E b a E pt pt E a b E pt pt                . Theorem 2. If 0 ) ), , ( ( ) ), , ( (         b a pt pt a b pt pt E       then 0 ) , ( ) , (       q p p q E E . Proof. Let's assume the contrary that 0 ) , ( ) , (       q p p q E E</formula><p>. Since the backward predicate transformer turns back to its possible state transition set, it means that</p><formula xml:id="formula_324">) ( ) ( ) , ( ) , ( q p p q E E              . State ) , ( q p E   ( ) , ( p q E   ) specifies a set of concrete</formula><p>states from which transitions from state    with operators p and q (q and p) exist, which means that 0</p><formula xml:id="formula_325">) , ( ) , ( ) , ( ) , (                   p q q p p q q p E E E E       . So, we got a contradiction, because if 0 ) , ( ) , (       q p p q E E then 0   E</formula><p>. The theorem is proved. This condition means that if two operators were dynamically permutable regarding E then it is necessary that current state of the environment should satisfy theorem 2.</p><p>Let E be some state of environment.</p><formula xml:id="formula_326">Theorem 3. If two operators b q a p       ,</formula><p>satisfy the sufficient condition of permutability and 0</p><formula xml:id="formula_327">) , ( ) , (        q p p q E E E then 0 ] * [ ] * [   p q E q p E .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof.</head><p>Let's consider the condition of dynamic permutability regarding E:</p><formula xml:id="formula_328">0 ] * [ ] * [   p q E q p E .        ] )[ , ( )] ( * ) [( ] * [ b a E pt b a E q p E               ) ), ), ( ( ( ) ), , ( ( a b E pt pt a b E pt pt                ) ), , ( ( b a E E pt pt                ) ), ), ( ) ), ( ( b a E pt a E pt pt       ) ), ), ( ( ) ), ), ( ( b a E pt pt b a E pt pt               </formula><p>Next, let's consider in details the sufficient condition permutability of operators that satisfies the operators p, q:</p><formula xml:id="formula_329">       ] )[ , ( )] ( * ) [( ] * [ b a E pt b a E q p E               ) ), ), ( ( ( ) ), , ( ( b a E pt pt b a E pt pt                    0 ) ), , ( ) , ( ( b a E pt a E pt pt       9 Alexander Letichevsky1, Oleksandr Letychevskyi1, Vladimir Peschanenko2              0 ) ), , ( ( ) ), , ( ( a b E pt pt a b E pt pt       0 ) ), , ( ( 0 ) ), , ( (              b a E pt pt b a E pt pt       Equality ] * [ ] * [ p q E q p E</formula><p> shall be satisfied because otherwise the operators p, q do not satisfy the sufficient condition permutability of operators (Theorem 1). Thus, we have:</p><formula xml:id="formula_330">         ) ), ), ( ( ) ), ), ( ( b a E pt pt b a E pt pt                 ) ), , ( ( ) ), , ( ( a b E pt pt a b E pt pt       ) ), , ( ( ) ), ), ( ( a b E pt pt b a E pt pt               Let's consider opposite: 0 ) ), , ( ( ) ), ), ( (         a b E pt pt b a E pt pt       Let's continue to consider sufficient conditions of permutability:        0 ) ), , ( ( ) ), , ( ( b a pt pt a b pt pt                     0 ) ), ), ( ( ( ) ), ), ( ( ( b a E E pt pt a b E E pt pt                ) ), ), ( ( a b E E pt pt                0 ) ), ), ( ( b a E E pt pt                ) ), ), ( ( ) ), ), ( ( a b E pt pt a b E pt pt                  0 ) ), ), ( ( ) ), ), ( ( b a E pt pt b a E pt pt       0 ) ), ), ( ( ) ), ), ( (            b a E pt pt a b E pt pt      </formula><p>This means that the condition 0</p><formula xml:id="formula_331">) , ( ) , (           q p p q E E E   should be satisfied.</formula><p>But we have the following condition 0</p><formula xml:id="formula_332">) , ( ) , (        q p p q E E E</formula><p>. Thus, both conditions must be satisfied, however: 0 </p><formula xml:id="formula_333">) , ( ) , ( ) , ( ) , (                  q p p q q p p q E E E E E E  </formula><formula xml:id="formula_334">       q p p q E E E</formula><p>is called sufficient condition of dynamic permutability of operators p, q regarding the environment E.</p><p>From a practical point of view, let's try to identify requirements for operators with which we can determine statistically whether they satisfy the sufficient condition of dynamic permutability or not.</p><p>Let E be a state of the environment, and p -an operator. The set A(E) is called the set of all attributes from state E and A(p) is called the set of all attributes in the statement p <ref type="bibr">[15]</ref>.</p><formula xml:id="formula_335">Two operators b q a p       ,</formula><p>are called statically permutable if they satisfy the following conditions:</p><formula xml:id="formula_336">0 ) , ( 0 ) , ( ) ( ) (        b pt a pt q A p A   Theorem 4. If two operators b q a p       ,</formula><p>are statically permutable then they are dynamically permutable.</p><p>Proof.</p><p>To prove the theorem we need to show that these operators satisfy necessary condition of permutability of operators in this case.</p><formula xml:id="formula_337">Since 0 ) , ( 0 ) , ( ) ( ) (        b pt a pt q A p A   and theorem 1 then 0 ) ), , ( ( ) ), , ( (         b a pt pt b a pt pt       0 )) , ( ( ) ), , ( (         b pt pt a b pt pt             ) ), , ( ( ) ), , ( ( b a pt pt a b pt pt              ) ), , ( ( ) ), , ( ( b a pt pt a b pt pt            ) ), , ( ( ) ), , ( ( b a pt pt a b pt pt     ) , ( ) , ( ) , ( ) , ( b pt a pt b pt a pt        </formula><p>The theorem is proved. This theorem means that if a predicate that combines memory in a state of environment with different operators is absent then checking the necessary condition of dynamic permutability is not required. Since in this case a usage of one of these operators does not affect the applicability of another operator. The appearance and disappearance of such predicates can be defined statically and syntactically.</p><p>Thus </p><formula xml:id="formula_338">1 0 0 1          b a E E b a a b b a o ) 1 ( ) 1 ( : ) , ( ) , ( ) , ( 1 1 1 1 1 1          b a E E b a a b b a</formula><p>Next let's try to apply sufficient condition of dynamic permutability of operators regarding the condition E for both pairs of operators:</p><formula xml:id="formula_339">0 ) 0 ( ) 1 ( ) ( : ) , ( ) , ( ) , (<label>1</label></formula><formula xml:id="formula_340">1 0 0 1              b a b a E E E b a a b b a o 0 ) 1 ( ) 1 ( ) ( : ) , ( ) , ( ) , ( 1 1 1 1 1 1              b a b a E E E b a a b b a Thus, operators ) , ( 1 o b a</formula><p>will be dynamically permutable regarding the condition E, and operators ) , ( <ref type="formula" target="#formula_1">1</ref>1 b a will be dynamically permutable. This means that interleaving will be removed in correct way for this problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">The Problem of Reachability of Some State</head><p>The approach proposed in the previous sections can be applied to the problem of finding deadlocks in a given model, but if the user specifies a state of environment you want to check coverage, whereas previously proposed approach should be strengthened.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Example 2. Let a,b:int and</head><formula xml:id="formula_341">)] || .( [ 1 1 1 b a init</formula><p>be initial behavior and a state of the environment, where init, 1 a , 1 b -operators. Agent's behavior could be represented by the following list of equations: , which means that the operator 1 b never will be applied before the operator 1 a and user defined state F will be unreachable after interleaving reduction. Let's try to enhance sufficient condition of operators permutability regarding some state E with some conditions related to formula</p><formula xml:id="formula_342">)) 1 : ( 1 ( )), 1 : ( 1 ( , || , ), 1 ) 0 ( ) 0 (( 1 1 1 1             b b a a b a</formula><formula xml:id="formula_343">F. 0 ]) * [ ( ]) * [ ( 1 1 1 1     a b E F b a E F</formula><p>for this example then we consider conditions for operators separately (not for pairs of operators).</p><p>Let a p    be an operator.</p><formula xml:id="formula_344">Theorem 5. If 0 ) , ), , ( ( 1    a a pt pt    then 0 ) , (  a pt  . Proof. Let's consider the opposite 0 ) , ), , ( ( 1    a a pt pt    and 0 ) , (  a pt </formula><p>. In this case by performed substitution it can be easily obtained the following:</p><formula xml:id="formula_345">0 0 0 ) , , 0<label>( 0 ) , ), , ( ( 1 1</label></formula><formula xml:id="formula_346">         a pt a a pt pt      So we got a contradiction. The theorem is proved. The operator a p   </formula><p>is called permutable regarding some user defined state F, if the following conditions are satisfied:</p><formula xml:id="formula_347">1) 0 ) , ), , ( ( 1    a a pt pt    ; 2) ) , ( ) , ), , ( ( 1 b pt F a a pt pt F          .</formula><p>This permutability means that an operator does not change the state of the environment in order to reach the user defined state changed. From reachability point of view we are interested in two cases (if 0 ) , ), , ( (</p><formula xml:id="formula_348">1    a a pt pt    ): 1) 0 ) , ( 0 ) , ), , ( ( 1        b pt F a a pt pt F     ; 2) 0 ) , ( 0 ) , ), , ( ( 1        b pt F a a pt pt F     .</formula><p>In first case, the reachability of user defined state should be checked immediately before application of an operator, and in the second case -after.</p><p>If operators satisfy the sufficient condition of dynamic permutability, but at least one of them is not permutable regarding a user defined state then this operator should be applied first.</p><p>This approach can be applied to any algorithm of unfolding. So, for checking of reachability of the user defined state F the notion of permutability regarding the user defined state could be used. You can't consider a pair of operators if both of them do not satisfy this condition.</p><p>Coming back to example 2. Operator 1 a will not be permutable regarding the user defined state F:</p><formula xml:id="formula_349">1 1 1 ) 1 : , 1 ), 1 : , 1 ( ( 1 E a a pt pt       2 ) 1 ( ) 1 : , 1 ( E a a pt     0 ) 1 ( ) 1 ( ) 0 ( 1 ) 1 ( ) 0 ( 2 1                a b a b a E F E F Operator 1</formula><p>b is permutable regarding F:</p><p>12 Alexander Letichevsky1, Oleksandr Letychevskyi1, Vladimir Peschanenko2</p><formula xml:id="formula_350">1 1 1 ) 1 : , 1 ), 1 : , 1 ( ( 1 E b b pt pt       2 ) 1 ( ) 1 : , 1 ( E b b pt     1 ) 1 ( ) 1 ( ) 0 ( 1 ) 1 ( ) 0 ( 2 1                b b a b a E F E F From other side operators 1 a , 1 b</formula><p>are statically permutable since</p><formula xml:id="formula_351">) 0 ( ) 0 (     b a E</formula><p>has no predicates that combine memory of these operators. This means that in this case you should first apply an operator 1 b , then you need to check reachability of</p><formula xml:id="formula_352">F (since 0 1 ) 1 ( ) 0 ( 1        b a E F</formula><p>) before applying 1 a . And after that you can try to apply 1 a . So, )</p><formula xml:id="formula_353">( ) 0 ( ) 1 : ), 0 ( ) 0 ((         b a b b a pt<label>1</label></formula><p>Then let's check the reachability of user defined state:</p><formula xml:id="formula_354">1 ) 1 ( ) 0 ( ) 1 ( ) 0 (         b a b a</formula><p>So, reachability of user defined state is proved.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3.">The Main Interleaving Reduction Algorithm</head><p>Let ] [u E be a model (an initial state of the environment and behavior), where u is behavior, and F is some user defined state which reachability should be checked. So, we need to check reachability of</p><formula xml:id="formula_355">F in the model ] [u E</formula><p>and all its deadlocks. The main interleaving reduction algorithm for reachability checking is represented in fig. <ref type="figure" target="#fig_0">1</ref>. </p><formula xml:id="formula_356">Bool G Op N Op N H N N      :</formula><p>. This table by a pair (parallel process identifier and operator) returns four (number of parallel process that is not equal to the previous one, and the operator which is 13 Alexander Letichevsky1, Oleksandr Letychevskyi1, Vladimir Peschanenko2 permutable to current one, the last two parameters are sufficient condition for permutability of operators and flag for static permutability of operators).</p><p>For each pair of operators that does not satisfy the sufficient condition of permutability of operators the table is filled: } , { :</p><formula xml:id="formula_357">N N Op N Op N D   , where } , { N Op N</formula><p>is a set of pairs: the number of parallel process and an operator, which does not satisfy the sufficient condition of permutability.</p><p>Each operator is constructed</p><formula xml:id="formula_358">Bool Bool Bool Op Flt N    :</formula><p>, which defines the triple for each operator in set: value of reachability of user defined state before and after application of an operator, the third value is 1 if all operators from other processes are statically permutable with this one, and 0 if not.</p><p>Checking Reachability. Checking reachability of user defined state F. If the filter is reachable then saving corresponded trace and stop modeling.</p><p>Choosing Component. We build normal form (section 4). From list of components we should choose one to continue working. Here we propose to select first component from the list, but in general case here some heuristics could be applied (it's out of scope of this paper). If there is no component left then finishing.</p><p>Choosing Operator. In a chosen component we select operators in the following order. First we check the applicability of operators for which the third option from the table Fpl is 1. If there are no operators or they can't be applied, then we choose other operators. If the flag state of the reachability of user defined state is 1 then we first try to apply such operators that are permutable regarding a user defined condition for both operators in the table Flt being 1. If the flag state of user defined state equals 0 then we choose to consider operators whose value pairs in the table Flt are (0,1). If one of such operators is applicable then after his application we need to check the reachability of user defined state. If user defined state is reachable then finishing. If no such operators left then deadlock is obtained and we get new component. Otherwise, finishing.</p><p>Cycle/Visited. Checking cycle/visited filters. If the filter is reachable then we choose a next operator to work. If no operator left then we choose other component.</p><p>Partial Unfolding. We try to build B and C if it is required, using notion of sufficient condition of static and dynamic permutability. If the last operators satisfy the sufficient condition of static (dynamic) permutability then B=0. Starting delayed to build C. In general, this problem is formulated as follows. It is given: current state of environment E, operator a one of the parallel processes u1 (other processes are delayed to use some operators in this process, including the process by which it was taken the operator a), and delayed parallel processes. In the set of parallel processes it is needed to find the operator b, which does not satisfy the sufficient condition of permutability (table D) or does not satisfy the condition of sufficient dynamic permutability regarding the E. In order to check whether these operators are in a given process, you generally build all states space. If these operators are not found then all resulting state of the search should be removed from storage cycle/visited filters. This is necessary because subtrace which leads to the required operator can modify the current state of the environment and a sufficient condition for dynamic permutability can not be performed, although for state E a sufficient condition for dynamic permutability is performed. But in some cases the search for these operators do not need to spend a dynamically performance of all subtrace. If the state of the 14 Alexander Letichevsky1, Oleksandr Letychevskyi1, Vladimir Peschanenko2 environment does not contain predicates that combine memory of these operators and the set of attributes operators intersect, then we can use the concept of specialization <ref type="bibr">[16]</ref> in order to break into several operators and sufficient condition will check only those suboperator memory that belongs to the operator. If such operator was found then we add result of it insertion into the list of components.</p><p>For trace equivalence each trace for deadlock should be checked additionally because of used normal form. Each cycle/visited trace should be checked for reachability of user defined state in the following way: turning back with a help of backward predicate transformer until operator doesn't have value 1 as first and second parameters in the table <ref type="table">Flt</ref> . This means that the required state of the environment is reachable, but after applying the operator a on the next step these operators are dynamically permutable regarding the environment E. From other point of view we do not take into account E . If value of pair for the operator in the table Flt is (0,1) then according to step 5 we have to take it into consideration and in this case it will be the first operator in the behavior of components ) , ( ), , ( ),</p><formula xml:id="formula_359">( i E C i E B i A</formula><p>. If the value of such pair is (1,1) then the state of the environment is reachable in the next step, as defined Flt. If the value is (1,0) then before application of the operator a we need to check the reachability of the environment E and definitions in Flt. If the value is (0,0) then required state is not reached in E . That means that the required state of the environment is not unreached at all states of the environment as a result of unfolding application </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.5.">Examples of Application</head><p>In Table <ref type="table" target="#tab_1">1</ref> information about few big examples run with our static interleaving reduction algorithm are presented. All of them give out of memory error (PC with 8 Gb of RAM) if we try to obtain all states space. So, we try to run them on implementation of proposed algorithm in Insertion Modeling System. Here "on prototype" means that this experiment was done on the algorithm which was implemented in language of Insertion Modeling System <ref type="bibr">[17]</ref>. Other experiments were run on the algorithm which was implemented on C++. "Total number of operators pairs" is number of pairs of operators which were detected in parallel behavior of the model. "Number of non-permutable operator's pairs" is a number of detected non-permutable pairs of operators. Example 2 works slower because it has four parallel processes and each sequential process more non-deterministic, example 1 has only 2 parallel processes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusion</head><p>Described algorithm of interleaving reduction was implemented in Insertional Modeling System. Its restriction for usage of static permutability condition was good account in set of big examples. In any case, the main interleaving reduction algorithm depends on reachability checking problem (component ) , ( i E C</p><p>, section 6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Among the formalisms employed to describe the semantics of transition systems, two particularly popular choices are abstract machines and structural operational semantics (SOS). Abstract machines are widely used for modeling and verifying dynamic systems, e.g. finite automata, Büchi automata or timed automata <ref type="bibr">[9,</ref><ref type="bibr">4,</ref><ref type="bibr">1]</ref>. An abstract machine can be represented as a directed graph with transition semantics between nodes. The transition semantics is defined by moving a pointer to a current node. Automata are a popular tool for modeling dynamic systems due to the simplicity of the verification of automata systems, which can be carried out in a fully automated way, something that is not generally possible for Turing-complete systems. This kind of semantics is often extended by adding a background state composed of a set of variables with their values: this is the case of timed automata, which use background clock variables <ref type="bibr">[2]</ref>. The Uppaal model checker for timed automata extends the notion of background state even further by adding integer and Boolean variables to the state <ref type="bibr">[7]</ref> which, however, do not increase the computational power of such timed automata but make them more convenient to use. Another formalism for modeling transition systems is structural semantics ("small-step", contrary to "big-step" semantics which is much easier to handle but which is inappropriate for a concurrent setting), which uses a set of reduction rules for simplifying a program expression. It has been described in detail in <ref type="bibr">[14]</ref> and used, for example, for the Jinja project developing a formal model of the Java language <ref type="bibr">[10]</ref>. An appropriate semantic rule for reduction is selected based on the expression pattern and on values of some variables in a state. As a result of reduction the expression and the state are updated.</p><formula xml:id="formula_360">s ′ = s(v −→ eval expr s) (Assign v expr, s) → (U nit, s ′ ) [Assignment]</formula><p>This kind of rules is intuitive; however, the proofs involving them require induction over the expression structure. A different approach to writing a structural semantics was described in <ref type="bibr">[3,</ref><ref type="bibr">12]</ref> for the CMinor language. It uses a notion of continuation which represents an expression as a control stack and deals with separate parts of the control stack consecutively.</p><formula xml:id="formula_361">(Seq e1 e2 • κ, s) → (e1 • e2 • κ, s) (Empty • κ, s) → (κ, s)</formula><p>Here the "•" operator designates concatenation of control stacks. The semantics of continuations does not need induction over the expression, something which makes proof easier; however it requires more auxiliary steps for maintaining the control stack which do not have direct correspondance in the modeled language.</p><p>For modeling non-local transfer of control, Krebbers and Wiedijk <ref type="bibr">[11]</ref> present a semantics using (non-recursive) "statement contexts". These are combined with the above-mentioned continuation stacks. The resulting semantics is situated mid-way between <ref type="bibr">[3]</ref> and the semantics proposed below.</p><p>The present paper describes an approach to translation from structural operational semantics to finite automata extended with background state. All the considered automata are an extension of Büchi automata with background state, i.e. they have a finite number of nodes and edges but can produce an infinite trace. The reason of our interest in abstracting from structural semantics to Büchi automata is our work in progress <ref type="bibr">[6]</ref>. We are working on a static analysis algorithm for finding possible resource sharing conflicts in multithreaded Java programs. For this purpose we annotate Java programs with timing information and then translate them to a network of timed automata which is later model checked. The whole translation is formally verified. One of the steps of the translation procedure includes switching from structural operational semantics of a Java-like language to automata semantics. During this step we discovered some problems which we will describe in the next section. The solutions we propose extend well beyond the problem of abstracting a structured language to an automaton. It can also be used for compiler verification, which usually is cluttered up with arithmetic adress calculation that can be avoided in our approach.</p><p>The contents of the paper has been entirely formalized in the Isabelle proof assistant <ref type="bibr">[13]</ref>. We have not insisted on any Isabelle-specific features, therefore this formalization can be rewritten using other proof assistants. The full Isabelle formal development can be found on the web <ref type="bibr">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Problem Statement</head><p>We have identified the following as the main problems when trying to prove the correctness of the translation between a programming language semantics and its abstraction to automata:</p><p>1. Preservation of execution context: an abstract machine always sees all the available nodes while a reduced expression loses the information about previous reductions. 2. Semantic artifacts: some reduction rules are necessary for the functionality of the semantics, but may be missing in the modeled language. Additionally, the rules can produce expressions which do not occur in the original language.</p><p>These problems occur independently of variations in the presentation of semantic rules <ref type="bibr">[14]</ref> adopted in the literature, such as <ref type="bibr">[10]</ref> (recursive evaluation of sub-statements) or <ref type="bibr">[3,</ref><ref type="bibr">12]</ref> (continuation-style).</p><p>We will describe these two problems in detail, and later our approach to their solution, in the context of a minimalistic programming language which only manipulates Boolean values (a Null value is also added to account for errors):</p><formula xml:id="formula_362">datatype val = Bool bool | Null</formula><p>The language can be extended in a rather straightforward way to more complex expressions. In this language, expressions are either values or variables:</p><formula xml:id="formula_363">datatype expr = Val val | Var vname</formula><p>The statements are those of a small imperative language: Assume we have a structural semantics for our minimal imperative language (some rules of a traditional presentation are shown in Figure <ref type="figure" target="#fig_0">1</ref>): we want to translate a program written in this language into an abstract machine. Assume that the states of variable values have the same representation in the two systems: this means we only need to translate the program expression into a directed graph with different nodes corresponding to different expressions obtained by reductions of the initial program expression.</p><formula xml:id="formula_364">s ′ = s(v −→ eval expr s) (Assign v expr, s) → (Empty, s ′ ) [Assign]</formula><p>eval bexp s = T rue (Cond bexp e1 e2, s) → (e1, s)</p><p>[CondT] eval bexp s = F alse (Cond bexp e1 e2, s) → (e2, s)</p><p>[CondF]</p><p>Fig. <ref type="figure" target="#fig_0">1</ref>. Semantic rules for the minimal imperative language.</p><p>On the abstract machine level the Assign statements would be represented as two-state automata, and the Cond as a node with two outgoing edges directed to the automata for the bodies of its branches.</p><p>Consider a small program in this language Cond bexp (Assign a 5) Empty and its execution flow. The execution can select any of the two branches depending on the bexp value. There are two different Empty expressions appearing as results of two different reductions. The corresponding abstract machine would be a natural graph representation for a condition statement with two branches (Figure <ref type="figure" target="#fig_1">2</ref>). During the simple generation of an abstract machine from a program expression the two Empty statements cannot be distinguished although they should be mapped into two different nodes in the graph. We need to add more information about the context into the translation, and it can be done by different ways.</p><p>A straightforward solution would be to add some information in order to distinguish between the two Empty expressions. If we add unique identifiers to each subexpression of the program, they will allow to know exactly which subexpression we are translating (Figure <ref type="figure" target="#fig_2">3</ref>). The advantage of this approach is its simplicity, however, it requires additional functions and proofs for identifier management. Another solution for the problem proposed in this paper involves usage of a special data structure to keep the context of the translation. There are known examples of translations from subexpression-based semantics <ref type="bibr">[10]</ref> and continuationbased semantics <ref type="bibr">[12]</ref> to abstract machines. However, all these translations do not address the problem of context preservation during the translation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Semantic artifacts</head><p>The second problem appears because of the double functionality of the Empty expression: it is used to define an empty operator which does nothing as well as the final expression for reductions which cannot be further reduced. The typical semantic rules for a sequence of expressions look as shown on Figure <ref type="figure" target="#fig_3">4</ref>. Here the Empty expression means that the first expression in the sequence has been reduced up to the end, and we can start reducing the second expression. However, any imperative language translated to an assembly language would not have an additional operator between the two pieces of code corresponding to the first and the second expressions. The rule Seq2 must be marked as a silent transition when translated to an automaton, or the semantic rules have to be changed.</p><formula xml:id="formula_365">(e1, s) → (e1 ′ , s ′ ) (Seq e1 e2, s) → (Seq e1 ′ e2, s ′ ) [Seq1] (Seq Empty e2, s) → (e2, s) [Seq2]</formula><p>3 Zipper-based semantics of imperative programs</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">The zipper data structure</head><p>Our plan is to propose an alternative technique to formalize operational semantics that will make it easier to preserve the execution context during the translation to an automata-based formalism. Our technique is built around a zipper data structure, whose purpose is to identify a location in a tree (in our case: a stmt) by the subtree below the location and the rest of the tree (in our case: of type stmt-path). In order to allow for an easy navigation, the rest of the tree is turned inside-out so that it is possible to reach the root of the tree by following the backwards pointers. The following definition is a straightforward adaptation of the zipper for binary trees discussed in <ref type="bibr">[8]</ref> to the stmt data type:</p><formula xml:id="formula_366">datatype stmt-path = PTop | PSeqLeft stmt-path stmt | PSeqRight stmt stmt-path | PCondLeft expr stmt-path stmt | PCondRight expr stmt stmt-path | PWhile expr stmt-path</formula><p>Here, PTop represents the root of the original tree, and for each constructor of stmt and each of its sub-stmts, there is a "hole" of type stmt-path where a subtree can be fitted in. A location in a tree is then a combination of a stmt and a stmt-path:</p><formula xml:id="formula_367">datatype stmt-location = Loc stmt stmt-path</formula><p>Given a location in a tree, the function reconstruct reconstructs the original tree reconstruct :: stmt ⇒ stmt-path ⇒ stmt, and reconstruct-loc (Loc c sp) = reconstruct c sp does the same for a location. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Semantics</head><p>Our semantics is a small-step operational semantics describing the effect of the execution a program on a certain program state. For each variable, the state yields Some value associated with the variable, or None if the variable is unassigned. More formally, the state is a mapping vname ⇒ val option. Defining the evaluation of an expression in a state is then standard. Before commenting the rules of our semantics, let us discuss which kind of structure we are manipulating. The semantics essentially consists in moving around a pointer within the syntax tree. As explained in Section 3.1, a position in the syntax tree is given by a stmt-location. However, during the traversal of the syntax tree, we visit each position at least twice (and possibly several times, for example in a loop): before executing the corresponding statement, and after finishing the execution. We therefore add a Boolean flag, where True is a marker for "before" and False for "after" execution. As an example, consider the execution sequence depicted in Figure <ref type="figure" target="#fig_4">5</ref> (with assignments written in a more readable concrete syntax), consisting of the initial steps of the execution of the program While (e, Seq(x := T , y := F )). The before (resp. after) marker is indicated by a downward arrow before (resp. an upward arrow behind) the current statement. The condition of the loop is omitted because it is irrelevant here. The middle configuration would be coded as ((Loc (x := T ) (PSeqLeft (PWhile e PTop) (y := F ))), True).</p><p>Altogether, we obtain a syntactic configuration (synt-config) which combines the location and the Boolean flag. The semantic configuration (sem-config) manipulated by the semantics adjoins the state, as defined previously.</p><formula xml:id="formula_368">type-synonym synt-config = stmt-location × bool type-synonym sem-config = synt-config × state</formula><p>The rules of the small-step semantics of Figure <ref type="figure" target="#fig_5">7</ref> fall into two categories: before execution of a statement s (of the form ((l , True), s)) and after execution (of the form ((l , False), s)); there is only one rule of this latter kind: SFalse.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Let us comment on the rules in detail:</head><p>-SEmpty executes the Empty statement just by swapping the Boolean flag.</p><p>-SAssign is similar, but it also updates the state for the assigned variable. -SFalse comes into play when execution of the current statement is finished.</p><p>We then move to the next location, provided we have not already reached the root of the syntax tree and the whole program terminates.</p><p>The move to the next relevant location is accomplished by function next-loc (Figure <ref type="figure" target="#fig_38">6</ref>) which intuitively works as follows: upon conclusion of the first substatement in a sequence, we move to the second substatement. When finishing the body of a loop, we move back to the beginning of the loop. In all other cases, we move up the syntax tree, waiting for rule SFalse to relaunch the function.</p><p>4 Target language: Automata</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Syntax</head><p>As usual, our automata are a collection of nodes and edges, with a distinguished initial state. In this general definition, we will keep the node type ′ n abstract. It will later be instantiated to synt-config. An edge connects two nodes; moving along an edge may trigger an assignment to a variable (AssAct), or have no effect at all (NoAct).</p><p>An automaton ′ n ta is a record consisting of a set of nodes, a set of edges and an initial node init-s. An edge has a source node, an action and a destination node dest. Components of a record are written between (| ... |).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Semantics</head><p>An automaton state is a node, together with a state as in Section 3.2.</p><p>type-synonym ′ n ta-state = ′ n * state Executing a step of an automaton in an automaton state (l , s) consists of selecting an edge starting in node l, moving to the target of the edge and executing its action. Automata are non-deterministic; in this simplified model, we have no guards for selecting edges.</p><p>e ∈ set (edges aut) l = source e l ′ = dest e s ′ = action-effect (action e) s aut ⊢ (l , s) → (l ′ , s ′ )</p><p>[Action]</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Automata construction</head><p>The principle of abstracting a statement to an automaton is simple; the novelty resides in the way the automaton is generated via the zipper structure: as nodes, we choose the locations of the statements (with their Boolean flags), and as edges all possible transitions of the semantics.</p><p>for corresponding program and automata states. For this correspondence, we use the notation ≈, even though it is just plain syntactic equality in our case.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma 1 (Simulation property).</head><p>Assume that synt-step-image-closed aut and (((lc, b), s) ≈ ((lca, ba), sa)). If ((lc, b), s) → ((lc ′ , b ′ ), s ′ ), then there exist lca ′ , ba ′ , sa ′ such that (lca ′ , ba ′ ) ∈ set (nodes aut) and the automaton performs the same transition: aut ⊢ ((lca, ba), sa) → ((lca ′ , ba ′ ), sa ′ ) and ((lc</p><formula xml:id="formula_369">′ , b ′ ), s ′ ) ≈ ((lca ′ , ba ′ ), sa ′ ).</formula><p>The proof is a simple induction over the transition relation of the program semantics and is almost fully automatic in the Isabelle proof assistant.</p><p>We now want to get rid of the precondition synt-step-image-closed aut in Lemma 1. The first subcase (edge closure), is easy to prove. Node closure is more difficult and requires the following key lemma:</p><formula xml:id="formula_370">Lemma 2. If lc ∈ set (all-locations c PTop) then set (map fst (synt-step-image (lc, b))) ⊆ set (all-locations c PTop).</formula><p>With this, we obtain the desired Lemma 3 (Closure of automaton). synt-step-image-closed (stmt-to-ta c)</p><p>For the proofs, see <ref type="bibr">[5]</ref>.</p><p>Let us combine the previous results and write them more succinctly, by using the notation → * for the reflexive-transitive closure for the transition relations of the small-step semantics and the automaton. Whenever a state is reachable by executing a program c in its initial configuration, then a corresponding (≈) state is reachable by running the automaton generated with function stmt-to-ta:</p><formula xml:id="formula_371">Theorem 1. If ((Loc c PTop, True), s) → * (cf ′ , s ′ ) then ∃ cfa ′ sa ′ . stmt-to-ta c ⊢ (init-s (stmt-to-ta c), s) → * (cfa ′ , sa ′ ) ∧ (cf ′ , s ′ ) ≈ (cfa ′ , sa ′ ).</formula><p>Obviously, the initial configuration of the semantics and the automaton are in the simulation relation ≈, and for the inductive step, we use Lemma 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusions</head><p>This paper has presented a new kind of small-step semantics for imperative programming languages, based on the zipper data structure. Our primary aim is to show that this semantics has decisive advantages for abstracting programming language semantics to automata. Even if the generated automata have a great number of silent transitions, these can be removed.</p><p>We are currently in the process of adopting this semantics in a larger formalization from Java to Timed Automata <ref type="bibr">[6]</ref>. As most constructs (zipper data structure, mapping to automata) are generic, we think that this kind of semantics could prove useful for similar formalizations with other source languages. The proofs (here carried out with the Isabelle proof assistant) have a pleasingly high degree of automation that are in sharp contrast with the index calculations that are usually required when naming automata states with numbers.</p><p>Renaming nodes from source tree locations to numbers is nevertheless easy to carry out, see the code snippet provided on the web page <ref type="bibr">[5]</ref> of this paper. For these reasons, we think that the underlying ideas could also be useful in the context of compiler verification, when converting a structured source program to a flow graph with basic blocs, but before committing to numeric values of jump targets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>As for now, methods of program statistical analysis are being studied intensely. One of the important problems is a problem of the automatic generation of program invariants. Invariants of program are used particularly in methods of programs verification.</p><p>The problem of searching for loop invariants in imperative programs was offered by R. Floyd <ref type="bibr">[1]</ref> and C. Hoare <ref type="bibr">[2]</ref>.</p><p>A correctness property of the program is formulated in terms of its total or partial correctness. Often, the proof of termination of the program should be implemented separately from the proof of its partial correctness. The algorithmic unsolvability of the termination problem shows that the general algorithm of proof of termination of the program does not exist. To prove the partial correctness of programs, Р. Floyd and S. Hoare offered the idea of building loop invariants <ref type="bibr">[1]</ref> and invariant relations in control points of programs <ref type="bibr">[2]</ref>, which allows to prove programs by method of math induction.</p><p>Thus, there is a problem of finding the invariants of the program as a key problem of analysis of programs properties. Now, the main attention is paid to the problem of constructing polynomial invariant equalities. A set of invariant equalities forms the polynomial ideal, a finite basis of which one must build. Note that in a general case, the problem of constructing this basis has not been solved.</p><p>The existence and efficiency of algorithms to generate program invariants depend on the subject domain, i.e., on the properties of the data algebras the program deals with. Problems of automatic generation of program invariants for various data algebras have been being analyzed since beginning of 1970s at the Institute of cybernetics of NAS of Ukraine. Their main results are represented in <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>.</p><p>Numerical data algebras are the most important from the practical point of view. The paper <ref type="bibr">[5]</ref> outlines two methods of constructing polynomial invariant equalities types in programs whose data algebra is the domain of integrity (polynomially determinate programs) or a field (rationally determinate programs).</p><p>This idea used in <ref type="bibr">[6]</ref> to generate polynomial invariants of bounded degree for polynomially determined programs. Program conditions such as 0 ) (  X f were taken into account, where ) (X f are polynomials of program variables. In <ref type="bibr">[7]</ref> they proposed a method to generate polynomial program invariants of bounded degree in linearly determinate (affine) programs containing recursive procedure calls.</p><p>In <ref type="bibr">[8]</ref> they proposed a method to generate polynomial loop invariants as template polynomials with the use of the algorithm for computing Grobner bases. In <ref type="bibr">[9]</ref> they described a method to generate nonlinear and, generally speaking, nonpolynomial invariant relation for linear loops. The method uses eigenvalues and eigenvectors of the linear operator in the loop body.</p><p>The paper <ref type="bibr">[10]</ref> is devoted to the algebraic fundamentals of the problem of generating polynomial loop invariants. The main result of the study is an algorithm for generating all polynomial invariants for loops with so-called solvable assignment operators. In particular, affine operators with positive real eigenvalues are solvable. The same authors <ref type="bibr">[11]</ref> proposed a method to generate polynomial loop invariants, including enclosed loops, as well as program conditions in the form of both polynomial equalities and inequalities. The paper considers a great number of examples and presents tables for the algorithm time depending on technical parameters of the program being analyzed.</p><p>In <ref type="bibr">[12]</ref> they proposed an algorithm to search for loop invariants based on a system of recurrent relations with loop variables and parameter n, which is the loop index. The algorithm searches for the solution of this system not depended on n. It is implemented in Theorema software system and is illustrated with examples in detail.</p><p>The problem of the description of invariant inequalities is less studied. The main intricacy lies in the infinity of the basis of the metaideal <ref type="bibr">[13]</ref> of polynomial inequalities <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>. Iterative methods for solving the problem of the description of linear invariant inequalities were considered in <ref type="bibr">[15]</ref><ref type="bibr">[16]</ref><ref type="bibr">[17]</ref><ref type="bibr">[18]</ref>. In <ref type="bibr">[15]</ref>, the problem of generation of the simplest invariant inequalities is solved. In <ref type="bibr">[16]</ref><ref type="bibr">[17]</ref>, general iterative methods are used to solve the problem of searching for linear invariant inequalities.</p><p>In <ref type="bibr">[19]</ref> they described a method of proving the invariance of the system of linear inequalities for a class of linear iterative loops with real eigennumbers of linear operators in the loop body. This method can be applied to the entire class of linear iterative loops and it can also be applied to prove their termination. The paper with description of it is under preparation for a publication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Static Analysis of Polynomial Invariant Equations</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">L-invariants of Linear Maps and Invariants of Linear Loops.</head><p>Definition 1. Let W be an n-dimensional vector space over the field of rational numbers Q and let _ Q be the algebraic closure of the field</p><formula xml:id="formula_372">Q . Let ) ,.... ( 1 n x x X  be an n -dimensional vector of variables. A rational function ) ( ) ( _ X Q X p  is called L-invariant of a linear operator W W A  : if, for any vector W b  the following relationship holds: ) ( ) ( b p b A p  <label>(1)</label></formula><p>Example 1. (a linear operator with characteristic polynomial 2 3  x ) Let us consider a linear operator with the matrix</p><formula xml:id="formula_373">           0 0 2 1 0 0 0 1 0 A , ) , , ( z y x X  .</formula><p>It's easy to calculate <ref type="bibr">[26]</ref>, that the rational expression</p><formula xml:id="formula_374">2 2 2 2 3 2 3 1 2 1 ) ( ) )( ( ) , , ( z y x z y x z y x z y x p             <label>(2) where , 2 , 2 , 2 2 3 3 3</label></formula><formula xml:id="formula_375">2 3 1         and ) 3 2 sin( ) 3 2 cos(    i  </formula><p>is the primitive third root of unity, is the L-invariant of this operator. </p><formula xml:id="formula_376">) ( ) ( ) ( X q X r X p  is an L-invariant of a linear operator A , then the polynomial ) ( ) ( ) ( ) ( b r X q b q X r </formula><p>is an invariant of a linear loop over the field _ Q .</p><p>We call such loop invariants L-invariants (of linear loops).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Example 2. (a linear loop with operator from example 1)</head><p>The linear loop corresponding to the operator A , has the form (x, y, z) := (a, b, c); While True|False do (x, y, z) := (y, z, 2*x)</p><p>L-invariant of this loop is defined by formula (2):</p><p>) )(</p><formula xml:id="formula_377">1 2 1 2 2 2 2 2 2 2 2 3 2 3 1 2 1 c b a c b a z y x c b a z y x z y x c b a z y x P                            (4) Note that L-invariant of the loop ) , , , , , ( c b a z y x P is defined over a field ) , ,<label>( ) ( ) )( )( ( ) , , , , , ( 3 2 3</label></formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>  </head><p>Q . However, it has a set of L-invariants with coefficients from the field Q , which can be constructed, they are shown in (4) the canonical form to the polynomial from field Q is demonstrated in [20]. Note that if the variables c b a , , are the assigned numeric values, L-invariant is converted into a loop invariant.</p><p>In <ref type="bibr">[22]</ref> they described the results, that link L-invariants to eigenvalues and eigenvectors of the operator  </p><formula xml:id="formula_379">1    m k m k   . (<label>5</label></formula><formula xml:id="formula_380">)</formula><p>Then</p><formula xml:id="formula_381">m k m k X s X s X p ) , ( ... ) , ( ) ( 1 1    (6)</formula><p>is L-invariant of the linear operator A .</p><p>Proof of the theorem 2 can be found in <ref type="bibr">[21]</ref> Example 3 (continuation of example 2). Apply the theorem 2 to the example 2.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Calculate the eigennumbers of operator .</head><p>A </p><formula xml:id="formula_382">           0 0 2 1 0 0 0 1 0 A , 2 0 2 1 0 0 1 ) ( 3                E A h . A characteristic polynomial has the form b 2 ) ( 3   x x h . Its roots are 2 3 3 3 2 3 1 2 , 2 , 2         , where ) 3 2 exp(   i  is the primitive cube root of unity. Calculate the eigenvectors 3 2 1 , , s s s of matrix            0 1 0 0 0 1 2 0 0 T A : ) 1 , ,<label>( ), 1 , , ( ), 1 , , ( 3 2</label></formula><formula xml:id="formula_383">3 3 2 2 2 2 1 2 1 1          s s s . It is easy to check that</formula><formula xml:id="formula_384">          5 / 4 5 / 3 5 / 3 5 / 4 A . 1 5 8 ) ( 2          E A h . 5 3 5 4 , 5 3 5 4 2 1 i i       . ) 1 , ( ), 1 , ( 2 1 i s i s    . Since 1 2 1    , L-invariant of the operator A is 2 2 ) )( ( ) , ( y x y ix y ix y x p       .</formula><p>And the loop invariant is Calculate the eigenvalues and eigenvectors of the operator A :</p><formula xml:id="formula_385">         0 1 1 1 A . 1 ) ( 2          E A h . 5 2 1 2 1 , 5 2 1 2 1 2 1       . ) 1 ,<label>5 2 1 2 1 ( ) 1 , ( ), 1 , 5 2 1 2 1 ( ) 1 , ( 2 2 1 1 </label></formula><formula xml:id="formula_386">       s s . Since 1 2 1     , L-invariant of the operator A is 2 2 2 2 2 1 ) ( )) )( (( ) , ( y xy x y x y x y x p         . The invariant relation of loop is 2 2 2 2 2 2 ) ( ) ( b ab a y xy x      . Corollary 2. If the characteristic (minimum) polynomial ) (X h of linear operator</formula><p>A is a x m  , then linear operator has an L-invariants.</p><p>Proofs of corollaries 1 and 2 are in <ref type="bibr">[21]</ref> Theorem 3. Let ) (x h be an polynomial from variable x with rational coefficients and ) ,...,</p><formula xml:id="formula_387">( 1 m     are all its roots in an algebraic closure  Q of the field Q . Consider the set } 1 ... : ... { ) ( 1 1 1 1       m m k m k k m k x x h G  </formula><p>that is the set of monomials of the field of rational expressions ) (X Q (possibly with negative degrees), who receive a value of 1 when we substitute i</p><formula xml:id="formula_388"> instead of i x . Then ) (h G</formula><p>is a multiplicative abelian group with a finite number of generators.</p><p>The proof of theorem 3 is obvious, since the subgroup of an abelian group with a finite number of generators has a finite number of generators.</p><p>It follows from theorem 3 that the main problem for the generation of L-invariants is the problem of finding an algorithm for constructing a set that generate the groups</p><formula xml:id="formula_389">) (h G .</formula><p>Example 6 (continuation of example 3). It is easy to see that we have the following multiplicative relations for the polynomial 2 ) ( 3   x x h between its roots:</p><formula xml:id="formula_390">3 3 3 2 2 2 3 1 2 3 2 1 3 2 2 1 , , ,               </formula><p>These relations have relevant binomials  </p><formula xml:id="formula_391">3 3 3 2 2 2 3 1 2 3 2 1 3 2 2 1 , , , x x x x x x x x x x x     , that form a Gröbner basis of the ideal )) ( ( ) ( h G I G I B  .</formula><formula xml:id="formula_392"> or    m i i k 1 0 .</formula><p>The proof is in <ref type="bibr">[21]</ref> Definition 5. L-invariants of operator A , defined of multiplicative relation between the roots of the characteristic polynomial 1 ...</p><formula xml:id="formula_393">1     m  </formula><p>, will be called whole. L-invariants of operator A , defined of multiplicative relation</p><formula xml:id="formula_394">     0 , 1 ... 1 1 i k m k k m  </formula><p>, will be called rational.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 5. If the characteristic polynomial of operator</head><formula xml:id="formula_395">A is 1 ), (  k x h k , then</formula><p>operator A has a rational L-invariants.</p><p>The proof of theorem 5 is in <ref type="bibr">[21]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">L-invariants of Jordan Cells</head><p>A nondegenerate linear operator A can be represented in a suitable basis by the following Jordan form of its matrix <ref type="bibr">[18,</ref><ref type="bibr">22]</ref>.</p><formula xml:id="formula_396">             ) ( ... 0 0 . ... . . 0 ... ) ( 0 0 ... 0 ) ( 2 2 1 1 m m J J J A    ,<label>(7)</label></formula><p>where</p><formula xml:id="formula_397">) ( i i J  are Jordan cells of different sizes. Jordan cell is of the form                   0 ... 0 1 ... 0 0 ... 0 0 ... 1 ) ( J (8)</formula><p>Thus, theorem 2 is applied only to the rows of the matrix of the linear operator A , that correspond to the eigenvectors of A , i.e., to the collection of the last rows of Jordan cells</p><formula xml:id="formula_398">) ( i i J  , m i ,..., 1 </formula><p>. Below, we will extend this theorem to arbitrary nondegenerate linear operators by considering Jordan cells on the whole. Transformation</p><formula xml:id="formula_399">X J J * : , where ) ,..., ( 1 k x x X  , in the coordinate form is k k k k k x x x x x x x x           : ; : ;...; : 1 1 2 1 1</formula><p>Introduce the following notation:</p><formula xml:id="formula_400">z x y x df k df k    , 1 .</formula><p>For each Jordan cell ) ( k k J  of the Jordan form of the operator A its own sequence of subspaces of eigenpolynomials is determined.</p><p>The main theory of the eigenpolynomials of Jordan cells as well as of the relationship between eigenpolynomials and L-invariants of linear operators is formulated in <ref type="bibr">[23,</ref><ref type="bibr">24]</ref>.</p><p>The concept of eigenpolynomial of a linear operator can be of an independent interest for linear algebra applications.</p><p>If all eigennumbers of linear operator A are rational numbers, then the problem of constructing this basis is an algorithmically solvable with the help of theoretical&amp;number algorithm.</p><p>In the <ref type="bibr">[25]</ref> a direct method of finding invariants of Jordan cells is described. The main results of this work are discussed below.</p><p>Theorem 6 (about the structure of the ideal of invariants). Let A be an arbitrary nondegenerate linear operator, presented in a suitable basis of matrix (7), ) ( ),..., (</p><formula xml:id="formula_401">1 A I A I k J J</formula><p>are ideals of his invariants, presented in homogeneous</p><formula xml:id="formula_402">coordinates i i i i ij ij z y u z x u / ,   i i i i ij ij c b e c a e   , by basis of the form ) 1 , , ( u q u j j   , 2 ,..., 1   n j and ) (A I  is an ideal of invariants of the operator red A , and ) ( A I is an ideal of invariants of the operator A (of the loop (3)). Then )) ( ( )) ( ( ... )) ( ( )) ( ( 1 A I GBase A I GBase A I GBase A I GBase k J J       Theorem 7. If a group of multiplicative relations of roots of an irreducible polynomial ) (x f is nontrivial )) ( ) ( ( e f MR </formula><p>, there may be two situations: </p><formula xml:id="formula_403">k i id d i i l          Wherein kd n len d j   ), ( . Multiplicative relations from ) ( f MR ) ( f MR in this situation have the form l i j ij i ,..., 1 ,     </formula><p>, where j  are roots from 1.</p><p>Both situations may occur simultaneously. For the proof of theorem 7, take a look in <ref type="bibr">[25]</ref>. This theorem has a key role for the algorithm of calculation of the system generators of the group </p><formula xml:id="formula_404">) ( f MR . Theorem 8. Let ] [ ) ( x Q x f </formula><formula xml:id="formula_405">: ... { ) ( 1 1 1 1 U x x h G m m k m k k m k U    </formula><p>, where U is a group of all roots from 1 is algorithmically solvable.</p><p>The proof of theorem 8 is in <ref type="bibr">[25]</ref>. Thus, by theorem 6, the invariants of a linear operator can be classified as intracellular -that are inherent to each Jordan cell of linear operator, and intercellular -those that are inherent in its diagonalisable part.</p><p>Intracellular invariants are computed directly from the formulas of <ref type="bibr">[25]</ref> )</p><formula xml:id="formula_406">) ( ... ) ( ( 1 1 n j n j n j j j a cz bz cy C a cz bz cy C a c z x              .</formula><p>The existence of intercellular invariants depend on the existence of nontrivial multiplicative relations between the eigenvalues of the linear operator (theorem 2).</p><p>For linear operators with an irreducible minimum characteristic polynomial problem of constructing a basis of set of multiplicative relations between its eigenvalues is algorithmically solvable, but the algorithm of theorem 8 is ineffective due to a very large degree of the polynomial ) (x S , which is be necessary to decompose into factors.</p><p>The problem of constructing a basis of set of multiplicative relations for arbitrary linear operators is still open.   In this example, the linear operator A is an operator of rotation for angle ) 3 / 4 ( arctg   . A starting point b belongs to the unit square. The orbit of a linear operator A is a sequence, each point of which lies on the loop with accuracy equal to  . Since the angle  is incommensurate with  , the orbit of the operator A is a dense set on the circle , therefore, the loop is complete. In this example, the basic algorithm is used to prove that</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The Static Analysis of Linear Inequalities.</head><formula xml:id="formula_407">) 1 0 ( &amp; ) 1 0 ( ) , (      y x y x S , ) | (| &amp; ) | (| ) , , , ( 2 1 2 1         b y b x b b y x U ,         5 / 3 5 / 4 5 / 4 5 / 3 A . 2 1 2 2 b b y x L     // ) 2 ,<label>2 ( ), 1 , 1 (   c a</label></formula><formula xml:id="formula_408">2 1 2 2 b b y x L     is a conditional invariant of loop. Let ) (x f be a minimal characteristic polynomial of the operator A , } ,..., { 1 n    </formula><p>is a set of its roots (spectrum A ). Suppose further that, k 2 1 ,...,  is a set of complex eigenvalues, and</p><formula xml:id="formula_409">n k   ,..., 1 2  is a set of real eigennumbers and k k 2 1 2 2 1 ,...,       </formula><p>than we obtain a representation of a linear operator in the so-called real Jordan form: . But in order not to overload the text by new notations, we will use the old notations.</p><formula xml:id="formula_410">                         n k k B B B A   ... 0 . . . 0 . . . . . . . 0 ... 0 . . 0 0 ... . 0 ... 0 . . . . . . . 0 . . 0 . 0 0 . . 0 . 0 1 2 2 1 b ) , , , ( b X c a L  ) , ( b X U  Where         j j j j j j r B     .</formula><p>Note, that the matrix of the form</p><formula xml:id="formula_411">            df B</formula><p>, where</p><formula xml:id="formula_412">1 2 2     is a matrix</formula><p>of rotation of vector of two-dimensional space on the angle  , that is defined by ratios <ref type="bibr">(12)</ref>, whose invariance is regarded by a loop <ref type="bibr">(11)</ref> with a specific initial value b , indicates that ) ,</p><formula xml:id="formula_413">      ) sin( , ) cos( . That is why         ) cos( ) sin( ) sin( ) cos( j j j j j j r B     , 2 2 j j j j r       . inequality</formula><formula xml:id="formula_414">X a b A Orbit X   <label>( ) , )( , ( b c</label></formula><p>. Algorithm of prove of the invariance of ( <ref type="formula" target="#formula_280">12</ref>) will be formulated in the equivalent form: )  , and m is a multiple iteration of loop, that is described by the transformation</p><formula xml:id="formula_416">X A X m * : -in ) , ( X A a m . Let ) , ( ),..., , ( 2 1 2 2 1 1 k k k x x X x x X    , ) , ( ),..., , ( 2 1 2 2 1 1 k k k a a a a a a    . Then n n k k k k x a x a X a X a X a         ... ) , ( ... ) ,<label>( ) , ( 1 2 1 2 1 1 (13) Conversion</label></formula><p>) , ( AX a of a linear form can be written as</p><formula xml:id="formula_417">n n n k k k k k k x a x a X B a X B a AX a            ... ) , ( ... ) , ( ) , ( 1 2 1 2 1 2 1 1 1 (14)</formula><p>And its m -th iteration can be written as</p><formula xml:id="formula_418">n n m k k m k m k m m x a x a X B a X B a X A a n k k            ... ) , ( ... ) , ( ) , ( 1 2 1 2 1 1 1 2 1 (15)</formula><p>Passing in <ref type="bibr">(14)</ref> to the representation in the form</p><formula xml:id="formula_419">j j j B r B </formula><p>, we obtain:</p><formula xml:id="formula_420">n n m k k m k m k m k m m m x a x a X B a r X B a r X A a n k k            ... ) , ( ... ) , ( ) , ( 1 2 1 2 1 1 1 1 2 1</formula><p>Consider the question of the set of values of the operator orbit ) , ( ... ) , (</p><formula xml:id="formula_421">1 1 1 k m k m X B a X B a k   for the initial value ) ,..., ( ) 0 ( ) 0 ( 1 ) 0 ( k b b b  , where ) , ( 2 1 2 j j j b b b   , k j ,...,<label>1 </label></formula><p>. The interpreted pair j X shall be as points on the two- dimensional plane, and the conversion of</p><formula xml:id="formula_422">        ) cos( ) sin( ) sin( ) cos( j j j j df j B      -as a rotations of points j X on the angle j  .</formula><p>The proof is formulated in lemmas 1-7 in <ref type="bibr">[20]</ref>. Theorem 12. The problem of termination of the loop ( <ref type="formula" target="#formula_70">9</ref>) is algorithmically solvable. Proof of theorems 10-12 is in <ref type="bibr">[20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>This review represents main results of several works of one of the authors of the theory of program invariants. Subject of the research is an invariant of linear iteration loops. A new approach to the problems of static analysis of linear loops is represented: the problem of generating of polynomial invariance equations and the problem of proving the invariance of linear inequalities. This approach uses the representation of a linear operator in the loop body in the Jordan form and is based on the analysis of the spectrum of this operator.</p><p>The main results about invariant equality are the theorem 2 about multiplicative relations, a formula of invariant equations for the Jordan cell, a theorem 6 of the structure of a basis of the ideal of polynomial invariants, and, also, the algorithm of constructing of the basis of ideal of polynomial invariants for operators with irreducible over the field of rational numbers characteristic polynomial. Thus, for a given problem the problem of constructing of the basis of ideal of polynomial invariants for operators with a reducible characteristic polynomial remains open. From the practical view, the interest is in constructing the corresponding effective algorithms.</p><p>Unlike polynomial equations, the set of linear invariant inequalities does not have a finite basis. Therefore, a method of generating the basis is not applicable to this task. This paper represents the basic idea of the direct method of proof of the invariance of linear inequalities. There is a need to note, that the key role in the method is played by the set of maximal (from the modulus) eigenvalues of operator A . In this case, the case of maximal real eigenvalues and the maximal complex eigenvalues are significantly different. In the second case, the method uses the original method of</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Defining Finitely Supported Mathematics over Sets with Atoms 1 Introduction</head><p>Since the experimental sciences are mainly interested in quantitative aspects, and since there exists no evidence for the presence of infinite structures, it becomes useful to develop a mathematics which deals with a more relaxed notion of (in)finiteness. We present our attempt of building the necessary concepts and structures for a finitely supported mathematics. What we call Finitely Supported Mathematics is a mathematics which is consistent with the axioms of the Fraenkel-Mostowski (FM) set theory. The FM axioms represents an "axiomatization" of the FM permutation model of the Zermelo-Fraenkel set theory with atoms; in this way, these axioms transform this model into an independent set theory. The axioms of the FM set theory are precisely the Zermelo-Fraenkel with atoms (ZFA) axioms over an infinite set of atoms <ref type="bibr">[16]</ref>, together with the special property of finite support which claims that for each element x in an arbitrary set we can find a finite set supporting x. Therefore in the FM universe only finitely supported objects are allowed. The original purpose of the FM set theory was to provide a mathematical model for variables in a certain syntax. Since they have no internal structure, atoms can be used to represent names. The finite support axiom is motivated by the fact that syntax can only involve finitely many names. The FM set theory provides a balance between rigorous formalism and informal reasoning. This is discussed in <ref type="bibr">[23]</ref>, where principles of structural recursion and induction are explained in the FM framework. We can use this theory in order to manage infinite structures in a finitary manner, that is, in the FM framework we try to model the infinite using a more relaxed notion of finite, i.e, the notion of finite support. Although a set of axioms for describing sets with atoms (or FM-sets) was introduced in <ref type="bibr">[16]</ref>, an earlier idea of using atoms in computer science belongs to Gandy <ref type="bibr">[17]</ref>. Gandy proved that any machine satisfying four physical 'principles' is equivalent to some Turing machine. Gandy's four principles define a class of computing machines, namely the 'Gandy machines'. Gandy machines are represented by classes of 'states' and 'transition operations between states'. States are represented by hereditary finite sets built up from an infinite set U of atoms, and transformations are given by restricted operations from states to states. The class HF of all hereditary finite sets over U introduced in Definition 2.1 from <ref type="bibr">[17]</ref> is described quite similar to the von-Neumann cumulative hierarchy of FM-sets, F M A presented in <ref type="bibr">[16]</ref>. The single difference between these approaches is that each HF n+1 is defined inductively involving 'finite subsets of U ∪ HF n ', whilst each F M α+1 (A) is defined inductively by using 'the disjoint union between A and the finitely supported subsets of F M α (A)'; HF is the union of all HF n (with the mention that the empty set is not used in this construction), and the family of all FM-sets is the union of all F M α from which we exclude the set A of atoms. The support of an element x in HF , obtained according to Definition 2.2(1) of <ref type="bibr">[17]</ref>, coincides with supp(x) (with notations from Definition 2(4)) if we see x as an FM-set. Also, the effect of a permutation π on a structure x described in Definition 2.3 from <ref type="bibr">[17]</ref> is defined analogue as the application of the S A -action on F M A to the element (π, x) ∈ S A × F M A . Obviously, the Gandy's principles can also be presented in the FM framework because any finite set is well defined in FM; however, an open problem regards the consistency of Gandy's principles when 'finite' is replaced by 'finitely supported'. The construction of the universe of all FM-sets <ref type="bibr">[16]</ref> is inspired by the construction of the universe of all admissible sets over an arbitrary collection of atoms <ref type="bibr">[6]</ref>. The hereditary finite sets used in <ref type="bibr">[17]</ref> are particular examples of admissible sets. The FM-sets represent a generalization of hereditary finite sets because any FM-set is an hereditary finitely supported set.</p><p>In the literature there exist various approaches regarding the FM framework. We try to clarify the differences between these approaches.</p><p>-The FM permutation model of the ZFA set theory.</p><p>This model was introduced by Fraenkel <ref type="bibr">[14]</ref> and extended by Lindenbaum and Mostowski <ref type="bibr">[21]</ref>. Its original aim was to establish the independence of the axiom of choice from the other axioms of the ZFA set theory. There also exist some other permutation models of ZFA presented in <ref type="bibr">[20]</ref> which are defined by using countable infinite sets of atoms. -The FM axiomatic set theory. This set theory was presented in <ref type="bibr">[16]</ref>. It is inspired by the FM permutation model of the ZFA set theory. However, the FM set theory, the ZFA set theory and the Zermelo-Fraenkel (ZF) set theory are independent axiomatic set theories. All of these theories are described by axioms, and all of them have models. For example, the Cumulative Hierarchy Fraenkel-Mostowski universe F M A presented in <ref type="bibr">[16]</ref> is a model of the FM set theory, while some models of the ZF set theory can be found in <ref type="bibr">[19]</ref>, and the permutation models of the ZFA set theory can be found in <ref type="bibr">[20]</ref>. The sets defined using the FM axioms are called FM-sets. A ZFA set is an FM-set if and only if all its elements have hereditarily finite supports. Note that the infinite set of atoms in the FM set theory does not necessary be countable. The Fraenkel-Mostowski set theory is consistent whether the infinite set of atoms is countable or not. In <ref type="bibr">[16]</ref> it is used a countable set of atoms in order to define a model of the Fraenkel-Mostowski set theory for new names in computer science, while in <ref type="bibr">[7]</ref> there are described FM-sets over a set of atoms which do not represent a homogeneous structure. Also, in <ref type="bibr">[12]</ref> the authors use non-countable sets of atoms (like the set of real numbers) in order to study the minimization of deterministic timed automata.</p><p>-Nominal sets. These sets can be defined both in the ZF framework <ref type="bibr">[24]</ref> and in the FM framework <ref type="bibr">[16]</ref>. In ZF, a fixed infinite set A is considered as a set of names. A nominal set is defined as a usual ZF set endowed with a particular group action of the group of permutations over A that satisfies a certain finiteness property. Such a finiteness property allows us to say that nominal sets are well defined according to the axioms of the FM set theory whenever the set of names is the set of atoms in the FM set theory. There exists also an alternative definition for nominal sets in the FM framework. They can be defined as sets constructed according to the FM axioms with the additional property of being empty supported (invariant under all permutations). These two ways of defining nominal sets finally lead to similar properties. According to the previous remark we use the terminology "invariant" for "nominal" in order to establish a connection between approaches in the FM framework and in the ZF framework. Moreover, we can say that any set defined according to the FM axioms (any FM-set) can be seen as a subset of the nominal (invariant) set F M A . However, an FM-set is itself a nominal set only if it has an empty support. The theory of nominal sets makes sense even if the set of atoms is infinite but not countable. Informally, since the ZFA set theory collapses into the ZF set theory when the set of atoms is empty, we can say that the nominal sets represent a natural extension of the usual sets. In computer science, nominal sets offer an elegant formalism for describing λ-terms modulo α-conversion <ref type="bibr">[16]</ref>. They can also be used in algebra <ref type="bibr">[5,</ref><ref type="bibr">2]</ref>, in proof theory <ref type="bibr">[27]</ref>, in domain theory <ref type="bibr">[26]</ref>, in topology <ref type="bibr">[22]</ref>, semantics of process algebras <ref type="bibr">[4,</ref><ref type="bibr">15]</ref> and programming <ref type="bibr">[25]</ref>. A survey on the applications of nominal sets in computer science emphasizing our contributions can be found in <ref type="bibr">[3]</ref>.</p><p>-Generalized nominal sets. The theory of nominal sets over a fixed set A of atoms is generalized in <ref type="bibr">[10]</ref> to a new theory of nominal sets over arbitrary (unfixed) sets of data values. This provides the generalized nominal sets. The notion of 'S A -set' (Definition 2) is replaced by the notion of 'set endowed with an action of a subgroup of the symmetric group of D' for an arbitrary set of data values D, and the notion of 'finite set' is replaced by the notion of 'set with a finite number of orbits according to the previous group action (orbitfinite set)'. This approach is useful for studying automata on data words <ref type="bibr">[10]</ref>, languages over infinite alphabets <ref type="bibr">[8]</ref>, or Turing machines that operate over infinite alphabets <ref type="bibr">[11]</ref>. Computations in these generalized nominal sets are presented in <ref type="bibr">[9,</ref><ref type="bibr">13]</ref>.</p><p>As their names say, the nominal sets are used to manage notions like renaming, binding or fresh name. However, this theory could be studied deeper from an algebraically viewpoint, and it could be used in order to characterize some infinite structures in terms of finitely supported objects.</p><p>Finitely Supported Mathematics (FSM) is introduced to prove that many finiteness ZF properties still remain valid if we replace the term 'finite' with 'infinite, but with finite support'. Such results have already been presented in <ref type="bibr">[5]</ref> where we proved that a class of multisets over infinite alphabets (interpreted in the nominal framework) has similar properties to the classical multisets over finite alphabets. FSM is the mathematics developed in the world of finitely supported objects where the set of atoms has to be infinite (countable or not countable). Informally, FSM extends the framework of the ZF set theory without choice principles; ZF set theory is actually the Empty Supported Mathematics. In FSM, we use either 'invariant sets' or 'finitely supported sets' instead of 'sets'. As an intuitive rule, we are not allowed to use in the proofs of the results of FSM any construction that does not preserve the property of finite support. That means we cannot obtain a property in FSM only by using a ZF result without an appropriate proof using only the finite support condition. Since the invariant sets can also be defined in the ZFA framework similarly as in the ZF framework (see the first paragraph in Section 2), the definition of the finitely supported mathematics also makes sense over the ZFA axioms.</p><p>To summarize, FSM represents the ZF theory rephrased in terms of finitely supported objects; this means that FSM presents the theory of invariant sets, including invariant algebraic structures. FSM is not at all the theory of nominal sets from <ref type="bibr">[24]</ref> presented in a different manner; actually the theory of nominal sets <ref type="bibr">[24]</ref> could be considered as a tool for defining FSM. The main aim of FSM is to characterize the infinite algebraic structures by using their finite supports.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Sets with Atoms</head><p>Let A be a fixed infinite (countable or non-countable) ZF-set. The following results make also sense if A is considered to be the set of atoms in the ZFA framework (characterized by the axiom "y ∈ x ⇒ x / ∈ A") and if 'ZF' is replaced by 'ZFA' in their statements. Thus, we mention that the theory of invariant sets makes sense both in ZF and in ZFA. Several results of this section are similar to those in <ref type="bibr">[24]</ref>, but without assuming the set of atoms to be countable. Proposition 2. <ref type="bibr">[5]</ref> Let (X, •) and (Y, ⋄) be invariant sets, and let Z be a finitely supported subset of X. The function f : Z → Y is finitely supported in the sense of Definition 4 if and only if there exists a finite set S of atoms such that for all x ∈ Z and all π ∈ F ix(S) we have π • x ∈ Z and f (π</p><formula xml:id="formula_423">• x) = π ⋄ f (x).</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Reformulating the Classical ZF Results in FSM</head><p>The main idea of translating a classical ZF result (depending on sets and relations) into FSM is to analyze if there exists a valid result obtained by replacing "set" with "invariant/finitely supported set" and "relation" with "invariant/finitely supported relation" in the ZF result. If this is possible, then things go smoothly; however, this is not always so simple.</p><p>Every ZF set is a particular invariant set equipped with a trivial permutation action (Example 1(2)). Therefore, the general properties of invariant sets lead to valid properties of ZF sets. The converse is not always valid, namely not every ZF result can be directly rephrased in the world of invariant sets, terms of finitely supported objects according to arbitrary permutation actions. This is because, given an invariant set X, there could exist some subsets of X (and also some relations or functions involving subsets of X) which fail to be finitely supported. A classical example (presented also in Subsection 2.2.3.6 of <ref type="bibr">[26]</ref>) is represented by the powerset of the invariant set A. A subset of A which is in the same time infinite and coinfinite could be defined in some models of ZF (or of ZFA is we consider A to be the set of atoms in ZFA), but it can not be defined in FSM because it is not finitely supported. Therefore the remark that everything that can be done in ZF can also be done in FSM is not valid. That means there may exist some valid results depending on several ZF structures which fail to be valid in FSM if we simply replace "ZF structure" with "FSM structure" in their statement.</p><p>We present few examples regarding these aspects. There exist some valid ZF results that cannot be translated into FSM. According to Remark 1, the following examples are particularly interesting because they do not overlap neither on some known properties of permutative models of ZFA, nor on some properties of nominal sets <ref type="bibr">[24]</ref>.</p><formula xml:id="formula_424">Example 2.</formula><p>-There exist models of ZF without choice that satisfy the ordering principle "Every set can be totally ordered". More details about such models are in <ref type="bibr">[19]</ref>, where there are mentioned Howard-Rubin's first model N38 and Cohen's first model M1. Therefore the ordering principle is independent from the axioms of the ZF set theory. -In FSM the following result fails "For every invariant set X there exists a finitely supported total order relation on X". Therefore the ordering principle is inconsistent with the axioms of the FM set theory. Indeed, suppose that there exists a finitely supported total order &lt; on the invariant set A. Let a, b, c / ∈ supp(&lt;) with a &lt; b. Since (a c) ∈ F ix(supp(&lt;)) we have (a c)(a) &lt; (a c)(b), so c &lt; b. However, we also have (a b), (b c) ∈ F ix(supp(&lt;)), and so ((a b)</p><formula xml:id="formula_425">• (b c))(a) &lt; ((a b) • (b c))(b), that is, b &lt; c.</formula><p>We get a contradiction, and so the translation of the ordering principle in FSM realized by replacing "structure" with "finitely supported structure" leads to a false statement.</p><p>Example 3.</p><p>-There exist models of ZF without choice that satisfy the partial countable choice principle: "Given any countable family (sequence) of non-empty sets F = (X n ) n , there exists an infinite subset M of N such that it is possible to select a single element from each member of the family (X m ) m∈M , i.e. there exist a choice function on (X m ) m∈M ". More details about such models are in <ref type="bibr">[19]</ref>, where there are mentioned Pincus-Solovay's First Model M27, Shelah's Second Model M38 and Howard-Rubin's first model N38. Therefore the partial countable choice principle is independent from the axioms of the ZF set theory.</p><p>-In FSM the following result fails: "Given any invariant set X, and any countable family F = (X n ) n of subsets of X such that the mapping n → X n is finitely supported, there exists an infinite subset M of N with the property that there is a finitely supported choice function on (X m ) m∈M ". Therefore the partial countable choice principle is inconsistent with the axioms of the FM set theory. Indeed, for the invariant set A we consider the countable family (X n ) n where X n is the set of all injective n-tuples from A. Since A is infinite, it follows that each X n is non-empty. In the FM framework, each X n is equivariant because A is an invariant set and each permutation is a bijective function. Therefore the family (X n ) n is equivariant, and the mapping n → X n is also equivariant. Suppose that there exists an infinite subset M of N and a finitely supported choice function f on (X</p><formula xml:id="formula_426">m ) m∈M . Let f (X m ) = y m with each y m ∈ X m . Let π ∈ F ix(supp(f ))</formula><p>. According to Proposition 2, and because each element X m is equivariant according to its definition, we obtain that π</p><formula xml:id="formula_427">• y m = π • f (X m ) = f (π • X m ) = f (X m ) = y m .</formula><p>Therefore, each element y m is supported by supp(f ), and so supp(y m ) ⊆ supp(f ) for all m ∈ M . Since y m is a finite tuple of atoms which has exactly m elements for each m ∈ M , we have that supp(y m ) = y m , ∀m ∈ N (see Example 1(1)). Thus y m ⊆ supp(f ) for all m ∈ M . However, because M is infinite, we contradict the finiteness of supp(f ). Therefore the translation of the partial countable choice principle in FSM realized by replacing "structure" with "finitely supported structure" leads to a false statement.</p><p>Remark 1. Examples 2 and 3 show us that there exist some choice principles which are independent from the axioms of the ZF set theory, but inconsistent in FSM. Since FSM is consistent even if the set of atoms is not countable, such results do not overlap on some related properties in the basic or in the second Fraenkel modes of the ZFA set theory (which are defined using countable sets of atoms) <ref type="bibr">[20]</ref>. Also, the previous results do not follow immediately from <ref type="bibr">[24]</ref> because the nominal sets are defined over countable sets of atoms, while we define invariant sets over possible non-countable sets of atoms; in <ref type="bibr">[24]</ref> where the set of atoms is countable, Example 3 would be trivial. Moreover, we claim that all the choice principles from <ref type="bibr">[18]</ref> rephrased in terms of invariant sets are inconsistent in FSM. Note that it is not easy to prove such a result in FSM, even if various relationship results between several forms of choice hold in the ZF framework. This is because nobody guarantees that ZF results remain valid in FSM. Therefore, all the possible relationship results between various choice principles in FSM have to be independently proved in terms of finitely supported object. Details regarding the consistency of various choice principles in the world of invariant sets defined over possibly non-countable sets of atoms are presented in another paper.</p><p>Other results which fail in FSM are given by the Stone duality <ref type="bibr">[22]</ref>, by the determinization of finite automata and by the equivalence of two-way and oneway finite automata <ref type="bibr">[10]</ref>. There also exist some valid ZF results that can be translated into FSM only in a weaker form.</p><p>Example 4. We define an invariant complete lattice as an invariant set (L, •) together with an equivariant order relation ⊑ on L satisfying the property that every finitely supported subset X ⊆ L has a least upper bound with respect to the order relation ⊑.</p><p>-Let L be a ZF complete lattice and f : L → L a ZF monotone function.</p><p>Then there exists a greatest e ∈ L such that f (e) = e and a least e ∈ L such that f (e) = e (weak form of Tarski theorem). -Let (L, ⊑, •) be an invariant complete lattice and f : L → L a finitely supported monotone function. Then there exists a greatest e ∈ L such that f (e) = e, and a least e ∈ L such that f (e) = e (the proof is similar to Theorem 3.2 in <ref type="bibr">[1]</ref>).</p><p>These results show that the weak form of the Tarski theorem can be naturally translated into FSM. However, as it is presented below, the strong form of the Tarski theorem cannot be naturally translated into FSM; it holds in FSM only for a particular class of finitely supported monotone functions, i.e, the equivariant monotone functions.</p><p>-Let L be a ZF complete lattice and f : L → L a ZF monotone function over L. Let P be the set of fixed points of f . Then P is a complete lattice (strong form of Tarski theorem). -Let (L, ⊑, •) be an invariant complete lattice and f : L → L an equivariant monotone function over L. Let P be the set of fixed points of f . Then (P, ⊑, •) is an invariant complete lattice. The result does not hold if f is finitely supported, but not equivariant (the proof is similar to Theorem 3.3 in <ref type="bibr">[1]</ref>).</p><p>that a certain structure is finitely supported. The first method is a constructive one: by using some intuitive arguments, we anticipate a possible candidate for the support and prove that this candidate is indeed a support. The second method is based on a general finite support principle which is defined using the higherorder logic. However the use of this second method has some limits, as we present in the paragraphs below.</p><p>According to <ref type="bibr">[23]</ref>, we have the following equivariance/finite support principle which works over invariant sets.</p><p>Theorem 1.</p><p>-Any function or relation that is defined from equivariant functions and relations using classical higher-order logic is itself equivariant. -Any function or relation that is defined from finitely supported functions and relations using classical higher-order logic is itself finitely supported.</p><p>In applying this equivariance/finite support principle, one must take into account all the parameters upon which a particular construction depends. We think that the formal involvement of the equivariance/finite support principle, i.e. the precise verification if the conditions for applying the equivariance/finite support principle are properly satisfied is sometimes at least as difficult as a constructive proof. Moreover, in many cases we need to construct effectively the support, and it is not enough to prove only that a certain structure is finitely supported.</p><p>Example 5. An invariant monoid (M, •, ⋄) is an invariant set (M, ⋄) endowed with an equivariant internal monoid law</p><formula xml:id="formula_428">• : M × M → M . If (Σ, ⋄) is an invariant set,</formula><p>then the free monoid Σ * on Σ is an invariant monoid <ref type="bibr">[5]</ref>.</p><p>1. For each monoid M and each function f : Σ → M , there exists a unique homomorphism of monoids g : Σ * → M with g • i = f , where i : Σ → Σ * is the standard inclusion of Σ into Σ * which maps each element a ∈ Σ into the word a (ZF universality theorem for monoids).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">i) Let (Σ, ⋄</head><p>Σ ) be an invariant set. Let i : Σ → Σ * be the standard inclusion of Σ into Σ * which maps each element a ∈ Σ into word a. If (M, •, ⋄ M ) is an arbitrary invariant monoid and ϕ : Σ → M is an arbitrary finitely supported function, then there exists a unique finitely supported homomorphism of monoids ψ : Σ * → M with ψ • i = ϕ. This result can be proved directly by involving the equivariance/finite support principle. ii) Let (Σ, ⋄ Σ ) be an invariant set. Let i : Σ → Σ * be the standard inclusion of Σ into Σ * which maps each element a ∈ Σ into the word a.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>If (M, •, ⋄</head><p>M ) is an arbitrary invariant monoid and ϕ : Σ → M is an arbitrary finitely supported function, then there exists a unique finitely supported homomorphism of monoids ψ :</p><formula xml:id="formula_429">Σ * → M with ψ • i = ϕ.</formula><p>Moreover, if a finite set S supports ϕ, then the same set S supports ψ. The last sentence of this theorem cannot be proved by involving the equivariance/finite support principle.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proof. If (M, •, ⋄</head><p>M ) is an invariant monoid, then (M, •) is a monoid. From the general ZF theory of monoids, we can define a unique homomorphism of monoids ψ :</p><formula xml:id="formula_430">Σ * → M with ψ • i = ϕ.</formula><p>In <ref type="bibr">[5]</ref> we proved that the free monoid Σ * on Σ is an invariant monoid whenever (Σ, ⋄) is an invariant set. The S A -action ⋆ : S A × Σ * → Σ * is defined by π ⋆x 1 x 2 . . . x l = (π ⋄ x 1 ) . . . (π ⋄ x l ) for all π ∈ S A and x 1 x 2 . . . x l ∈ Σ * \ {1}, and π ⋆1 = 1 for all π ∈ S A . In order to prove that ψ is finitely supported it is sufficient to apply Theorem 1 because ψ is defined from the finitely supported functions ϕ and i using the higher-order logic. However, Theorem 1 is not sufficient to prove that if a finite set S supports ϕ, then the same set S supports ψ. In order to prove the previous statement we proceed as follows.</p><p>Let us consider S = supp(ϕ). Thus, by Proposition 2 we have ϕ(π</p><formula xml:id="formula_431">⋄ Σ x) = π ⋄ M ϕ(x)</formula><p>for all x ∈ Σ and π ∈ F ix(S). We have to prove that S supports ψ. Let π ∈ F ix(S). According to Proposition 2 it is sufficient to prove that</p><formula xml:id="formula_432">ψ(π ⋆x 1 x 2 . . . x n ) = π ⋄ M ψ(x 1 x 2 . . . x n ) for each x 1 x 2 . . . x n ∈ Σ * .</formula><p>However, ψ is a monoid homomorphism between Σ * and M , and</p><formula xml:id="formula_433">ψ • i = ϕ. This means ψ(x 1 x 2 . . . x n ) = ϕ(x 1 )•ϕ(x 2 )•. . .•ϕ(x n ). Since (M, •, ⋄ M ) is an invariant monoid we have π ⋄ M ψ(x 1 x 2 . . . x n ) = π ⋄ M (ϕ(x 1 ) • ϕ(x 2 ) • . . . • ϕ(x n )) =(π ⋄ M ϕ(x 1 )) • (π ⋄ M ϕ(x 2 )) • . . . • (π ⋄ M ϕ(x n )) = ϕ(π ⋄ Σ x 1 ) • ϕ(π ⋄ Σ x 2 ) • . . . • ϕ(π ⋄ Σ x n ). However, π ⋆x 1 x 2 . . . x n = (π ⋄ Σ x 1 ) . . . (π ⋄ Σ x n ) and ψ(π ⋆x 1 x 2 . . . x n ) = ψ((π ⋄ Σ x 1 ) . . . (π⋄ Σ x l )) = ϕ(π⋄ Σ x 1 )•ϕ(π⋄ Σ x 2 )•. . .•ϕ(π⋄ Σ x n ). Hence ψ(π ⋆x 1 x 2 . . . x n ) = π ⋄ M ψ(x 1 x 2 . . . x n ) for each π ∈ F ix(S)</formula><p>, which means S supports ψ. Example 5 <ref type="bibr">(2)</ref> shows us that by using the equivariance/finite support principle we can obtain a universality property for invariant monoids which is similar to the one described in Example 5 <ref type="bibr">(1)</ref>. However, in order to prove that supp(ψ) ⊆ supp(ϕ) in the second item of Example 5(2), we need to present a constructive method of defining a set supporting ψ (see also Theorem 6 from <ref type="bibr">[5]</ref>).</p><p>Other related examples regarding the equivariance/finite support principle are Theorems 4, 9 and 11 from <ref type="bibr">[5]</ref>, or Theorem 3.7 from <ref type="bibr">[2]</ref>. In these theorems we are able to prove a precise characterization for the support of some structures which could not be obtained by a direct application of the equivariance/finite support principle in the form from Theorem 1. In these results we do not prove only that some structures are finitely supported, but we also found a relationship between the supports of the related structures.</p><p>In some cases we can prove stronger properties without involving the equivariance/finite support principle. For example, each function f</p><p>x in the proof of Theorem 7 of <ref type="bibr">[5]</ref> has a non-empty finite support. Using the equivariance/finite support principle one can say that the function T from that theorem has also a finite support. We were able to prove something stronger using a constructive method: the function T is equivariant.</p><p>A constructive method of defining the support is also necessary in order to assure that some structures are uniformly finitely supported (i.e. supported by the same finite set of atoms). Some related examples regarding the uniform support are presented in <ref type="bibr">[2]</ref> (Section 5), where we should assume that some structures are uniformly supported in order to obtain some embedding properties for invariant (nominal) groups. Also, note that a chain is finitely supported if and only if all its elements are finitely supported and have the same support, i.e., all its elements are uniformly finitely supported. Therefore, in order to prove that a chain is finitely supported, we must present a constructive method of defining the support of its elements. More exactly, we cannot use the equivariance/finite support principle which would not assure the uniformity of the support of its elements. Suggestive examples regarding finitely supported chains are presented in Chapter 4 of <ref type="bibr">[25]</ref>.</p><p>We conclude that the equivariance/finite support principle is not useful when we want to obtain a relationship between the supports of several constructions (and we do not want only to prove that these constructions are finitely supported). This is because, in its actual form, the second part of Theorem 1 allows to prove that a certain structure is finitely supported, but it do not provide any information about the structure of the support. However, the first part of Theorem 1 helps when we want to prove the equivariance of some constructions. Note that we do not claim that the finite support principle is not useful. Obviously, it can be used to give simpler proofs for the fact that functions and relations defined from finitely supported functions and relations via classical higher-order formulas are finitely supported. However, a concrete calculation for the supports of some structures is able to provide more informations about the related supports; we justify this viewpoint in Example 5. Also, such a method is useful in order to find the uniform supports.</p><p>Note that, often in practice, it is not sufficient to prove only that a certain structure is finitely supported without giving any information about the structure of support. A more precise characterization of the support is useful. For example, let us consider an α-equivalence class [t] of a λ-term t. The support of [t] is represented by the set of free names of t <ref type="bibr">[16]</ref>; the support of [t] is finite because any λ-term has a finite numbers of free names. However, the precise description of the free names of t is an aspect that matters. Therefore, we suggest to use a constructive method of defining the support of a certain structure instead of the finite support part (the second part) of Theorem 1, because in this way we can obtain more informations about the support.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>Our goal is to develop a mathematics for experimental science which deals with a more relaxed notion of finiteness. We call it the 'Finitely Supported Mathematics'. Informally, in Finitely Supported Mathematics we can model infinite structures after a finite number of observations. More precisely, we intend to restate some parts of algebra by replacing '(infinite) sets' with 'invariant sets'. This allows to model some infinite structures by using their finite supports. In order to sustain our viewpoint, we involve the axiomatic theory of FM-sets presented in <ref type="bibr">[16]</ref>. Rather than using a non-standard set theory, we could alternatively work with invariant sets, which are defined within ZF as usual sets endowed with some group actions satisfying a finite support requirement. The properties of invariant sets are similar to those presented in <ref type="bibr">[24]</ref>, with the mention that we assume invariant sets to be defined over possible non-countable sets of atoms. Our paper presents the basic steps requested in order to provide an extension of the theory of invariant sets to a theory of invariant algebraic structures. Although the initial purpose of defining invariant sets was to formulate a semantics for syntax with variable binding, we consider that such sets can also be used from an algebraic perspective in order to characterize infinite structures modulo finite supports, and thus in order to provide more informations about infinite objects.</p><p>The category of invariant sets has a very rich structure, and so the definitions of many structures given in the usual category of sets can be reformulated within the invariant sets framework. A natural question is which classical theorems about these structures hold internally in the world of invariant sets. Until now (or, more precisely, until we would be able to solve the open problem presented below), there does not exist a standard algorithm to translate any classical ZF result into FSM. This is because there may exist some subsets of an invariant set which fail to be finitely supported, and thus there may exist some ZF results that fail in the universe of invariant sets. Related examples regarding the previous statement are presented in Section 3. Therefore, reformulating the ZF theorems into FSM should be done for each case separately. For example, the theory of monoids is studied in FSM in <ref type="bibr">[5]</ref>, the theory of groups is rephrased in FSM in <ref type="bibr">[2]</ref>, and the theory of posets and domains is reformulated within invariant sets framework in <ref type="bibr">[24,</ref><ref type="bibr">25]</ref>. In order to prove that a structure is finitely supported, one could use either the finite support principle of <ref type="bibr">[24]</ref> (e.g. Theorem 1), or a more "constructive" method. To employ such a "constructive method" means that we anticipate a possible candidate for a support, and then prove that this candidate is indeed a support. The benefit of this method is that we are able to obtain more informations about the related support than by using the finite support principle. Related examples can be found in Section 4.</p><p>An Open Problem: The main task in order to define a finitely supported mathematics is to prove that certain subsets of an invariant set are finitely supported. We already know that given an invariant set X, there could exist some subsets of X which fail to be finitely supported. Some related examples are presented in <ref type="bibr">[24]</ref> and <ref type="bibr">[26]</ref>. However, all these examples are described by using choice principles or consequences of choice principles (like the assertion that the set A can be non-amorphous in ZFA) in order to construct some structures which later fail to be finitely supported. We conjecture that all the choice principles presented in <ref type="bibr">[18]</ref> are inconsistent in FSM. We did not find yet any example of a non-finitely supported subset of an invariant set defined without using a choice principle from <ref type="bibr">[18]</ref> or a consequence of a form of choice (like the construction of an infinite and coinfinite subset of an infinite set). Therefore, the question regarding the validity of the following assertions naturally appears.</p><p>-If we consider the ZF set theory (or the ZFA set theory) without any choice principle, then every subset of an invariant set is finitely supported?</p><p>-For what kind of atoms the previous question has an affirmative answer?</p><p>If we get an affirmative answer (even for a particular set of atoms), then the mathematics developed in the ZF (or ZFA) set theory without any choice principle would be somehow equivalent to FSM, namely we could model any infinite structure by using its finite support.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>A subset of the state space of a control system is called viable, if for any initial point in this set there exists a solution of the control system which stays forever in this set. Usual problems associated with viability are checking if a given set is viable, finding a solution (and/or the corresponding control input) which stays forever in this set (viable solution), designing a viable region <ref type="bibr">[2]</ref>. Viability was studied in many works on the theory of differential equations and inclusions and the control theory [20, 5,</p><p>. The corresponding results can be straightforwardly applied to control and verification problems for hybrid (discrete-continuous) systems <ref type="bibr">[11]</ref> and other models of cyber-physical systems <ref type="bibr">[22,</ref><ref type="bibr">4,</ref><ref type="bibr">17,</ref><ref type="bibr">23]</ref>, assuming that viable sets are interpreted as safety regions. However, this interpretation suggests certain natural generalizations of the notion of viability. We propose and investigate one such generalization in this paper.</p><p>Let n ≥ 1 be a natural number, I be a non-empty finite set, and f i : R → R n , i ∈ I be an indexed family of vector fields.</p><p>sufficient condition which can be used to verify that for a given system, X, and Y , X is Y -strongly viable.</p><p>To do this we will use the notion of a Nondeterministic Complete Markovian System (NCMS) <ref type="bibr">[14]</ref> which is based on the notion of a solution system by O. Hájek <ref type="bibr">[12]</ref>. More specifically, we will represent the system (1) using a suitable NCMS and reduce the problem of Y -strong viability of a set X to the problem of the existence of global-in-time trajectories of NCMS which was investigated in <ref type="bibr">[14,</ref><ref type="bibr">15]</ref> and apply a theorem about the right dead-end path in NCMS <ref type="bibr">[15]</ref> in order to obtain a condition of Y -strong viability.</p><p>To make the paper self-contained, in Section 2 we give the necessary definitions and facts about NCMS. In Section 3 we formulate and prove the main result of the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Notation</head><p>We will use the following notation: N = {1, 2, 3, ...}, N 0 = N ∪ {0}, R is the set of real numbers, R + is the set of nonnegative real numbers, f : A → B is a total function from a set A to a set B, f : A →B denotes a partial function from a set A to a set B. We will denote by 2 A the power set of a set A and by f | A the restriction of a function f to a set A.</p><p>If A, B are sets, then B A will denote the set of all total functions from A to B and A B will denote the set of all partial function from A to B.</p><p>For a function f : A →B the symbol f (x) ↓ (f (x) ↑) mean that f (x) is defined, or, respectively, undefined on the argument x.</p><p>We will not distinguish the notions of a function and a functional binary relation. When we write that a function f : A →B is total or surjective, we mean that f is total on the set A specifically (f (x) is defined for all x ∈ A), or, respectively, is onto B (for each y ∈ B there exists x ∈ A such that y = f (x)).</p><p>We will use the following notations for f : A →B: dom(f ) = {x | f (x) ↓}, i.e. the domain of f (note that in some fields like category theory the domain of a partial function is defined differently), and range(f ) = {y | ∃x f (x) ↓ ∧ y = f (x)}. We will use the same notation for the domain and range of a binary relation</p><formula xml:id="formula_435">: if R ⊆ A × B, then dom(R) = {x | ∃ y (x, y) ∈ R} and range(R) = {y | ∃ x (x, y) ∈ R}.</formula><p>We will denote by f (x) ∼ = g(x) the strong equality (where f and g are partial functions): f (x) ↓ if and only if g(x) ↓, and f (x) ↓ implies f (x) = g(x).</p><p>We will denote by f • g the functional composition:</p><formula xml:id="formula_436">(f • g)(x) ∼ = f (g(x)).</formula><p>For any set X and a value y we will denote by X → y a constant function defined on X which takes the value y.</p><p>Also, we will denote by T the non-negative real time scale [0, +∞) and assume that T is equipped with a topology induced by the standard topology on R.</p><p>The symbols ¬, ∨, ∧, ⇒, ⇔ will denote the logical operations of negation, disjunction, conjunction, implication, and equivalence respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Nondeterministic Complete Markovian Systems (NCMS)</head><p>The notion of a NCMS was introduced in <ref type="bibr">[13]</ref> for studying the relation between the existence of global and local trajectories of dynamical systems. It is close to the notion of a solution system by O. Hájek <ref type="bibr">[12]</ref>, however there are some differences between these two notions <ref type="bibr">[14]</ref>.</p><p>Denote by T the set of all intervals (connected subsets) in T which have the cardinality greater than one.</p><p>Let Q be a set (a state space) and T r be some set of functions of the form s : A → Q, where A ∈ T. The elements of T r will be called (partial) trajectories. Definition 1. ( <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>) A set of trajectories T r is closed under proper restrictions (CPR), if s| A ∈ T r for each s ∈ T r and A ∈ T such that A ⊆ dom(s). Definition 2. ( <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>)</p><formula xml:id="formula_437">(1) A trajectory s 1 ∈ T r is a subtrajectory of s 2 ∈ T r (denoted as s 1 ⊑ s 2 ), if dom(s 1 ) ⊆ dom(s 2 ) and s 1 = s 2 | dom(s 1 ) . (2) A trajectory s 1 ∈ T r is a proper subtrajectory of s 2 ∈ T r (denoted as s 1 ⊏ s 2 ), if s 1 ⊑ s 2 and s 1 = s 2 . (3) Trajectories s 1 , s 2 ∈ T r are incomparable, if neither s 1 ⊑ s 2 , nor s 2 ⊑ s 1 .</formula><p>The set (T r, ⊑) is a (possibly empty) partially ordered set. Definition 3. ( <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>) A CPR set of trajectories T r is (1) Markovian (Fig. <ref type="figure" target="#fig_1">2</ref>), if for each s 1 , s 2 ∈ T r and t ∈ T such that t = sup dom(s 1 ) = inf dom(s 2 ), s 1 (t) ↓, s 2 (t) ↓, and s 1 (t) = s 2 (t), the following function s belongs to T r: Definition 4. ( <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>) A nondeterministic complete Markovian system (NCMS) is a triple (T, Q, T r), where Q is a set (state space) and T r (trajectories) is a set of functions s : T →Q such that dom(s) ∈ T, which is CPR, complete, and Markovian.</p><formula xml:id="formula_438">s(t) = s 1 (t), t ∈ dom(s 1 ) s 2 (t), t ∈ dom(s 2 ) (2) complete, if each non-empty chain in (T r, ⊑) has a supremum.</formula><p>An overview of the class of all NCMS can be given using the notion of an LR representation <ref type="bibr">[13]</ref><ref type="bibr">[14]</ref><ref type="bibr">[15]</ref>. Definition 5. ( <ref type="bibr">[13,</ref><ref type="bibr">14]</ref>) Let s 1 , s 2 : T →Q. Then s 1 and s 2 coincide:</p><formula xml:id="formula_439">(1) on a set A ⊆ T , if s 1 | A = s 2 | A and A ⊆ dom(s 1 ) ∩ dom(s 2 ) (this is denoted as s 1 . = A s 2 ); (2) in a left neighborhood of t ∈ T , if t &gt; 0 and there exists t ′ ∈ [0, t) such that s 1 . = (t ′ ,t] s 2 (this is denoted as s 1 . = t− s 2 ); (3) in a right neighborhood of t ∈ T , if there exists t ′ &gt; t, such that s 1 . = [t,t ′ ) s 2 (this is denoted as s 1 . = t+ s 2 ).</formula><p>Let Q be a set. Denote by ST (Q) the set of pairs (s, t) where s : A → Q for some A ∈ T and t ∈ A. Definition 6. ( <ref type="bibr">[13,</ref><ref type="bibr">14]</ref></p><formula xml:id="formula_440">) A predicate p : ST (Q) → Bool is (1) left-local, if p(s 1 , t) ⇔ p(s 2 , t) whenever {(s 1 , t), (s 2 , t)} ⊆ ST (Q) and s 1 . = t− s 2 hold</formula><p>, and, moreover, p(s, t) holds whenever t is the least element of dom(s);</p><p>(2) right-local, if p(s 1 , t) ⇔ p(s 2 , t) whenever {(s 1 , t), (s 2 , t)} ⊆ ST (Q) and s 1 .</p><p>= t+ s 2 hold, and, moreover, p(s, t) holds whenever t is the greatest element of dom(s).</p><p>Let LR(Q) be the set of all pairs (l, r), where l : ST (Q) → Bool is a left-local predicate and r : ST (Q) → Bool is a right-local predicate.</p><formula xml:id="formula_441">Definition 7. ([14]) A pair (l, r) ∈ LR(Q) is called a LR representation of a NCMS Σ = (T, Q, T r), if T r = {s : A → Q | A ∈ T ∧ (∀t ∈ A l(s, t) ∧ r(s, t))}.</formula><p>The following theorem gives a representation of NCMS using predicate pairs.</p><formula xml:id="formula_442">Theorem 1. ([14, Theorem 1]) (1) Each pair (l, r) ∈ LR(Q) is a LR representation of a NCMS with the set of states Q. (2)</formula><p>Each NCMS has a LR representation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Existence global-in-time trajectories of NCMS</head><p>The problem of the existence of global trajectories of NCMS was considered in <ref type="bibr">[13,</ref><ref type="bibr">14]</ref> and was reduced to a more tractable problem of the existence of locally defined trajectories. Informally, the method of proving the existence of a global trajectory in NCMS consists of guessing a "region" (subset of trajectories) which presumably contains a global trajectory and has a convenient representation in the form of (another) NCMS and proving that this region indeed contains a global trajectory by finding or guessing certain locally defined trajectories independently in a neighborhood of each time moment.</p><p>Below we briefly state the main results about the existence of global trajectories of NCMS described in <ref type="bibr">[15]</ref>.</p><p>Let Σ = (T, Q, T r) be a fixed NCMS. </p><formula xml:id="formula_443">Definition 8. ([15]) Σ satisfies (1) local forward extensibility (LFE) property, if for each s ∈ T r of the form s : [a, b] → Q (a &lt; b) there exists a trajectory s ′ : [a, b ′ ] → Q such that s ′ ∈ T r, s ⊑ s ′ and b ′ &gt; b. (2) global forward extensibility (GFE) property, if for each trajectory s of the form s : [a, b] → Q there exists a trajectory s ′ : [a, +∞) → Q such that s ⊑ s ′ . Definition 9. ([15]) A right dead-end path (in Σ) is a trajectory s : [a, b) → Q, where a, b ∈ T , a &lt; b, such that there is no s ′ : [a, b] → Q, s ∈ T r such that s ⊏ s ′ (i.e.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 12. ([15]) (1) A right extensibility measure is a function f</head><formula xml:id="formula_444">+ : R × R →R such that A = {(x, y) ∈ T × T | x ≤ y} ⊆ dom(f + ), f (x, y) ≥ 0 for all (x, y) ∈ A, f + | A</formula><p>is strictly decreasing in the first argument and strictly increasing in the second argument, and for each x ≥ 0, </p><formula xml:id="formula_445">f + (x, x) = x , lim y→+∞ f + (x, y) = +∞. (2) A right extensibility measure f + is called normal, if f + is continuous on {(x, y) ∈ T × T | x ≤ y}</formula><formula xml:id="formula_446">→ f + (α(y), y) is of class K ∞ .</formula><p>An example of a right extensibility measure is f + 1 (x, y) = 2y − x. Let f + be a right extensibility measure. </p><formula xml:id="formula_447">(t) = σ(t), if t ∈ [a, b] and σ ′ (t) = σ(b), if t &gt; b. Then σ = σ ′ | [a,b] , σ ′ is piecewise-constant on each segment in its domain, and x(t) = x(t; a; x(a); σ ′ ) for all t ∈ [a, b]. Let b ′ = b + 1 and x ′ : [a, b ′ ] → R n be a function such that x ′ (t) = x(t; a; x(a); σ ′ ) for t ∈ [a, b ′ ]. Then x = x ′ | [a,b] . Because x ′ (t) = 0 for all t ∈ [a, b] and x ′ is continuous, there exists b ′′ ∈ (b, b ′ ] such that x ′ (t) = 0 for all t ∈ [a, b ′′ ]. Let s ′ : [a, b ′′ ] → Q be a function such that s ′ (t) = (x ′ (t), σ ′ (t)) for all t ∈ [a, b ′′ ].</formula><p>Then it follows immediately that s ′ ∈ T r. Besides, s⊑s ′ . Thus Σ satisfies LFE.</p><p>(2) Let us choose any i 0 ∈ I and define x : T → R n as x(t) = x(t; 0; x * 0 ; σ 0 ) for all t ∈ T , where σ 0 (t) = i 0 for all t. Then x is continuous and x(0) = x * 0 = 0, so there exists ε &gt; 0 such that</p><formula xml:id="formula_448">x(t) = 0 for all t ∈ [0, ε]. Let s : [0, ε] → Q be a function s(t) = (x(t), i 0 ), t ∈ [0, ε]. Then s ∈ T r.</formula><p>⊓ ⊔ Lemma 3. Assume that:</p><p>(1) for each t ∈ T there exist</p><formula xml:id="formula_449">i 1 , i 2 ∈ I such that f i1 (t, 0), f i2 (t, 0) are (nonzero) noncollinear vectors, i.e. k 1 f i1 (t, 0) + k 2 f i2 (t, 0) = 0 whenever k 1 , k 2 ∈ R are not both zero; (2) for each s ∈ T r defined on a set of the form [t 1 , t 2 ), if lim t→t 2 − (pr 1 •s)(t) = 0, then pr 1 (s(t)) ∈ D for some t ∈ [t 1 , t 2 ).</formula><p>Then each right dead-end path in</p><formula xml:id="formula_450">Σ(x * 0 ) is f + 1 -escapable, where f + 1 (x, y) = 2y −x is a right extensibility measure. Proof. Let M ′ = 1 + sup{ f i (t ′ , x ′ ) |(t ′ , x ′ ) ∈ T × R n , i ∈ I}. Then 0 &lt; M ′ &lt; +∞, because f is bounded. Let s : [a, b) → Q be a right dead-end path and x = pr 1 •s, σ = pr 2 •s. Let σ ′ : [a, +∞) → I be a function such that σ ′ (t) = σ(t), if t ∈ [a, b) and σ ′ (t) = σ(a), if t ≥ b. Then σ = σ ′ | [a,b</formula><p>) , σ ′ is Lebesgue-measurable, and x(t) = x(t; a; x(a); σ ′ ) for all t ∈ [a, b). Then there exists a limit x l = lim t→b− x(t) = x(b; a; x(a); σ ′ ) ∈ R n .</p><p>Firstly, consider the case when x l = 0. Then x l &gt; 0. Let us choose an arbitrary t 0 ∈ (a, b) such that b − t 0 &lt; x l /(4M ′ ) and x(t 0 ) − x l &lt; x l /2 (this is possible, because x l = lim t→b− x(t)). Let σ ′′ : [t 0 , +∞) → I and x ′′ : [t 0 , +∞) → R n be functions such that σ ′′ (t) = σ(t 0 ) for all t ≥ t 0 and x ′′ (t) = x(t; t 0 ; x(t 0 ); σ ′′ ) for all t ≥ t 0 . Then</p><formula xml:id="formula_451">x ′′ (t 0 ) = x(t 0 ) − x l + x l ≥ x l − x(t 0 ) − x l &gt; x l /2 &gt; 2M ′ (b − t 0 )</formula><p>. Then for all t ≥ t 0 we have</p><formula xml:id="formula_452">x ′′ (t) = x ′′ (t 0 ) + t t0 f σ ′′ (t) (t, x ′′ (t))dt ≥ ≥ x ′′ (t 0 ) − t t0 f σ ′′ (t) (t, x ′′ (t)) dt &gt; &gt; 2M ′ (b − t 0 ) − M ′ (t − t 0 ) = M ′ (2b − t 0 − t). = v 1 (t ′ 1 − t 0 ) − v 2 (t ′ 2 − t 0 ) + t ′ 1 t0 d 1 (t)dt − t ′ 2 t0 d 2 (t)dt ≥ ≥ v 1 (t ′ 1 − t 0 ) − v 2 (t ′ 2 − t 0 ) − t ′ 1 t 0 d 1 (t) dt − t ′ 2 t 0 d 2 (t) dt ≥ ≥ M (|t ′ 1 − t 0 | + |t ′ 2 − t 0 |) − ε(t ′ 1 − t 0 ) − ε(t ′ 2 − t 0 ) = M 2 (t ′ 1 − t 0 + t ′ 2 − t 0 ) &gt; 0.</formula><p>We have a contradiction, so there exists j ∈ {1, 2} and</p><formula xml:id="formula_453">t ′′ ∈ [t 0 , t ′ j ] such that x j (t ′′ ) ≥ R. This implies that R ≤ x j (t ′′ ) = x j (t ′ j ) − x j (t ′′ ) = t ′ j t ′′ f ij (t, x j (t))dt ≤ M ′ (t ′ j − t ′′ ). Then t ′ j − t 0 ≥ t ′ j − t ′′ ≥ R/M ′ &gt; 2(b − c) ≥ 2(b − t 0 ), so t ′ j &gt; 2b − t 0 . Let us choose any d ∈ (max{2b − t 0 , t 0 }, t ′ j ). Let s * : [t 0 , d] → Q be a function such that s * (t 0 ) = s(t 0 ) = (x(t 0 ), σ(t 0 )) and s * (t) = (x j (t), i j ) for all t ∈ (t 0 , d]. Because x j (t 0 ) = x(t 0 ) ∈ D and x j (t) = 0 for all t ∈ [t 0 , t ′ j ) ⊃ [t 0 , d], we have s * ∈ T r. Besides, s * (t 0 ) = s(t 0 ) and d &gt; 2b − t 0 = f + 1 (t 0 , b), so s * is an escape from s and s is f + 1 -escapable. ⊓ ⊔ Lemma 4.</formula><p>Assume that:</p><p>(1) for each t ∈ T there exist i 1 , i 2 ∈ I such that f i 1 (t, 0) and</p><formula xml:id="formula_454">f i 2 (t, 0) are noncollinear; (2) {0} is a path-component of {0} ∪ Y .</formula><p>Then Σ(x * 0 ) has a global trajectory.</p><p>Proof. Let us show that the assumption 2 of Lemma 3 holds. Let</p><formula xml:id="formula_455">s ∈ T r, dom(s) = [t 1 , t 2 ) (t 1 &lt; t 2 ), lim t→t2− (pr 1 • s)(t) = 0. Denote x = pr 1 • s. Suppose that x(t) / ∈ D for all t ∈ [t 1 , t 2 ). Let γ : [0, 1] → {0} ∪ (R n \D) be a function such that γ(ε) = x(t 1 + ε(t 2 − t 1 )), if ε ∈ [0, 1) and γ(1) = 0. Then γ is continuous, so there is a path from γ(0) = x(t 1 ) = 0 to 0 in {0}∪(R n \D) = {0}∪Y (considered as a topological subspace of R n ). This contradicts the assumption that {0} is a path-component of {0} ∪ Y . Thus x(t) ∈ D for some t ∈ [t 1 , t 2 ).</formula><p>The assumption 1 of Lemma 3 also holds, so by Lemma 2, Lemma 3, Lemma 1, Theorem 2, Σ satisfies GFE. Besides, by Lemma 2 there exists s ∈ T r with dom(s) = [0, ε] for some ε &gt; 0, so by the GFE property, Σ has a global trajectory.</p><p>⊓ ⊔ Proof (of Theorem 4). Follows straightforwardly from Lemma 4, because the statement of Lemma 4 holds for any x * 0 ∈ X.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Natural Computing Modelling of the Polynomial Space Turing Machines 1 Introduction</head><p>Membrane computing is a branch of the natural computing inspired by the architecture and behaviour of living cells. Various classes of membrane systems (also called P systems) have been defined in <ref type="bibr">[12]</ref>, together with their connections to other computational models. Membrane systems are characterized by three features: (i) a membrane structure consisting of a hierarchy of membranes (which are either disjoint or nested), with an unique top membrane called the skin; (ii) multisets of objects associated with membranes; (iii) rules for processing the objects and membranes. When membrane systems are seen as computing devices, two main research directions are usually considered: computational power in comparison with the classical notion of Turing computability (e.g., <ref type="bibr">[2]</ref>), and efficiency in algorithmically solving NP-complete problems in polynomial time (e.g., <ref type="bibr">[3]</ref>). Such efficient algorithms are obtained by trading space for time, with the space grown exponentially in a linear time by means of bio-inspired operations (e.g., membrane division). Thus, membrane systems define classes of computing devices which are both powerful and efficient. Related to the investigations of these research directions, there have been studied several applications of these systems; among them, modelling of various biological phenomena and the complexity and emergent properties of such systems presented in <ref type="bibr">[7]</ref>. In <ref type="bibr">[4]</ref> it is presented the detailed functioning of the sodium-potassium pump, while in <ref type="bibr">[1]</ref> it is described and analyzed the immune system in the formal framework of P systems.</p><p>In this paper we consider P systems with active membranes <ref type="bibr">[11]</ref>, and show that they provide an interesting simulation of polynomial space Turing machines by using only logarithmic space and a polynomial number of read-only input objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>We consider P systems with active membranes extended with an input alphabet, and such that the input objects cannot be created during the evolution <ref type="bibr">[14]</ref>. The original definition also includes dissolution and division rules, rules that are not needed here. The version used in this paper is similar to evolution-communication P systems used in <ref type="bibr">[6]</ref> with additional read-only input objects and polarities. Definition 1. A P system with active membranes and input objects is a tuple Π = (Γ, ∆, Λ, µ; w 1 , . . . , w d , R), where:</p><formula xml:id="formula_456">• d ≥ 1 is the initial degree; • Γ is a finite non-empty alphabet of objects; • ∆ is an input alphabet of objects such that ∆ ∩ Γ = ∅;</formula><p>• Λ is a finite set of labels for membranes; • µ is a membrane structure (i.e., a rooted unordered tree, usually represented by nested brackets) in which each membrane is labelled by an element of Λ in a one-to-one way, and possesses an attribute called electrical charge, which can be either neutral (0), positive (+) or negative (-); • w 1 , . . . , w d are strings over Γ , describing the initial multisets of objects placed in a number of d membranes of µ; notice that w i is assigned to membrane i; • R is a finite set of rules over Γ ∪ ∆:</p><p>1. [a → w] α h object evolution rules An object a ∈ Γ is rewritten into the multiset w, if a is placed inside a membrane labelled by h with charge α. An object a can be deleted by considering w the empty multiset ∅. Notice that these rules allow only to rewritten objects from Γ , but not from ∆.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">a[ ]</head><formula xml:id="formula_457">α h → [b] β h</formula><p>send-in communication rules An object a is sent into a membrane labelled by h and with charge α, becoming b; also, the charge of h is changed to</p><formula xml:id="formula_458">β. If b ∈ ∆, then a = b must hold. 3. [a] α h → b[ ] β h</formula><p>send-out communication rules An object a, placed into a membrane labelled by h and having charge α, is sent out of membrane h and becomes b; simultaneously, the charge of</p><formula xml:id="formula_459">h is changed to β. If b ∈ ∆, then a = b must hold.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Each configuration C</head><p>i of a P system with active membranes and input objects is described by the current membrane structure, including the electrical charges, together with the multisets of objects located in the corresponding membranes. The initial configuration of such a system is denoted by C 0 . An evolution step from the current configuration</p><formula xml:id="formula_460">C i to a new configuration C i+1 , denoted by C i ⇒ C</formula><p>i+1 , is done according to the principles:</p><p>• Each object and membrane is involved in at most one communication rule per step. • Each membrane could be involved in several object evolution rules that can be applied in parallel inside it. • The application of rules is maximally parallel: the only objects and membranes that do not evolve are those associated with no rule, or only to rules that are not applicable due to the electrical charges. • When several conflicting rules could be applied at the same time, a nondeterministic choice is performed; this implies that multiple configurations can be reached as the result of an evolution step. • In each computation step, all the chosen rules are applied simultaneously.</p><p>• Any object sent out from the skin membrane cannot re-enter it.</p><p>A halting evolution of such a system Π is a finite sequence of configurations</p><formula xml:id="formula_461">− → C = (C 0 , . . . , C k ), such that C 0 ⇒ C 1 ⇒ . . . ⇒ C</formula><p>k , and no rules can be applied any more in C k . A non-halting evolution</p><formula xml:id="formula_462">− → C = (C i | i ∈ N) consists of an infinite evolution C 0 ⇒ C 1 ⇒ . . .,</formula><p>where the applicable rules are never exhausted.</p><p>Example 1. Addition is trivial; we consider n objects a and m objects b placed in a membrane 0 with charge +. The rule [b → a] + says that an object b is transformed in one object a. Such a rule is applied in parallel as many times as possible. Consequently, all objects b are erased. The remaining number of objects a represents the addition n + m. More examples can be found in <ref type="bibr">[5]</ref>.</p><p>In order to solve decision problems (i.e., decide languages over an alphabet Σ), we use families of recognizer P systems Π = {Π</p><p>x | x ∈ Σ * } that respect the following conditions: (1) all evolutions halt; (2) two additional objects yes (successful evolution) and no (unsuccessful evolution) are used; (3) one of the objects yes and no appears in the halting configuration <ref type="bibr">[13]</ref>. Each input x is associated with a P system Π</p><p>x that decides the membership of x in the language L ⊆ Σ * by accepting or rejecting it. The mapping x ⊢ Π</p><p>x must be efficiently computable for each input length <ref type="bibr">[10]</ref>.</p><p>In this paper we use a logarithmic space uniformity condition <ref type="bibr">[14]</ref>.</p><formula xml:id="formula_463">Definition 2. A family of P systems Π = {Π x | x ∈ Σ * } is said to be (L, L)- uniform if the mapping x ⊢ Π</formula><p>x can be computed by two deterministic logarithmic space Turing machines F (for "family") and E (for "encoding") as follows:</p><p>• F computes the mapping 1 n ⊢ Π n , where Π n represents the membrane structure with some initial multisets and a specific input membrane, while n is the length of the input x.</p><p>• E computes the mapping x ⊢ w</p><p>x , where w x is a multiset encoding the specific input x.</p><p>• Finally, Π</p><p>x is Π n with w x added to the multiset placed inside its input membrane.</p><p>In the following definition of space complexity adapted from <ref type="bibr">[14]</ref>, the input objects do not contribute to the size of the configuration of a P system. In this way, only the actual working space of the P system is measured, and P systems working in sublinear space may be analyzed. Definition 3. Given a configuration C, the space size |C| is defined as the sum of the number of membranes in µ and the number of objects in Γ it contains.</p><formula xml:id="formula_464">If − → C is a halting evolution of Π, then | − → C | = max{|C 0 |, . . . , |C k |} or, in the case of a non-halting evolution − → C , | − → C | = sup{|C i | | i ∈ N}. The space required by Π itself is then |Π| = sup{| − → C | | − → C is an evolution of Π}.</formula><p>Notice that |Π| = ∞ if Π has an evolution requiring infinite space or an infinite number of halting evolutions that can occur such that for each k ∈ N there exists at least one evolution requiring most than k steps..</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">A Membrane Structure for Simulation</head><p>Let M be a single-tape deterministic Turing machine working in polynomial space s(n). Let Q be the set of states of M , including the initial state s; we denote by Σ ′ = Σ ∪ {⊔} the tape alphabet which includes the blank symbol ⊔ ∈ Σ. A computation step is performed by using δ :</p><formula xml:id="formula_465">Q × Σ ′ → Q × Σ ′ × {−1, 0, 1}, a<label>(partial)</label></formula><p>transition function of M which we assume to be undefined on (q, σ) if and only if q is a final state. We describe a uniform family of P systems Π = {Π x | x ∈ Σ * } simulating M in logarithmic space. Let x ∈ Σ n be an input string, and let m = ⌈log s(n)⌉ be the minimum number of bits needed in order to write the tape cell indices 0, . . . , s(n)-1 in binary notation. The P system Π n associated with the input length n and computed as F (1 n ) has a membrane structure consisting of |Σ ′ | • (m + 1) + 2 membranes. The membrane structure contains:</p><p>a skin membrane h; -an inner membrane c (the input membrane) used to identify the symbol needed to compute the δ function; -for each symbol σ ∈ Σ ′ of M , the following set of membranes, linearly nested inside c and listed inward:</p><p>• a membrane σ for each symbol σ of the tape alphabet Σ ′ of M ;</p><p>• for each j ∈ {0, . . . , (m − 1)}, a membrane labelled by j.</p><p>This labelling is used in order to simplify the notations. To respect the one-toone labelling from Definition 1, the membrane j can be labelled j σ . Thus in all rules using membranes j, the σ symbol is implicitly considered. Furthermore, the object z 0 is located inside the skin membrane h.</p><p>The encoding of x, computed as E(x), consists of a set of objects describing the tape of M in its initial configuration on input x. These objects are the symbols of x subscripted by their position bin(0), . . . , bin(n − 1) (where bin(i) is the binary representation of i on m positions) in x, together with the s(n) − n blank objects subscripted by their position bin(n), . . . , bin(s(n) − 1). The binary representation, together with the polarities of the membranes, is essential when the membrane system has to identify the symbol needed to simulate the δ function (e.g., rule ( <ref type="formula" target="#formula_476">13</ref>)). The multiset E(x) is placed inside the input membrane c.  During the first evolution steps of Π</p><p>x , each input object σ i is moved from the input membrane c to the innermost membrane (m − 1) of the corresponding membrane σ by means of the following communication rules:</p><formula xml:id="formula_466">σ i [ ] 0 σ → [σ i ] 0 σ for σ ∈ Σ ′ , bin(0) ≤ i &lt; bin(s(n))<label>(1)</label></formula><formula xml:id="formula_467">σ i [ ] 0 j → [σ i ] 0 j for σ ∈ Σ ′ , bin(0) ≤ i &lt; bin(s(n)), 0 ≤ j &lt; m<label>(2)</label></formula><p>Since only one communication rule per membrane can be applied during each evolution step of Π x , all s(n) input objects pass through m membranes, in order to reach the innermost membranes (m − 1), in at most l = s(n) + m evolution steps. In the meantime, the subscript of object z 0 is incremented up to max{0, l − 3} before object z l−3 exits and enters membrane c changing the membrane charge from 0 to +:</p><formula xml:id="formula_468">[z t → z t+1 ] 0 c for 0 ≤ t &lt; l − 3 (3) [z l−3 ] 0 c → z l−3 [ ] 0 c<label>(4)</label></formula><formula xml:id="formula_469">z l−3 [ ] 0 c → [z l−3 ] + c<label>(5)</label></formula><p>The object z l−3 is rewritten to a multiset of objects containing an object z ′ (used in rule ( <ref type="formula" target="#formula_70">9</ref>)) and |Σ ′ | objects z + (used in rules <ref type="bibr">(7)</ref> [</p><formula xml:id="formula_470">z l−3 → z ′ z + • • • z + ] + c |Σ ′ | copies<label>(6)</label></formula><p>The objects z + are used to change the charges from 0 to + for all membranes σ ∈ Σ ′ using parallel communication rules, and then are deleted:</p><formula xml:id="formula_471">z + [ ] 0 σ → [#] + σ for σ ∈ Σ ′<label>(7)</label></formula><formula xml:id="formula_472">[# → ∅] + σ for σ ∈ Σ ′<label>(8)</label></formula><p>In the meantime, the object z ′ is rewritten into z ′′ (in parallel with rule ( <ref type="formula" target="#formula_6">7</ref>)), and then, in parallel with rule (8), into s 00 (where s is the initial state of M ):</p><formula xml:id="formula_473">[z ′ → z ′′ ] + c (9) [z ′′ → s 00 ] + c<label>(10)</label></formula><p>The configuration reached by Π x encodes the initial configuration of M : </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>An arbitrary configuration of M on input x is encoded by a configuration of Π</head><p>x as it is described in Figure <ref type="figure" target="#fig_2">3</ref>:</p><p>• membrane c contains the state-object q i , where q is the current state of M and i ∈ {bin(0), . . . , bin(s(n) − 1)} is the current position of the tape head;</p><p>• membranes (m − 1) contain all input objects; • all other membranes are empty; • all membranes are neutrally charged, except those labelled by σ ∈ Σ ′ and by c which all are positively charged.</p><p>We employ this encoding because the input objects must be all located in the input membrane in the initial configuration of Π x (hence they must encode both symbol and position on the tape), and they can never be rewritten. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Simulating Polynomial Space Turing Machines</head><p>Starting from a configuration of the single-tape deterministic Turing machine M , the simulation of a computation step of M by the membrane system Π</p><p>x is directed by the state-object q i . As stated above, q i encodes the current state of M and the position of the head on the tape (in binary format). To simulate the transition function δ of the Turing machine M in state q, it is necessary to identify the actual symbol occurring at tape position i. In order to identify this σ i object from one of the (m − 1) membranes, the object q i is rewritten into</p><formula xml:id="formula_474">|Σ ′ | copies of q ′ i , one for each membrane σ ∈ Σ ′ : [q i → q ′ i • • • q ′ i ] + c q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) |Σ ′ | copies<label>(11)</label></formula><p>The objects q ′ i first enter the symbol-membranes in parallel, without changing the charges:</p><formula xml:id="formula_475">q ′ i [ ] + σ → [q ′ i ] + σ for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(12)</label></formula><p>The object q ′ i traverses the membranes 0, . . . , (m − 1) while changing their charges such that they represent the bits of i from the least to the most significant one, where a positive charge is interpreted as 1 and a negative charge as 0. For instance, the charges of [[[ ] − 2 ] − 1 ] + 0 encode the binary number 001 (that is, decimal 1). By the j-th bit of a binary number is understood the bit from the j-th position when the number is read from right to left (e.g, the 0-th bit of the binary number 001 is 1). The changes of charges are accomplished by the rules:</p><formula xml:id="formula_476">q ′ i [ ] 0 j → [q ′ i ] α j for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)), 0 ≤ j &lt; m, (<label>13</label></formula><formula xml:id="formula_477">)</formula><p>where α is − if the j-th bit of i is 0, and α is + if the j-th bit of i is 1. The membranes j, where 0 ≤ j &lt; m, behave now as "filters" for the input objects σ k occurring in membrane (m − 1): these objects are sent out from each membrane j if and only if the j-th bit of k corresponds to the charge of j.</p><formula xml:id="formula_478">[σ k ] α j → [ ] α j σ k for σ ∈ Σ ′ , bin(0) ≤ k &lt; bin(s(n)), 0 &lt; j &lt; m,<label>(14)</label></formula><p>where α is − if the j-th bit of k is 0, and α is + if j-th bit of k is 1.</p><p>If an object σ k reaches membrane 0, it is sent outside if the 0-th bit of k corresponds to the charge of membrane 0. In order to signal that it is the symbol occurring at location i of the tape, the charge of the corresponding membrane 0 is changed (either from + to − or from − to +). By applying the rules ( <ref type="formula" target="#formula_479">15</ref>) to <ref type="bibr">(17)</ref>, exactly one object σ k , with k = i, will exit through membrane c:</p><formula xml:id="formula_479">[σ k ] + 0 → [ ] − 0 σ k for σ ∈ Σ ′ , bin(0) ≤ k &lt; bin(s(n)), [σ k ] − 0 → [ ] + 0 σ k for σ ∈ Σ ′ , bin(0) ≤ k &lt; bin(s(n)),<label>(15)</label></formula><p>where α is − if the j-th bit of k is 0, and α is + if the j-th bit of k is 1;</p><formula xml:id="formula_480">[σ k ] + τ → σ k [ ] − τ for σ, τ ∈ Σ ′ , bin(0) ≤ k &lt; bin(s(n)).<label>(16)</label></formula><p>After an σ i exits from membrane c it gets blocked inside membrane h, by the new charge of membrane c, until it is allowed to move to its new location according to function δ of the Turing machine M . Thus, if another object τ j reached membrane σ due to the new charge of membrane 0 established by rule <ref type="bibr">(15)</ref>, τ j is contained in membrane σ until reintroduced in a membrane (m-1) using rule <ref type="bibr">(2)</ref>.</p><formula xml:id="formula_481">[σ k ] + c → σ k [ ] − c for σ ∈ Σ ′ , bin(0) ≤ k &lt; bin(s(n))<label>(17)</label></formula><p>Since there are s(n) input objects, and each of them must traverse at most (m + 1) membranes, the object σ i reaches the skin membrane h after at most l + 1 steps, where l is as defined in Section 3 before rule <ref type="bibr">(3)</ref>. While the input objects are "filtered out", the state-object q ′ i "waits" for l steps using the rules:</p><formula xml:id="formula_482">[q ′ i → q ′′ i,1 ] α m−1 for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)), α ∈ {−, +} (18) [q ′′ i,t → q ′′ i,t+1 ] α m−1 for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)), α ∈ {−, +}, 1 ≤ t ≤ l (19) [q ′′ i,l+1 → q ′′ i ] α m−1 for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)), α ∈ {−, +}<label>(20)</label></formula><p>In order to reach membrane c, the objects q ′′ i are sent out through membranes j (0 &lt; j ≤ m − 1) using rule <ref type="bibr">(21)</ref>, through membrane 0 by rules <ref type="bibr">(22)</ref> and <ref type="bibr">(24)</ref>, and through membranes σ ∈ Σ ′ by rule <ref type="bibr">(23)</ref>. While passing through all these membranes, the charges are changed to neutral. This allows the input objects to move back to the innermost membrane (m − 1) by using rules of type <ref type="bibr">(2)</ref>.</p><formula xml:id="formula_483">[q ′′ i ] α j → [ ] 0 j q ′′ i for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) 0 &lt; j ≤ m − 1, α ∈ {−, +}<label>(21)</label></formula><p>When q ′′ i reaches the membranes 0, only one has the charge different from the 0-th bit of i, thus allowing q ′′ i to identify the symbol in tape location i of M :</p><formula xml:id="formula_484">[q ′′ i ] α 0 → [ ] 0 0 q ′′′ i for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)),<label>(22)</label></formula><p>where α is − if the 0-th bit of i is 1, and α is + if the 0-th bit of i is 0.</p><p>[</p><formula xml:id="formula_485">q ′′′ i ] − σ → [ ] 0 σ q i,σ,1 for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(23)</label></formula><p>The other copies of q ′′ i are sent out as objects # through membrane 0, and then deleted by rules of type <ref type="bibr">(8)</ref>:</p><formula xml:id="formula_486">[q ′′ i ] α 0 → [ ] 0 0 # for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)),<label>(24)</label></formula><p>where α is − if the 0-th bit of i is 0, and α is + if the 0-th bit of i is 1. The state-object q i,σ,1 waits in membrane c for l steps, l representing an upper bound of the number of steps needed for all the input objects to reach the innermost membranes:</p><formula xml:id="formula_487">[q i,σ,t → q i,σ,t+1 ] − c for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)), 1 ≤ t &lt; l (25) q i,σ,l [ ] 0 σ → [q i,σ,l ] + σ for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) (26) [q i,σ,l ] + σ → q ′ i,σ [ ] + σ for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(27)</label></formula><p>The state-object q ′ i,σ now contains all the information needed to compute the transition function δ of the Turing machine M . Suppose δ(q, σ) = (r, v, d) for some d ∈ {−1, 0, +1}. Then q ′ i,σ sets the charge of membrane v to − and waits for m + 1 steps, thus allowing σ i to move to membrane (m − 1) of v by using the rules ( <ref type="formula" target="#formula_553">31</ref>), ( <ref type="formula">32</ref>) and ( <ref type="formula" target="#formula_43">2</ref>):</p><formula xml:id="formula_488">q ′ i,σ [ ] + v → [q ′ i,σ ] + v for σ, v ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(28)</label></formula><formula xml:id="formula_489">[q ′ i,σ ] + v → q ′ i,σ,1 [ ] − v for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(29)</label></formula><formula xml:id="formula_490">[q ′ i,σ,1 ] − c → q ′ i,σ,1 [ ] 0 c for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(30)</label></formula><formula xml:id="formula_491">σ i [ ] 0 c → [σ i ] 0 c for σ ∈ Σ ′ , bin(0) ≤ i &lt; bin(s(n)) (31) σ i [ ] − v → [σ i ] − v for σ, v ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) (32) [q ′ i,σ,t → q ′ i,σ,t+1 ] 0 h for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) 1 ≤ t ≤ m<label>(33)</label></formula><p>The object q ′ i,σ,m+1 is used to change the charges of membranes c and v to +, thus preparing the system for the next step of the simulation:</p><formula xml:id="formula_492">q ′ i,σ,m+1 [ ] 0 c → [q ′ i,σ,m+1 ] + c for σ ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) (34) q ′ i,σ,m+1 [ ] − v → [q ′ i,σ,m+1 ] − v for σ, v ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n)) (35) [q ′ i,σ,m+1 ] − v → q ′′ i,σ [ ] + v for σ, v ∈ Σ ′ , q ∈ Q, bin(0) ≤ i &lt; bin(s(n))<label>(36)</label></formula><p>Finally, the state-object q ′′ i,σ is rewritten to reflect the change of state and head position, thus producing a configuration of Π</p><p>x corresponding to the new configuration of M , as described in Section 3:</p><formula xml:id="formula_493">[q ′′ i,σ → r i+d ] + c for bin(0) ≤ i &lt; bin(s(n))<label>(37)</label></formula><p>The P system Π</p><p>x is now ready to simulate the next step of M . If q ∈ Q is a final state of M , we assume that δ(q, σ) is undefined for all σ ∈ Σ ′ ; thus we introduce the following rules which halt the P system with the same result (acceptance or rejection) as M :</p><formula xml:id="formula_494">[q i ] + c → [ ] +</formula><p>c yes for bin(0) ≤ i &lt; bin(s(n)), if q is an accepting state (38)</p><p>[yes] 0 h → [ ] 0 h yes for bin(0) ≤ i &lt; bin(s(n)), if q is an accepting state (39)</p><formula xml:id="formula_495">[q i ] + c → [ ] + c no for bin(0) ≤ i &lt; bin(s(n)), if q is a rejecting state (40) [no] 0 h → [ ] 0 h no for bin(0) ≤ i &lt; bin(s(n)), if q is a rejecting state<label>(41)</label></formula><p>The simulation directly leads to the following result.</p><p>Theorem 1. Let M be a single-tape deterministic Turing machine working in polynomial space s(n) and time t(n). Then there exists an (L, L)-uniform family Π of P systems Π x with active membranes using object evolution and communication rules that simulates M in space O(log n) and time O(t(n)s(n)).</p><p>Proof. For each x ∈ Σ n , the P system Π</p><p>x can be built from 1 n and x in logarithmic space as it is described in Definition 2; thus, the family Π is (L, L)-uniform.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Each P system Π</head><p>x uses only a logarithmic number of membranes and a constant number of objects per configuration; thus, Π</p><p>x works in space O(log n). Simulating one of the t(n) steps of M requires O(s(n)) time, an upper bound to the subscripts of objects used to introduce delays during the simulation; thus, the total time is O(t(n)s(n)).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>In this paper we provided a simulation of the polynomial space Turing machines by using logarithmic space P systems with active membranes and binary representations for the positions on the tape. A similar approach is presented in <ref type="bibr">[9]</ref>. There are important differences in terms of technical details and efficient representation; in comparison to <ref type="bibr">[9]</ref>, we improve the simulation by reducing the number of membranes (by |Σ ′ | − 1) and the number of rules (by</p><formula xml:id="formula_496">|Σ ′ |•|Q|•s(n)•(5−|Σ ′ |)+|Σ ′ |•|Σ ′ |s(n)•(2•m+1)+|Q|•s(n)−|Σ ′ |•s(n)•(m+3)).</formula><p>In particular, for the running example, the number of rules is reduced by 14•|Q|+84. A different approach is presented in <ref type="bibr">[8]</ref> where it is claimed that a constant space is sufficient. However, in order to obtain the constant space space, input objects (from ∆) are allowed to create other objects (from Γ ) leading to a different and more powerful formalism than the one used by us in this paper, and making such an approach not so interesting because of these unrealistic (powerful) input objects.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Computer systems are widely used in modern industry for control and automation purposes. All of these systems are controlled by software. Thus, software is used in air traffic control, nuclear power plants, automated patients monitoring etc. Therefore high requirements for software reliability are demanded because failures of such systems can lead not only to significant financial losses, but also threaten human life and health. Although techniques that allow assessing and ensuring the specified hardware reliability requirements have been developed, there are no common approaches for software systems assessment.</p><p>According to STD-729, software reliability is defined as the probability of failurefree software operation for a specified period of time in a specified environment <ref type="bibr">[1,</ref><ref type="bibr">2]</ref>. Although Software Reliability is defined as a probabilistic function, and comes with the notion of time, it should be noted that, contrast to traditional hardware relia-bility, software reliability is not a direct function of time <ref type="bibr">[1]</ref>. Electronic and mechanical parts may become "old" and wear out with time and usage, but software will not rust or wear-out during its life cycle. Software will not change over time unless intentionally changed or upgraded.</p><p>The history of software reliability assessment methods and tools began in the 60s of last century. A number of researchers <ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref> worked on issues of development and research of software reliability analysis and assessment models and methods that would allow reducing the costs required for software testing stage. New software reliability assessment models that reflect the internal structure of the application and interaction of its components <ref type="bibr">[6]</ref>, called architectural-based models, are being developed because of increasing complexity of software systems and the result of expanding their functional purpose.</p><p>In known models based on architectural approach <ref type="bibr">[6,</ref><ref type="bibr">7]</ref> the theory of first order Markov chains is used with the assumption that the software components runs are independent. This assumption is not always true due to the complexity of modern software architecture and huge set of usage scenarios this assumption <ref type="bibr">[8,</ref><ref type="bibr">9]</ref>. Therefore, for the development of adequate software reliability assessment models, which will improve the testing process (e.g. allow to reduce the needed resources), one should consider the high-order Markov chains, which allow to take into account the interdependence of components runs <ref type="bibr">[10]</ref>.</p><p>This paper describes the software reliability assessment models based on architectural approach, which use discrete and continuous time high-order Markov chains and their comparison based on real world data. Nowadays architecture-based software reliability models have been well studied in theory, but there is lack of papers describing their practical applications. Developing of high-order models for software reliability assessment is not described enough in literature as well. Thus, the development of new architecture-based software reliability assessment models that take into account the dependencies among software component runs along with their application to real world data is still a problem waiting for solution.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Software Reliability Model with Discrete Time High-Order Markov Chain</head><p>This model considers absorbing Markov process that implies the existence of one or more absorbing states, i.e. states that, once entered, cannot be left.</p><p>The developed software reliability assessment model <ref type="bibr">[10]</ref> is hierarchical, that is initially software architecture parameters are calculated based on software usage model <ref type="bibr">[11]</ref> using the theory of Markov processes, and then the behaviour of each component failures is taken into account.</p><p>The discrete time HOMC software reliability model can be described using the following components -  According to this model the reliability of the whole system is calculated as</p><formula xml:id="formula_497">   N l l R R 1 .<label>(1)</label></formula><p>In turn, the reliabilities of each component ( l R ) using high-order Markov chains are calculated by</p><formula xml:id="formula_498">) ) ( exp( .. ... ... 0     k ij kl ij kl ij t V l l dt t R  . (<label>2</label></formula><formula xml:id="formula_499">)</formula><p>To calculate kl ij V .. -the expected number of visits a component l depending on be- ing in previous K componentsone has to solve the following system of linear equations:</p><formula xml:id="formula_500">     1 1 .. .. .. .. N i kl ij k ij k ij kl j p V q V ,<label>(3)</label></formula><p>here kl ij t .. denotes the time spent at the component l depending on being in previous K components.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Software Reliability Model with Continuous Time High-Order Markov Chain</head><p>Using discrete-time model has a number of significant simplifications and restrictions. Thus, this model takes into account only the number of visits to i -th com- ponent without taking into account of the distribution function of this random variable (while taking it into account the expected value should be used). In addition, it is clear that at any given time t the software failure is generally caused by the failure of the software component, which is executed at a given time (in case of sequential connection of software components in Reliability Block Diagram). Thus, to increase the degree of adequacy of the software reliability architectural model the continuous time Markov chains should be used.</p><p>The continuous time HOMC software reliability model can be described using the </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>is the failure rate of i -th software compo- nent.</p><p>In this case, the failure rate of a software system consisting of N components can be written as <ref type="bibr">[12]</ref> </p><formula xml:id="formula_501">         N i i i t t p t 1   , (4) here   t i  is the failure rate of i -th component,   t p i</formula><p>is the probability of i -th component execution at time t .</p><p>Components failure rates   t i  can be obtained from the results of unit testing using known software reliability models, for example ones based on an inhomogeneous Poisson process <ref type="bibr">[13]</ref>.</p><p>If the flow control between the components of the software is presented as a Markov process with continuous time, assuming that the i -th state of the process is the execution of i -th component, the time dependences of the probabilities being in i -th state (   t p i ) can be obtained by solving the system of equations of the Kolmogorov- Chapman <ref type="bibr">[14]</ref> for this process: To take into account the interdependence of execution of software component (and consequently changes of transition probability from i -th state) depending on the way of getting to the current state, the high-order Markov chain should be used (the order K of the model determines the accounted length of the path). In a case of high-order Markov chains the actual problem is to calculate the transition probabilities depending on the program control flow background.</p><formula xml:id="formula_502">  S i t p t t p t dt t dp S j j ji S j j ij i         , ) ( ) ( ) ( ) (   , (<label>5</label></formula><p>It is well known that a high order Markov chain can be represented as a first order chain by appropriate redefining the state space <ref type="bibr">[15]</ref>. For software implementation of models that use high-order chains, it is necessary to have the formalized algorithm for this representation. Using the analogy with the known Erlang phase method <ref type="bibr">[16]</ref> a high-order Markov process can be represented as an equivalent first-order process with additional virtual states. Each state of the original graph   i C (geometric dia- gram, showing the possible states of the system and the possible transitions of the system from one state to another) is split into such number of virtual states as many different paths of length K to this state exist. Thus the problem solution essentially is reduced to using of graph theory. Therefore, to calculate the number K ij m of chains of K-th order from state i to state j the following expression based on the Floyd method can be used:</p><formula xml:id="formula_503">         S j lj il K il K ij m e m m 1 1 1 ,<label>(6)</label></formula><p>here ij e are the elements of the identity matrix.</p><p>Using <ref type="bibr">(6)</ref> one can build an equivalent graph   i C which is a representation of the initial graph   i C , taking into account all K -th order paths to i -th state. This allows to avoid the dependencies of the transition intensities ) (t ij  on the program control flow background. Then the time dependence of the software component execution probability is obtained by solving the system of Kolmogorov-Chapman equations <ref type="bibr">(5)</ref> for the equivalent first order Markov process. Using this dependence in (4) together with the component failure rate, the failure rate of the whole software system can be calculated.</p><p>For calculation of software reliability measures, based on the obtained relationship (4), one can use the following relations <ref type="bibr">[14]</ref>:</p><p>reliability function P(t)the probability that no failure will occur within the time interval [0, t]can be calculated as </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Determination of the Markov Chain Order for Software Reliability Assessment</head><p>In this paper it is proposed to use AIC and BIC criteria <ref type="bibr">[17]</ref> since they are not a hypothesis test and thОy Нon't usО thО significancО lОvОl. Although these criteria give consistent results and don't depend on the estimated model order. They are efficiently used for weather forecasting and selection of adequate environmental model <ref type="bibr">[18]</ref>. But the usage of these criteria in software reliability modeling still remains unexamined.</p><p>In general AIC criterion <ref type="bibr">[19]</ref> is calculated by the following expression:</p><formula xml:id="formula_504">) ln( 2 2 L k AIC   , (<label>9</label></formula><formula xml:id="formula_505">)</formula><p>here k is the number of independent parameters in the model, and L is the moНОl's maximum likelihood function.</p><p>If the value of this software moНОl's maximum likОlihooН function is substituted in the expression <ref type="bibr">(9)</ref>, and instead of parameter k one substitute the number of the K-th order model parameters, which contain N components (</p><formula xml:id="formula_506">) 1 (   N N k K</formula><p>), then the following expression can be obtained <ref type="bibr">[20]</ref> ) ln( <ref type="formula" target="#formula_43">2</ref>)</p><formula xml:id="formula_507">1 ( 2 ) ( .. .. , ,.., , kl ij n kl ij l k j i K p N N K AIC     ,<label>(10)</label></formula><p>here kl ij n .. is the number of transitions from component і to component l depending on being in previous components (</p><formula xml:id="formula_508">l k j i     ...</formula><p>) in observed sequence and kl ij p .. is the transition probability in this sequence.</p><p>As it can be seen from <ref type="bibr">(10)</ref>, this criterion is independent of sample size. Therefore, AIC criterion is used in the case of a large sample size (observable sequence) when the software is tested many times and the sequence of software component runs is logged.</p><p>An alternative to AIC criterion is ВІС <ref type="bibr">[21]</ref>, which takes into account the number of elements in observable sequence and expressed as</p><formula xml:id="formula_509">. ) ln( ) ln( 2 ) ( k n L K BIC   <label>(11)</label></formula><p>In the case of using the BIC criterion for the Markov chain optimal order determination in the case of software reliability modeling, the expression similar to AIC criterion <ref type="bibr">(10)</ref> is obtained:</p><formula xml:id="formula_510">    l k j i kl ij kl ij K p n n N N K BIC , ,.., , .. .. ln 2 ) ln( ) 1 ( 2 ) ( . (<label>12</label></formula><formula xml:id="formula_511">)</formula><p>It is worth noted that the BIC criterion should be used at the small sample size of empirical data concerning the software usage, because it imposes stronger penalties even when the sample size n&gt;8.</p><p>Thus, after determining the order of Markov chain, the well-known classical Markov tools can be used for software reliability assessment as it was described above.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Verification of the Models</head><p>To study the efficiency of the developed software reliability assessment model that uses the discrete time high-order Markov chains, the reliabilities of the five software systems, developed by one of the authors, were calculated using the first and the high order Markov chain models. The average amount of software components in tested software systems is 10. The results of reliability calculations using the first and the high-order models are shown in Fig. <ref type="figure" target="#fig_0">1</ref> along with the reliability obtained from unit testing data. As shown in fig. <ref type="figure" target="#fig_0">1</ref>, the usage of software reliability assessment model based on discrete time high-order Markov chains makes it possible to increase the software reliability accuracy to 6% even for software systems with a small number of components.</p><p>To illustrate the efficiency of continuous time software reliability model, the reliability of the authors' developed program with four components (in this case, each component refers to one of the following program classes -Input, Calculation, Output, Exit) was analyzed. The values of each component failures rates are presented in Table <ref type="table" target="#tab_1">1</ref>. The probability transition matrix and the initial probability vector of the Markov chain were calculated and are summarized in Table <ref type="table" target="#tab_0">2</ref> and Table <ref type="table" target="#tab_21">3</ref> correspondingly.  The AIC criterion was used for optimal Markov chain order determination (the sample set contains 188 entries). The AIC values are listed in Table <ref type="table" target="#tab_9">4</ref>.  Fig. <ref type="figure" target="#fig_3">4</ref> shows the time dependency of failure rate on tested software system (Fig. <ref type="figure" target="#fig_1">2</ref>) obtained from continuous time first-and second-order Markov chains. It's worth noting that for continuous time model simulations time was counted as arbitrary time units (a.u).</p><p>As it is seen from this figure the first order model gives slightly (1-5%) reduced failure rate value for small values of time, while it gives significantly (20%) overestimated failure rate value for middle time values range, and when the value of t in- creases by more than 60 a.u. the difference between values of   t  obtained from both models almost tends to be negligible. Reducing the difference of   t  values, obtained from the first and the second-order models, to zero at high times can be explained by decreasing of the   t  value itself and by the absence of differences in the software behaviour description by two models in this case. In the case of   t both models suggest that system is in thО "Exit" state (see Fig. <ref type="figure" target="#fig_1">2</ref>, 3) and, accordingly, its failure rate is limited by this component failure rate. Differences of   t  behav- iour on the initial evolution stages of software system can be entirely explained by differences in the software system behaviour description by different models, where the first-order model ignores the interdependence of software component runs, and therefore the probabilities of components executing are different at given time t for both models. Thus, it could be argued that software reliability model based on the high order Markov chain describes the software system behaviour more adequately and determines its reliability measures more accurately. This conclusion is confirmed by the analysis of software system reliability function time dependence obtained using equation <ref type="bibr">(7)</ref> as shown in Fig. <ref type="figure" target="#fig_4">5</ref>. Note that the reliability function is calculated using Ukrainian national standards <ref type="bibr">[22]</ref> and, as it was indicated in <ref type="bibr">(7)</ref>, represents the probability of failure free operation during the time interval   t , 0 , but not exactly at the time t . So, it is evidently that the reliability function is time-decreasing one. As it can be seen from Fig. <ref type="figure" target="#fig_4">5</ref>, the difference in the values   t P increases up to 20% with time value increasing. This behavior is easily understood if taking into account the interval estimation of reliability for the range   t , 0 [15], and its deviation evidently increases with interval length increasing. So, we can conclude that ignoring the interdependence of software components runs could results in increasing inaccuracy of software reliability measures estimation up to 20%.</p><p>Another measure of reliability, which was used to determine the developed highorder model effectiveness and adequacy, is the mean operating time to failure 1 T . The value of mean operating time to failure calculated by the expression (8) is 20.9 time units for first-order model, while the value obtained from the second-order model is 23.3 time units. Obviously the difference between the first and the second-order models is 11.5%, which can be crucial in the reliability analysis of the complex technical systems. Therefore, the usage of software reliability models based on the high-order Markov chains even with a small components number (in this case there was 4 component software, see Fig. <ref type="figure" target="#fig_1">2</ref>) and complexity (in this case the optimal model order is 2, see Table <ref type="table" target="#tab_9">4</ref>) results in the increase of model adequacy and the software reliability assessment accuracy on 10-20%. The value of such growth of reliability estimation accuracy is especially important in the case of complex hardware and software systems in which the mistake of software component reliability estimation can repeatedly affect the accuracy of whole system reliability assessment. Using the high-order models for more complex software systems could results in more significant improvements of reliability assessment.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>In this paper the software reliability models using discrete and continuous time high-order Markov chains, which enable consideration the dependencies among software components runs, have been developed. Software reliability assessment based on the high-order discrete time Markov chains allows to increase the software reliability measures accuracy up to 6 %, and high-order continuous time Markov chainup to 10-20%. The advantage of high-order discrete time Markov chains model for software reliability analysis is small computing resources needed even for software with a lot of components, while the advantages of high-order continuous time Markov chains model are independence from the sampling step (in the case of discrete time model it may cause inaccurate transition probabilities calculation), and also automatic consideration of transitions pii that avoids unnecessary computations. Practical aspects of estimating input parameters for the models as well as studying the dependence of the software reliability on its characteristics (components number, the average number of variables in the component, components cohesion etc.) will be described elsewhere.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Motivation and Work Related Analysis</head><p>A set of Software Quality Models (SWQM) has been introduced during evolution of software engineering <ref type="bibr">[1]</ref>. Software quality is a degree to which a software product satisfies stated and implied needs when used under specified conditions <ref type="bibr">[2]</ref>. Software Quality Model (SWQM) is usually defined as a set of characteristics and relationships between them which actually provide the basis for specifying the requirements of quality, evaluating quality and comparing of SWQMs <ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref>. There are a lot of the models suggested during «software engineering era» <ref type="bibr">[10]</ref>. Some of SWQM, described in IEEE, ISO, IEC standards, became well-known and can be called basic. New significant SWQM appear just about once in 10 years. The characteristics and subcharacteristics set and structure (graph-based hierarchy and semantic content) of such SWQMs are changed <ref type="bibr">[11]</ref><ref type="bibr">[12]</ref><ref type="bibr">[13]</ref><ref type="bibr">[14]</ref>. Generally, these sets are extended and the next SWQM becomes more and more complicated. Changing's of SWQMs are caused by evolution of technologies, new challenges in software engineering and so on.</p><p>One of the challenges is development of energy-saving (green) information technologies. It has been caused by appearance of a concept «green software» <ref type="bibr">[15]</ref>. Gist of «green software» (GSW) in a broad sense is described by the following words: «decrease» (energy or other resources consumption), «don't do much harm and preserve» (energy, resources, environment) and «improve» (make environment more comfortable and safe). More wide aspects and directions of green and safe/reliable computing are discussed in <ref type="bibr">[16,</ref><ref type="bibr">17]</ref>.</p><p>«Green» characteristics for software are resources saving and sustainability, which were not explicitly defined in well known SWQMs described by standards ISO/IEC9126 <ref type="bibr">[18]</ref>, ISO/IEC25010 <ref type="bibr">[2]</ref>. Analysis of <ref type="bibr">[3,</ref><ref type="bibr">4,</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref> allowing to conclude that SWQMs do not include such characteristics in explicit form.</p><p>Taking into consideration the prerequisites for emergence of green characteristics in future SWQMs in direct form we analyze the evolution of the characteristics associated with GSW for existing quality models and try to predict their changing. The analysis will allow defining tendencies of green characteristics and suggesting variants of including some in future SWQMs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Goal and Approach</head><p>A goal of the paper is carrying out of analysis of known software quality models and their development in context of GSW and software reliability. We aim to investigating SWQMs using metric-based approach to assess "weights" of different software quality attributes, first of all, green and reliability characteristics, changing of the weights during evolution of the models and to predict their changing in future.</p><p>Stages of the research are the following: 1. Determination of occurrence rates for different SWQM attributes (characteristics at the first level of hierarchy and subcharacteristics at the second one) in different quality models;</p><p>2. Selection and analysis of SWQM characteristics which are implicitly associated with green software;</p><p>3. Analysis of SWQMs in context green software and reliability by use of complexity metrics and calculation of corresponding weights for attributes;</p><p>4. Research of relationship/dependency between metric values for green software, reliability and the years of emergence for known basic SWQMs; 5. Calculation of complexity metric for using results of SWQMs relationship/dependency comparison, described in <ref type="bibr">[11]</ref>;</p><p>6. Calculation of complexity metric for green and reliability attributes of new SWQMs using function describing of dependency between metric values and years of SWQMs emergence; 7. Analysis of SWQM in use in context of green software and definition of possible variants of inclusion of green attributes in new models.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">SWQM Analysis in Context of Green Software and Reliability</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Analyzed Models</head><p>Let's select and analyse SWQM characteristics which can be implicitly associated with green software and reliability. The results of analysis are shown in Table <ref type="table" target="#tab_1">1</ref> and Table <ref type="table" target="#tab_0">2</ref> for green characteristics and reliability characteristics correspondingly. Numeration of the characteristics corresponds with their "places" in hierarchy of SWQMs. To assess "weights" of green characteristics the technique of SWQM structuresemantic analysis (SSA-technique) can be applied <ref type="bibr">[11]</ref>. The technique describes quality models as a facet-hierarchy structure (graph). Nodes corresponds quality attributes and links take into account hierarchy dependencies. To briefly characterize the proposed analysis technique, let us introduce some initial terms:</p><p> conceptual model is a model which a model under study is compared with;  model under study is a model which is compared with a conceptual model;  characteristic under study is a conceptual model characteristic which is compared with model under study characteristics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Metrics</head><p>SSA-technique is based on comparing a model under study with the conceptual model, i.e. every SW Quality Model is compared with the conceptual model. So, the analysis is equivalent to semantic comparing characteristics and subcharacteristics of a model under study and the conceptual model with regard to their structures. Selecting a reference model is usually performed by an expert who has relevant experience and qualifications.</p><p>At the following stage comparison of models among themselves should be performed. The simplest and most obvious metrics are offered. Hierarchy of these metrics is presented in Fig. <ref type="figure" target="#fig_0">1</ref>. The metrics are used to compare models with reference model bottom up, i.e. first at the level of subcharacteristics (subcharacteristics matching metric SMM, cumulative subcharacteristics comparison metric CSCM, characteristics matching metric CMM), then at the level of characteristics (cumulative matching characteristics metric CMCM) and finally at the level of models as a whole (cumulative software quality models comparison metric CSQMCM).  Features of the metrics are the following: subcharacteristic matching metric (SMMj). Every subcharacteristic match value is identified as SMMj = 0,5 / number of reference (conceptual) model elements subcharacteristics of the characteristic under study. Weights of characteristics are not considered when calculating metrics;</p><p>cumulative subcharacteristics comparison metric (CSCM) is evaluated as a sum of SMM:</p><formula xml:id="formula_512">∑ k 1 = j j i SMM = CSCM ;<label>(1)</label></formula><p>characteristics matching metric (CMM) takes the value of 0.5 in case of matching or 0 if the characteristics are different;</p><p>cumulative matching characteristics metric (CMCM) is calculated as a sum of CMM metric and : CSCM</p><formula xml:id="formula_513">k 1 j j   ∑ k 1 = j j i i CSCM + CMM = CMCM ;<label>(2)</label></formula><p>cumulative software quality models comparison metric (CSQMCM) is calculated according to the formula:</p><formula xml:id="formula_514">∑ n 1 = j j i CMCM = CSQMCM</formula><p>(3)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Results of SWQM Analysis in Context of Green Software and Reliability Characteristics</head><p>Let us conduct SW QM analysis and first of all, define the reference (conceptual) model. SW Quality Model ISO/IEC 25010 will be considered as uppermost and etalon regarding to all other models. It is the newest introduced model and takes into account main modern software peculiarities in point of view quality evaluation. This model is described by international standard of top level.</p><p>According with results of analysis CMCM is calculated for set of characteristics presented in Table <ref type="table" target="#tab_1">1</ref>. The results of calculation are shown in Table <ref type="table" target="#tab_21">3</ref> (Сhscharacteristics, SChssubcharacteristics) for GSW characteristics and Table <ref type="table" target="#tab_9">4</ref> for reliability characteristics.</p><p>The histogram of CMCM values for software quality models is presented on Fig. <ref type="figure" target="#fig_1">2</ref>. An abscissa axis corresponds to years of SWQM emergence. Initial point (year) is 1970 (as a first year after 1968 which is multiple of a ten years). CMCM values will be further represented and analysed only for so-called basic SWQMs <ref type="bibr">[18]</ref>. Basic models were selected considering their support by standards, the international reputation and application. The models of McCall and Boehm are similar, hence first one was selected. Hence, the models of Boehm, Ghezzi, FURPS, Dromey, QMOOD were excluded (Fig. <ref type="figure" target="#fig_2">3</ref>).</p><p>The analytical dependency between SWQM appearance year (X axis) and CMCM value (Y axis) for characteristics associated with GSW may be represented by regressive liner function:</p><formula xml:id="formula_515">y = ax+b,<label>(4)</label></formula><p>where xvariable, a and b -regression coefficients. For 1970 year variable (x) has value 0, for 1980 year x=10, for 1990 year x=20, for 2000 year x=30 and for 2010 year x=40. Linear subjection was chosen by graphic data analysis (Fig. <ref type="figure" target="#fig_2">3</ref>). Satisfiability of applying linear subjection is confirmed by coefficient of determination (R2) which equals 0,94.     The values of parameters a and b can be calculated using Least Square Method:</p><formula xml:id="formula_516">2 n 1 = i i n 1 = i 2 n 1 = i i n 1 = i i n 0 = i i i ) x ( x n y x y x n = a ∑ ∑ ∑ ∑ ∑ ,<label>(5) n</label></formula><formula xml:id="formula_517">x a y = b ∑ ∑ n 1 = i n 1 = i i i . (<label>6</label></formula><formula xml:id="formula_518">)</formula><p>As a result а = 0.0146, b = 0.4108 and function:</p><formula xml:id="formula_519">y = 0.0146x+0.4108. (<label>7</label></formula><formula xml:id="formula_520">)</formula><p>The obtained function may be called a law of increasing of characteristics associated with GSW for SWQM.</p><p>The similar dependency can be obtained for reliability characteristics. In this case а = 0.011, b = 0.5 and function:</p><formula xml:id="formula_521">y = 0.011x+0.5.<label>(8)</label></formula><p>Formulas 7 and 8 illustrate a tendency of SWQMs characteristics/ subcharacteristics changes. Analysis of dependencies (Fig. <ref type="figure" target="#fig_2">3</ref>) allows concluding that weights of green and reliability characteristics became equal in 2010 (the standard ISO/IEC 25010). Hence, since first SWQMs the characteristics/ subcharacteristics related to green attributes have faster dynamics of increasing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Development of SWQM in Context of Green Software</head><p>We can assume that the next general SWQM will include GSW characteristics in an explicit form. Let's analyse SWQM evolution tendency in context GSW as a whole. CSQMCM for SWQM may be calculated as shown in formula <ref type="bibr">(3)</ref>. It may be appeared for future model (2020 year). In compliance with <ref type="bibr">[11]</ref> and basing on the analytical relationship between SWQM appearance year (X axis) and CSQMCM value (Y axis) the following formula may be obtained: y=0,153x+1,363.</p><p>Besides, considering that each new SWQM approved as a standard is received about once per 10 years, and that the last model was introduced by the standard ISO/IEC 25010 appeared in 2010 the prediction of the CSQMCM value can be done. With this in mind: CSQMCM = 0,153*50 + 1,363= 9,013. <ref type="bibr">(10)</ref> CSQMCM values change is illustrated in Fig. <ref type="figure" target="#fig_3">4</ref> as a histogram for the well known base SWQM as columns of gray and subsequent SWQM 2020 as a column of light gray column. According to the obtained dependence (4) CMCM for green software characteristics is calculated for predictable SWQM 2020 (Fig. <ref type="figure" target="#fig_4">5</ref>). y=0,0146*50+0,4108=1,1408.</p><p>And CMCM for reliability characteristics is calculated for predictable SWQM 2020 (Fig. <ref type="figure" target="#fig_4">5</ref>). y = 0,011*50+0,5=1,05.</p><p>(12) Analysis of dependencies (Fig. <ref type="figure" target="#fig_4">5</ref>) allows predicting that green characteristics number will increase faster comparing with other more conservative characteristics.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">GSW Oriented ON Extending of SWQMs</head><p>Taking into account predictable changing of SWQMs let's analyse how content of such models may be added including software quality models in use.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Variants of GSW Characteristics Inclusion in SWQM</head><p>In the following, possible variants are shown of inclusion of GSW characteristics and its components in a SWQM.</p><p>1. GSW characteristic can be introduced in SWQM as a separated characteristic with subcharacteristics resources saving and sustainability. It should be noted that usually resources saving excludes resource utilization from performance efficiency characteristic (Fig. <ref type="figure" target="#fig_38">6</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Software quality</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Green software</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Resources saving Sustainability</head><p>Performance efficiency Resource utilisation ... 2. Green software characteristics are not included in SWQM explicitly, but subcharacteristics can go in to SWQM (Fig. <ref type="figure" target="#fig_5">7</ref>). Resources saving goes in to SWQM as the subcharacteristic in place of resource utilization. Subcharacteristic sustainability goes in to SWQM as separated characteristic. environment in a specified context of use. Risks are usually a result of deficiencies in the functionality (including security), reliability, usability or maintainability;</p><p> for SWQM-U, ISO/IEC 25010: resources savingefficiency; sustainability freedom from risk, which include 3 subcharacteristicseconomic risk mitigation, health and safety risk mitigation and environmental risk mitigation. Efficiency is a ratio of expended resources to the accuracy and completeness with which users achieve goals. Freedom from risk is a degree to which a product or system mitigates the potential risk to economic status, human life, health, or the environment.</p><p>Correlation of SWQM-U characteristics for standards ISO/IEC 9126 and 25010, which are implicitly associated with «green software» and among themselves is shown in Fig. <ref type="figure" target="#fig_53">9</ref>.</p><p>Thus, GSW related characteristics should be taken into account on development of the next SWQM (SWQM-U) as well. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In compliance with SWQM structural and semantic analysis technique we have analyzed SWQM of standards ISO/IEC 9126 and 25010 in context characteristics associated with green software. Using SSA-technique, a relationship between the year of the SWQM appearance and the value of CMCM was obtained and analyzed. Besides, we have calculated the CMCM values for the green software characteristics of the next SWQM, the output of which may be expected in 2020.</p><p>It was also obtained the value of metric -CSQMCM for SWQM of 2020, which exceeds the value of this indicator for SWQM ISO/IEC 25010 (Fig. <ref type="figure" target="#fig_3">4</ref>). It may be explained by possible inclusion of green software characteristics in SWQM explicitly.</p><p>According with results of analysis we can conclude that:</p><p>-since first SWQMs the characteristics/ subcharacteristics related to green attributes have faster dynamics of increasing; -weights of green and reliability characteristics became equal in the standard ISO/IEC 25010;</p><p>-it is predicted faster increasing of number green characteristics comparing with other more conservative characteristics.</p><p>However, implementation of green characteristics in future quality models should be harmonized with basic attributes such as reliability.</p><p>In the future we plan to investigate every SWQM characteristic separately. The data obtained in this case will provide development of a prototype of the new SWQM.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Service and Business Models with Implementation Analysis of Distributed Cloud Solution Introduction</head><p>The IT industry constantly grows, raising the expectations of big organizations and individuals alike, changing the way things are done nowadays; in fact, without it, it would be impossible to conduct business and human interaction as we know it today would be greatly different across numerous professional and social sectors. At the same time, gradually more people and enterprises access the Internet, adding to the increasing needs of computing and generating data through various devices, at an accelerating rate. This data is required to be stored and handled in order to be secure and available to be retrieved once the user requests it.</p><p>To accommodate demand, large, expensive, energy hungry data centers have been built that only powerful company can afford to have. Additionally, they require high costs of maintenance, personnel, power back up systems and space. Located at a physical place, they are vulnerable to local conditions, be it weather phenomena, re-gional power cuts, earthquakes etc. Furthermore, 2% of global CO2 emissions are attributed to the ICT industry, a significant part of which is caused by data centers. High investment costs for data centers prevent smaller companies from entering the market, making it necessary to improve service reliability, energy and cost efficiency of Cloud computing infrastructure.</p><p>Currently, the concept of P2P technology is not new but its application to cloud computing is at its early stages. However, it is gradually growing as more new companies begin to join the race to provide smarter and cheaper solutions. More specifically, the majority of the companies that are active in P2P cloud technology are strongly focusing on storage and sharing of documents, in order to facilitate storing options and to assist teams or groups to virtually interact through their documents. Additionally, they enhance user experience due to optimized infrastructure, collaboration and sync. BitTorrent goes a step further, by offering information sharing from device to device, skipping the use of cloud <ref type="bibr">[1]</ref>. Within this suggestion, we propose a method for Cloud data center architecture modernization <ref type="bibr">[2]</ref>. The method assumes implementation of distributional technologies such as peer-to-peer (P2P) networks to Cloud architecture. Distributed Cloud computing, being part of cloud computing, supports customers' needs and provides main cloud benefits. However, it differentiates itself from the existing Cloud Computing in a unique way: it is anthropocentric, revolving around people and their activities, making them sources and consumers at the same time. In addition to its human-centered function, P2P Cloud Computing is a new application of previous technologies, one that can provide both, value and results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>State of the Art</head><p>According to a Cisco study <ref type="bibr">[3]</ref>, it is estimated that data traffic will reach 7.7 ZB by 2017 and the need for more websites constantly and steadily rises. This need does not only apply to professionals and big companies that either have the money to allocate the task to a skilled person or have the skills themselves. It also corresponds to a wide number of individuals and companies that, although experienced in a number of sectors, may not have the skills or financial resources to create their content.</p><p>Currently, customers deal with scalability issues by using the services of Cloud providers. Studying the pricing of these services <ref type="bibr">[4]</ref>, it is found that customers may very well enjoy the benefits of the Cloud but at a rather significant cost. Many Cloud providers have joined the sector and provide solutions to customers. For companies that aim to scale up and grow, this can have a heavy toll on their budget and, in more than one cases, budget limitations may actually delay or even prohibit growth. According to the IDC, the cloud software market is forecast to surpass $75 B by 2017, while at the same time, the percentage of IT budget expected to be spent on cloudbased applications and platforms by current organizations within the next 2 years reaches 53.7%. Regarding storage as a service model, several solutions within the use of the decentralization approach were developed for content sharing. The following table depicts competitive products, their key features, their advantages and disadvantages. TB space using as P2P sync [5].</p><p>A cross-platform application. Free for the first year.</p><p>Expensive device ($795).</p><p>Annual payment $49. Can only be used as Cloud storage and doesn't support other types of Cloud services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Project Maelstrom</head><p>Web browser based on the Chromium Project that allows access to static web pages using torrent protocol <ref type="bibr">[6]</ref>.</p><p>No limits to file size and transfer speeds.</p><p>Can only be applied for static web pages without server part (database, cgi, etc.).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Wuala</head><p>Secure Cloud storage, a haven in the Cloud to store customers' files <ref type="bibr">[7]</ref>.</p><p>Components </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Symform</head><p>Customers get 1GB free for every 2GB contributed <ref type="bibr">[9]</ref>.</p><p>A cross-platform application. Free and paid subscriptions.</p><p>Can only be used as Cloud storage and does not support other types of Cloud services.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>BOINC</head><p>Uses the idle time on users' computer (Windows, Mac, Linux, or Android) to perform scientific computing <ref type="bibr">[10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Free.</head><p>Software is for volunteers within the academic society. Does not provide profits to users.</p><p>As seen by the table above, almost all of the presented solutions provide users with only one type of Cloud servicesstorage as a service, meaning they are unsuitable for deploying applications and service delivery. Moreover, the expenses issue remains unsolved.</p><p>The aim of this paper is to present the concept of a decentralized cloud architecture based on P2P technology, estimate its availability and to highlight the changes it may bring to business models within the sector. The paper is structured in the following way: section 2 presents the current status of the technology and benefits of Cloud usage. Section 3 describes the proposed solution. In section 4, the service model of the distributed cloud is presented. Sections 5 and 6 examine the response time to a request and the service availability respectively, while section 7 contemplates the business model that may be formed around the proposed idea. Finally, section 8 provides a case study for the implementation of the solution while the conclusion is presented in section 9.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Description of the proposed solution</head><p>When a company or individual wants to create a website about their activities or themselves, they usually have two options to select from, in order to successfully complete the task.</p><p>1.</p><p>Hire professionals who will handle all the necessary steps, from ensuring a domain name to publishing the website. This solution is time efficient for the customer, as they do not allocate internal resources to such tasks and receive a ready-to-use product.</p><p>2. Use internal skills and set up the website on their own. This implies that members of the team have the skill and experience to create the website. The team has to allocate responsibilities, select and ensure a domain name, find and pay for a reliable host, use a template or create their own (based on their level of skills), insert and organize all content and then manage it.</p><p>Both solutions require a significant amount of money and, if the second option is selected, time and skills while at the same time, they completely depend upon the server and the data center that hosts them. In addition, there are fixed costs that need to be paid on an annual basis for maintaining it. Businesses may end up paying more than they actually use, limiting collaboration within the business teams due to teams operating in silos, easily maxing out their budget and facing scalability problems, which is one the biggest issues for companies when they plan for growth.</p><p>Cloud computing has been introduced as a new approach to satisfy customers' needs and is expected to continue its impressive growth. Cloud technologies facilitate data storage, data exchange and organization amongst businesses and individuals, provide flexibility, vastly reduce infrastructure costs and allow the workforce to better concentrate on their work, leading to increased productivity and efficiency.</p><p>However, the relationship between Cloud providers and companies/individuals is no different to any other model of service: supplierbuyer. This one-way model allows customers to store, manage and share data privately or publicly, using the Cloud service that the supplier provides.</p><p>The business model Cloud computing is founded on is a very intriguing and value centered model as it enables users to pay per use instead of paying on a time-set basis, regardless of the use they make. Distributed Cloud technology introduces a new type of Cloud services based on peer-to-peer technology that aims to facilitate and enhance content creation and resource sharing. The idea of distributed Cloud computing is to combine the Grid and Cloud concepts. For a distributed Cloud, users' workstations provide their own computing recourses (storage and computing power) to Cloud participants. The network architecture is based on the principle of equal interaction between nodes. The number of users who may share the resource increases as a function of the resource's popularity. This means that the more popular a resource is, the more the users that can access it and share it. Apart from the above advantages, the unique point of differentiation lies within scalability. Peer-to-peer technology enables users to scale their content for free, regardless of the scalability level.</p><p>As a result, both, small and big companies can use the same technological basis to scale their content and grow to new levels.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Distributed P2P Based Cloud Service Model</head><p>The focus of the study is to improve the process of allocating resources between user nodes in a Cloud with a distributed architecture [2] and to reduce the response time for such a Cloud. Fig. <ref type="figure" target="#fig_0">1</ref>   The solution can be found in organizing the decentralized resources between user nodes in a Cloud by using peer-to-peer protocols. Each node acts in 3 ways: as a client when making a request to the resource, as a server when responding to requests providing the resources and as a resource owner who has permission for full access. The initial stage entails the process of publishing the resource by its owner. It consists of creating an association between the domain name and the resource by adding the network address of the owner and the unique resource identifiers to DNS-record.</p><p>The domain name is used as a unique identifier while the resource allocation process is coordinated through the DNS-server by modifying the resource records. After the participant's node processes the request of a resource, it addresses it to the DNSserver and receives the address of the resource owner. The next stage is the resource replication process, which is implemented by a cache of request, and the response data on the storage of the user's workstation node makes it possible to share the result of the cache with other Cloud nodes. As a result, the node that responds to a request acts as a server and its address is added to one of the resource records of the DNSserver. It enables the node participant of the distributed Cloud to access the resource from several addresses contained in the DNS records, due to the fact that the requested resource is replicated, thus increasing the availability of the service. The more popular the resource, the more nodes can share it.</p><p>However, server functionality requires from the participant node to share the hardware resources of its workstation, such as storage space and processing power. The participants' nodes that interact with each other are equal and the implementation of the distributed Cloud on the users' side is achieved through the installation of a software on the workstations of each participant node. Furthermore, it is possible for participants' nodes that are non-members to access the resources through a regular request to DNS-server and to get the network addresses of the owner's station or the participants' nodes with the full resource. After receiving their addresses, they can interact with each other. However, it is important to note that for such users, the bandwidth is limited by the number of users that use the standard interaction mechanism.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>5</head><p>Response time to a request</p><p>The response time to a remote Cloud server depends on several factors, such as customers' geographical location in relation to the server, the available bandwidth of communication channels and network interfaces, the number of concurrent user connections to the server, the rate of requests, the hardware configuration of the server etc. [11].</p><p>The average response time (receiving the service) for the end-user in a Cloud client-server architecture in general form can be expressed by the following formula:</p><formula xml:id="formula_524">trrt_c-s = tbase_c-s + tresponse_serv + tresponse_BD, (<label>1</label></formula><formula xml:id="formula_525">)</formula><p>where trrt_c-sthe average time to access the resource, tbase_c-sthe basic transmission delay on the communication channels, tresponse_servthe server response time, tresponse_BDthe data base response time.</p><p>Consequently, the basic delay of the network transmission response is determined by the ratio of the data transmitted to the bandwidth:</p><formula xml:id="formula_526">tbase_c-s = V/C, (<label>2</label></formula><formula xml:id="formula_527">)</formula><p>where Vthe data response size, Cthe available bandwidth.</p><p>The available user goodput is limited by the following: -the network adapter, -actual Internet access speed determined by the ISP, -the server bandwidth, -communication channels [12]. Thus, all users that are concurrently connected to the server evenly share the bandwidth. It means that the available goodput of the connection between the client and the server is determined by the goodput of the "bottle neck" of the route between the client and the server [13].</p><p>Therefore, to determine the value of the available goodput, the following expression can be used:</p><formula xml:id="formula_528">C = min (G, Gserv, Glink),<label>(3)</label></formula><p>where Gthe available user goodput, Gservthe available server goodput, Glinkthe available link goodput.</p><p>In cases where nodes of the distributed Cloud interact with each other, the average response time is defined by the sum of the basic time delay of the network component and the delay that is related to the process of finding and selecting the nodes that provide part of the resource, combining all the parts of the resource together and other time delays.</p><formula xml:id="formula_529">trrt_p2p = tbase_p2p +tinteraction, (<label>4</label></formula><formula xml:id="formula_530">)</formula><p>where trrt_p2paverage time to access the resource, tbase_p2pbasic transmission delay of the communication channels, tinteractioninteraction delay between nodes that provides resource or its part. The basic transmission delay on communication channels, as previously mentioned, is determined by the bandwidth of the "bottle neck" of the network. The transfer of several parts of the resource may occur concurrently from multiple nodes with sufficient bandwidth. The overall delay network component will be determined by the slowest transmission time:</p><formula xml:id="formula_531">tbase_p2p = max (tb_p2p_1, tb_p2p_2, …, tb_p2p_N), (<label>5</label></formula><formula xml:id="formula_532">)</formula><p>where tb_p2p_ithe basic delay of the transmission communication channel from node i, Nthe number of nodes, from where receiving the resources occur concurrently. Given the constraints of the available bandwidth, the user network adapter and the internet speed connection:</p><formula xml:id="formula_533">  1 _ _ 2 _ 1 ,; , , ,. N i i i i link i b p p i N i i V GG min G G G t V GG G               (6)</formula><p>where Gthe available user goodput, Githe available goodput of i node, Glink_ithe available link to the i node goodput, Vithe size of the resource V, provided by node i. For a comparative evaluation of the average response time to a request for centralized client-server and distributed Cloud architectures, initial data (Table <ref type="table" target="#tab_0">2</ref>) is collected based on the analysis of the research [11-14].   Analyzing the graphical representation of the two types of architectures' behavior with the number of concurrent users makes it possible to conclude that the selected set of input data can achieve a significant reduction of response time in the case of a distributed Cloud architecture with 15 or more concurrent users that all interact with each other.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Service Availability</head><p>As previously mentioned, the main advantage of a distributed cloud architecture is the high degree of resource replication. The copies of the resource are distributed among the nodes that had previously requested it. Thus, the number, states and hardware properties of the nodes will determine the Service Availability. There are different methods for the evaluation of Service Availability <ref type="bibr">[15]</ref>. Within the scope of this study, the evaluation of Service Availability deployed on two types of cloud architectures is considered: centralized and distributed. Furthermore, Service Availability evaluation does not take into account the hardware, software and network failures. It is assumed that service is available when there are no performance-related failures that usually occur when incoming requests are not served due to limited capacity of the server. If the service is implemented based on the standard cloud server, then the probability that an arriving request is lost due to buffer overflow is described by the formula <ref type="bibr">[15]</ref>:</p><formula xml:id="formula_534">1 1 , 1; 1 1 , 1. 1 b b b b P                    , (<label>7</label></formula><formula xml:id="formula_535">)</formula><p>where the server load, bthe server input buffer size. The server's behavior can be modeled by a M/M/1/b queue. Then, when the steady state probability of the up state corresponds to the system's steady-state availability and when it is equal to 1, then the availability of the service is:</p><formula xml:id="formula_536">A(WS) = (1 -Pb). (<label>8</label></formula><formula xml:id="formula_537">)</formula><p>In the case of applying the distributed approach, the service is successfully provided as long as at least one of the replication nodes is available. The model of the system's behavior is described as M/M/c/b queue, where c -the number of available nodes that function as a replication, bthe node input buffer size. The probability of requests being lost due to buffer overflow is given by <ref type="bibr">[15]</ref>: </p><p>where cthe number of replication nodes, n -the node load, bnthe node input buffer size. Similarly (2), the availability of the service is:</p><formula xml:id="formula_539">A(NS) = (1 -Lb(c)). (<label>10</label></formula><formula xml:id="formula_540">)</formula><p>The initial data that is used for the evaluation of Service Availability is taken from <ref type="bibr">[14]</ref>. The input data and evaluation results are summarized in tabl. 3: As seen from the table, for the given set of input parameters, Service Availability is implemented through passive replication based on the above properties of the distributed cloud. Service Availability increases significantly with the number of replication nodes is increased and is, therefore, dependent on the popularity of the resource. However, in cases where the service is insufficiently popular and has a low degree of replication nodes, it would be more appropriate for the implementation to be based on a centralized cloud architecture, where the replication of existing nodes can reduce the load on the server. In order to implement an autonomous and stable operation of the service-based distributed cloud infrastructure without a server, it is important to determine the number of nodes' replication as sufficient enough. This is a crucial area for further research. Furthermore, it is necessary to consider a new business model for such an approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>7</head><p>Moulding a new business model</p><p>Customers of distributed Cloud vary from individuals who plan to make a website for personal reasons, to freelancers or professionals who need a reliable service at a smart price, all the way to small and large corporations who seek to be innovative but without compromising their financial resources.</p><p>The use of websites is global but the needs are very different, depending on the quality, quantity, target group and nature of the information of it. Studying the market and creating a list of questions to guide the team throughout the process of identifying each customer group, the following segments have been determined and are presented in table below. Emerging markets and technologies consist of a number of risks that should be taken into consideration before venturing. Distributed Cloud computing, slightly lagging Cloud computing, is at the beginning of its Life Cycle, where the early majority has already started adopting the technology for a number of daily applications. For a startup company, this point is a good one to enter the market, provided it can offer a unique differentiation and a well perceived value to its customers.</p><p>Various technologies have not only introduced new benefits and solutions to existing and new needs, but have also encouraged business models and strategies to change accordingly, in order to accommodate new trends and expectations. Cloud computing consists one of the most revolutionary technologies, mainly due to the fact that it shapes a different future. Through a shift in business conduct, it further empowers existing and new parties allowing more versatility, flexibility and innovation to grow.</p><p>However, technology does not create value on its own. It is the design and application of a sustainable and evolving business model that enables technology to create value for its users. A successful and well-developed business plan may result in cost reduction, strategic flexibility or even reduction in risk, amongst other benefits.</p><p>Existing business models have a distinct separation in roles. As depicted in Ostewalder's business model canvas, the company works with key partners and suppliers in order to create value for its customers and maintain a good and profitable relationship that will ensure a stable and increasing revenue stream. So far, usual business models may be characterized as "non-interactive" models, as the end-target (the customer) does not participate. Distributed Cloud enables business models to change and include their customers in the value creation process. Fig. <ref type="figure" target="#fig_2">3</ref> depicts the distinct roles and interactions between participating sides within distributed Cloud, as structured in the business model canvas. The Production Side (PS) refers to the cluster of parties that work together to create and deliver the value to the customers. Based on the customers' needs and demand, the PS organizes itself to ensure cost reduction, trusted relationships and quality partnerships that will lead to the product. The Consumption Side (CS) consists of the market clusterthe customers who are using the product and enjoy the benefits and the value it creates. Their needs and their demand is the major factor based on which the PS makes alterations and adjustments. For this reason, market and business intelligence is extremely critical, as the data provides companies with sufficient intel to allow trends predictions and needs insights. The capabilities of distributed Cloud technology set new foundations for business models to evolve and grow in order to better facilitate all interested parties. Distributed Cloud technology is a technology that interacts with users, depends on user popularity and constantly moves to adapt to its users. By natural consequence, business models that correspond to P2P technology need to interact with the user and adapt to changes in demand.</p><p>Distributed Cloud approach sets new roles and multiple sides to the business model canvas. Companies do not simply work with suppliers to create a product and customers and users of the technology do not simply purchase or enjoy the value of the product. Instead, the company becomes the technology facilitator and the customers become the suppliers as well. As a result, the business model that emerges is a model that is "alive" and "evolving" with change and a series of "participatory business models" is introduced, where customers obtain a double identitythat of the consumer and that of the source-supplier.</p><p>It is essential to notice that the Production Side of the business model canvas does not have any interaction with the Consumption Side, other than any alterations that result from business intelligence.</p><p>The double role of the customers is the key to this new business model ecosystem, significantly affecting the interaction between customer-user and customer-supplier, through the technology.</p><p>It is important to note that in such business models, monitoring intellectual property and rights is challenging and needs to be dealt with utmost care and responsibility in order to ensure protection of all participants.</p><p>In the field of distributed Cloud for website applications, the use of such a dynamic business model is essential, as it is the core of value creation and value delivery to customers. Users purchase or subscribe to the service to enjoy the benefits of the distributed Cloud solution as provided by the company, in the form of a software, thus becoming customers-consumers. In return, other customers-consumers that request access to the content of the website through the same software service, retrieve it from fellow customers-consumers who, having a virtual footprint of the information on their computers, they now become sources-suppliers for the new customersconsumers.</p><p>As a result, the group of people who share a common interest in the content they seek, participate in a "shared cluster" of information and act as both, sources and consumers of the content. Apart from the development of new business models, companies may find it beneficial to use distributed Cloud as it offers new options in terms of budget and scalability. Budget and scalability consist of the two main issues that companies face. Increased demand may indeed increase revenue stream. However, in order to meet this demand, companies need to invest in more resources. Even with current cloud services, suppliers' costs are high and not easy to handle.</p><p>Currently, companies increase their IT infrastructure and spend significant amounts on adding new serves in order to accommodate their customers' needs and the company's workload. Without this expansion, the company cannot achieve scalability.</p><p>Churn is also important, as users may activate and deactivate their nodes, altering the dynamic of the P2P system. However, the bigger the network of customerssources, the more manageable is the churn, as the system will dynamically adapt to changes and maintain its efficiency.</p><p>Overall, distributed Cloud technology has a number of potential applications that can benefit different companies and users. However, the technology itself produces value when a major condition is met: the design of an appropriate, innovative and predictive business model that ensures value is captured and transferred to users, delivers results and revenue for the company and adapts to the dynamic nature of the system.</p><p>It is necessary to highlight that there is no correct business model. Different models may work as long as they incorporate the P2P values and focus on the double role of the customers. The term "participatory business models" is suggested to describe the new reality that companies and entrepreneurs are expected to face. Monetization through such a business model may be significantly more challenging compared to more popular business models but this may set the foundations for a new way of conducting business and commercializing technologies, ideas and goods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>8</head><p>Case study</p><p>In order to implement distributed Cloud solution, a number of expenses categories has been created:</p><p>-Operational expenses refer to the expenses that the company needs to cover in order to operate and run smoothly. The expenses required for the running and operation are originally limited to the renting of a small server of 50-70 accounts and to the costs of premises and power (office rent, electricity etc.). The initial premises costs are small due to the fact that a big part of the work completed will be through computers and virtual desktops.</p><p>-Labour expenses refer to the amount of money the company needs to pay for the services of its human resources. In this category, all expenses that refer to salaries of regular employees or outsourced partners are included.</p><p>-Variable expenses refer to the expenses of other parameters such as marketing campaigns, royalties to the university, depreciation of the investment within maximum 2 years etc. Variable expenses include marketing budget, university royalties of 3% for the first year and 5% onwards and depreciation of the investment cost within 2 years.</p><p>The proposed solution has a number of implementation stages in order to be fully developed and be ready to use. Strategic planning before starting the development will ensure time efficiency, productive allocation of tasks and smart use of resources. More specifically, the development stages of the project are summarized in the table below: Within the first stage, a number of steps are included: implementation of the static website functionality, distribution of the website tasks and storage between the users' hardware, and finally, implementation of the general service. Stage 2. Implementation of the IaaS (infrastructure as a service) service model. Implementation of the special software layer, which is responsible for distributing the system requests of the guest operating system between the participants' devices, allowing the running of a virtual machine. Stage 3. Implementation of the SaaS (software as a service) service model.</p><p>The last stage assumes improvement of the software based on the specifically configured virtual machine that was mentioned above.</p><p>The distributed Cloud solution can begin its commercialization from within the academic society. The educational sector is a potential big customer that could highly benefit from the proposed approach, and the use of academic and EU connections can greatly help spread the technology. The aim is to begin locally by promoting the proposed solution through academic events and contacts with the respective IT administration departments in order to expand to more universities locally and internationally.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="9">Conclusion</head><p>Cloud Computing has arrived at a very good timing to introduce a new reality based on current needs and future aspirations. Granted, as a new technology, it requires a number of years to set and to become popular, constantly raising awareness amongst people and introducing them to its benefits. The above trends demonstrate the high prospects of different types of Cloud Computing that is expected to grow in the following years in many markets and to extend to a variety of applications. Competition is an expected to be high and technology progress will demand constant update of versions and improvement of products and solutions, in order to successfully supply an ever growing market and a rapidly changing business and social environment.</p><p>The Distributed P2P based Cloud is a new solution that aspires to change the way companies and organizations work with regards to creating, publishing and sharing content. The purpose of the Distributed Cloud approach is to provide P2P Cloud services to individuals, companies and organizations with the view to facilitating costeffective scalability, flexibility and efficiency and enhancing the experience of creating, organizing, publishing and sharing content. Its competitive advantage lies within the concept of reliability and scalability at significantly lower costs, allowing customers to differently allocate their financial resources or to grow even on a budget.</p><p>In addition, well-structured, targeted and smart marketing strategies are necessary to be developed in order to ensure strategic growth of the business sector and brand awareness amongst existing and prospective customers. The proposed solution combines Cloud computing and Grid technology with peer-to-peer networks through a software that allows users to participate in a single, decentralized Cloud system and use their workstations to allocate network resources. As a result, it partially or completely eliminates the need to use powerful, high-performance servers in virtual data centers and, ultimately, reduces energy consumption and negative impacts on the environment.</p><p>By applying Distributed Cloud technology, the dynamics of the system changes so that users become sources and consumers at the same time. This is the very core value of this technology as it enhances cost effective scalability and changes the way business is conducted, through a dynamic, alive and self-adjusting business model.</p><p>The interchanging roles of customers and suppliers within such a participatory business model encourages companies and entrepreneurs to focus more strongly on the value that can be obtained through the P2P technology within the distributed cloud, rather than the marketing of the product itself. Consumers are becoming more and more informed about how technology works and what benefits each provider gives them. This means, that shifting towards value creation and focus through customer participation may actually help companies differentiate themselves from the mass, attract more customers and, eventually, contribute to a new corporative culture.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Motivation</head><p>Nowadays the developments of fault-tolerant computer-based systems (FTCSs) are a part of weaponry components, space, aviation, energy and other critical systems. One 2 of the main tasks is to provide requirements of reliability, availability and functional safety. Thus the two types of possible risks relate to the assessment of risk, and to ensuring their safety and security.</p><p>Reliability (dependability) related design (RRD) <ref type="bibr">[1]</ref><ref type="bibr">[2]</ref><ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref><ref type="bibr">[6]</ref> is a main part of development of complex fault-tolerant systems based on computers, software (SW) and hardware (HW) components. The goal of RRD is to develop the structure of FTCS tolerating HW physical failure and SW designs faults and assure required values of reliability, availability and other dependability attributes. To ensure fault-tolerance software, two or more versions of software (developed by different developers, using other languages and technologies, etc) are used <ref type="bibr">[7]</ref>. Therefore use of structural redundancy for FTCS with multiple versions of software is mandatory. When commissioning software some bugs (design faults) remain in its code <ref type="bibr">[8]</ref>, this leads to the shut-down of the FTCS. After detection the bugs, a software update is carried out. These factors have influence on the availability of the FTCS and should be taken into account in the availability indexes. During the operation of FTCS it is also possible that the HW will fail leading to failure of the software. To recover the software operability, an automatic restart procedure, which is time consuming, is performed. The efficiency of fault-tolerant hardware of FTCS is provided by maintenance and repair.</p><p>Insufficient level of adequacy of the availability models of FTCS leads either to additional costs (while underestimating of the indexes), or to the risk of total failure (when inflating their values), namely accidents, material damage and even loss of life. Reliability and safety are assured by using (selection and development) fault-tolerant structures at RRD of the FTCS, and identifying and implementing strategies for maintenance. Adoption of wrong decisions at this stage leads to similar risks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">Related Works Analysis</head><p>Research papers, which focus on RRD, consider models of the FTCS. Most models are primarily developed to identify the impact of one the above-listed factors on reliability indexes. The rest of the factors are overlooked. Papers <ref type="bibr">[4,</ref><ref type="bibr">5]</ref> describe the reliability model of FTCS which illustrates separate HW and SW failures. Paper <ref type="bibr">[6]</ref> offer reliability model of a fault-tolerant system, in which HW and SW failures are differentiated and after corrections in the program code the software failure rate is accounted for. Paper <ref type="bibr">[8]</ref> describes the reliability model of the FTCS, which accounts for the software updates. In paper <ref type="bibr">[10]</ref> the author outlines the relevance of the estimation of the reliability indexes of FTCS considering the failure of SW and recommends a method for their determination. Such reliability models of the FTCS produce analysis of its conditions under the failure of SW. This research suggests that MTTFsystem=MTTFsoftware. Thus, it is possible to conclude that the author considers the HW of the FTCS as absolutely reliable. Such condition reduces the credibility of the result, especially when the reliability of the HW is commensurable to the reliability of the SW. Paper <ref type="bibr">[11]</ref> presents the assessment of reliability parameters of FTCS through modelling behavior using Markovian chains, which account for multiple software updates. Nevertheless there was no evidence of the quantitative assessments of the reliability measures of presented FTCS. In paper <ref type="bibr">[12]</ref>, the authors propose a model of FTCS using Macro-Markovian chains, where the software failure rate, duration of software verification, failure rate and repair rate of HW are accounted for. The presented method of Macro-Markovian chains modelling <ref type="bibr">[12,</ref><ref type="bibr">13]</ref> is based on logical analysis and cannot be used for profound configurations of FTCS due to their complexity and high probability of the occurrence of mistakes. Also there is a discussion around the definition of requirements for operational verification of software of the space system, together with the research model of the object for availability evaluation and scenarios preference. It is noted that over the last ten years out of 27% of space devices failures, which were fatal or such that restricted their use, 6% were associated with HW failure and 21% with SW failure.</p><p>Software updates are necessary due to the fact that at the point of SW commissioning they may contain a number of undetected faults, which can lead to critical failures of the FTCS. Presence of HW faults relates to the complexity of the system, and failure to conduct overall testing, as such testing is time consuming and needs substation financial support. To predict the number of SW faults at the time of its commissioning various models can be used, one for example is Jelinski-Moranda <ref type="bibr">[14]</ref>.</p><p>A goal of the paper is to suggest a technique to develop a Markovian chain for complex FTCS with different redundancy types (first of all, structure and version) using the proposed formal procedure and tool. The main idea is to decrease risks of errors during development of MC for systems with very large (tens and hundreds) number of states. We propose a special notation which allows supporting development chain step by step and designing final MC using software tools. The paper is structured in the following way. The aim of this research is calculating the availability function of FTCS with version-structural redundancy and double software updates.</p><p>To achieve this goal we propose a newly designed reliability model of FTCS. As an example a special computer-based system of space radio-technical complex is researched (Fig. <ref type="figure" target="#fig_0">1</ref>). The following factors are accounted for in this model: overall reserve of FTCS and joint sliding reserve of modules of main and diverse FTCS; the existence of two software versions; SW double update; and automatic software reboot, if its failure was caused by the HW physicals fault.</p><p>Structure of the paper is the following. Researched FTCS is described in the second section. An approach to developing mathematical model based on Markovian chain and detailed procedure for the FTCS are suggested in the third and fourth sections correspondingly. Simulation results for researched Markov's model are analyzed in the section 5. Last section concludes the paper and presents some directions of future researches and developments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Researched fault-tolerant computer based system with structure-version redundancy</head><p>The researched FTCS with structure-version redundancy is shown on figure 1. To ensure the minimal FTCS downtime, overall hot standby with other version of software is used. The FTCS consists of: a main system comprising modules; diverse system consist of k -modules; for two systems, the common sliding standby of modules is envisaged, the first module in hot standby and other in cold standby; a diagnostics control system determines the state of HW and SW, and manages the redundancy; and a switch is connected the modules to the main and diverse systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3</head><p>An approach to developing an availability model for FTCS with software update and restarting</p><p>An approach to the development of availability model for FTCS with double software updates and automatically software restart in the form of Markovian chains is presented in figure <ref type="figure" target="#fig_1">2</ref>. During the operation of computer based system there are the following states: S1, S4 and S7system operable states; S2, S5, S9, S10 -inoperable states, in which SW updates, are conducted; S3, S6, S8inoperable states in which software restart after physical failure is automatically conducted; S11, S12, S13inoperable states in which HW is repaired after physical failure. The system functioning after state S1 can unfold in four possible ways: the system moves to state S9 with rate sw11 after failure of first software version; the system move to state S3 with rate swerror, after temporary failure of SW; the system move to state S2 with rate up1=1/Tup1 (Tup1duration of bugs correction in software) after finished the first version software operation (ready to use second version of software); the system move to state S11 with rate hw, after physical failure.</p><p>The system functioning after state S4 can unfold in four possible ways: the system move to state S10 with rate sw12 after failure of second SW version; the system move to state S6 with rate swerror, after temporary failure of SW; the system move to state S5 with rate up2=1/Tup2 (Tup2duration of bugs correction in software) after finished the second version SW operation (ready to use the third version of SW); the system move to state S12 with rate hw, after physical failure. The system functioning after state S7 can unfold in two possible ways: the system move to state S6 with rate swerror, after temporary failure of SW; the system move to state S13 with rate hw, after physical failure. System moves from state S3and S6 to states S1 and S4 with a rate of rest=1/Trest (Trestduration of SW restart).</p><p>When the system is in state S2 and S5, it replaced the version of SW with rate repl=1/Trepl (Treplduration of software replacement). The system moves from states S9 and S10 to states S2 and S5 with rate up1=1/Tup1 (Tup1duration of bugs correction in software) and up2=1/Tup2 (Tup2duration of bugs correction in software).</p><p>After commissioning of the computer based system starts debugging the software and develops first update that takes time Tup1. Second update takes timeTup2 and involves finding all bugs in SW. Therefore after first SW update, the numbers of bugs decreases, and debugging software is more complex, and the development of second update takes more time Tup2&gt;Tup1.</p><p>The described approach to the development of availability model for FTCS with software update and restart is used to build availability model of FTCS showed in figure <ref type="figure" target="#fig_0">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head><p>Markov's model for FTCS with software update and restarting</p><p>The method of development Markovian chain of the FTCS is described in the monograph <ref type="bibr">[9]</ref>. It involves a formalized representation of the object of study as a "structural-automated model". To develop this availability model of the FTCS one needs to perform the following tasks: develop a verbal description of the research object (fig. <ref type="figure" target="#fig_0">1</ref>); define the basic events; define the component vector of states, which can be described as a state of random time; define the parameters for the object of research, which should be in the model; and shape the tree of the modification of the rules and component of the vector of states.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.1</head><p>The procedures to describe behavior of the FTCS</p><p>The FTTS behavior is described by the following procedures. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">A set of the events for the FTCS</head><p>According to described procedures which determine the behavior of FTCS, a list of events is composed. Events are presented in pairs corresponding to the start and the end of time intervals to perform each procedure. From this list of events for "structuralautomated model" basic events are selected <ref type="bibr">[9]</ref>.</p><p>As a result of analysis, twelve basic events in particular were determined: Event 1 -"Hardware failure of main system module"; Event 2 -"Software failure of the main system module"; Event 3 -"Software fault of the main system module"; Event 4 -"Hardware failure of the diverse system module"; Event 5 -"Software failure of the diverse system module"; Event 6 -"Software fault of the diverse system module"; Event 7 -"Module failure in hot standby"; Event 8 -"Termination of the procedure of the hot standby module connection to non-operational system"; Event 9 -"Termination of the procedure of the cold standby module transfer to non-operational system"; Event 10 -"Termination of the procedure of software reloading on the module with failure feature in its software work"; Event 11 -"Termination of the procedure of SW version renovation"; Event 12 -"Termination of the procedure of the HW repair".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Components of vector states for the FTCS</head><p>Components of the vector state that can also be described as a state of random time. To describe the state of the system, eleven components are used: V1 displays the current number of modules in the main system (the initial value of components V1 equal to n); V2displays the current number of modules in the diverse system (the initial value of components V2 equal to k); V3displays the current number of modules in hot standby (the initial value of components V3 equal to mh); V4displays the current number of modules in cold standby (the initial value of components V4 equal to mc); V5displays which software version is operated by the main system (V5=0first version, V5=1second version, V5=2third version); V6displays which software version operated by diverse system (V6=0first version, V6=1second version, V6=2third version); V7displays the temporary SW failure in the main system; V8displays the temporary SW failure in the diverse system; V9displays the SW fault in the main system; V10displays the SW fault in the diverse system; V11displays the number of non-operational units, due to HW fault.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.6">Automated development of the Markovian chain and determining of availability function</head><p>The developed availability model of the FTCS gives the possibilities according to technology <ref type="bibr">[9]</ref> for automated construct of the Markovian chains. This construction provides a software module ASNA <ref type="bibr">[15]</ref>. The Markovian chains which take into account the following settings FTCS: n=2; k=2;mh=0; mc=0; hw; sw11, sw12; swerror; Tup1, Tup2; Trest; Tswitch; Trep, are presented in figure <ref type="figure" target="#fig_2">3</ref>. Information is available on the status of each software module ASNA we have on file "vector.vs", which is written in the form: As the configurations of researched FTCS changes, the dimension of graphs increases. Therefore for the configuration of FTCS (Fig. <ref type="figure" target="#fig_0">1</ref>) with one module in a hot reserve graph has 395 states and 976 transitions.</p><p>The proposed availability model of FTCS can be easily transformed for other features of the object of study. It is enough to: add / remove basic event (4.2); attach / remove components of the state vector (4.3); and include / exclude parameters that describe the studied system (4.4). Based on information about the work of FTCS an appropriate change in the model could be made (Fig <ref type="figure" target="#fig_0">1</ref>).</p><p>Basing on the Markovian chains (Fig <ref type="figure" target="#fig_2">3</ref>) formulas for designing of availability FTCS can be assembled. One measure of the availability of recovered FTCS reveals it is an availability function. Availability function of FTCS is calculated as the sum of the probability functions staying in operable states of chains. Basing on these states the FTCS availability function with parameters of FTCS n=2; k=2; mh=0; mc=0 is determined by the formula (1): </p><p>Based on the Markovian chains (Fig. <ref type="figure" target="#fig_2">3</ref>) a system of differential equations (2) was formed. Its solution allows us to estimate the function availability value of researched FTCS.  </p><formula xml:id="formula_542">                                             <label>1</label></formula><formula xml:id="formula_543">                                                              <label>11</label></formula><formula xml:id="formula_544">                                      <label>(2)</label></formula><p>Initial conditions for the system (2) is  </p><formula xml:id="formula_545">1 1; Рt     2 121 ... 0. Р t Р t <label>5</label></formula><p>Simulation results</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Research of influence of software updates duration on the availability function</head><p>With the assistance of the proposed model, the following questions can be answered: What are the duration values of the first and the second software update (ensuring the values of the availability function of FTCS of the initial phase of its operation do not reach below the specified level)? What are the allowed duration values of the first and the second SW updates? How does the correlation between the first and the second SW updates influence on the availability function?  The following results are produced by the proposed experiments: 1) If the duration of the first software update is significantly shorter than the duration of the second update, a decrease of the availability function of the readiness of the operational interval to 1700 hours is observed. If the duration of the first software update is significantly longer the decrease of the availability function, are readiness of the operational interval to 800 hours is observed. 2) The minimal decrease level of the availability function of the readiness of FTCS in the first and the second experiments is the same. This is explained by the values chosen for the duration for the first and the second software updates.</p><p>3) With the assistance of the proposed model it is possible to choose the duration of software updates that helps to ensure a minimum allowed level of the decrease of the availability function of the FTCS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>This research presents a model of FTCS with version-structural redundancy, with software updates and restart for automated development of Markovian chains using a unique technology and specific tool ASNA.</p><p>The presented model can be easily adapted to different configurations of FTCS, which envisages the use of the majority voting reservation in the hardware part and as a consequence in the majority of software versions from different developers. This model can be adopted for an unlimited number of software updates.</p><p>Future research has the potential to supplement this model with further factors: -Erlang distribution for durations of software updates <ref type="bibr">[15]</ref>; -unsuccessful restarting; unreliable commutation of elements and so on.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The high-risk objects presented in energy, on transport, in space and defense branches have become an essential part of human environment. These include the power grid and power plants, aircraft and ground systems of ensuring flights, various kinds of weapons. Development and exploitation of these objects is impossible without wide use of information technologies which act as a counterbalancing factor of the complexity growing quantitatively and qualitatively, power and danger of critical applications <ref type="bibr">[1]</ref>.</p><p>The safety-related instrumentation and control systems (I&amp;CS) which are the development of computer systems with the diversification of an operation mode by its division into normal and emergency are designed for servicing of high-risk objects. Great demands for a complex of attributes which are regulated by the international standards are made of I&amp;CS. Requirements for ensuring functional safety of I&amp;CS based on the construction of fault-tolerant components are distinguished from the most important <ref type="bibr">[2]</ref>.</p><p>The technologies of design of the fault-tolerant digital devices including use of the correcting codes, majority structures, different types of element reservation and system reconfiguration and also the multi-version solutions for prevention of faults caused by the common reason are traditionally applied to the digital components (DC) <ref type="bibr">[3]</ref>.</p><p>However, the fault tolerance of I&amp;CS and its components cannot be provided in a separation from a solution of a problem of the hidden faults which can accumulate during a long normal mode in DC circuits owing to their low checkability <ref type="bibr">[4]</ref>.</p><p>In practice the problem of hidden faults is solved by improving the checkability of DC using periodic checking <ref type="bibr">[5]</ref>. It is performed in testing by imitation of emergency mode with shutdown of emergency protection. On-line testing is used in periodic checking at manual regulation of the input data with the approximation to the conditions of the emergency mode, keeping within the normal mode. This solution has often led to emergency consequences of unauthorized inclusion of imitation in emergency mode by the person or fault <ref type="bibr">[6]</ref>. Manual regulation and shutdown of emergency protection preceded Chernobyl catastrophe.</p><p>Thus, the problem of hidden faults is better known for emergencies that arise due to actions aimed at its solution. Faults remaining hidden have not led to any accidents. At the same time, the history of fight against them shows mistrust to fault tolerance of I&amp;CS and its components.</p><p>For verification of I&amp;CS, its components and solutions used for their development and testing apply a number of methods and technologies, including <ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref>:  Expanded Functional Testing to study the behavior of I&amp;CS on the occurrence of rare events, for example, multiple failure;  Event Tree Analysis (ETA) and Fault Tree Analysis (FTA), considering the sequence of events and fault developing in ICS;  Failure Modes, Effects and Criticality Analysis (FMECA) of components on their criticality for safety of I&amp;CS (it is aimed at determining the need for special conditions of design and operation);  Fault Insertion Testing (FIT) to evaluate the methods and means of testing and the consequences caused by the fault. These and other measures stipulated by international standards in the existing I&amp;CS does not directly put and do not solve the problem of hidden faults. In practice, these measures do not solve the full problem of functional safety systems and facilities management. Proof of that are numerous accidents in recent years in power networks and power plants, train wreck and the crash, failed launches of spacecraft.</p><p>The concept of checkability was formed in testing as testability for estimating the complexity of test generation and further testable design of the digital devices aimed at detecting faults in pauses of an operating mode. The assessment is carried out for points of the digital circuit by calculation of controllability, observability and checkability as their product <ref type="bibr">[10]</ref>. In on-line testing observability coincides with checkability, and controllability is their upper bound. The checkability of DC becomes structurally functional showing the dependence not only on the structure of the circuit, but also the characteristics of the input data <ref type="bibr">[11]</ref>. On its basis the methods for improving checkability in normal mode of I&amp;CS by approach to the upper bound and its raising are developed <ref type="bibr">[12]</ref>.</p><p>The point is observable or not observable in the presence or absence of the path activated from this point to a check point of the circuit. The path is activated if an erroneous value accepted by a signal in the point passes this path at the input data of the considered I&amp;CS mode.</p><p>Table <ref type="table" target="#tab_1">1</ref> shows a necessary condition for the point belonging to set of PHP. Within this condition the PHP are identified on condition ON + OE = 3 according to which the quantity NPHP of PHP in the circuit of the DC can be estimated. Two types of stuck-at faults can arise in PHP when performing a condition (ON = 0)  (OE = 3). Their quantity NDHF allows estimating probability of decrease in fault tolerance of the DC upon transition to emergency mode <ref type="bibr">[14]</ref> by the formula</p><formula xml:id="formula_546">PFTR = (NPHP + NDHF) / (2NDCC), (<label>1</label></formula><formula xml:id="formula_547">)</formula><p>where NDCC is the total number of points of the DC circuit.</p><p>To identify PHP of the circuit it is necessary to properly assess their observability ON and OE, whereas the DC input data, typical for normal and emergency mode of I&amp;CS.</p><p>We propose the following model of the activated path AP of DC circuit: AP(U1, …, UI, …, UK), where UI, ..., UK are descriptions of data processing units on the pipeline sections that make up the path AP; K is the number of units UI, I = K , 1 . Each unit UI is represented by a model UI (FI, ZI 1, …, ZI J, …,</p><formula xml:id="formula_548">I M I Z</formula><p>), where FI is the operation performed by the unit UI; Z I 1,…,</p><formula xml:id="formula_549">I M I Z</formula><p>descriptions of inputs of the unit UI; MI is the number of inputs of the unit UI. Each input ZI J is characterized by the distance DI J between own and current word and also by values calculated at the input words of the DC circuit. The distance is measured in clock cycles according to the formula</p><formula xml:id="formula_550">DI J = | YI -YI J |, (<label>2</label></formula><formula xml:id="formula_551">)</formula><p>where YI is the number of the current word input to the unit UI by input ZI belonging to the way AP; YI J is the number of own word at the input ZI J. Input ZI is one of the inputs of ZI J for which DI J = 0. In case (I, J), DI J = 0 unit UI is simulated at the inputs ZI J, each of which receives the value calculated for the current word. Model of activated path AP is simplified so that the evaluation of the observability can accumulate with consecutive simulation of path AP at separate words of I&amp;CS mode.</p><p>In case (I, J), DI J &gt; 0 the unit UI is simulated at the inputs ZI J, which takes the value calculated for the current word, and the word input to the DC input on DI J clock cycles sooner or later. Generally this word can be any input word of the considered mode. Therefore, the unit UI should be simulated for each of the input words on the values of input ZI J which are accepted by it on all words of the considered mode.</p><p>For inertial processes of change of the input data processed in DC, the model of path AP can be refined taking into account the maximum possible step Δ of changing the input words or the operands making them. Let Δ ≥ 1. Then the unit UI should be simulated for each input word with number G on the values of input ZI J, which are accepted in the range of words with numbers G  Δ • DI J,, where G &gt; Δ • DI J. For G ≤ Δ • DI J the initial set value of input DI J are used. In case of Δ &lt; 1, when the value of the input word is changed no more than once per 1 / Δ clock cycles, the number range is rounded to the value of G  ] Δ • DI J [. Building a model of the path AP is performed by analyzing the structure of the pipeline taking into account quantity of the sections preceding the data processing unit UI on its inputs ZI J. The quantity of these sections determines amount of clock cycles required for data delivery from the inputs of the DC circuit to the unit UI. Let HI J is the quantity of sections (clock cycles) preceding the input ZI J, and HMAX = MAX(HI J). Then, the equality HI J + YI J =HMAX + 1 is carried out for unit UI in clock cycle HMAX. This determines number of own word</p><formula xml:id="formula_552">YI J = HMAX + 1 -HI J,<label>(3)</label></formula><p>including current word YI for input ZI. Substituting (3) in ( <ref type="formula" target="#formula_43">2</ref>) determines the values of the distance DI J = | HI -HI J | in the model of path AP by the structure of the pipeline DC.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Simulation of the Circuit of a Pipeline DC</head><p>The observability of the circuit point is calculated in the course of pipeline DC simulation at the input data, which are determined taking into account the model of path AP.</p><p>Simulation of DC is performed according to the following method. Examination of all input words of the considered mode and examination of all points of the circuit on the pipeline course will be organized. The value of the examined point is calculated at a given input word and is complemented by an inverse value. Values of all following points of the circuit are calculated for two values of the examined point before reaching a check point or a point where results of calculations coincide. If the results in a check point are inverted, all the points belonging to the path, refer to the 0observable or 1-observable depending on the values accepted by them. If at the previous input words the point was identified as observed with opposite value, this point refers to observable and is not considered at the following input words. Point values with DI J &gt; 0 are calculated on an extended set of input words. The simulation is carried out taking into account all their values.</p><p>It should be noted that incomplete simulation of the DC circuit in case of a restriction of the input data typical for considered mode leads to an underestimation of the observability of points. This underestimation admitted for normal and emergency mode conducts to false detection of PHP and their skipping, respectively.</p><p>Considering that controllability of the circuit points is estimated directly by their values, i.e. it is much simpler than observability, and taking into account that controllability is the upper bound of observability, the following method of PHP identification is offered: For the other points, simulation of the DC is running at the input words of emergency mode for determining the sets EO-0, EO-1, EO-2, EO-3 of points with observability of OE: 0, 1, 2, 3 and identification of PHP, according to Table <ref type="table" target="#tab_1">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Identification of Internal PHP in Circuits with the LUT-Oriented Architecture</head><p>Modern I&amp;CS are designed with the use of pipeline DC constructed on FPGA with the LUT-oriented architecture. The feature of the circuits of such DC consists in a table specifying logical functions in memory of LUT (Look-Up Table <ref type="table">)</ref>. The result of function is read out (with use of the multiplexer) from memory of LUT with the address which code is formed from arguments of function <ref type="bibr">[15]</ref>.</p><p>The bits of the LUT memory are considered as internal points of the DC circuit. Stuck-at faults of an internal point can be caused by defect of memory bit or defect of the multiplexer. The internal point of the circuit is controllable if the appropriate bit is selected at the input data of the considered mode, and is uncontrollable otherwise. The internal point is observable if the point of the LUT output is observable at a choice of the appropriate bit of memory.</p><p>The set of all controllable internal points of the circuit can be calculated for each mode by simulation of DC at all input words of this mode including additional words for points with DI J &gt; 0. All internal points addressed in memory of LUT belong to the controllable.</p><p>Internal PHP of the circuit can be identified according to the following method: For each LUT two sets NC and EC of internal points which are controllable respectively in normal and emergency mode are determined. The set of CEN = EC \ NC of the internal points addressed in emergency mode and not used in the normal one is calculated. Internal points of a set of CEN are checked for observability in emergency mode. If they are observable, refer to the set of PHP.</p><p>For example, the task of identifying internal PHP in the circuit of DC that computes the function F(X) = 1 for X mod 3 = 0 and F(X) = 0 for other values of X, where X = {x5, x4, x3, x2, x1}, X = 0  31. The circuit is evaluated for stuck-at faults for the given ranges RN and RE of input data.  <ref type="table" target="#tab_0">2</ref>. The number of input words and the function values are shown in pairs of columns separately for values x5 = 0 and x5 = 1. The ranges RE of emergency mode selected dark color.</p><p>The circuit of DC designed on FPGA ALTERA Quartus II <ref type="bibr">[16]</ref> is shown in Fig. <ref type="figure" target="#fig_0">1</ref>.  <ref type="table" target="#tab_21">3</ref>. </p><formula xml:id="formula_553">№ Variables L1 L2 F for x2 FL1 for x2 FL2 for x2 X for x2 x3 x5 x1 x4 0 1 0 1 0 1 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 2 2 0 0 1 0 1 0 0 1 0 0 1 0 1 3 4 0 1 0 0 1 0 0 1 0 0 0 0 16 18 5 0 1 0 1 0 0 1 0 0 0 0 1 24 26 6 0 1 1 0 0 1 0 0 1 0 0 0 17 19 7 0 1 1 1 1 0 1 0 0 0 0 0 25 27 8 1 0 0 0 1 0 0 1 0 0 1 0 4 6 10 1 0 1 0 0 1 0 0 1 0 0 0 5 7 12 1 1 0 0 0 1 0 0 1 0 0 0 20 22 13 1 1 0 1 1 0 0 1 0 0 1 0 28 30 14 1 1 1 0 1 1 1 0 0 0 0 1 21 23 15 1 1 1 1 0 1 0 0 1 0 0 0 29<label>31</label></formula><p>The functions FL1 and FL2 take the values of the function F for inverse value according to L1 and L2 owing to the distorted value of internal point in the LUT memory. Besides, the first column contains the numbers of sets of the input variables equal to their decimal equivalent. They are also numbers of internal points disposed in the LUT memory. The values of X are specified in two last columns for two values of variable x2 = 0 and x2 = 1. Values of functions FL1, FL2 selected in Table <ref type="table" target="#tab_21">3</ref> by dark color are inversed to values of function F that defines the internal points of LUT corresponding to them as observable.</p><p>According to Table <ref type="table" target="#tab_21">3</ref> internal points which are observable in emergency mode for the considered ranges of RN and RE compose the following sets: a) 5, 7, 13, 15 to LUT 1 and 5, 7, 13 to LUT 2; b) 4 -7, 12 -15 to LUT 1 and 4, 5, 7, 13, 14 to LUT 2; c) 0, 2, 5, 7, 8, 10, 13, 15 to LUT 1 and 0, 2, 5, 7, 8, 13 to LUT 2.</p><p>Listed internal points are not used in the normal mode, i.e. are unobservable. Therefore they belong to the set of PHP. In LUT 3 the same 6 internal points 1, 3 -7 in all modes are used that excludes them from a set of PHP as CEN =  and the output of LUT 3 is an observable point. The quantity of PHP in DC for the considered three cases makes respectively 7, 13 and 14 at total of internal points NDCC = 40. The probability of decrease in fault tolerance of the DC upon transition to emergency mode calculated by the formula (1) accepts values of 17.5%, 32.5% and 35% for cases of a, b and c, respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>Two modes of operation characteristic for I&amp;CS generate the problem of hidden faults which can accumulate in normal mode and reduce fault tolerance of the DC in the most responsible emergency mode. In single-mode systems such problem isn't present as a hidden fault is never shown and if a fault was shown, it isn't hidden.</p><p>The success in the solution of a task of PHP identification where the problem of the hidden faults occurs is determined by opportunities of an assessment in observability of circuit points in each mode of I&amp;CS. The correctness of this assessment is provided with completeness of input data considered for each mode of I&amp;CS. The underestimated assessment leads to false detection of PHP or their skipping. The offered model of the activated path specifies a set of input data for determination of observability of points in circuits of pipeline DC. The method of simulation of pipeline DC and method of PHP identification follows from this model.</p><p>The design of modern I&amp;CS on FPGA defines an additional task of identifying internal PHP typical for circuits with LUT-oriented architecture. The offered method of solving this task analyzes sets of internal points used in normal and emergency mode.</p><p>It should be noted that these sets determine the effectiveness of manual regulation of the input data in the normal mode. This procedure is used in practice for solving the problem of the hidden faults. Procedure reduces the effectiveness with different sets and becomes completely meaningless in case of disjoint sets. Keywords: digital watermarks, control of information object integrity, control of information object usage, information security, cybersecurity, IT systems safety, steganography, LUT-oriented architecture, FPGA.</p><p>Key terms: Information Technology, Data, Object, Approach, Method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction: Topicality of the Problem and Aim of the Paper</head><p>The technologies of digital watermark (DWM) usage are one of the most effective approaches to the comprehensive information security provision <ref type="bibr">[1]</ref>. DWMs are mainly used for:</p><p>1. the control of information object integrity; 2. the control of information object usage: information object copyright provision, digital content authentication, the tracking of digital content move (including the tasks of source retrieval of information leak).</p><p>DWM technologies are based on steganographical technique, with the help of which the fact of DWM presence in an information object (DWM container) is hidden. At the same time DWM can be read in the container if someone has a stegokey possessing the set of access rules to DWM elements <ref type="bibr">[2]</ref>.</p><p>The control of information object integrity by DWM is based on embedding some control data unit allowing to analyze the object integrity in an information object. Hash sum calculated with the help of the definite hash-function is most frequently used as such kind of data unit <ref type="bibr">[3]</ref>. However such kind of control unit embedding results in information object change and consequently violates its integrity by itself. Under these conditions the so-called self-recovering DWMs possessing the ability to recover the initial object value (a value, which it had before DWM embedding) in the process of DWM reading from the object are used <ref type="bibr">[4]</ref>. In order to control the integrity the DWM extraction from information object, hash sum calculation and this hash sum with DWM contents comparison is performed. The analysis of integrity control guarantees the impossibility of the information object substitution or corruption. Finally this provides the safety of functioning the information system processing the given information object.</p><p>The control of information object usage legitimacy b y D W M i s b a s e d o n possibility of a copyright owner to embed DWM having the copyright owner identifying data into the object. So it is only a copyright owner who possesses a stegokey can check the DWM presence and its contents in the information object <ref type="bibr">[5]</ref>. DWM technologies are actively used in the structure of Digital Rights Management systems (DRM -systems), but the field of their usage is commonly limited with the multimedia content protection: graphical, audio and video files <ref type="bibr">[6]</ref>, <ref type="bibr">[7]</ref>. In performing the tasks of control of information object usage legitimacy by DWM the recovery of initial object value after DWM extraction is necessary.</p><p>In the present paper the author proposes the information technology of selfrecovery DWM usage in active hardware containers based on LUT-oriented architecture (further LUT-containers). We can refer, for example, Field Programmable Gate Array microchips (FPGA microchips) <ref type="bibr">[8]</ref>, which at present are often used as an element base for computer and control system design, to such kinds of containers. The main element of such containers is LUT units, which are the data structure used to replace the calculation with prepared data search operation <ref type="bibr">[9]</ref>. LUT units in FPGA are normally represented in the form of RAM. In this case LUT unit inputs are the address inputs of RAM. If the number of inputs equals n a LUT unit stores 2 n bits information and is capable of calculating the value of 1 n-argument Boolean function.</p><p>Self-recovering DWMs have been developed and used in the field of control of integrity and legitimacy of usage for passive multimedia containers, e.g. graphical, audio and video files. However it is necessary to control not only the information objects of such kind by DWMs. But the task of self-recovering DWM usage in active containers performing some calculating or controlling function is not realized at the moment. In the articles <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref> the techniques of DWM embedding in active LUTcontainers are proposed. But the techniques described do not possess the possibility to recover the container original. So the aim of the given paper is to describe the possibility of container original recovery after DWM extraction by developing the technique of forming the DWMs in LUT-containers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Information Technology of Embedding the Self-Recovering DWM in LUT-Container</head><p>The information technology considered in the paper is a formal process of usage of the proposed and already existing techniques as well as the means of information processing, which provides DWM forming in LUT-container space. The proposed information technology uses a set of Fridrich-Goljan-Du method (further Fridrich method) approaches <ref type="bibr">[12]</ref>, <ref type="bibr">[13]</ref> in the part, which is intended for container recovery, and technique described in <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref> in the part intended for DWM embedding in LUT-containers. Besides the represented technology uses such peculiarities of LUT-containers as activeness, accurate data presentation, nonautonomousness of their elementary parts <ref type="bibr">[10]</ref>.</p><p>The methods proposed in <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref> are based on the change of codes of a pair of successively integrated LUT units, which does not alter this pair functioning. Assume there is a pair of LUT units and the output of the first one is connected directly or through a trigger to the address input of the second one. The inversion of all the bits of the first unit code and a definite rearrangement of the bits of the second unit code does not change the functioning of the given pair of units. It is the consequence of equivalence of Boolean functions realized by the pair of units before and after values inversion. The rearrangement of bits in the second unit code of the pair is produced according to the rules depending upon the binary weight of its address input, which the first unit output is connected to. The inversion of bits of the first unit code of the pair gives the possibility to achieve the required value in a definite bit of a unite code. This peculiarity is exactly used by the methods considered in <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref> for DWM embedding in a LUT-container. However these methods are not able to recover the container original.</p><p>Fridrich method <ref type="bibr">[12]</ref>, <ref type="bibr">[13]</ref> is based on the group processing -disjoint subsets of elementary parts of a container with the help of two functions: Flipping-function F and function of discrimination f. Function of discrimination is used in Fridrich method on order to classify the groups of elementary container parts by including them to the classes of regular, singular and unused groups. To determine the function value in each of the container groups we are to calculate the sum of pairwise subtractions with overlapping for elementary container parts included in a group.</p><p>Flipping-function is used by Fridrich method to modify the groups according to some rule possessing the characteristic of involution. In the proposed information technology the LUT-container architecture peculiarities are taken into account and this fact differs it from Fridrich method in the following features:</p><p> within the frames of the proposed technology in the course of DWM embedding the modification of elementary parts exactly (LUT units) is performed but not the groups of elementary parts of a container;  within the frames of the proposed technology the calculation of Flipping-function F(x) unlike Fridrich method contains the LUT unit value inversion according to the procedure mentioned in <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref>. The procedure is the invention of values of the current processed LUT unit and propagation the inversion around the inputs of all the LUT units connecting to the current unit output. It is obvious that the Fridrich method requirement concerning the presence of involution characteristics is performed for the given type of Flipping-function, i.e. F(F(LUT i )) = LUT i where LUT i is any valid value of some LUT unit;  unlike Fridrich method within the frames of the proposed technology a principle of container element classification without calculating any function of discrimination is determined. Certainly, the rules of moving the container from one class to another defined by Fridrich method are performed within the frame of the proposed approach as well:</p><formula xml:id="formula_554">F (LUT R ) = LUT S ; F (LUT S ) = LUT R ;<label>(1)</label></formula><p>F (LUT U ) = LUT U , where LUT R , LUT S , LUT U -LUT units classified as R-unit, S-unit and U-unit, respectively; F() -Flipping-function.</p><p>The succession of actions in the proposed information technology in DWM embedding in LUT-container is as follows.</p><p>Stage 1. The movement about LUT-container units in the order determined by embedding path is realized. During this action each of the LUT units refers to the classes R-unit, S-unit or U-unit on the basis of the above mentioned classification rules. According to the results of classification the binary RS-vector is formed in the following way: if the next LUT unit is classified as R-unit then zero value is fixed in RS-vector; if the next LUT unit is classified as S-unit then one value is fixed in RSvector; U-unit values are not fixed in RS-vector.</p><p>Stage 2. The obtained RS-vector compression is performed with the help of some lossless compression algorithm. As a result of this the compressed vector RS com is formed. It is obvious that RS com vector length is less than RS-vector length. Difference of length of these vectors is denoted as ΔL. Stage 3. DWM, which is a binary succession the length of which does not exceed ΔL is added to vector RS com by concatenating. Vector RS* obtained after concatenation is added with arbitrary binary values until it reaches the RS vector length. So:</p><formula xml:id="formula_555">RS* = RS com . DWM . Add,<label>(2)</label></formula><p>where "." -operation of concatenation; DWM -watermark embedded into container;</p><p>Add -optional addition of vector RS* to RS vector length. Stage 4. The movement about LUT units of container in the order determined by embedding path is performed. In the course of this movement U-units are ignored, and within R-units and S-units a mutual transition of one into another with the help of Flipping-function is made according to the table. </p><formula xml:id="formula_556">RS* Action R 0 0 - R 0 1 Transformation LUT i to S-unit S 1 0 Transformation LUT i to R-unit S 1 1 -</formula><p>The actions at the given stage leads to vector RS* embedding in a LUT-container. Vector RS* contains DWM and a compressed vector RS (vector RS com ) version in accordance with equation <ref type="bibr">(2)</ref>. Thus except for a DWM itself the information necessary for the original container value recovery is embedded in a container. The rules represented in table 1 describe the actions providing the vector RS* embedding in a LUT-container. If the corresponding current bits of vectors RS and RS* coincide then no modification for the current LUT unit is produced. In the case of mismatch of these bits the current LUT unit transition in the class corresponding to the current bit value of vector RS* is performed.</p><p>Taking into account that the Flipping-function impact on LUT units occurs according to the unit inversion rules represented in <ref type="bibr">[10]</ref>, <ref type="bibr">[11]</ref> LUT-container functioning does not change after DWM embedding.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Example of DWM Embedding According to the Proposed Technology</head><p>Let us consider the example of described stages of DWM embedding in container technology. In table <ref type="table" target="#tab_0">2</ref> the hexadecimal values of codes of twenty LUT units (i = 1…20), which are in some embedding path of a container are shown in the lines "Unit code". </p><formula xml:id="formula_557">unit R R R R R U S R R R RS-v e c t o r 0 0 0 0 0 - 1 0 0 0</formula><p>For each of these units a number of one values (n 1 ) in the unit code bits are indicated. Depending on the proportion of amounts of one and zero values in the code the unit is classified as R, S or U unit according to the above mentioned rules. In accordance with the results of the classification a RS-vector is formed, in which zero values correspond to R-units and one values -to S-units. U-units do not participate in forming the RS-vector.</p><p>As a result the RS-vector takes the value RS = 011100001000001000 consisting of 18 bits (the information about two U-units was not included in RS-vector). Then the RS-vector is to be subjected to lossless compression. In the given example the simplest way of compression on the basis of Huffman method is used for illustration (in practice the more effective compression methods are to be used). For this purpose the triads of RS-vector bits are taken as elementary characters and their frequency of entering the vector is found. The triad "000" enters the vector twice, the triad "100"once, the triad "011" -twice. As a result of Huffman method we obtain the following system of uneven prefix codes for the triads of RS-vector: "000"  "11", "100"  "100", "011"  "101", "001"  "0".</p><p>As a result of usage of the obtained codes we can have 12 bits vector RS com = 101100011011 instead of the initial triads in 18 bits RS-vector. RS and RS com vector lengths difference is ΔL = 6. This value expresses the maximum amount of DWM bits, which can be embedded in LUT units in the given example.</p><p>In table 3 the values of bits of the initial RS-vector and its compressed version RS com are shown. Let us consider the example of addition of the 6-bits DWM -DWM = 101010 to the vector RS com . As a result of concatenation of the vector RS com and DWM embedded in DWM container we obtain vector RS* having the similar length as to vector RS. Table <ref type="table" target="#tab_21">3</ref>. Binary vector values RS 0 1 1 1 0 0 0 0 1 0 0 0 0 0 1 0 0 0</p><formula xml:id="formula_558">RS com 1 0 1 1 0 0 0 1 1 0 1 1 DWM 1 0 1 0 1 0 RS* 1 0 1 1 0 0 0 1 1 0 1 1 1 0 1 0 1 0</formula><p>Then according to the rules specified in table 1 the LUT-container modification is performed. The aim of this modification is to adapt the LUT-unit classes lying in the embedding path to the value of vector RS* containing DWM. As we see from table 1 the LUT-unit movement from one class to another is only performed when the values of the corresponding bits of vectors RS a n d RS* do not coincide. The bits characterizing with the absence of coincidence of such kind are distinguished in table <ref type="table" target="#tab_21">3</ref>. For the LUT-unit codes corresponding to the distinguished bits a Flipping-function is applied and this leads to the movement of these units from one class to another.</p><p>In table 4 the values of LUT-unit codes after Flipping-function application to the distinguished units (units, for which the class is to be changed). As a result of these actions the RS-vector of units, which are in the embedding path takes a value of the vector RS* and DWM is embedded into the LUT-container. </p><p>where order -the information defining the order of move around LUT units in the container (embedding path) for DWM embedding or extracting; classificationconcrete definition of the principle of LUT-unit classification (unit is considered to be R-unit if the amount of parts in the unit code is more or less); RSrule -the rule of interpretation of RS, RS com , RS* vector bit values: for R-units a zero value and for Sunits one value are fixed in the RS-vector and vice versa; ΔL -the difference between the vector RS length and its compressed version RS com length.</p><p>The succession of actions of the proposed information technology in DWM extracting and recovering the initial value of LUT-container is as follows.</p><p>Stage 1. The movement about LUT-container units in the order specified by embedding path occurs. And along with this a binary vector RS' is formed on the basis of LUT-unit classification like in the case of embedding the information.</p><p>Stage 2. The obtained vector RS' structure corresponds to the one of vector RS* (2) formed in DWM embedding in container. The last ΔL bits of vector RS' are DWM with the possible addition to the necessary vector length. At this stage the reading of this bits and DWM obtaining is performed.</p><p>Stage 3. The other vector bits are subjected to the procedure of decompression opposite to compression, which is performed at the stage of embedding the information. As a result a binary vector RS decom is formed.</p><p>Stage 4. On the basis of information contained in vector RS decom the recovery of original container value is performed. The movement about LUT-units of the container in the order specified by the embedding path and successive review of vector RS decom values are performed for this. In the course of this movement the U-units are ignored and within R-units and S-units a mutual transition is made by Flipping-function according to table 1.</p><p>For the example considered above DWM extraction can be described in the following way. As a result of analysis of LUT-unit codes lying in the embedding path the unit classification is performed and a binary vector RS' = 101100011011101010 is formed. From the vector end the ΔL = 6 bits containing DWM "101010" are taking. The rest bits of the vector "101100011011" are subjected to decompression with the usage of the table making the match between the uneven prefix codes of compressed vector and the triads of decompressed vector bits. This leads to creation of binary vector RS decom = 011100001000001000, which coincides with the container vector RS before DWM embedding in it. The given vector has the information for the original value recovery of LUT-container. According to the rules of table 1 the LUT-unit classes become the original ones and the container acquires the value it had before DWM embedding.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Experimental Research of the Proposed Technology</head><p>Aims of the experimental research: Environment for making the experiments. The hardware-software means based on the chips FPGA Altera Cyclone II and CAD Altera Quartus II usage have been developed for the experimental research. The group of scripts performing the interaction with CAD Altera Quartus II for reading and recording the LUT-unit contents was organized in TCL language. The read data processing subsystem itself is realized in language C# within the frame of the platform .Net in accordance with the proposed technology. The estimation of design characteristics mentioned above were carried out by means of CAD Altera Quartus II Timing Analyzer (estimation of the limit processing speed) and Power Play (estimation of energy consumption and thermal dissipation). The states of container before DWM embedding and after DWM extraction were compared by bit-by-bit analysis of configuration files of the corresponding containers.</p><p>The Materials for experiments are 40 FPGA -projects of different complexities and purposes. The hardware complexity of devices within the frames of the given projects varies from 1,2% to 65% resource volume (logic cells, RAM units) of target chip FPGA.</p><p>The process of making the experiments. The experiments for each of the researched project consist of the following stages:</p><p>1. estimation of the main characteristics (processing speed, energy consumption, thermal dissipation) for the device represented in the form of initial container; 2. embedding the random binary succession of DWM in container; 3. estimation of the main characteristics for a container having the embedded DWM; 4. DWM extraction from the filled container; 5. comparison of configuration files of the final and initial container states.</p><p>The results of experimental research. As a result of experiments a complete coincidence of configuration files of the initial containers and the ones obtained after DWM extraction for all of the 40 projects has been established. So due to the features of self-recovery after DWM extraction from containers they take the original form and their characteristics return to the initial values.</p><p>In the part of determining the degree of changes of the main container characteristics (after DWM embedding) the following results were obtained. We found that insignificant changes of container characteristics occurs as a result of DWM embedding. Along with this the dependence of this change upon hardware complexity and its structural peculiarities is extremely low. The difference between the changes of characteristics for devices occupying 1,2% and the ones occupying 65% resource volume of the target chip FPGA is hundredths of a percent. On average (for all of the researched 40 projects) the processing speed characteristic change is 0,18%, changes of energy consumption and thermal dissipation characteristics -0,22%. As we see the change values are within the limits of error value of measurement means.</p><p>The technology offered in the paper does not change the mutual connections of LUT units but does change the values of the specific units codes. It is accordingly of interest to learn whether the changes of units codes are able to influence on the FPGA project features under such conditions. Except for the previously considered experiment another experimental research of the influence of the values of LUT units codes on the basic features of FPGA projects has been made with the participation of one of the authors of the given paper. The description of this research and its results are shown in <ref type="bibr">[14]</ref>. In the above considered experiment a random binary succession was embedded in various FPGA projects. This led to the fragmentary changes of LUT units codes as in accordance with table 1 the codes of units change only in the two of four cases of possible combinations of values of bits of vectors RS and RS*. In <ref type="bibr">[14]</ref> the extreme cases of codes change in all the involved LUT units of FPGA-project were considered. In order to create such kinds of changes the projects of similar structures, but with the LUT units codes containing minimum and maximum amount of one value, respectively, were formed and compared. The projects were chosen to deploy the resources of the corresponding FPGA chip in a maximum way. In table <ref type="table" target="#tab_3">5</ref> the main results of comparison of such projects are represented. The projects with the minimum and maximum amount of one values are marked in table 5 as P min and P max , respectively. In the given table the following characteristics are represented: maximum clock frequency F; dynamic and static power supply as well as the total energy consumption of chip core obtained for the indicated clock frequencies; δ -a relative energy consumption change in mass changes of the number of logical values in the codes of LUT units of a project. All the families of chips used in the experiment have the core power supply equal 1,2 V. The experiment results shown in table <ref type="table" target="#tab_3">5</ref> demonstrate that in maximum mass change of the number of one values correlation in LUT units:</p><p>1. the energy consumption of input output system for chips within a FPGA family is retained at the same level; 2. the chip core energy consumption changes insignificantly within one family mainly due to the dynamic component (maximum value of this change equals 0,46% for chips EP4CE30F29C6 of family Cyclone IV E); 3. the maximum clock frequency expressing the extreme processing speed of devices does not practically change within one FPGA family.</p><p>The results show that such important characteristics as productivity and energy consumption are not practically dependent upon the type of Software code used in F P G A -p r o j e c t s w i t h t h e f i x e d h a r d w a r e r e a l i z a t i o n . S o w e c a n c o me to the conclusions that according to the technology proposed in the given paper the DWM embedding in a LUT-container does not substantially impact on the FPGA project characteristics mentioned above.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusions</head><p>The information technology proposed in the paper allows to perform DWM embedding in containers with LUT-oriented architecture. The technology gives the possibility to recover the initial state of container after DWM extraction from it. The technology is based on the combination of DWM embedding method into LUTcontainers proposed in the given paper and the popular Fridrich method oriented at the passive multimedia containers. Unlike Fridrich method the proposed technology:</p><p> uses less complicated Flipping-function taking into account the container peculiarities;  does not include the discrimination function calculation in order to perform the element classification of container;  performs information embedding at the level of the container elementary parts (LUT-units) but not at the level of groups of elementary parts.</p><p>The degree of the proposed technology effectiveness is of qualitative nature and is expressed in possibility to recover the initial LUT-container after DWM extraction, which was absent before. The proposed technology can be used in developing the hardware and software, which realize digital watermark embedding in computer and control devices created on the LUT-oriented element base (e.g. FPGA or programmable logic integrated circuits with the similar architecture). Such kind of embedding allows to control the device configuration integrity makes the substitution or corruption of configuration impossible, which is of vital importance for critical domains. In addition it allows to control the legitimacy of usage of project information and devices themselves at the different stages of CAD and life cycle: synthesized FPGA project, configuration file FPGA, operating device.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Functional Diversity Design of Safety-Related Systems</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ivan Malynyak</head><p>Stalenergo LLP ivanmiros@gmail.com Abstract. Traditionally, the application of safety voted-groups architectures is a matter of redundancy, where hardware and software components are replicated and become a source of vulnerabilities with decreased system reliability as a whole, therefore necessity of functional diversity design is become essential. Well known diversity approach for similar erroneous results mitigation is widely used, but combined software and hardware techniques to achieve necessary safety system requirements without enlarged implementation of price isn't yet evolved. Avoidance of redundant complexity with limitation the number of channel's internal states could lead to common cause failures reduction and sufficient level of residual risks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Nowadays technology of control system is believed to be effective and safe, where essential approaches are sufficiently exploited <ref type="bibr">[1]</ref>. The current generation of instrumentation and control systems is highly integrated digital complexes which offer better performance, versatility and additional diagnostic capabilities in comparison with aged analog systems. But as far as systems become more safety-critical, all kinds of possible vulnerabilities have to be taken into account.</p><p>This paper offers the concept of functional diversity design which is unfolded by three steps from the problem, through different approaches to the implementation. First of all, necessity of latent systematic faults elimination is assumed, where question of misinterpreted functional requirements within the system becomes a main framework for modern applications <ref type="bibr">[2,</ref><ref type="bibr">3]</ref>. Secondly, the approach to cover up to 99.9% faults without overhead in performance and power consumption based on modern surveys is suggested <ref type="bibr">[4]</ref>. And finally, new architecture based on reduced system complexity which helps to make up savings in development life cycle stage with higher availability and higher safety in railway industry is proposed.</p><p>To be accurate with terminology, the functional diversity design in this paper is not assumed as different physical functions within determined process implementation, but more broadly, where fundamental diverse technology is considered in a way of inherent difference without any commonality in its nature. Even the most comprehensive strategies approach are suffered from the common channel failures and possible external influences or insufficient faults mitigation that can further contribute to the potential concurrent vulnerabilities <ref type="bibr">[2]</ref>. Indeed, all mentioned strategies assumed the six different fault management techniques which solves equal project problems in redundant channels, composed of sensors, computers and control elements with purpose to take the process to a de-energized state when predetermined conditions are violated.</p><p>As shown in Fig.  Almost all created inter-channel data than is sent to hardware/software redundant voting mechanism Xi which than implements safe control output function Z. Despite the fact that diversity questions are deeply concerned and surveyed, the biggest issue still lies in assumption of equal channel functional design, where the fundamental problem took their roots <ref type="bibr">[4,</ref><ref type="bibr">5]</ref>. Of course, it's easy to fit out the system with all kinds of diversity techniques, but absence of overall differential approach can't guarantee prolonged operation without common cause vulnerabilities. The possibility of concurrent triggering the latent multi-channel failures is potentially hazardous and it's like a group of man walking simultaneously around a pit with averted eyes.</p><p>The way out could be found in "sequential" (or satellite) type of system architecture, where parallel equivalent sub-channels are substituted with diverse ones as shown in Fig. <ref type="figure" target="#fig_1">2</ref>. The challenge is to cope with nature evolution, where necessity of redundancy implements as sequential algorithm in embedded bundle of diverse entities <ref type="bibr">[6]</ref>. The idea is already has been considered in <ref type="bibr">[2]</ref>, but existent architectural context is still repeated virtual "OR" logic of distinct sub-channels. Even if functional diversity is achieved through different control laws, elements and distinct functionality, the need of overall agreement among the sub-channels and data synchronization may critically affect output values. Data lines in sequential architecture 1oo2S are minimized to essential level with safety functions are guaranteed to be executed correctly by de-energize signals. This type of architecture isn't widespread despite advantages of system simplicity because of general established multichannel parallel approach used to cover safety issues. Nevertheless, such direction may have its future in the light of necessity to drop overall system complexity to acceptable level for commercial use.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Redundancy</head><p>The challenge of providing redundancy management to meet certain requirements for different application is complicated by the critical constraints of market cost and schedule. Further evolution of redundancy management with its intricate synchronization interfaces and overall complexity were already found to be potentially catastrophic <ref type="bibr">[7]</ref>. This approach obviously was costly in a way of wiring and components but from the other hand it's offered rather simple and attractive macro level "black box" design.</p><p>As one could see, the redundancy approach is well known and understandable, where failures of elements could be easily found by comparison. For simple functions it works greatly and reliability decreasing is not matter of consideration. But when dozens of input and output were designed with redundancy management, cost of developing and physical implementation tended to increase exponentially. The result of complexity already known and contained to be in faults propagation which leads to unsafe concurrent failures of two or more identical parallel sub-channels <ref type="bibr">[8]</ref>.</p><p>More than that, the design to achieve necessary safety level leaded out into duplicating functions almost at every step. Firstly, the safe input means at least of two signals to be monitored with safe outputs are based on the same repeating principal. Secondly, to achieve availability requirements the "design shape" just went on adding next "channel 2", but of course it could be more channels. And finally, when all components are successfully placed, the intricately net of data communicating has to be put over.</p><p>The first step down from "black boxes" design could be avoiding some needless redundancies. As shown in Fig. <ref type="figure" target="#fig_2">3</ref>, 1oo2D architecture is looked safe due to transparent functional scheme. Indeed, all inputs are duplicated and could be verified by other neighbor. Moreover, output Z is drove from two channels by voting mechanisms Xi, with ability to perform safety de-energized state. On the contrary, the sequential architecture approach could change the whole appearance of system design, where redundancy eliminating is only the first step to be done. As shown in Fig. <ref type="figure" target="#fig_3">4</ref>, the point of view lied in the basic sequential approach idea, where elements of system are presented with non-symmetrical faults property. Let's describe it by simplified hardware model, which could be than enlarged on software issues by substitution physical elements with similar software routines in a project.</p><p>For example, if "input" is implied as thermocouple, than implementing fixed current with periodical caliber testing would guarantee possible input faults detection. Indeed, the only fault is not detected by this approach is a rare gradual measurement drift and by using high quality thermocouple with periodical external checkup this could be solved and particular problem due to low possibility of such fault would be eliminated. As a result, a thermocouple with measuring circuits is treated as single element with non-symmetrical types of faults, where most likely defects in circuit break or rapid measurement drift (op-amps or connecting line issues) are easily detected. The non-symmetrical type fault output is treated in the same way, where satellite sub-channel S drives relay Z safely through transformer X with inherently eliminating shortcut failures. The main sub-channel A is connected to S with communication line where control data and both functional integrity is transferred. Each of subchannels could run safety function by de-energizing transformer in case of discrepancy. As a result, sequential approach is constrained to build the system with strong functional design separation between core algorithm A and routine input/output tasks, whereupon for example the fast and simple satellite sub-channel S is prepared to deal only with input/output X and functional integrity management. The effect would come out of overall system complexity reduction, common cause failures elimination and reliability enlargement due to algorithm simplification with functional diversification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>S</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Design of safety-related systems</head><p>The main aim of diversity is to perform safety functions achieved by monitoring the behavior of number of sub-channels. The way safety ideas are implemented reminds "fractal" pattern, where general method of reiteration is repeated at every scale of a project. It could be seen in software, where developer has no idea how his source code would be eventually implemented into assembler language. The same thing is happened in hardware, where design is implemented by pure repeating elements based on monolithic integrated circuits without clear understanding of its full functionality. As a result, each level of system decomposition is considered with increasing uncertainty and the principle of aggregation with uncontrollable elements cascading may not be as reliable as it expected.</p><p>Finally, the result of uncontrolled "fractal" implementation is come out as necessity of channel diversity due to providing predictable system behavior and is turned to entity multiplication which has to be carefully verified <ref type="bibr">[9]</ref>. Hereafter, when system is installed, a well known golden rule is remained -"don't change anything".</p><p>Evolution of Nature shows that repeated and uncontrolled growth ultimately leads to disaster, just look back on dinosaurs or cancer. So, the main idea of safety may lies in capability of system predicting its behavior with reasonable complexity. For example, for the implication to the brain size it could be said, that decision making mechanism should be "large as you need and as small as you can" <ref type="bibr">[10]</ref>.</p><p>Looking forward at systems design, there is a time point when sufficient data of failures is gathered and overall availability could be increased just due to better maintenance understanding. Indeed, if its clear how light bulbs in mines are breaks and what circumstance is preceded, then particular algorithm with appropriate feedback could lead to limited abundance of lighting control system or even eliminate redundancy at all due to accurate prediction of failures with using certain planned actions.</p><p>After thorough revision of prevail railway control systems it's assumed, that architectures could be transformed into simplified 1oo2S variant, where all inputs and outputs are designed with proper feedback (shown in Fig. <ref type="figure" target="#fig_4">5</ref>). </p><p>Nonworking de-energized output state where sub-channels' internal conditions are differ because of failure detection:  r,q,p: Arq≠Brp  Arp≠Brq, Z= </p><p>Hazardous state where sub-channels' outputs synchronously being changed by latent failure:</p><p> r,q: Arq=Brq, Z  Z'≠ <ref type="bibr">(3)</ref> Sequential architecture 1oo2S is considered to be diverse on design level where each sub-channel is used different technologies, logic and way of responding by nature, therefore equation A  S ≈  is assumed. Nevertheless, in order to provide necessary safety technique, the idea of artificially divided sub-channels' internal conditionals alphabet is used and proper mapping of normal responses set within each sub-channel is determined <ref type="bibr">[11</ref></p><formula xml:id="formula_562">]:  r,p: Arp  SA  Srp  AS, Z  Z' ≈ <label>(4)</label></formula><p>Here the SA is a set of sub-channel A mapping responses which are analyzed in S and vice versa. Hazardous state where sub-channels' outputs synchronously being changed by latent failure are very rare due to functional diversity design:  r,p,q: Arpq  Srpq ≈ </p><p>In order to avoid potentially hazardous states, a number of conditions must be met <ref type="bibr">[2]</ref>. Let us assume A and S with internal symmetric difference feature and in theory it's possible to reach necessary level of identified errors possibility at 99.9%:  r,p,q: Arpq  ¬ Srpq, Z  Z' ≈ </p><p>One of the approaches to achieve channels' software symmetric difference could be based on "likely program invariants" idea with substitution invariants property of critical parts for negations ones <ref type="bibr">[12]</ref>. For example, if sub-channel A algorithm has CASE operator for "what must be done", than sub-channel's S algorithm to control this part of software should have operator for "what is not supposed to be done in any case". This paper is regarded only as intention where distinguish functional design specifications of sub-channels is took into account. The formulas (1-6) are correlated with already developed theoretical foundation and mathematical models of multi-version systems <ref type="bibr">[11]</ref>, where different diversity kinds r  R are sequentially accumulated in final diverse versions by special mapping of output signal set Zi  Z.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Architecture diversity usage</head><p>The problem of common cause failures mitigation basically could be found in four industries (aviation, chemical process, rail transportation and nuclear power plant) that provide high failure-consequence consideration in evaluating the diversity.</p><p>The usage of diversity are described in <ref type="bibr">[2]</ref> with guidance related to clear examples of diversity (shown in Table <ref type="table" target="#tab_1">1</ref>). x In spite of the intensive researches in area of multi-version systems, the distributed nature of the rail network and the localized action for interlocks and train control, the railway safety management is paid less attention to diversity implementation. By stopping or slowing trains to inhibit access to occupied tracks, railways have a readily accessible safe state by local de-energized "stop" configuration. This failsafe approach based on old all-relay interlocking system resulted in a practical emphasis for identifying faulted conditions and stopping the affected trains until the hazard can be cleared.</p><p>In the modern microprocessor interlocks and train control the system diversity usage is vital due to increased speed and shortened time between rolling-stocks. Moreover, unique set of input and output signals for every railway station imposed additional constraints on control systems, which has to be flexible in configuration, safe in operation and cost effective in realization.</p><p>The idea of sequential 1oo2S architecture could fill the diversity gap in domains, such as traffic control, where collision avoidance is a key of operational safety but with considerable economic constraints.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>With respect to size and complexity of modern safety-critical application it could be assumed, that one way to achieve necessary system requirements without enlarged implementation price is functional diversity design optimization. This paper proposes combined software and hardware applying, where overall system complexity would not exceed the uncontrollably high level and would decrease developing time.</p><p>Sequential safety architecture 1oo2S combines the benefit of 1oo2D and 2oo3 systems with higher availability and higher safety levels. The price for this innovation lies in additional functional requirements to successfully analyzing integrity of sub-Introduction One of the most important problems that arises constantly in the process of information and communication systems service is the problem of the estimation of system reliability with the following making decision about the possibility of its further exploitation on the basis of the information about possible failures in the future <ref type="bibr">[1]</ref><ref type="bibr">[2]</ref><ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref>. The problem becomes especially important in the case when information system is used for the management of the objects that relate to the class of critical or dangerous and under the threat of accident objects (aircraft, sea mobile objects, nuclear power stations, chemical industry plants etc.) <ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref>. The forecasting of failures is the primary stage of the providing of the dependability of the systems of such class. However, nowadays the problem of failures forecasting (in overwhelming majority cases) is solved by means of informal methods and the decision about the possibility of dependable exploitation of the corresponding information system is made on the basis <ref type="bibr">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr">[11]</ref>:</p><p>─ qualitative and quantitative estimation of its current state; ─ the experience of the exploitation of the given and analogous information systems.</p><p>As far as information and communication systems (ICT) become more complicated and also as far as there is the growth of requirements to the probability of their reliable work, informal methods of making decision are becoming less and less effective. Hence, the usage of stricter approaches to the estimation of the dependability and reliability of ICTs functioning based on the quantitative estimations of future state of experimental information systems is very important.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Statement of the problem</head><p>Accuracy of the obtained solutions for correspondent class of problems and the time during which given solutions can be obtained are the most universal parameters characterizing the quality of information system functioning. Stated parameters (accuracy and time) have stochastic character because of the presence of inner defects of the system and uncontrolled external destabilizing factors. That's why the problem of the forecasting control of information system reliability can be formulated in the following way.</p><p>Without the restriction of the generality of the next calculations let us assume that the state of the information system in exhaustive way is determined with scalar parameter X (accuracy or time of problem solution). The change of the values of the parameter X in discrete range of points , 1,</p><formula xml:id="formula_565">i t i I  is described by random sequence   ( ), 1, X X i i I  </formula><p>. The values of the parameter X must satisfy the condition</p><formula xml:id="formula_566">( ) 1 a x i b, i ,I   <label>(1)</label></formula><p>In the case of the crossing by parameter X the limits of acceptable area [a; b] the failure of information system in the process of its functioning is registered. The state of the system is controlled periodically in discrete moments of time , 1, k tt the failure would take place that would lead to the suspension of the process of information system functioning.</p><formula xml:id="formula_567">t k    by measurement of the values  , 1, x k   of the parameter X where  , 1, x k   is the realization of the random sequence   X in the cut set , 1, t k    . It</formula><p>The statement of the problem can be formulated in the following way: on the basis of stated (measured) information about current values of the parameter X on the time interval 1</p><p>[ ; ] k tt the conclusion about the usability of the information system to exploitation in future moments of time , 1, i t i k I  must be made. Similarly the problem of providing of dependable functioning and forecasting of the state of the technical systems or objects to the structure of which information systems or management-information systems enter in the form of components can be formulated. Herewith the dependability of functioning and usability of such complicated systems and objects certainly depend on reliability and fail-safety of all their components..</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Solution</head><p>Given that the value of the controlled parameter X changes randomly within the forecast region, the probability of fail-safe operation becomes an exhaustive feature of the safety of functioning of the information system examined.  </p><formula xml:id="formula_568">k P I P a X i b i k I x k       <label>(2)</label></formula><p>The problem is thus reduced to the determination of the probability of non-falling of the realization of the a posteriori random sequence () ( / ( ),</p><formula xml:id="formula_569">X i x k i k I   <label>1, ), 1, k</label></formula><p> outside the limits of the permissible region [ ; ] ab . In <ref type="bibr">[12]</ref>, <ref type="bibr">[13]</ref> there was proposed an approach to the estimation of likelihood (2) through multiple statistical modeling of possible extensions ( ), 1, , 1,</p><formula xml:id="formula_570">l x i i k I l L   </formula><p>of the random sequence analyzed {} X in the forecast region, verification for each realization of condition (1) and calculation as a result of the required estimation experiment *( ) ()</p><formula xml:id="formula_571">k P I n L  (<label>n</label></formula><p>is the number of successes). In this method, its canoni- cal expansion <ref type="bibr">[14]</ref> within the range of points analyzed is used as a model of the random sequence , 1,</p><formula xml:id="formula_572">i t i I  :   1 ( ) ( ) ( ), 1, , i X i M X i V i i I        <label>(3)</label></formula><p>where , 1,</p><formula xml:id="formula_573">V I    -random coefficients: [ ] 0, [ ] 0 M V M V V      for 2 , [ ] M V D     ; ( ), , 1, i i I    -nonrandom coordinate function: ( ) 1, ( ) 0 i       under  &gt; i .</formula><p>Elements of the canonical representation (3) are defined by the following recursions:</p><formula xml:id="formula_574">  1 1 ( ) [ ( )] ( ), 1, , i V i X i M X i V i i I           (4) 1 2 2 2 1 [ ( )] { [ ( )]} ( ), 1, ; i i D M X i M X i D i i I           (5) 1 1 1 ( ) { [ ( ) ( )] [ ( )] [ ( )] ( ) ( )}, 1, , , . j j j j i M X X i M X M X i D D i I i I                    <label>(6)</label></formula><p>Tipping in the expression (3) of known values</p><formula xml:id="formula_575">( ) ( ), 1, X x k     </formula><p>converts the a priori random sequence into the a posteriori one:</p><formula xml:id="formula_576">( ) ( ) 1 ( ) ( ) ( ), 1, , i k k x v v vk X i m i V i i k I       <label>(7)</label></formula><p>where () ()</p><formula xml:id="formula_577">k x</formula><p>mi -linear optimal, by the criterion of mean square minimum of prediction error, estimate of the future value of the random sequence   X at the point i t according to the known initial values of k .</p><p>Expressions for finding () ()</p><formula xml:id="formula_578">k x</formula><p>mi have two equivalent forms of notation</p><formula xml:id="formula_579">()<label>( 1) ( 1)</label></formula><p>[</p><formula xml:id="formula_580">( )], if =0, =1,I ; () ( ) [ ( ) ( )] ( ), =1, , = +1, ; x x x M X i i mi m i x m i k i I                   <label>(8)</label></formula><p>or</p><formula xml:id="formula_581">( ) ( ) 1 ( ) [ ( )] ( ( ) [ ( )]) ( ), 1 ; k k k x j m i M X i x M X f i i = k + ,I       <label>(9)</label></formula><p>( 1) The calculation method of forecasting of fail-safe operation of information systems on the basis of the model ( <ref type="formula" target="#formula_6">7</ref>) covers a fairly wide class of random sequences (nonmarkovian, non-stationary, non-monotonic, etc.), but this representation of an a posteriori random sequence is optimal only within the framework of linear stochastic properties, thus reducing significantly the accuracy of prediction of random sequences, which have non-linear links.</p><formula xml:id="formula_582">() ( ) ( ) ( ), 1; () ( ), = ; k k k k k f i f k i k - fi ik              <label>( 1)</label></formula><p>The clearing of this trouble is possible through the use on the basis of estimation method of the probability of fail-safe operation of an information system of nonlinear canonical expansion of the random sequence <ref type="bibr">[15]</ref>, changing values of the parameter controlled:</p><formula xml:id="formula_584">1 () () 1 11 ( ) [ ( )] ( ), 1, . iN X i M X i V i i I            <label>(11)</label></formula><p>Elements of the expansion <ref type="bibr">(11)</ref> are determined by the following recursions:</p><formula xml:id="formula_585">        1 1 1 ( ) ( ) ( ) ( ) ( ) 1 1 1 [ ] , 1, ; N j j j j j j V X M X i V V I                               (12)           11 () 2 2 11 1 () 2 1 [{ [ ]} ] ( ){ } ( ){ } , 1, ; N j j j j j j D M X M X D DI                            <label>(13)</label></formula><p>()</p><formula xml:id="formula_586">1 1 1 ( ) ( ) ( ) ( ) 1 1 1 1 ( ) { [ ( ) ( )] [ ( )] [ ( )] () ( ) ( ) ( ) ( ) ( ) ( )}, 1, , 1, . h h h N j j j j j j h h j j i M X X i M X M X i D D i D i h i                                          <label>(14)</label></formula><p>In the canonical expansion (11) the random sequence {} X is represented in the range of points analyzed i , 1,</p><formula xml:id="formula_587">t i I  via 1 N  the arrays () { }, 1, 1 V N    of uncorrelated centered random coefficients. () , 1, 1, 1, . i V N i I      These coefficients contain information on the values ( ), 1, 1, 1, X i N i I     </formula><p>, and the coordinate functions</p><formula xml:id="formula_588">() ( ), , 1, 1, , 1, h i h N i I        </formula><p>describe probabilistic links of the order h   between the sections t  and , , 1, .  </p><formula xml:id="formula_589">) ( ), 1, 1, 1, X x N k         </formula><p>allows to move from the a priori random sequence <ref type="bibr">(11)</ref> to the a posteriori one:</p><formula xml:id="formula_590">1 () ( ) ( , 1) ( ) 1 11 ( ) (1, ) ( ), 1, . iN k k N x k X i m i V i i I               <label>(15)</label></formula><p>The expression ( , ) (1, ) [ ( ) / ( ), 1, ,</p><formula xml:id="formula_591">] kl x m i M X i x j j k N      <label>1, 1</label></formula><p>is the conditional expectation of a random sequence providing that values</p><formula xml:id="formula_592">( ), 1, 1, 1, x j N j k     </formula><p>are known and the process analyzed is fully specified by the discretized moment func-</p><formula xml:id="formula_593">tions [ ( )], [ ( ) ( )], , 1, 1, , 1, . h M X M X X i h N i I         </formula><p>The computing algorithm</p><formula xml:id="formula_594">( , ) 1 (1, ) [ ( ) / ( ), 1, , 1, 1] kl x m i M X i x j j k N      </formula><p>has two equivalent forms of notation <ref type="bibr">[16]</ref>:</p><formula xml:id="formula_595">() ( , ) (<label>, 1) ( , 1) (1) ( 1, 1) ( 1, 1)</label></formula><p>[ ( )], 0;</p><p>( , )</p><formula xml:id="formula_596">l l l l l x x x h N N x x h M X i m h i m h i x m l i l m h i x m i l                                  <label>( , ) ( ( ) ( , )) ( ), 1, ( , ) ( ( ) (1, )) ( ), 1 h</label></formula><p>or</p><formula xml:id="formula_598">1 (<label>( 1)</label></formula><p>) ( , 1) (( 1)( 1) ) 11 <ref type="bibr">(1, )</ref> [ ( )] ( ) (( 1)( 1) 1),</p><formula xml:id="formula_599">kN kN kN x jN j m i M X i x j F i N                <label>(17)</label></formula><p>where</p><formula xml:id="formula_600">( 1) ( 1) () ( ) ( ) ( ), -1; () ( ), = ; k F F i F                         <label>(18) 1 1 (mod</label></formula><formula xml:id="formula_601">( )) 1,[ /( 1)] 1 (mod ( )) 1,[ /( 1)] 1 ([ / ( 1)] 1), for<label>( 1);</label></formula><formula xml:id="formula_602">() ( ), if =( -1)( -1) 1. N N N N N k N i i N                         <label>(19)</label></formula><p>The simulation procedure of the a posteriori random sequence <ref type="bibr">(15)</ref> assumes that densities of random coefficients</p><formula xml:id="formula_603">() , 1, 1, 1, i V N i I   </formula><p>  are known. The simplest and the most effective solution to the problem of determining these one-dimensional densities is to use nonparametric parse type estimates <ref type="bibr">[17]</ref>. Together with this the estimate of the required density of distribution  0,5sup , , 2, .</p><formula xml:id="formula_604">N N N N i l i l i l i l l d v v v v l L      <label>(23)</label></formula><p>Thus, the offered calculation method of polynomial predictive control of fail-safe operation of information systems consists of the following stages:</p><p>─ construction on the basis of the known a priori information  <ref type="bibr">(1, )</ref> [ ( ) / ( ), 1, , Increasing the reliability of the estimate of the probability of fail-safe operation on the basis of the model (15) compared to <ref type="bibr">(7)</ref> is achieved by using nonlinear stochastic properties of the random sequence analyzed: there rises the accuracy of determination of conditional expectation and reliability of possible paths of a random sequence in the forecast region through the use in the process of simulation of an additional array of random coefficients () , k 1, , 2,</p><formula xml:id="formula_606">1 i V i I N      </formula><p>. The gain in accuracy can be estimated using the expression: </p><formula xml:id="formula_607">        1 2 1 1 2 1 ... , l l l l M X i p X i p X i p X i             1 , 1<label>, 1, 1,</label></formula><p>.</p><formula xml:id="formula_608">l jj j N p i i I       </formula><p>Decomposition of random sequence   X looks like <ref type="bibr">[18]</ref>, <ref type="bibr">[19]</ref>:  </p><formula xml:id="formula_609">            (1)<label>(1</label></formula><p>, , 1, ,</p><formula xml:id="formula_611">l l i i I   <label>(25)</label></formula><p>where</p><formula xml:id="formula_612">  , f , , if ; iN M NN          '( ) 0, if 1, 1 or 1, , if 1, 1, 1; l j j l l p v l j j l l               1 () '( ) 1 , 1, . l l j j N l l               () 1 () () 1 1 , if 1, ,<label>2, , , if , 2,</label></formula><p>.</p><formula xml:id="formula_613">n n j n pn p v l p n                                <label>(28)</label></formula><formula xml:id="formula_614">() 1 () 1 ( ) ( ) 1 1 , if 1, ,<label>2, ; , if , 2,</label></formula><p>.</p><formula xml:id="formula_615">n i i j n i j nn i jj j i i n N n i i n                                <label>(29)</label></formula><p>The values </p><p>;         </p><formula xml:id="formula_617">i i k k j j m k j m n i k N n j j k n j k n                                  * * * * 1 * 11 1 2. , 1<label>, 1; 1; , 1, 1; , 1, , if 1, 1, ; 1; 1; 1, 1;</label></formula><formula xml:id="formula_618">k k j i j m i k k j j m k n j j k n N n i i n i n j k n                                              * * * *</formula><formula xml:id="formula_619">i M X X D X i b X i M X X M X i b X i M X X M X i b X i D                                                                            1 1 1 1 1 1 (1) (1)<label>(1)</label></formula><formula xml:id="formula_620">                                            '<label>( 1)</label></formula><formula xml:id="formula_621">i                             <label>(35)</label></formula><p>Technology of predictive control of fail-safe operation on the model ( <ref type="formula" target="#formula_621">35</ref>) is the same as using the expression (15).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>Thus, there we obtained an calculation method for the estimation of the probability of fail-safe operation of information systems in the future instants of time. The technology is based on the model of the canonical expansion of the a posteriori random sequence of changes of the parameter controlled. Estimation of the probability of failsafe operation of a information system based on the results of the numerical experiments is determined as a relative frequency of an event characterized by belonging of the realization to the allowable region on the forecast interval. The calculation method offered does not impose any significant constraints on the class of random sequences analyzed (linearity, stationarity, Markov behaviour, monotoneness, etc.). The only constraint is the finiteness of variance that is usually performed for real random processes. In contrast to the known solutions <ref type="bibr">[12]</ref>, <ref type="bibr">[13]</ref> the suggested estimation procedure for fail-safe operation of information systems allows for nonlinear stochastic properties of the random sequence analyzed, which improves the accuracy of the predictive control procedure.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Nowadays, any kind of human activity requires an infrastructure to support efficiently the corresponding process of decision making. A modern answer to such a requirement is an information system that is an integrated set of components to collect, store and process data, to deliver information, knowledge, and digital products. Today the development trend of Information and Communication Technology is a wide use of networking technologies. Therefore a typical modern information system is a distributed data processing system with a distributed datastore. Now it is generally accepted that a distributed datastore should guarantee the following properties: consistency (C), availability (A), and partition tolerance (P). They are discussed in papers <ref type="bibr">[5]</ref> and <ref type="bibr">[1]</ref>, but this discussion is too implicit. These works had been critically reviewed in <ref type="bibr">[2]</ref>. This criticism is based on the fact that nobody had so far given explicit and rigorous definitions of these guarantees. Taking into account this remark we accept the following understanding as the origin point of our research: consistency means that all replicas of any data unit contain the same data at the same time point; availability means that a datastore eventually returns a response (either a success report or a failure notification) on each request; and finally, partition tolerance characterizes the ability of a datastore to continue to operate despite arbitrary message losses or failure of part of the system (sometimes to refer to this ability the more general concept faulttolerance is used).</p><p>In the ideal case a distributed datastore should provide these guarantees. In contrast to relational datastores like SQL databases that satisfy ACID properties and ensure the system safety, non-relational datastores do not provide complete safety for the information system. As known Brewer's conjecture <ref type="bibr">[5]</ref>, being called sometimes CAP theorem, says that it is impossible to maintain simultaneously all three CAP-guarantees in asynchronous or partially synchronous network and maintain safety in this way. Taking into account that synchronization of a distributed datastore decreases essentially system throughput we study consequences of Brewer's conjecture for asynchronous distributed datastores.</p><p>A lot of research had been wasted at the consideration of CAP-guarantees. As it is impossible to implement all three of them, we suggest a new approach: to characterise stochastically that each of these requirements is fulfilled or not (see Sec. 5) and do the best for a consumer -provide him with mechanisms used in different datastores for restoring the validity of the CAP-guarantees.</p><p>This supposition leads us to the need to develop a simulation framework for supporting numerical experiments to study these mechanisms.</p><p>As we said above, the principal objective for an information system design process is to provide a consumer with qualitative information just in time. Therefore we should understand how information quality (IQ) and the CAP-guarantees are connected. In order to clarify this interconnection we give some model of information quality and determine its indicators that depend on providing the CAP-guarantees in Sec. 2.</p><p>In Sec. 4 we present the conceptual model of a distributed datastore proposed as a background for the framework that should be developed. In Sec. 3 we discuss briefly the models for maintaining the consistency property in distributed systems. And finally, in Sec. 5 we give rigorous definitions for stochastic criteria of the CAP-guarantees providing, which is based on the presented conceptual model.</p><p>Further to avoid cumbersome formulations we shall say "CAP-properties" instead of "ensuring CAP-guarantees".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Interrelations between IQ model and CAP-properties</head><p>The problem to identify Information Quality (IQ) model was widely described and discussed in <ref type="bibr">[3]</ref>, <ref type="bibr">[8]</ref>, <ref type="bibr">[4]</ref>. On our opinion, this discussion had been compactly summarized in <ref type="bibr">[7]</ref>. The information represented in these sources correlates with -Timeliness -Believability -Security -Accessibility -Ease-of-Manipulation -Reputation -Value Added on the accessibility, because if the consistent information is received, it does not necessarily mean that it was retrieved quickly and easily. Now we tell about the availability interrelations. Firstly, reasoning from the availability definition (see Sec. 1) the accessibility directly depends on the availability measurement. Secondly, the free-of-error indicator definition involves reliable data that is delivered just-in-time, so it also has a direct dependence on the availability. Evidently, it does not impact on the consistent representation and concise representation indicators; also it is not tightly connected with the timeliness indicator. Further in this paper we shall determine availability more strictly: we shall denote the availability as the meantime between a request and the response on it. And following from that definition, with improving availability the speed of retrieving data is increased, but it does not mean that these data are up-to-date.</p><p>The last group of interrelations is about the partition tolerance. It has an impact on the consistent representation, free-of-error, accessibility and timeliness quality indicators. The thing is that the perfect partition tolerance fulfillment ensures the successful response from a distributed datastore. In its turn, the successful response must always contain consistent, correct, reliable and up-todate information. Otherwise the system answer is counted as an error message. Therefore greater probability to get the successful response gives higher values of indicators mentioned above.</p><p>Evidently, it does not have any influence on the concise representation in contrast to the consistency.</p><p>We summarize this connection in Table <ref type="table" target="#tab_0">2</ref>.</p><p>The endorsement of some interrelations and the discovering their behaviour can be obtained by the further experiments. The rest of indicators of IQ model depend on the quality of the information system that provide information dataunits and we are not interested in them.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Brief overview of Models for Distributed Systems</head><p>The distributed datastores are various, therefore it is necessary to have tools for their analysis. The simplest classification is related to the ratio of read and write operations quantity. This classification should be reasonable from the point of view of three pillars that maintain all distributed systems: consistency, availability, partition tolerance. Hence the list will be as follows:</p><p>-Systems with domination of read operations (decision support or retrieval systems); -Systems with domination of write operations (online transaction processing systems); -Systems without explicit domination of read or write operations (business systems).</p><p>This classification is based on the quantity of read and write operations. It is important to know for us, because it may require different mechanisms for each type of system. In this section we tell about the way to verify consistency and maintain the probability of its fulfillment following <ref type="bibr">[10,</ref><ref type="bibr">Chapter 7</ref>]. An appropriate way to increase this probability is replication -making copies of new data units at each node and their updating.</p><p>Traditionally, consistency is discussed in the context of read and write operations in distributed systems. Following the book mentioned above there are two consistency models for different distributed systems: data-centric and clientcentric ones. They are applied for different types of distributed systems. The first one, data-centric consistency model is a model for wide usage: online transaction and business systems mentioned above. It involves many types of consistency, such as continuous, sequential, causal and combined one, called grouping operations. The protocols for these consistency types are more complex than protocols in the second model. That is because data-centric model should be usable for systems where a lot of write operations may occur and spoil all the data units. To present the behaviour in clear and understandable way, we separate more complex method of node handle request from the general behavioural view and show it in Fig. <ref type="figure" target="#fig_2">3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Distributed Datastores: Basic Prerequisites and Metrics</head><p>As said above the leading idea of this paper is to suggest an approach for estimating probabilistic metrics of CAP-properties. It is generally accepted (see <ref type="bibr">[9]</ref>) that a distributed datastore is a computer network where information is stored on more than one node, often in a replicated fashion.</p><p>Moreover, it is important to mention that a researcher has the possibility to observe datastore events in the sequence according to physical time while each  datastore node considers the sequence of events with respect to its local time only. Also we assume that datastores at study meet the eventual consistency requirement <ref type="bibr">[10]</ref>. It means that after an isolated read request for any data unit all its replicas eventually have the same value.</p><p>Let us represent a short case study in order to understand the motivation to apply the probabilistic approach in asynchronous distributed datastore.</p><p>Let us suppose that there is the unreliable node in a distributed system that fails and recovers over over some time. At the initialization moment when nodes are established each node has the probabilistic distribution of recovering time and time of failure. In a distributed system links that bind nodes may also fail. To be able to calculate the probability of partition tolerance fulfillment we need to take into account these distributions in our research.</p><p>For now we are ready to describe how we apply the probabilistic approach in our studying by giving the rigorous definitions of CAP-properties. To do this, we describe a distributed datastore using the following mathematical model.</p><p>Our model is a tuple (N, L, ∂, D, r), where N is a finite set, whose elements correspond to nodes of a distributed datastore; L is a finite set, whose elements correspond to links of a distributed datastore;</p><formula xml:id="formula_622">∂ : L → 2 N</formula><p>is a mapping that associates each link with two nodes that it connects; D is a finite set, whose elements correspond to stored data units; r : D → 2 N is a mapping that associates each data unit d with a subset of nodes that store its replica. Thus, firstly, let us introduce the consistency metric. Taking into account that the consistency is the property when for each data unit its replicas have the same value, we shall consider the probability that all data units at distributed datastore are consistent at a certain time moment. Therefore we define the consistency metric in the following manner.</p><p>Definition 1 (Consistency metric). Let σ t ∈ {0, 1} be the random variable that represents one of two events at time point t ≥ 0: σ t = 0 corresponds to the event "there exists a data unit that is not consistent at the time point t" and σ t = 1 corresponds to the event "all data units are consistent at the time point t". Then the consistency metric C(t) at time point t is defined by the formula C(t) = Pr(σ t = 1) .</p><p>(</p><formula xml:id="formula_623">)<label>1</label></formula><p>The second metric estimates the availability guarantee. We propose to measure the extent of availability as meantime between two events: the request has been received by the datastore and the corresponding response 1 has been sent by the datastore. More, formally: Definition 2. Let τ t be the time interval between a request receiving at the time point t and the corresponding response. Then the mean response time is defined by the formula</p><formula xml:id="formula_624">T (t) = E[ τ t ] .<label>(2)</label></formula><p>Finally, to estimate the third guarantee, called the partition tolerance, we consider the ability of a datastore to survive network partitions, so that the performance of the datastore does not suffer. This definition is more complicated. Let us consider some time point t . At this instant some nodes are alive, but other ones failed. We denote by N a t the set of alive nodes (N a t ⊂ N ). Similarly, we denote by L a t the set of alive links that connect alive nodes. Definition 3. We shall say that a data unit d ∈ D is reachable from a node n ∈ N a t at time point t if there exists a path in the graph (N a t , L a t ) from n to some n ′ ∈ N a t r(d) . Now we can introduce the metric for the partition tolerance using the previous definition.</p><p>Definition 4. Let ζ t ∈ {0, 1} be the random variable that represents one of two events at time point t ≥ 0:</p><p>ζ t = 0 corresponds to the event "there exists a data unit that is not reachable from some alive node at time point t" and ζ t = 1 corresponds to the event "all data units are reachable from any alive node at time point t". Then the partition tolerance metric P (t) at time point t is defined by the formula P (t) = Pr(ζ t = 1) .</p><p>(3)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>In this paper we have started studying the problem of the quality for distributed datastores. We have proposed the approach to measure the quality properties of a datastore. Therefore we have described CAP-properties and have built the metric system for CAP-properties estimation. We have described the indicators of the information quality and have found interrelations between the information quality and distributed datastores' properties basing on <ref type="bibr">[7]</ref>.</p><p>In order to have a view of the datastore and be able to work with it we have built its structural and behavioural model and based on this knowledge, we specified probabilistic characteristics for CAP-properties measurement.</p><p>Thus, the following steps for the problem set in the paper have been done:</p><p>-Formulation of understanding the idea: what are CAP-guarantees for distributed datastores indeed; -Description of the information quality indicators; -Investigating the connection between CAP-guarantees and information quality model; -Building the structural and behavioural models for a distributed datastore; -Forming "CAP-metrics" as the main idea for studying the quality of distributed datastores.</p><p>These steps give us possibilities to study CAP-properties fulfillment using the following background: the fault-tolerance mechanisms for asynchronous systems, concurrent programming, algorithms of data propagation in distributed systems, probably, some issues of internet strategy, Queueing Theory, Mathematical Statistics. Fault-tolerance protocols can be used to invent the algorithms for maintaining the partition tolerance guarantee. Obviously, a researcher should have the good background in Graph Theory, Probability Theory and Concurrent Programming in asynchronous distributed systems. Also, as we need to represent experimental results, it is necessary to imitate the model of a distributed datastore.</p><p>Summing up now we might set following problems:</p><p>-To simulate the model of a distributed datastore; -To study different mechanisms to estimate the degree of ensuring each guarantee applying specified metrics; -To analyse discovered mechanisms and their composition; -To integrate these mechanisms with simulated asynchronous distributed datastore; -To estimate theoretically the total time complexity for all provided mechanisms; -To carry out the experimental estimation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Reliability is a principal attribute for the operation of any modern technological system. A principal issue in reliability analysis is the uncertainty in the failure occurrences and consequences. With respect to the complexity of the system and the modeling of their behavior, a distinctive feature of the system reliability analysis is a comprehensive and integrated manner <ref type="bibr">[1]</ref>. Focusing on safety, reliability engineering methods aim at the quantification of the probability of failure of the system. In paper <ref type="bibr">[1]</ref> presents detail analysis of reliability engineering state and define principal problems in this scientific discipline. According to <ref type="bibr">[1]</ref> one direction of reliability engineering is estimation of a complex system based on Multi-State System (MSS) reliability analysis methods.</p><p>MSS is mathematical model used in reliability analysis for system with some (more that two) levels of performance <ref type="bibr">[1,</ref><ref type="bibr">2]</ref>. This mathematical model has been exploited in reliability engineering since 1975 <ref type="bibr">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr">[5]</ref>. Principal advantage of this mathematical model is detail description of investigated object. MSS permits to define and investigate several performance levels: from perfect function to fault. The typical Binary-State System allows evaluating only two system states as functioning and failure. Other states, for example, as partly functioning or functioning with restrictions are not analyzed in case of Binary-State System use. But extra states and performance levels in the mathematical model dramatically increase size of this model and computational complexity of its analysis. Therefore the MSS has not been used intensively in reliability analysis. There is other aspect to restrict the application of MSS. It is absent of effective methods for MSS analysis.</p><p>According to analysis in paper <ref type="bibr">[2]</ref> there are four groups of methods for MSS analysis that are based on different mathematical approach: an extension of Boolean models to the multi-valued case, the stochastic process as Markov process, the universal generation function methods and the Monte-Carlo simulation techniques. For example, Markov processes are used to analyze the system state transition process <ref type="bibr">[6]</ref>. The universal generation function application is useful in optimization problem <ref type="bibr">[7]</ref>. The Monte-Carlo simulation as a rule is used for reliability assessment of system with large number of components <ref type="bibr">[8]</ref>. The methods based on extension of Boolean models to the multi-valued case were developed historically the first <ref type="bibr">[9,</ref><ref type="bibr">10]</ref>. According to these methods MSS is represented and defined by the structure function. This function is defined the conformance of the system performance level and components states. As a rule for the structure function definition and representation is used Boolean functions <ref type="bibr">[10,</ref><ref type="bibr">11]</ref>. Only in separated publications the structure function with some values has been considered <ref type="bibr">[9,</ref><ref type="bibr">12]</ref>. In papers <ref type="bibr">[13,</ref><ref type="bibr">14]</ref> the correlation of Miltiple-Valued Logic (MVL) function and structure function was analyzed. The interpretation of the structure function as the MVL function allowed using the mathematical approach of MVL in the analysis of the MSS structure function. In paper <ref type="bibr">[14]</ref> the application of Logical Differential Calculus for MSS reliability analysis has been proposed. The Logic Differential Calculus is used for analysis of dynamic properties of MVL function and this approach can be applied for analysis of dynamic behaviour of MSS that is determined by the structure function.</p><p>In the paper <ref type="bibr">[14]</ref> the basic conception of application of Direct Partial Logic Derivatives (it is part of Logical Differential Calculus) in MSS reliability analysis has been considered. The proposed method permits to investigate the influence of one system component state change to the system performance level. The new indices for quantitative analysis of such influence have been defined. The application of these derivatives for calculation of importance measures (Structural Importance, Birnbaum Importance and Criticality Importance) has been investigated in paper <ref type="bibr">[15,</ref><ref type="bibr">16]</ref>. The algorithm for calculation of Fussell-Vesely Importance based on Direct Partial Logic Derivatives has been proposed in <ref type="bibr">[17]</ref>.</p><p>In this paper new application of Direct Partial Logic Derivatives for MSS reliability analysis based on the structure function is considered. The new algorithm for calculation of boundary states of MSS is proposed. This algorithm is based on representation of MSS by the structure function (section 2). This section includes the conception of boundary states of MSS for every performance level. The special structures of MSS (parallel and series) and their structure function are considered in the section 2 too. These types of system are typically employed in reliability analysis <ref type="bibr">[18]</ref>. The short description of conceptions of Direct Partial Logic Derivatives with respect to one variable and with respect to variable vector are presented in the section For example, consider the simple service system (Fig. <ref type="figure" target="#fig_0">1</ref>) in a region from paper <ref type="bibr">[17]</ref>. This system consists of three components (n = 3)service point 1 (x1), service point 2 (x2) and infrastructure (x3). This system has four performance levels: 0nonoperational (no customer is satisfied), 1partially operational (some customers are satisfied), 2partially non-operational (some customers are not satisfied), 3fully   </p><formula xml:id="formula_625">0 0 0 0 0 1 0 1 1 2 0 2     0 3     1 0 0 1 1 2 1 1 0 2 3 3 1 2     1 3     2 0     2 1     2 2     2 3     3 0     3 1     3 2     3 3    </formula><p>operational (all customers are satisfied). Next, we assume that the service points are only functional (state 1) or dysfunctional (state 0). The infrastructure can be modelled by 4 quality levels, i.e. from 0 (the quality of the infrastructure is poor) to 3 (the quality is perfect). The structure function of this system according to ( <ref type="formula" target="#formula_43">2</ref>) is defined in Table <ref type="table" target="#tab_1">1</ref> (m1 = m2 = 2, m3 = 4 and M = 4). The structure function of this system as an incompletely specified MVL function is shown in Table <ref type="table" target="#tab_0">2</ref> (mmax = 4).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Series and Parallel MSS</head><p>There are some typical structures in the reliability engineering: series, parallel, kout-of-n and bridge. Every system of these structures has single valued definition for Binary-State System (Fig. <ref type="figure" target="#fig_1">2</ref>). The extension of mathematical definition of the structure functions of these system for the MSS has some variants. For example, in paper <ref type="bibr">[24]</ref> the structure functions of series, parallel and k-out-of-n MSS are defined based on the interpretation of mathematical equations of these system in terms of MVL. Structure According to <ref type="bibr">[24]</ref> structure functions parallel, series and k-out-of-n MSS are declared -for parallel MSS as:</p><formula xml:id="formula_626">(x) = i n i x 1   = MAX(x1, x2, …, xn),<label>(4)</label></formula><p>-for series MSS as:</p><formula xml:id="formula_627">(x) = i n i x 1   = MIN(x1, x2, …, xn),<label>(5)</label></formula><p>-for k-out-of-n MSS as:</p><formula xml:id="formula_628">(x) =</formula><p>)) ,..., , ( MIN ),..., ,..., , ( MIN ( MAX ) (</p><formula xml:id="formula_629">2 1 2 1 1 k k z i i i w i i i i k z x x x x x x x     , (<label>6</label></formula><p>)</p><formula xml:id="formula_630">) )! ( ! /( ! k n k n w    .</formula><p>In paper <ref type="bibr">[27]</ref> other declaration of these MSS are presented in which a system performance level depends on the number of functioning components. In Table <ref type="table" target="#tab_21">3</ref> some structure functions of parallel MSS of two components (n = 2) with three states (m1 = m2 =3) and three performance level (M = 3) are shown. All these structure function in case of Binary-State System are parallel system. The series MSS can be defined similarly. Therefore the typical structures of MSS have no single valued mathematical definition, because there are the set of structure functions of MSS that can be agreed with one Binary-State System. The structure function allows defining MSS explicitly. Therefore the structure function is preferable form of MSS mathematical representation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Boundary States of MSS</head><p>The conception of boundary states has been proposed for Binary-State System firstly. The boundary state is defined as state for which the failure of one system components or some components causes the fault of a system <ref type="bibr">[20]</ref>. The boundary state of MSS must be defined for every system performance level <ref type="bibr">[2]</ref>. In papers <ref type="bibr">[21,</ref><ref type="bibr">22]</ref> the boundary states of MSS are interpreted as minimal cut/path sets. Authors of <ref type="bibr">[23]</ref> introduced conception of Lower (Upper) Boundary Points of MSS for system performance level j (j =0, …, M-1). The boundary states for system performance level j and component i (i = 1, …, n) (named as exact boundary states) has been proposed and considered in papers <ref type="bibr">[24,</ref><ref type="bibr">25]</ref>. In paper <ref type="bibr">[26]</ref> and <ref type="bibr">[17]</ref> the correlations of these boundary states with Lower (Upper) Boundary Points and minimal cut/path sets are shown accordingly.</p><p>The exact boundary states have been considered in paper <ref type="bibr">[25]</ref>. These states are system states for which the change of the i-th component state from s to s ~ causes the system performance level change from j to j ~ (s, s ~ {0,…, mi -1}, s  s ~ and j, j ~ {0,…, M -1}, j  j ~). The exact boundary state is defined by the exact boundary vector unambiguously. Illustrate the correlation of a system exact boundary state and an exact boundary vector by the example for the service system in Fig. <ref type="figure" target="#fig_0">1</ref>. Determine the exact boundary states of this service system for which the failure of the first component causes the system failure as the change of the system performance level from state "1" to "0". According to Table <ref type="table" target="#tab_1">1</ref>, there are two situations that agree to this condition. They are possible for the failure of the second component and the third component state "1"or "2". These exact boundary states can be presented as vector states: x = (x1, x2, x3) = (1  0,0,1) and x = (x1, x2, x3) = (1  0,0,2). Note that the boundary state x = (x1, x2, x3) = (1  0,0,3) does not satisfy the condition because the system performance level changes from "1" to "2" depending on the failure of the first component in this case.</p><p>One of possible mathematical approaches for the definition of the exact boundary states in MVL is Logical Differential Calculus, in particular the Direct Partial Logical Derivatives. Consider the application of this mathematical approach for analysis of structure function of MSS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Direct Partial Logical Derivatives</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Direct Partial Logical Derivative with respect to one variable</head><p>The mathematical tool of Direct Partial Logic Derivatives has been proposed in <ref type="bibr">[25]</ref> for calculation of an exact boundary states of a MSS. The Direct Partial Logic Derivative with respect to variable xi for the structure function <ref type="bibr">(1)</ref> permits to analyze the system performance level change from j to j ~ when the i-th component state changes from s to s ~:  For example, investigate the influence of the first component failure to the fault of the simple service system in Fig. <ref type="figure" target="#fig_0">1</ref>. The Direct Partial Logic Derivative (10)/x1(10) allows to calculate the system state for which this failure causes the system break down. The calculation of this derivative is shown in Fig. <ref type="figure" target="#fig_2">3</ref>  According to definition of the Direct Partial Logic Derivative (7) for these system state the failure of the first system component causes the system failure too. Therefore the service system fails after the failure of the first service point if the second service point isn't functioning and the functioning of the infrastructure conforms to state one or two. The system states x = (x1, x2, x3) = (1  0,0,1) and x = (x1, x2, x3) = (1  0,0,2) are exact boundary states for the first system component failure and the system performance level 1. component and their influence to MSS performance level can be investigated based on the Direct Partial Logic Derivative <ref type="bibr">(7)</ref>. But this derivative permits to investigate the influence of one component only. The Direct Partial Logic Derivative with respect of variable vector investigate the system state changes depending on changes of states of some system components. </p><formula xml:id="formula_631">         </formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Direct Partial Logical Derivative with respect to variable vector</head><formula xml:id="formula_632">   .<label>(8)</label></formula><p>In ( <ref type="formula" target="#formula_8">8</ref>) a change of value of iq-th variable can be interpreted as components states vector or components efficiencies vector. For example, consider the simple service system (Fig. <ref type="figure" target="#fig_0">1</ref>) failure depending on fault of the first service point and reduction of functioning of infrastructure from state 2 to 1. This system behavior can be presented by the Direct Partial Logic Derivative (10)/x1(10) x3(21). The calculation of this derivative is shown in Fig. <ref type="figure" target="#fig_3">4</ref> by the flow graph.</p><p>The derivative (10)/x1(10) x3(21) has two values and one of them is non-zero value that agrees with state vector: x = (x1, x2, x3) = (1  0, 0, 2  1). This state vector define of the service system failure depending on the failure of the first service point and deterioration of the infrastructure functioning from state 2 to state 1. Therefore the system state x = (x1, x2, x3) = (1  0, 0, 2  1) can be interpreted as exact boundary state for the first and the third system components of the system performance level 1.</p><p>The Direct Partial Logic Derivative with respect to variable vector (8) allows investigating boundary states of a MSS for which simultaneous changes of p components states from q i s to q i s ~(q = 1, …, p and p &lt; n) causes the system performance level change from j to j ~. Therefore, the Direct Partial Logic Derivative with respect to variable vector allows calculating exact boundary states for MSS performance level j of the i-th system component. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">The Calculation and Estimation of Exact Boundary States of MSS based on Direct Partial Logic Derivatives</head><p>The exact boundary state of MSS are defined based on the condition that fixed system performance level change depending on the appointed change of one system component state or specified changes of some components states. The Direct Partial Logic Derivative with respect to one variable <ref type="bibr">(7)</ref> and the Direct Partial Logic Derivative with respect to variable vector (8) can be used to investigate change of the system performance level from j to j ~ that are caused by specified changes of one or some system components states. These derivatives have non-zero values of the structure function for system states that satisfy for specified condition: the system performance level change from j to j ~ depending on specified changes of one or some system components states. Therefor the exact boundary states can be defined as system states that conform to non-zero values of derivatives <ref type="bibr">(7)</ref> and <ref type="bibr">(8)</ref>.</p><p>The exact boundary state for MSS performance level j depending on the i-th Consider estimation of the system boundary states for coherent MSS. There are next assumptions for structure function of coherent MSS <ref type="bibr">[2]</ref>: (a) the structure function is monotone and (s)=s (s{0, …, m-1}) and (b) all components are sindependent and are relevant to the system.</p><p>Every system component is characterized by the probabilities of its state:</p><p>pi,s = Pr{xi = s}, s = 0, …, mi -1. .</p><p>The probability of every boundary state (a1, …, si, …, an) for MSS performance level j depending on the i-th system component change from s to s ~ is calculated based on the probabilities of components states:</p><formula xml:id="formula_634">n i i i n i a n a i s i a i a j j s s i a s a p p p p p x p , ,<label>1 , , 1 , 1 )</label></formula><p>... ... (</p><formula xml:id="formula_635">1 1 1 1                     . (<label>10</label></formula><formula xml:id="formula_636">)</formula><p>The probability of boundary state for MSS performance level j depending on the ith system component states changes is calculated as: </p><p>The probability of MSS performance level change depending on all change of the i-th system component state is generalization of previous equation:</p><formula xml:id="formula_638">               s s s s i i x p x p , ~.<label>(14)</label></formula><p>The similar measures to ( <ref type="formula" target="#formula_11">10</ref>) -( <ref type="formula" target="#formula_478">14</ref>  <ref type="formula" target="#formula_11">10</ref>) -( <ref type="formula" target="#formula_478">14</ref>) for the simple service system in Fig. <ref type="figure" target="#fig_0">1</ref>. The components states probabilities for this system are defined in Table <ref type="table" target="#tab_9">4</ref>. Consider this system failure depending to the first components. The Direct Partial Logic Derivative (10)/x1(10) represents this system behavior (Fig. <ref type="figure" target="#fig_2">3</ref>). This derivative has two non-zero values that conform to two  The probabilities of boundary states for the system failure depending the first component break down</p><formula xml:id="formula_639">        0 1 0 1 1</formula><p>x are calculate according to <ref type="bibr">(10)</ref> and are: . Therefore the probability the service system fault caused by the failure of the infrastructure is 0.564. Other probabilities of this system failure or deterioration of the performance level are calculated according to (10) -( <ref type="formula" target="#formula_478">14</ref>) similar.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>The mathematical background for application of mathematical methods of MVL for reliability analysis of MSS is considered in this paper. The correlation of the structure function and MVL function are shown and proved by means of the conception of incompletely specified MVL function. This background allows using Direct Partial Logic Derivatives for analysis of MSS structure function.</p><p>Mathematical approach of Direct Partial Logic Derivatives in MVL is used for investigation of dynamic properties of MVL function. The analysis of boundary values of MVL function is possible based on these derivatives too. In this paper the investigation of boundary values of the structure function of MSS and definition of MSS exact boundary states based on these valued are considered. Conception of exact boundary states is defined as boundary states for fixed MSS performance level change depending on change of the appointed change components state. This conception is extended for exact boundary states depending on changes of some components states.</p><p>New measures for estimation of MSS boundary states estimation are introduced and considered in the paper. The analysis of MSS based on the exact boundary states has not limits for the numbers of components (n) and states for every component (mi), and system performance levels (M) according to the theoretical background. But in real-world applications these numbers have important influence to the structure function dimension (number of structure function elements) that is calculated as:</p><formula xml:id="formula_640">Nstructure function dimension = m1  m1  …  mn</formula><p>As a rule the number of system performance levels (M) and number of component states (mi) are defined between two and seven. The increase of the structure function dimension depending on the number of components (n) is illustrate in Fig. <ref type="figure" target="#fig_4">5</ref>. According to the investigation in papers <ref type="bibr">[15 -17]</ref> the Direct Partial Logical Derivatives is applicable for systems which have dimension less than ten millions elements. So the proposed method can be used for the MSS at least ten components. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Modern technical systems belong to the class of complex systems, which have the following properties <ref type="bibr">[1,</ref><ref type="bibr">2]</ref>:</p><p> presence of large number of elements which interact according to the given fuctional algorithm, that causes the great dimention of reliability mathematical model (from tens to hundreds of thousands of differential equations);  elements of the system can be characterized by several types of failures (such as breakage and short circuit);  in the case of multifunctional systems the situations when not all functions are fully performed or are performed simultaneously or are performed with the deterioration of relevant characteristics can happen. Therefore the definition of "system failure" is complicated;  the failure of complex system for critical application can affect the human casualties or material damage, so these systems must be fault-tolerant (the ability to function normally in conditions of failures of individual elements) and safety (resistance to accidents). These properties are achieved by introduction of various kinds of redundancy (structural, algorithmic, time, etc.), that leads to complexity of structure and internal behavior algorithm of the system as a result of the introduction of control functions, fault isolation and function recovery. Thus, the designers of complex technical systems for critical application (CTSCA) must provide the high level of reliability and safety of the project, and thus they meet a number of contradictions, namely: contradiction between the complexity of the system and its reliability (more complex system has lower reliability), the contradiction between reliability and safety (to increase the level of safety it is necessary to induce additional subsystem of security, locking, emergency stop, etc., that reduces reliability). Increasing of reliability through the use of fault-tolerant configuration does not increase the level of safety. At the same time the applying of appropriate maintenance strategy increases both reliability and safety. At the design stage, these contradictions are solved by multivariate mathematical modeling of CTSCA, comparative analysis of alternatives and selection of the best one. Note that the system reliability analysis involves the study of the process of transition from state to state in the state space as a result of failure or restoration of certain elements of the system. In the general approach for forming reliability models these models are formalized and describe the interaction of elements of the system while its performing from the reliability position. These models reflect the degree of each element influence on the reliability in the whole. The study of safety includes, in addition, the analysis of the transition of system failures due to accident and determines the characteristics of this process.</p><p>Due to complexity of modern technical systems the multivariate analysis without automation of model building and estimation of reliability and safety indexes on its basis are not available in many cases. So often, especially for safety estimation, it is replaced by building one variant of the model followed by the combination of obtained results with expert evaluation of safety and recommendations to bring them up to acceptable values.</p><p>Nowadays reliability behavior modeling of CTSCA and its safety modeling are carried out independently of each other, using different types of models, which in the case of reliability take into account some properties of the system, but in the case of safetycompletely different, although in reality these properties are interrelated and can't be separated. This approach is explained by the reliability models complexity as well as safety models and respectively by huge time costs for their building and by significant computational costs for their analysis with taking into account only the important nuances of CTSCA behavior. The dimension of reliability models of modern systems can reach hundreds and thousands equations. The safety model is, unlike the reliability model, complex logical function that contains hundreds and thousands arguments. Experience shows that the "manual" building of reliability models of fault-tolerant systems even with small number of elements <ref type="bibr">(10)</ref> without software usage requires timeconsuming procedure of dozen hours. If you change the parameters of the state graph you need to rebuild the new one and the probability of making errors in the model is very high when the chances of detection them is very low, also the time of restructuring the state graph is comparable with the time of construction its first version. Manual building of safety models as fault tree and the risk indexes estimation on its basis the features of system behavior that allows us to obtain standardized and nonstandardized reliability indexes, which are required by developer at design stage. However, for the analysis of safety and risk, in particular, this mathematical tool is not used in practice, although there are attempts to use it for building dynamic fault trees <ref type="bibr">[10]</ref>. Practical use of state space method <ref type="bibr">[11]</ref> is limited at the design stage, due to cumbersome models, the phase space of which is equal to 103 .. 104 equations, and for multivariate analysis, in most cases, it is replaced by simplified evaluation using standard models.</p><p>In work <ref type="bibr">[2]</ref> the method of automated generation of state space for behavior analysis of CTSCA basing on formalized description of the designed object in the form of structural-automatic model is described. It allows us to automate the process of reliability models building and to significantly reduce the time costs of multivariate analysis.</p><p>Structural-automatic model (SAM) consists of three sets of data <ref type="bibr">[2]</ref>. The first set is state vector (SV), which describes all the formalized list of states using variables -SV components. The SV components are variables which describe the state of the system elements. State vector may contain additional components which are used to track the status of additional features, such as counter of current number of repairs of each item; counter of all repairs; counter of total number of failed items and so on.</p><p>The second set is constants -set of formal parameters which characterize the structure of the system and its properties, namely the number of parts on the system configuration, the number of reserve elements, their failure rate and intensity of renewals, limited number of updates and more.</p><p>The third set is tree of modification rules of state vector components (TMRSVC), which is given in tabular form and reflects the consequences which come after the failure or recovery of certain elements under certain conditions. The components of TMRSVC are the events, which can occur with elements (failure or recovery of element, reserve connection etc.), the set of logical conditions that defines combinations of values of state vector components, which take place for this event, and the modification rules of states vector components (MRSV). Each condition corresponds to the formula for calculating the intensity transition (FCIT). The event result is the change of SV component and transition from one state of system to another in accordance with the rules of transition. If certain elements inherent in more than one type of failures (such as breakage and short circuit), the probability of which is known, in such cases, use the set of formulas for calculate the probability of alternative transitions (FCPAT), for each of which the certain rule from MRSV is used.</p><p>Time-costs for build the SAM by experienced developer are 1-30 hours, depending on the complexity of the system. These costs justifies itself in multivariate analysis of fault-tolerant systems, because the next correction of the model, even with significant changes in the structure of the system takes time from tens of minutes to several hours. This approach is implemented in ASNA software <ref type="bibr">[2,</ref><ref type="bibr">11]</ref>. Input data about the researched object for software module ASNA should be submitted in the form of SAM, which is formalized description of the structure and reliability behavior of system (the rules of transition from one state to another during the failure and recovery of elements). Basing on SAM software module ASNA generates the list of all possible states of the system, the table of transitions from one state to another, which is transformed into the matrix of intensities of transitions when entering numerical values of intensities of failures and recovery of the system. Therefore, basing on the matrix of intensities ASNA module automatically forms the system of differential Chapman-Kolmogorov equations and solves it by Runge-Kutta-Merson method. As a result the user gets the time dependences of probabilities of system being in each of the possible states. Basing on this information, the user can define standardized reliability indexes of system (availability function, probability of failure, failure flow parameter, MTTF, etc.), and arbitrary parameters that may be needed for the "thin" study of the system (probability of downtime, probability of having at least N employable elements when using a certain number of renewals, etc.).</p><p>This approach focuses on estimation reliability indexes for reliability design and efficiency indexes for functional design. To use this approach to the safety indexes estimation the improvement both the graph states and transitions (to display emergency situations) and description of the state vector and principles of SAM building is needed. In particular, in work <ref type="bibr">[12]</ref> it is proposed to combine the approach outlined in the monograph <ref type="bibr">[1]</ref> with reliability block diagram GUI, allowing us to integrate into SAM designed method of RBD visualization and determine system operation conditions. Developed interface allows entering data not only for method of RBD visualization, but also for reliability model of the whole system. However, this approach has several limitations considering maintenance strategies and tools for monitoring and diagnostics. In addition, this approach focuses exclusively on building reliability models.</p><p>Thus, among the known approaches there were not found ones which allow determining the reliability and safety indexes for the same behavior model of CTSCA with taking into account all behavior features of the system while disability, accidents, downtime, etc. Hence the task of updating SAM and state space method for their adaptation to the problems of multivariate analysis and safety indexes estimation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Improvement of the State Space Method and Its Formalization for Safety Models Building</head><p>The state space method combining with formalized description of the systems in the form of SAM is the powerful tool for the study of both functional and reliability indexes of CTSCA STSVP that allows us to perform multivariate analysis with minimal timecost. Significant advantages of the state space method is that it provides the set of all states of CTSCA and determine the probability rates getting in or staying in any of them. This property is particularly relevant when the operation of the system allows the states of reduced functionality or partial disability. In addition, you can see the quantity of reliability increase when entering certain types of redundancy and their cost. These properties make it possible not only to investigate the reliability of CTSCA when carrying in redundancy or changing its behavior algorithm, but also to analyze the impact of these actions on safety, which we understand as the risk of emergency in case of failure of each element of system.</p><p>From the resulting set of operable states the necessary reliability indexes are formed and from the set of inoperable states the MCScombination of inoperable states, when the critical failure definitely will occurare obtained.</p><p>As the number of inoperable states is equal to 10 1 ..10 2 , for automated MCS obtaining, an algorithm for finding all combinations of inoperable states, which refer to critical system failure, should be developed. This means that this element is one of the most critical parts of the system. In the case of fault-tolerant systems, CTSCA is just that, the combination of several elements is possible. It is considered that as more inoperable states are included in MCS so the less vulnerable system is and so the effects of its failure will not be catastrophic for human life and health and the environment.</p><p>If vulnerable elements, which form inoperable states, which are included in MCS, are replaced by more reliable or reserved, the risk of accident is reduced in times. Thus, the MCS are necessary for designer to make reasonable redundancy in a new version of designed CTSCA. So due to the effect of redundancy input we can quantify the rate of risk reduction:</p><formula xml:id="formula_641">Krr=Cm/Cn,<label>(1)</label></formula><p>where Cm -MCS before redundancy input; Cn -MCS after redundancy input; Generalized diagram of technique of estimation of safety and reliability indexes basing on the graph of states and transitions with the split failure state and using SAM is shown in Fig. <ref type="figure" target="#fig_1">2</ref>. According to it, the automated algorithm for obtaining MCS was developed. The input data for the algorithm is the set of inoperable states (MCS), derived from the binary SAM.</p><p>The binary SAM is the SAM of the CTSCA, in which all elements of structure are displayed by individual SV components and can take only of two values: zero and one. The binary SAM, which, unlike to original SAM <ref type="bibr">[2]</ref>, makes a possibility to describe Split state of CF the structure and behavior of CTS without unification of states of its structure elements.</p><p>In addition, the binary SAM allows obtaining split failure state, in which states of CTSCA subsystems failures can be discerned with the given level of detail representation. condition. If the element is operable, the value of its corresponding SV component is greater than zero. If the element failed and led to accident, the component will be equal to zero.</p><p>While the algorithm development it is taken into account that:  at least one MCS is presented in the sysytem;  cut set of the system is inoperable state, when system falls into catastrophic failure condition;  MCS of the system is the state, when the system is in catastrophic failure but taking off at least one of the elements that are failed in this MCS, the catastrophic failure of the system can not occur at all. Definition of MCS is provided in two stages: stage of MCS obtaining and stage of estimation their probability values.</p><p>Stage I. For MCS finding the following procedures are used: MCS sorting; MCS determination.</p><p>At this step it is necessary to sort obtained array of inoperable states of the system on the feature of the smallest number of events that led to the accident of the system. Further, basing on sorted array of inoperable states the MCS are defined. As a result of the proposed procedures the array of MCS is presents as a matrix.</p><p>Stage II. Determination of MCS probability is performed by the following procedures: determination of MCS from all cut sets; sum of MCS probabilities; forming of array of MCS and their probability values.</p><p>According to this stage we must create a matrix that consists of four columnsthe first column is a serial number of MCS -N; the second column is SV component and its value; in the third column the numbers of states, which are attended by the corresponding MCS, are recorded. So in the fourth column there are recorded obtained probabilities of MCS as a result of this procedure. Also at this stage procedure of comparison of the system states is used.</p><p>The procedure for obtaining probability values of MS is the sum of probability values of being in respective states, whose numbers were found in the previous procedure, i.e., in the states that are recorded in the third column corresponding to the MCS matrix. As a result, the fourth column is filled with appropriate MCS probabilities value.</p><p>An example of the usage of developed method of MCS definition. Fault-tolerant system consists of five modules A, B, C, D, E. Modules A, B, D are the main operable configuration that provides performance of system functions and modules C and E are reserve modules. Modules A and B are reserved by module C. The entire system is reserved by module E. All modules have the same failure intensity = 0,001, and the observation period is T = 100 h.</p><p>The RBD of the fault-tolerant system is shown in Fig. <ref type="figure" target="#fig_2">3</ref>:</p><p>On the basis of developed binary SAM of the fault-tolerant system, which consists of set of formal parameters (Fig. <ref type="figure" target="#fig_3">4</ref>), SV components and failure condition (Fig. <ref type="figure" target="#fig_4">5</ref>), the tree of modification rules of state vector (Fig. <ref type="figure" target="#fig_38">6</ref>), which is the input to the software module ASNA, the graph states and transitions was obtained in the automatic mode (Fig. <ref type="figure" target="#fig_5">7</ref>).  Basing on the obtained graph of states and transitions the software module ASNA formed mathematical model of the system as a system of Chapmen -Kolmogorov differential equations. After its solving the probability of being in every possible state was obtained. Probability of system being in operable state is 0.9894, and the probability of failure is equal to: Qf = 1 -0,9894 = 0,01061</p><p>On the basis of the graph of states and transitions according to developed algorithm, it was determined that after simultaneous failure of modules E and D the system fails    Validation of the developed method. To validate the developed method it was implemented the a fault tree building for the system (Fig. <ref type="figure" target="#fig_6">8</ref>) according to the approach <ref type="bibr">[8]</ref> and the values of the probability of failures for each MCS were calculated. It was considered that the results obtained by fault tree are accurate and they were compared with results which are shown in Table <ref type="table" target="#tab_1">1</ref>.</p><p>The validation was performed using specialized software suite RAM Commander by ALD Service. For RBD the fault tree was set up (Fig. <ref type="figure" target="#fig_6">8</ref>) and MCS were obtained by tools of RAM Commander and are shown in Fig. <ref type="figure" target="#fig_53">9</ref>.</p><p>The comparison shows that the calculated values of MCS, which were obtained from fault tree using software suite RAM Commander coincide with the values obtained from the graph of states and transitions with the split failure state using binary SAM. The developed approach (Fig. <ref type="figure" target="#fig_1">2</ref>) allows us to get the MCS in automatic mode without fault tree construction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Expanding the Functionality of the Program ASNA for the Safety Analysis of CTSCA</head><p>For building complex models, which are focused on determination of the reliability and safety indexes it is most advisable to take as a basis the graph of states and transitions with split state of catastrophic failure and method for its automated construction using binary SAM. However, the biggest problem for the designer, in this case, is the construction of the binary SAM because its formation requires from the developer not only the deep knowledge of the nuances of functionality of designed CTSCA but also thorough knowledge about techniques of construction the formalized graph of states and transitions that is the whole direction in complex systems designing.</p><p>Therefore, the next urgent task is to automate the construction of binary SAM-based graphical representation of the system as a RBD. This will speed up the development of SAM, reduce the time cost in degree and obtain both reliability and safety indexes. Principles of this automation were laid in works <ref type="bibr">[12,</ref><ref type="bibr">15]</ref>. At the same time, we note that this approach narrows the class of the analyzed systems because it does not allow us to analyze complex technical systems that are described by queuing systems, flowcharts, etc. behavior algorithm.</p><p>According to approach <ref type="bibr">[12]</ref> the visualization software for RBD of technical system, which makes it possible the automatic construction of graphic images of flow diagram of technical systems and the formation of conditions of their functioning and failure, was developed. Using the developed software the information about the system is transmitted as input to the ASNA software for further calculations of reliability indexes accordingly to the number of elements in the node, the number of renewals and maintenance crews, time range, intensity of failures and recoveries for each of elements of analyzed system.</p><p>In order to extend the functionality of the ASNA software for safety analysis of CTSCA it is needed to combine binary SAM methodology with the approach <ref type="bibr">[12]</ref>. It is necessary to modify the SAM as follows:  Every element input in the RBD is accompanied by the creation the next set of SV components, the number of elements corresponds to the number of components:</p><p>Item1, Item2, … ,Itemi,… → V11, V21, … , Vi1, … 4. Risk reduction factor was introduced for quantitatively assess of the efficiency of improving safety by improving reliability by introducing redundancy in critical elements of complex technical systems for critical application. 5. Fault tree building from the graph of states and transitions basing on minimal cut sets takes into account the behavior of complex system that is not available when using static and dynamic fault trees 6. The combination of binary structural-automatic model and method of automated constructing of graph of states and transitions basing on reliability block diagram makes it possible to automate the procedure of building structural-automatic model of fault-tolerant renewable complex technical systems for critical application and reduce time costs by more than degree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Efficient implementation and operation of multitier web-systems using COTS components depend on accuracy of security assessment and quality of attacks prevention and recovery activities. Security of web-system can be estimated by analyzing web-components vulnerabilities and predicting attacks affecting system availability and other security attributes. System availability and accessibility of the provided ser-vices depend on the used maintenance strategy. This strategy can implement various vulnerability prevention and elimination scenarios <ref type="bibr">[1]</ref>. Thus, assessing web-systems availability taking into account both system failures due to HW/SW faults, and hacker attacks on components vulnerabilities is important.</p><p>To estimate system availability and security researchers develop various simulation models <ref type="bibr">[1,</ref><ref type="bibr">2]</ref>. Most of them are based on attack tree analysis <ref type="bibr">[3,</ref><ref type="bibr">4]</ref>, Markov's <ref type="bibr">[5,</ref><ref type="bibr">6]</ref>   The third scenario (Fig. <ref type="figure" target="#fig_217">1,c</ref>) describes graduate vulnerability elimination only after successful attacks on these vulnerabilities. In this scenario the total number of vulnerabilities in the system may be unlimited nv → ∞.</p><p>The step by step vulnerability elimination is described by the next scenario (Fig. <ref type="figure" target="#fig_217">1,d</ref>). In this case it is assumed that restart of web-system is possible without elimination of vulnerability which was attacked.</p><p>According with the fifth scenario (Fig. <ref type="figure" target="#fig_0">1</ref>,e) vulnerabilities can be detected and eliminated from the system only during the periodic maintenance actions (i.e. security audits) only. After the successful attack a web-system is restarted or reboot without vulnerability elimination. Vulnerabilities can be detected and eliminated from the system only during periodic security audits. The probability of eliminating the i-th vulnerability is equal to αi, Σαi = 1.</p><p>The sixth scenario (Fig. <ref type="figure" target="#fig_0">1</ref>,f) assumes that vulnerabilities can be detected and eliminated from the system both after successful attacks or during periodic security audits. The seventh scenario takes into account possibility of attacks on several vulnerabilities (Fig. <ref type="figure" target="#fig_217">1,g</ref>). The scenario describes sequential chains of attacks on sever-al (four, in our example) services of a web-system. In this case an intruder continues to attack the next services. After successful attack a web-system can transit to a new upstate where vulnerabilities are eliminated from the system or can return back to the initial state by system restarting or rebooting.</p><p>Described set of scenarios is not complete. This set includes some basic scenarios. However, other scenarios can be developed considering different procedures of maintenance and vulnerability elimination or patching.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Estimation of Input Parameters for Markov's Web-System Availability Models</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Vulnerabilities Sampling</head><p>In this section we discuss how parameters of Markov's models simulating websystem availability can be estimated using existing vulnerability databases like NVD.</p><p>The whole set of vulnerabilities stored in NVD can be downloaded as an XML file «NVD/CVE XML Feed with CVSS and CPE mappings (version 1.2)» <ref type="bibr">[11,</ref><ref type="bibr">12]</ref>. Then we need to select those vulnerabilities of Web-system components (DNS-server, HTTPserver, application server, etc.) affecting system availability. It is can be done by analyzing vulnerabilities availability impact and vector of access using, for instance, common vulnerability scoring system (CVSS) <ref type="bibr">[13]</ref> provided by NVD:</p><p>-Availability impact, A, which can be equal one of three fuzzy values "None" (N), "Partial" (P) and "Complete" (C); -Vector of access, value "Network" (N).</p><p>For example, Table <ref type="table" target="#tab_1">1</ref> presents a subset of vulnerabilities detected during 2013 and causing unavailability of DNS (CVSS_vectorcontains -AVμN, AμC и AμP; ns1:descriptcontains -DNS (an example for analysis attacks on DNS) including their publishing dates and score.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Estimation of Attack Rates</head><p>In order to parameterizes state-transition models we need to evaluate a rate of the attacks exploiting system vulnerabilities.</p><p>This rate obviously depends on different factors including number of system  The RBD consists of three consequently connected components and failure of any components causes failure (unavailability) of the system. In this section we study two availability models taking into account attacks on DNS vulnerabilities and different maintenance operations including security audits <ref type="bibr">[7]</ref>. The first model (MA-1) corresponds to scenario with vulnerability elimination during security audits only (Fig. <ref type="figure" target="#fig_217">1,e</ref>). The second one (MA-2) implements scenario with vulnerability elimination after successful attack on a system and also during security audits (Fig. <ref type="figure" target="#fig_217">1,f</ref>).</p><p>Initial values of model parameters are presented in Table <ref type="table" target="#tab_0">2</ref>. The models itself have been implemented as Matlab programs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">The Model MA-1</head><p>This model describes a web-system with attacks on DNS vulnerabilities and periodic maintenance activities (security audits) including detection and elimination of vulnerabilities without complication of code (ladns =const).   As during these activities it is possible to detect and eliminate more than one vulnerability [1…nv], we use a special parameter αj which defines probability of detection of j-th (j  [1…nv]) vulnerabilities. Apparently, Σαj = 1, and values α1, α2,… αj,… αnv are distributes on discreet law. For calculation of geometrical distribution law αj was used with parametersμ р=α1=0.7 (probability of detection of the single vulnerability) and q=1-р=0.3 (Table <ref type="table" target="#tab_21">3</ref>).</p><p>Initially (state S0) web-system works considering failures and recovering of DNS, DHCP и Routing services (states S1-S3). After attack on DNS (transition to state S5 with the rate d1dns*laatdns) the system fails and can be recovered by restart without vulnerability elimination with rate mureboot. Periodically maintenance activities are performed (state S4) during which 0, 1,…nv vulnerabilities can be eliminated (transitions from state S4 to states S0, S4… Sn). These transitions are weighted using parameter αj*muprof. Further process is continued in the same way (states Sn…Sn+3). The research results of availability function depending on parameters р=α1 and mureboot are shown on Fig. <ref type="figure" target="#fig_3">4</ref> and Fig. <ref type="figure" target="#fig_4">5</ref>.</p><p>The greater value α1 causes more fast transition of the function A(t) to stationary state (Fig. <ref type="figure" target="#fig_3">4</ref>). A value of mureboot influences on a value of availability function minimum, location of minimum on the time axis and time of transition to stationary state (Fig. <ref type="figure" target="#fig_4">5</ref>). If mureboot=2 (1/hour) availability function minimum equals 0,9953 for t=17 hours; if mureboot=0.05 (1/hour) availability function minimum equals 0,9103 for t=119 hours.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">The model МА-2</head><p>This model describes scenarios whish in addition to MA-1 assumes detection and elimination of vulnerabilities both during security audit and right after attack (without complication of code (ladns =const). Marked Markov's graph is shown on Fig. <ref type="figure" target="#fig_38">6</ref>. After attack on DNS and transition to state S5 with rate d1dns*laatdns system fails and can be recovered by restart without eliminating vulnerability with the rate (1-d2p)*murecovery or with elimination with the rate d2p*murecovery.</p><p>The results of availability function analysis depending on parameters d2p and laprof are shown on Fig. <ref type="figure" target="#fig_5">7</ref> and Fig. <ref type="figure" target="#fig_6">8</ref>. The increasing of probability of vulnerability elimination d2 during maintenance activities causes more fast transition of the function A(t) to stationary state (Fig. <ref type="figure" target="#fig_6">8</ref>). Changing the availability function depending on the rate of maintenance laprof is dual. On the one hand the rare maintenance activities are carried on the more minimum of availability function on non-stationary phase. On the other side the more often maintenance activities are carried on the faster the function transits to stationary state (Fig. <ref type="figure" target="#fig_6">8</ref>). According to Fig. <ref type="figure" target="#fig_53">9</ref>, the vulnerability elimination scenario MA-1 is better to use till tswitch =750 hours, after this time the scenario MA-2 ensures better availability. Hence at the beginning recovering a system after attack (without vulnerability elimination) is preferable. Then, taking into account increase of the number of failures caused by attacks other scenario (when vulnerabilities are detected and eliminated both after attacks and during maintenance) becomes preferable. It allows increasing the value of availability from 0.984 (MA-2) to 0.988 (MA-1) and decreasing time transition to stationary state from 20000 (MA-1) to 3000 (MA-2) hours.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>We analyzed a set of web-system behavior scenarios in conditions of attacks on component vulnerabilities. Quantitative assessment and research of availability for such systems can be based on Markov's models using statistic data about vulnerabilities contained in open databases and described sequence of evaluating of attacks rates and criticality.</p><p>We proposed and discussed two models of web-system availability considering attacks on DNS vulnerabilities and different scenarios of vulnerability elimination. There is possibility and reasonability of scenario changing taking into account values of availability function allowing increase minimum one at the non-stationary stage and decrease time of transition to stationary state. This approach allows selecting VE scenario to improve resilience of web-system.</p><p>The future research efforts may be concentrated on development of integrated strategies for maintenance and security policies selection taking into account physical, design and interaction faults, and implementation of dynamically reconfigurable weband cloud-systems with embedded monitor and solver to select the optimal strategy of</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The dynamics in the numbers of research staff, PhD students, and university graduates in Ukraine (1995-2013).</figDesc><graphic coords="24,122.65,155.05,347.40,137.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The dynamics in the numbers of Ukrainian organizations performing research and development (1995-2013).</figDesc><graphic coords="24,140.40,421.55,329.65,135.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The availability of DC related information on the web sites.</figDesc><graphic coords="27,189.65,491.70,216.00,87.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig.4. Frequency of updates.</figDesc><graphic coords="28,209.20,170.40,191.05,119.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. The use of social networks in the work of DC.</figDesc><graphic coords="29,171.65,156.70,245.35,111.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 7 .</head><label>7</label><figDesc>Fig.7. User roles and their main features.</figDesc><graphic coords="31,169.90,384.80,255.45,153.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Algorithm of DC system work.</figDesc><graphic coords="32,132.00,216.85,331.30,290.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Fig. 1 .Fig. 2 .</head><label>12</label><figDesc>Fig. 1. The percent of people willing to use DMS at different math lessons</figDesc><graphic coords="42,124.80,147.35,346.55,160.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 3 .Fig. 4 .Fig. 5 . 6 .Fig. 7 . 8 .Fig. 9 .Fig. 10 .</head><label>345678910</label><figDesc>Fig. 3. The attractiveness of DMS for teachers</figDesc><graphic coords="43,124.80,400.90,346.55,148.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Fig. 11 .</head><label>11</label><figDesc>Fig. 11. Increase in the number of people psychologically ready to use DMS</figDesc><graphic coords="46,124.80,147.35,346.55,163.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Video interface controls for video lecture in Udacity.</figDesc><graphic coords="54,153.35,387.50,300.00,178.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_12"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Graph showing percentage features used by some open source MOOC platforms.</figDesc><graphic coords="62,136.20,147.35,327.70,154.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_13"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Graph showing percentage of feature level used by some open source MOOC platforms.</figDesc><graphic coords="62,136.20,352.45,327.70,137.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_14"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Membership functions for subsets of student's statements (a) and evaluation of academic achievements (b) A membership function for each term of the base term set of a logical variable "Level of matching answers" ((x)) is shown in Fig. 2,a. According to the mentioned above chart, all possible values of the function (x) are characterized as low, moderate or high level of matching answers depending on how the student's answer is close to the reference one. At the same time, mismatch of the answers can be caused not only by the incomplete knowledge, but also by insufficient confidence in knowledge, excessive emotions, or any other reasons preventing the student from making an unequivocal judgment about trueness of his/her conclusions. Similar situation is with a membership function of a logical variable "Evaluation of student's knowledge" ((y)), where the terms of a base term set are characterized by</figDesc><graphic coords="69,126.24,147.36,345.72,123.84" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_15"><head></head><label></label><figDesc>Student's answers do not match the reference ones Student's answers match the reference ones NS LS SS S NS LS SS S NS LS SS S</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_16"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. AOSD: (а) -the conceptual scheme; (б) -the implementation facets (compare with [19])</figDesc><graphic coords="79,143.28,483.72,319.32,126.96" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_17"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. 3-D modeling space for POOT's effectiveness estimation</figDesc><graphic coords="81,190.08,288.36,240.60,135.24" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_18"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. The list of requirements completed in RMS Rational Requisite Pro Priority : X ; } immidiate" " , actual" " , neutral" {" ) T(Priority = (5)</figDesc><graphic coords="83,164.88,138.96,275.40,89.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_19"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. (a) -the initial allocation of system's requirements in the space "Requirement Rank";(b) -the mapped system's position in the space "System Type"</figDesc><graphic coords="83,153.96,436.68,314.52,161.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_20"><head></head><label></label><figDesc>Mamdani's algorithm, the next step is a fuzzifying of variables in FPR, therefore average implementation efforts, residual crosscutting ratio, and effectiveness of POOT usage have to be represented as LV. The output LV POOT E is the effectiveness of POOT-usage, the LV POOT E is bounded on universe X , and it belongs to the interval [0;1]. The term set for this LV looks like: could be represented in short form as { , , , , } POOT E Z PS PM PB PH ∈ . The corresponding identifier for POOT E is 3 β (see FPR above), and it is shown in Fig. 7.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_21"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. The graphic form for LV "Effectiveness" POOT E The input LV POOT C represents average implementation efforts, POOT C is bounded on universe X and belongs to an interval [(EAP)min; (EAP)max], where EAPmin, EAPmax are minimum and maximum values of architectural complexity (measured in a.u.) for appropriate LSS type respectively. The term set for the POOT C linguistic</figDesc><graphic coords="88,153.96,304.32,281.76,94.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_22"><head>Fig. 1 :</head><label>1</label><figDesc>Fig. 1: Graph structures</figDesc><graphic coords="95,138.67,334.06,199.69,144.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_23"><head>Fig. 2 :</head><label>2</label><figDesc>Fig. 2: An example program</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_24"><head></head><label></label><figDesc>substitution) The semantics of DLs is given by Kripke structures or, differently speaking, by typed graphs. Under this interpretation, concepts represent sets of individuals. The constructors ¬, ⊓, ⊔ (in Ascii notation: !,[&amp;&amp;],[||]) then have the obvious meaning. ([?] r C) is the set of individuals x such that there is at least one rtyped edge (x r y) between x and y, where y belongs to C. Dually, ([!] r C) is the set of individuals x all of whose r-edges go to individuals of type C.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_25"><head>Fig. 5 :</head><label>5</label><figDesc>Fig. 5: Weakest preconditions and verification conditions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_26"><head></head><label></label><figDesc>substitutions τ of the form a := a − {v} or a := a + {v}: • (x : c)[a := a − {v}] (x : c) for a = c, and similarly for a := a + {v} • (x : a)[a := a − {v}] (x : a) ∧ x = v • (x : a)[a := a + {v}] (x : a) ∨ x = v • (x : ([?] r C))[a := a − {v}] (x : ([?] r C[a := a − {v}])), and similarly for the other combinations involving constructor [?] or [!] and substitutions a := a + / − {v}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_27"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The concept of neuronet prediction of characteristics of software project based on the analysis of specification</figDesc><graphic coords="116,207.32,559.40,180.60,105.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_28"><head>Fig. 2 . 3 .</head><label>23</label><figDesc>Fig. 2. The coordinate system for Iip Sp Fig. 3. The graphical representation of Iip Sp and Iip max For calculation of integrative indicator Iip Sp we will divide the hexagon into six triangles, will calculate the area of each triangle with two sides (value of characteristics) and angle between them (60°) and will add the obtained values of triangles areas: S CsOCx =½*Cs ANN *Cx ANN *sin60°=0.5*0.866* Cs ANN *Cx ANN , (4) Iip Sp =0.5*0.866*(Cs ANN *Cx ANN + Cx ANN *Dsp ANN + Dsp ANN *Ub ANN + Ub ANN *Cp ANN + +Cp ANN *Qs ANN + Qs ANN *Cs ANN ) (5)</figDesc><graphic coords="117,325.55,420.05,113.40,107.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_29"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Teeth and intervals on the cardiogram</figDesc><graphic coords="125,125.15,147.40,344.25,243.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_30"><head>Phase 1 .Phase 2 .Phase 4 .Phase 5 .</head><label>1245</label><figDesc>Collection of statistic information about each investigated random se-Calculation on the basis of the accumulated realizations Obtaining on the basis of statistic information the assessments of onedimensional densities of the distribution of the random coefficients of the canonical decompositions of the random sequences Decomposition of the recognizable realization by canonical expressions; calculation of the values of one-dimensional densities of distribution of coefficients formed as a result of decompositions; determination of the belonging of the realization of a certain random sequence</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_31"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Scheme of functioning of the computer system of cardiovascular diseases diagnostics</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_32"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Neuron of the Optimal Autoregressive Model</figDesc><graphic coords="142,136.20,147.35,345.70,120.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_33"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Neuro-scheme for Time Series Prediction</figDesc><graphic coords="142,142.90,406.20,320.90,177.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_34"><head></head><label></label><figDesc>. The quality of the prediction methods of passenger traffic for the forecast period (2014-2018) with the steps of the forecast 1</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_35"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Forecasting errors of prediction methods with the step 1 (in %)</figDesc><graphic coords="147,136.30,147.35,334.10,233.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_36"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Forecasting errors of prediction methods with the step 5 (in %)</figDesc><graphic coords="147,136.20,437.50,333.10,227.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_37"><head>Fig. 5 .</head><label>5</label><figDesc>Fig.5. The share of road passenger transport in Ukraine over the period (2014-2018) To compare the dynamics of changes of the volume of passenger traffic in Ukraine for different types of vehicles (rail, river, road) we construct the following diagram.</figDesc><graphic coords="148,124.80,345.35,347.40,254.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_38"><head>Fig. 6 .</head><label>6</label><figDesc>Fig.6. Dynamics of passenger traffic in Ukraine (2014-2018)</figDesc><graphic coords="149,138.00,147.35,330.70,281.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_39"><head>RR.</head><label></label><figDesc>Thus, S ⊢ CR on the basis of Prop. 2. QED. Let us consider an example of a deduction in the CR-calculus. Note that all the examples in the paper are given only for propositional case since the resolution-type technique under consideration uses the usual unification. Example 1. Let U denote the following set of c-clauses: {(A ∧ ¬A) ∨ (B ∧ C) ∨ (E ∧ L), ¬B ∨ ¬C, ¬E ∨ ¬L}, where A, B, C, E, and L are atomic formulas. The (minimal) inference of from U in CR is as follows:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_40"><head></head><label></label><figDesc>by IR from the 1st-block c-clauses with the 1st c-clause as a nucleus), | . . . ⌊ Ln ∨ Ẽn (by IR from the nst-block c-clauses with the 1st c-clause as a nucleus),</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_41"><head>1 Fig. 2 .</head><label>12</label><figDesc>Fig. 2. The structure of combined multichannel ICS of TP of magnetite quartzites beneficiation (classification-optimal control)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_43"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Results of computer modeling of classification optimization process in the context of actual indicators of magnetite quartzites concentration</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_44"><head>Fig. 4 .Fig. 5 .</head><label>45</label><figDesc>Fig. 4. K-society Index for Ukraine's neighbors Firstly, it is necessary to mention that Russia confirms the significant fall of index' values in 2012-2013, that USA and Canada showed. Secondly, two countries, Hungary and Poland, have almost equal dynamics of index' values. Ukraine shown higher estimations than Moldova and Russia in 2008 and outstripped those countries until 2012. The situation was changed in 2013 when Ukraine got lower position than Moldova. In general, Ukraine takes the 40th place from 87 countries in 2013. Its value</figDesc><graphic coords="183,186.10,448.80,234.60,141.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_45"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Layered architecture</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_46"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Combination with webinterface</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_47"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Combination with webinterface</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_48"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Different platforms and their relations</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_49"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Case with coloured balls in the webbrowser</figDesc><graphic coords="193,238.53,251.76,138.30,90.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_50"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. A simple paint example</figDesc><graphic coords="193,254.13,468.34,107.10,112.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_51"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. A 3D structure</figDesc><graphic coords="194,255.93,156.68,103.50,85.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_52"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. View of an STL-image</figDesc><graphic coords="194,245.43,447.95,124.50,87.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_53"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. Components of a step object</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_54"><head>Fig. 11 .</head><label>11</label><figDesc>Fig. 11. WIMP paint design</figDesc><graphic coords="198,147.68,115.83,320.00,240.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_55"><head>Fig. 12 .</head><label>12</label><figDesc>Fig. 12. Resulting product on the equiplet</figDesc><graphic coords="199,147.68,115.83,320.00,240.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_56"><head>5 .</head><label>5</label><figDesc>Moergestel, L.v., Meyer, J.-J., Puik, E., Telgen, D.: Decentralized autonomousagent-based infrastructure for agile multiparallel manufacturing. ISADS 2011 proceedings pp. 281-288 (2011) 6. Moergestel, L.v., Meyer, J.-J., Puik, E., Telgen, D.: Production scheduling in an agile agent-based production grid. IAT 2012 proceedings pp. 293-298 (2012) 7. Moergestel, L.v., Meyer, J.-J., Puik, E., Telgen, D.: Embedded autonomous agents in products supporting repair and recycling. Proceedings of the International Symposium on Autonomous Distributed Systems (ISADS 2013) Mexico City pp. 67-74 (2013) 8. Paolucci, M., Sacile, R.: Agent-based manufacturing and control systems : new agile manufacturing solutions for achieving peak performance. CRC Press, Boca Raton, Fla. (2005) 9. Puik, E., Moergestel, L.v.: Agile multi-parallel micro manufacturing using a grid of equiplets. IPAS 2010 proceedings pp. 271-282 (2010) 10. Quigley, M., Gerkey, B., Conley, K., Faust, J., Foote, T., Leibs, J., Berger, E., Eheeler, R., A., N.: Ros: an open source robot operating system. Open-Source Software workshop of the International Conference on Robotics and Automation (ICRA) (2009) 11. Shingo, S.: A Study of the Toyota Production System. Productivity Press (1989) 12. Telgen, D., Moergestel, L.v., Puik, E., Meyer, J.: Requirements and matching software technologies for sustainable and agile manufacturing systems. INTELLI 2013 proceedings pp. 30-35 (2013) 13. Wooldridge, M., Jennings, N.: Intelligent agents: Theory and practice. The Knowledge Engineering Review (10(2)), 115-152 (1995)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_57"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Location of Ukraine and JECAM test site in Ukraine (Kyiv oblast, marked with bold boundaries.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_58"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The land cover map of Ukraine for 2010 year (and also land cover maps of Kyiv oblast for 2010, 2000 and 1990 years).</figDesc><graphic coords="213,187.92,379.44,171.72,165.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_59"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Final crop map obtained by classifying multi-temporal Landsat-8 imagery.</figDesc><graphic coords="215,173.52,180.84,56.28,113.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_60"><head>Fig. 1 .</head><label>1</label><figDesc>Fig.1.Comparison of possible income from agricultural production and power generation Source: own calculations on base table 4</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_61"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2.Model of possible risks of functioning of Dnieper reservoirs</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_63"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Hypothetical function values</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_64"><head>3</head><label></label><figDesc>Optimal Portfolio Structure We estimate the portfolio structure with maximum profitability and limited risks for different combinations of UAH/USD and EUR/USD devaluation multiplier factors. Evaluation of devaluation multiplier factors is based on monthly time series of UAH/USD (03.1997 -02.2015) and EUR/USD (02.2007 -02.2015) exchange rates.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_65"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Dynamics of devaluation multiplier UAH/USD</figDesc><graphic coords="242,124.80,398.40,346.10,207.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_66"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Dynamics of devaluation multiplier EUR/USD The period (1997-2014 for UAH/USD) consists of periods of economic growth with fixed course and periods crisis when monetary system tends to new equilibrium. Devaluation multiplier factor UAH/USD 1   under 155 observations (minor revaluation probability 736 , 0  r p ), 1   under 55 observations (devaluation probability 264 , 0  d p ). Devaluation multiplier factor EUR/USD 1   under 44 observations (revaluation probability 449 , 0  r p ), 1   under 54 observations (devaluation probability 551 , 0  d p). Devaluation multiplier EUR/USD has more natural character, when the equilibrium is set under the influence of many non-interrelated reasons and a stable tendency is missing. The stationary hypothesis of the exchange rate of EUR/USD can be proved if we explored a long time period. The same hypothesis for exchange rate of UAH/USD must be rejected because of a full asymmetry of devaluation multiplier relatively to unity level.We consider the optimal portfolio structure in three cases: landslide devaluation from 43% to 150% -1 </figDesc><graphic coords="243,124.80,147.35,346.10,207.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_69"><head>Table 3 .</head><label>3</label><figDesc>AbbreviationDenomination Definition B2B Business-to-Business</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_70"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The structure of e-commerce in South Korea in 2013, %</figDesc><graphic coords="253,127.20,315.10,340.80,66.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_71"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Dynamics of growth rate of B2C e-commerce sales in regions from 2012 to 2014, % 3</figDesc><graphic coords="255,243.10,340.10,137.14,118.54" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_72"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. The commodity structure of sales in B2C e-commerce segment in selected countries 5 .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_73"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Comparative analysis of the B2C e-commerce sales volumes in different countries according to investigation in 2013, mln. dollars</figDesc><graphic coords="255,138.25,558.95,130.80,109.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_74"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. The triad of e-commerce components</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_75"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. The mechanisms of pricing in Internet-auctions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_76"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. Double electronТc VТckrey auctТon for true type's agents</figDesc><graphic coords="260,155.30,158.90,284.60,193.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_77"><head>Fig. 9 .Fig. 10 .</head><label>910</label><figDesc>Fig. 9. BТds and asks dТstrТbutТon at double electronТc VТckrey auctТon for true type's agents</figDesc><graphic coords="260,195.60,546.95,204.00,136.10" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_78"><head>Fig. 11 .</head><label>11</label><figDesc>Fig. 11. PrТce dynamТcs Тn double electronТc VТckrey auctТon for true type's agents</figDesc><graphic coords="261,203.05,361.45,189.10,125.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_79"><head>Fig. 12 .</head><label>12</label><figDesc>Fig. 12. Double electronic Vickrey auction for СТdden type's agents</figDesc><graphic coords="263,178.55,147.35,238.10,194.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_80"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Monthly CLS data in estimation of global FX volumes in all type of currencies (Bench &amp; Sobrun, 2013)</figDesc><graphic coords="270,138.50,147.35,318.20,152.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_81"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Monthly relationship between SWIFT data and developed currencies FX segment volume (Cook and Soramaki, 2014, p.27)</figDesc><graphic coords="270,158.40,423.85,278.65,187.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_82"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Yearly ETFs contribution to FX developing currencies segment volume We have found several studies which are focused on relation between volatility of volume of one of the FX ETF (FXE) and volume of other market segments (Daigler, Hibbert &amp; Pavlova, 2014). Other researchers studied the ETF segment statistics much more widely (Li, Klein, &amp; Zhao, 2012). The common way to construct time series is ARIMA method but the specific for volatility variables is ARCH method (Le &amp; Zurbruegg, 2010). Data about ETFs flows is available on website of Currencyshares' and Powershares' on-line databases which present three largest global currency ETFs indices (US dollar, euro, and yen).</figDesc><graphic coords="271,140.65,207.35,313.90,161.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_83"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Site interface</figDesc><graphic coords="278,131.30,243.35,332.85,172.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_84"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Questions Distribution</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_85"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Questions Distribution</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_86"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Questions Distribution</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_87"><head>Fig. 7 .</head><label>7</label><figDesc>Fig.7. Comparative resultsAs we see, from the student's point of view, what is interesting and what is useful is not the same. So 4 (lesson atmosphere) correlates with the factor 'interesting', while factor 5 (is the statement filled enough by examples)with 11 (accordance of a lesson's material to home assignment).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_88"><head>Fig. 8 . 1 .Fig. 9 .</head><label>819</label><figDesc>Fig. 8. Questions Distribution</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_89"><head>Fig. 10 .</head><label>10</label><figDesc>Fig.10. Comparative results</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_90"><head>Fig. 11 .</head><label>11</label><figDesc>Fig.11. Comparative results</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_91"><head>Fig. 12 .</head><label>12</label><figDesc>Fig.12. Comparative results</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_92"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Detailed fixed costs of the Kherson river port.</figDesc><graphic coords="296,183.12,147.36,228.96,183.36" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_93"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Detailed total revenue by origin and business-units including internal turnover.</figDesc><graphic coords="296,124.80,428.16,338.16,245.28" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_94"><head></head><label></label><figDesc>quality control, training the teaching staff, etc.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_95"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The Hybrid Cloud configuration.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_96"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. The hybrid service model of the learning resources access.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_97"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. The results of the cloud-based learning resource quality parameters evaluation.</figDesc><graphic coords="322,183.70,480.10,228.00,90.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_98"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Structure of EER quality management system.</figDesc><graphic coords="327,137.04,164.40,347.28,234.72" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_99"><head></head><label></label><figDesc>: learning-methodical, training, auxiliary and supervising. At monitoring of EER quality by criterion of compatibility with educational standards at definition of quality indicators it is possible to use specifications IMS which describe information model of educational objects. These specifications define the EER</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_100"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The scheme of service functionality in the EER quality management system.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_101"><head>1. Quality monitoring service 4 .</head><label>4</label><figDesc>Feedback system 3. Service of EER support and upgrade 2. Service of EER quality assessment</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_102"><head>1 . 2 T</head><label>12</label><figDesc>Comparing this value with the tabulated value 2 T for n -1 = 15 degree of freedom and significance level α = 0,01, = 30,578. Therefore, the hypothesis of consistency of expert evaluations confirmed according to Pearson.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_103"><head></head><label></label><figDesc>[n : ] (or x[n : ] respectively) we denote the word u[n] . . . u[|u|] (or the sequence x[n]x[n + 1] . . .).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_104"><head>Remark 4 .</head><label>4</label><figDesc>One can easy see that if N (u) = |u| then Def. 1 and the nonanticipation property given in Sec. 1 specify the same class of mappings. Now let us consider the partial mapping µ : X +</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_105"><head>Remark 5 .</head><label>5</label><figDesc>Returning to Fig. 1, we note that µ(u) = y[N (u)] .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_106"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The main interleaving reduction algorithm for reachability checking Static Analyses. In the initial behavior u we look for set</figDesc><graphic coords="363,229.68,420.96,147.36,173.04" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_107"><head>⋆</head><label></label><figDesc>N. Baklanova and M. Strecker were partially supported by the project Verisync (ANR-10-BLAN-0310). ⋆⋆ W. Ricciotti and J.-G. Smaus are supported by the project Ajitprop of the Fondation Airbus.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_108"><head></head><label></label><figDesc>datatype stmt = Empty -no-op | Assign vname val -assignment: var := val | Seq stmt stmt -sequence: c1; c2 | Cond expr stmt stmt -conditional: if e then c1 else c2 | While expr stmt -loop: while e do c 2.1 Preservation of execution context Problem 1 concerns the loss of an execution context through expression reductions which is a design feature of structural semantics. Let us consider a simple example.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_109"><head>Cond bexp (Assign a 5</head><label>5</label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_110"><head>Cond bexp (Assign a 5 Fig. 2 .</head><label>52</label><figDesc>Fig. 2. The execution flow and the corresponding abstract machine for the program Cond bexp (Assign a 5) Empty.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_111"><head>3 Fig. 3 .</head><label>33</label><figDesc>Fig. 3. The execution flow and the corresponding abstract machine for the program with subexpression identifiers Cond n1 bexp (Assign n2 a 5) (Empty n3).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_112"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Semantic rules for the sequence of two expressions.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_113"><head></head><label></label><figDesc>fun reconstruct :: stmt ⇒ stmt-path ⇒ stmt where reconstruct c PTop = c | reconstruct c (PSeqLeft sp c2 ) = reconstruct (Seq c c2 ) sp | reconstruct c (PSeqRight c1 sp) = reconstruct (Seq c1 c) sp | reconstruct c (PCondLeft e sp c2 ) = reconstruct (Cond e c c2 ) sp | reconstruct c (PCondRight e c1 sp) = reconstruct (Cond e c1 c) sp | reconstruct c (PWhile e sp) = reconstruct (While e c) sp fun reconstruct-loc :: stmt-location ⇒ stmt where reconstruct-loc (Loc c sp) = reconstruct c sp</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_114"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Example of execution of small-step semantics</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_115"><head>Fig. 6 .Fig. 7 .</head><label>67</label><figDesc>Fig. 6. Finding the next location</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_116"><head>-Remark 1 . 3 ) 3 .</head><label>133</label><figDesc>be two collections of variables. The following fragment of an imperative program is called a linear loop: X := b; While Q(X, b) do X := A*X Operators X:=b and X:=A*X are interpreted as simultaneous assignments of the values of the variables of the right sides to the variables on the left sides. In what follows, we ignore the condition Q(X, b) and consider that the linear loop is infinite and that its execution is nondeterministic. Thus, we consider loops of the form X := b; While True|False do X := A*X (Definition Let called the orbit of linear operator A .A loop sets the orbit of linear operator A in spaceW . Obviously, an orbit A lies in some one-dimensional variety, and the system of invariants characterizes this variety as algebraic.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_117"><head></head><label></label><figDesc>Vieta's relation. Technique for computing L-invariants over a</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_118"><head>TA.</head><label></label><figDesc>The main result of this work:Theorem 2 (about the multiplicative relations). Let these eigenvalues. We assume that there are integers</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_119"><head>1</head><label>1</label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_120"><head>1 .</head><label>1</label><figDesc>theorem 2 the operator A has a L- invariant (2). Corollary If the minimum characteristic polynomial ) (x h of linear operator A has a free term equal to 1  (i.e. the linear operator A has a L-invariant. Example 4. A loop of the points rotation of a plane y) := (a,b); While True do (x, y):= (4/5*x -3/5*y, 3/5*x + 4/5*y)Calculate the eigenvalues and eigenvectors of the operator A :</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_121"><head>Example 5 .</head><label>5</label><figDesc>Loop of Fibonacci sequence calculation, starting with a pair of ) , ( b a . (x,y) := (a,b); While True|False do (x, y):= (x + y, x)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_122"><head>Corollary 3 .</head><label>3</label><figDesc>The set of all L-invariant of operator A defines the field of rational expressions.Proof of corollary 3 is in[21]   Theorem 4 Let ) (x f be irreducible over the field Q and reduced polynomial and } the set of its roots over the field _ Q . If we have a</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_124"><head></head><label></label><figDesc>problem of constructing a basis of a set of generating the group } ...</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_125"><head>Remark 3 .</head><label>3</label><figDesc>an n-dimensional vector space over a linearly ordered and constructive field K and _ K is an algebraic closure of K . If the loop(10)  is not completed (is branched) at some point b , ) ( * b m it should be considered equal to infinity.:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_126"><head>.</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_127"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Geometric illustration of the linear defined loop.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_128"><head>.</head><label></label><figDesc>The condition of repeating of the loop is a «point , a loop is completed when the point gets inside this square, i.e. a point will make the rotation by angle  k 2 </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_130"><head>Remark 4 .</head><label>4</label><figDesc>After the transition to a basis of eigenvectors the coefficients of inequality will be changed. If ) ( S is a transition matrix, then the new values of the vectors</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_133"><head>Theorem 10 .</head><label>10</label><figDesc>The problem of proving the invariance of inequality ) the loop (9) with diagonalizable linear operator A and with an initial point b is algorithmically solvable.Theorem 11. The problem of proving the invariance of inequality) the loop (9) (i.e., with the precondition ) (b S ) is algorithmically solvable.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_134"><head>Definition 1 .</head><label>1</label><figDesc>A transposition is a function (a b) : A → A defined by (a b)(a) = b, (a b)(b) = a, and (a b)(n) = n for n = a, b. A permutation of A is generated by composing finitely many transpositions.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_135"><head>Fig. 1 .</head><label>1</label><figDesc>Fig.1. Markovian property of NCMS. If one trajectory ends and another begins in the state q at time t, then their concatenation is a trajectory.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_136"><head></head><label></label><figDesc>s cannot be extended to a trajectory on [a, b]). Definition 10. ([15]) An escape from a right dead-end path s : [a, b) → Q (in Σ) is a trajectory s ′ : [c, d) → Q (where d ∈ T ∪ {+∞}) or s ′ : [c, d] → Q (where d ∈ T ) such that c ∈ (a, b), d &gt; b, and s(c) = s ′ (c). An escape s ′ is called infinite, if d = +∞. Definition 11. ([15]) A right dead-end path s : [a, b) → Q in Σ is called strongly escapable, if there exists an infinite escape from s.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_137"><head></head><label></label><figDesc>and there exists a function α of class K ∞ (i.e. the function α : [0, +∞) → [0, +∞) is continuous, strictly increasing, and α(0) = 0, lim x→+∞ α(x) = +∞) such that α(y) &lt; y for all y &gt; 0 and the function y</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_138"><head>Lemma 2 .</head><label>2</label><figDesc>(1) Σ(x * 0 ) satisfies the LFE property. (2) There exists s ∈ T r and ε &gt; 0 such that dom(s) = [0, ε]. Proof. (1) Let s : [a, b] → Q be a trajectory, x = pr 1 • s, and u = pr 2 • s. Let σ ′ : [a, +∞) → I be a function such that σ ′</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_139"><head>Figure 1</head><label>1</label><figDesc>depicts an example.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_140"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Initial configuration of the P system Π3 with tape alphabet Σ ′ = {a, b, ⊔}, working in space s(n) = n + 1 = 4 on the input abb.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_141"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Configuration of Πx (from Figure 1) encoding the initial configuration of M on input x = abb and using s(|x|) = 4 tape cells.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_142"><head>Fig. 3 .</head><label>3</label><figDesc>Fig.3. A configuration of M (from Figure1) and the corresponding configuration of Πx simulating it. The presence of b01 inside membrane 1 of a indicates that tape cell 1 of M contains the symbol a.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_143"><head>iC</head><label></label><figDesc>is the graph with vertices corresponding to software components, while edges indicates the program control flow ( transition probability from component і to component l depending on being in previous K components); is the failure rate of i -th software component.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_144"><head></head><label></label><figDesc>intensity from component і to component j at time t, and S denotes the set of all system states. In general the transition intensities ) (t ij  depends on the transition probabilities ij a and could be calculated from latter.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_146"><head>Fig. 1 .</head><label>1</label><figDesc>Fig.1. The comparison diagram of the software reliability assessment accuracy using first and high order discrete time models.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_147"><head>Fig. 2 .Fig. 3 .</head><label>23</label><figDesc>Fig.2. Initial graph, representing the components and control flows of the software used for continuous time reliability model verification.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_148"><head>2 Fig. 4 .</head><label>24</label><figDesc>Fig.4. Time dependence of the tested software failure rate, obtained from the first (1) and second-order (2) models.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_149"><head>2 Fig. 5 .</head><label>25</label><figDesc>Fig.5. The time dependence of the tested software reliability function, obtained from the first (1) and second-order (2) models.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_150"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Metrics hierarchy.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_151"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. CMCM values for GSW and reliability characteristics of SWQMs.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_152"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. CMCM values for GSW and reliability characteristics of basic SWQMs.</figDesc><graphic coords="452,124.80,484.55,345.35,168.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_153"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. CSQMCM values for known and predictable SWQMs.</figDesc><graphic coords="454,124.80,187.90,345.10,149.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_154"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. CMCM values for reliability characteristics and green characteristics for basic SWQMs. CMCM values of SWQM 2020 for characteristics associated with «green» software exceed the value of the same metric for SWQM ISO/IEC 25010 by 0.1408. CMCM values of SWQM 2020 for reliability characteristics exceed the value of the same metric for SWQM ISO/IEC 25010 by 0.05.</figDesc><graphic coords="454,124.80,459.10,345.10,150.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_155"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Green software characteristics in SWQM at the level of characteristics (1).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_156"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. Correlation of characteristics of SWQM-Us (ISO/IEC 9126 and ISO/IEC 25010) with GSW characteristics.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_157"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Service model of the distributed Cloud</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_158"><head>Fig. 2</head><label>2</label><figDesc>Fig. 2 depicts the results of an estimation of the response time to a request for a centralized client-server t_rrt_c-s and a distributed t_rrt_p2p Cloud architecture for different numbers of concurrent users.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_159"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Results of the response time estimation</figDesc><graphic coords="467,143.05,454.55,320.40,185.30" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_161"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Business model canvas</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_162"><head>3</head><label>3</label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_163"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Fault-tolerant Computer Based System (1main system, 2hot standby, 3cold standby, 4diverse system, DCS -Diagnostics Control System).</figDesc><graphic coords="479,147.12,147.36,312.48,164.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_164"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2.Markovian chain which show the reliability behavior of computer-based system with double software updates and automatic restart</figDesc><graphic coords="479,178.08,549.12,251.52,103.44" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_165"><head>12</head><label></label><figDesc>The first experiment is conducted for the condition where the duration of the first software update is significantly shorter than the duration of the second update. The duration of the first update is given within 10 -50 hours, and the duration of the second update -200 hours. The experiment is conducted with the following parameters FTCS: hw=1•10 -5 hour -1 ; sw11=2•10 -3 hour -1 , sw12=1•10 -3 hour -1 ; swerror=1•10 -2 hour -1 ; Trest=6 min; Tswitch; Trep=200 hour; Tup2=200 hour; (line 1 -Tup1=10 hour; line2 -Tup1=20 hour; line3 -Tup1=30 hour; line4 -Tup1=40 hour; line5 -Tup1=50 hour).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_166"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Dependencies of availability function of the FTCS on values of the software update durations (duration of the first software update for 10 to 50 hours; the duration of the second firmware update -200 hours). The second experiment is conducted for the condition where the duration of the first SW update is significantly longer then the duration of the second SW update. The duration of the first update is 200 hours and the duration of the second update is given within 10 -50 hours. The experiment is conducted with the following parameters FTCS: hw=1•10 -5 hour -1 ; sw11=2•10 -3 hour -1 , sw12=1•10 -3 hour -1 ; swerror=1•10 -2 hour -1 ; Trest=6 min; Tswitch; Trep=200 hour; Tup1=200 hour; (line 1 -Tup2=10 hour; line2 -Tup2=20 hour; line3 -Tup2=30 hour; line4 -Tup2=40 hour; line5 -Tup2=50 hour).</figDesc><graphic coords="487,150.72,243.60,294.96,212.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_167"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Dependencies of availability function of the FTCS on the values of software update duration (duration of the first software update -200 hours; the duration of the second firmware update from 10 to 50 hours).</figDesc><graphic coords="488,146.16,147.36,304.56,208.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_168"><head></head><label></label><figDesc>Comparison in sizes | RN | and | RE | of ranges RN and RE for the input data of normal and emergency modes. In case | RN | &gt; | RE | simulation of the DC is running at the input words of emergency mode for determining the sets EO-0, EO-1, EO-2 and EO-3 of points with observability of OE: 0, 1, 2 and 3. The points of the set EO-0 are excluded from consideration as they cannot be PHP. For the other points, the simulation of DC is running at the input words of normal mode for determining the sets NO-0, NO-1, NO-2, NO-3 of points with observability of ON: 0, 1, 2, 3 and identification of PHP, according to Table 1.  In case | RN | ≤ | RE | simulation of the DC is running at the input words of normal mode for determining the sets NO-0, NO-1, NO-2 and NO-3 of points with observability of ON: 0, 1, 2 and 3. The points of the set NO-3 are excluded from consideration. The simulation of the DC is running at the input words of emergency mode to determine the sets EC-1 and EC-2 of points with controllability of CE: 1 and 2. The points of the sets NO-1  EC-1 and NO-2  EC-2 are excluded from consideration.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_169"><head></head><label></label><figDesc>The solution is considered for the three DC functioning in I&amp;CS in different conditions: a) RN = 0  23 and RE = 24  31; b) RN = 0  15 and RE = 16  31; c) RN = 8  23 and RE = 0  7, 24  31. A description of the function F and ranges RN and RE are shown in Table</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_170"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The circuit of DC</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_171"><head>1 .</head><label>1</label><figDesc>to show experimentally that LUT-containers, in which DWMs were embedded with the help of the proposed technology acquire their original value after DWM extraction; 2. to indicate the degree of change of the main characteristics of containers after DWM embedding in them. The main characteristics are considered to be the following ones: a) maximal clock signals frequency expressing the limits of processi ng s peed withi n the fram es of one fam ily of target chi ps; b) energy consumption of the input-output system of a chip; c) energy consumption of the chip core; d) thermal dissipation of a chip.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_172"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Two types of well-characterized architectures 2oo3 (left) and 1oo2D (right)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_173"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Sequential architecture of safety redundant control systems 1oo2S</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_174"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Decomposition of 1oo2D architecture</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_175"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Simplified model of sequential architecture 1oo1S</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_176"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Decomposition of 1oo2S architectureFor the preliminary evaluation of design safety advantages, it's assumed that set of proper input signals p  P or faults q  Q are used for all sub-channels A,B,C with set of internal conditionals r  R to implement safely output set Z or hazardous output set Z'.For 1oo2D architecture A  B is assumed where diversity mechanisms within sub-channel could be implemented or not. Working states when safety function operates normally is described by formula:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_178"><head></head><label></label><figDesc>k</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_179"><head>)</head><label></label><figDesc>Formation of possible extensions of random sequence {} X by the expression (7) is to compute estimates () one of the known methods of statis-tical modeling of values of independent random coefficients distribution law and transforming of the values obtained by the coordinate functions (</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_180"><head></head><label></label><figDesc>of the procedure for calculating the parameters of the canonical decomposition is shown in Fig.1.The concretization of values</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_181"><head>(</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_183"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Block-diagram of the procedure for calculating the parameters of the canonical decomposition (11).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_184"><head></head><label></label><figDesc>law(20)  and formation using the expression(15)  of the set of possible extensions of the realization of the random sequence within the forecast range k1 [ ... ] I tt  ; ─ verification of conditions of non-crossing by the paths obtained of the boundaries of the admissible region [ ; ] ab of the controlled parameter change X and determination of the estimate of the probability of fail-safe operation of the in-formation system as the ratio of the number of successes to the total number of the experiments conducted.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_186"><head></head><label></label><figDesc>of canonical decomposition(25)  are defined by the formulas:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_188"><head>,</head><label></label><figDesc></figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_192"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Conceptual model</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_193"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Behaviour of handle request method</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_194"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. A simple service system.</figDesc><graphic coords="552,194.15,215.75,218.15,145.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_195"><head>Table 1 .</head><label>1</label><figDesc>The structure function of the simple service</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_196"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Graphical and mathematical interpretation of typical structures of Binary-State System.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_197"><head></head><label></label><figDesc>The bridge system:(x) = (x1x2)(x4x5)(x1x3x5)(x2x3x4)The k-out-of-n system: of these MSS in MVL terms are declared by OR () and AND () MVL functions: OR(a, b) = MAX(a, b) and AND(a, b) = MIN(a, b).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_198"><head></head><label></label><figDesc>si, x) = (x1,…, xi-1, s, xi+1,…, xn); ( s ~, x) = (x1,…, xi-1, s ~, xi+1,…, xn); s, s ~ {0,…, mi -1}, s  s ~ and j, j ~ {0,…, M -1}, j  j ~.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_199"><head></head><label></label><figDesc>in form of flow graph. The derivative (10)/x1(10) has two non-zero values that agrees with state vectors: x = (x1, x2, x3) = (1  0,0,1) and x = (x1, x2, x3) = (1  0,0,2).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_200"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Calculation of the Direct Partial Logic Derivative (10)/x1(10). The Direct Partial Logic Derivative (7) allows investigating boundary states of a MSS for which component state xi change from s to s ~ causes the system performance level change from j to j ~. Therefore, this derivative allows calculating exact boundary states of the i-th system component for MSS performance level j that agree to state vectors x = (x1, x2,…, xn). All possible changes of the i-th system</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_201"><head></head><label></label><figDesc>= 1, …, p and p &lt; n). So, changes of some components states correspond with change of a variables vector x (p) = (xi 1 , xi 2 , …, xi p ). Every variable values of this vector changes form</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_202"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Calculation of the Direct Partial Logic Derivative (10)/ x1(10) x3(21).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_203"><head>.</head><label></label><figDesc>vector state x = (x1,…, xi,…, xn) = (a1,…, si,…, an) for which (a1,…, si,…, an) = j and (a1,…, i s ~,…, an) = j ~. This state is calculate as non-zero value of Direct Partial Logic Derivative (7). The exact boundary state for MSS performance level j depending on p components xi 1 , xi 2 , …, is indicated by vector state x = (x1,…, xi 1 ,…, xi p ,…, xn) = (a1,…, si 1 ,…, si p ,…, an) for which (a1,…, si 1 ,…, si p ,…, an) = j This state is calculate as non-zero value of Direct Partial Logic Derivative (8).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_204"><head></head><label></label><figDesc>Next measure is defined the probability of boundary state of MSS performance level j depending of all component state change from s to s ~: probability of MSS performance level change depending on the change of the i-th system component from state s to s ~ is calculated according to:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_205"><head>x</head><label></label><figDesc>: x = (1,0,1) and x = (1,0,2).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_206"><head></head><label></label><figDesc>boundary state for this system failure depending on the first component is calculated based on(11)  as: Therefore according to(16)  the service system failure depending on the breakdown of the first service point is 0.098. By the similar way the probability of this system failure depending on the breakdown of the second service point is calculated and this boundary states for the system failure depending the fault of infrastructure (the third component):</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_207"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Calculation of the Direct Partial Logic Derivative (10)/ x1(10) x3(21).</figDesc><graphic coords="562,190.10,204.70,215.25,140.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_208"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Graph of state and transitions with split state of catastrophic failure</figDesc><graphic coords="570,124.80,180.00,340.36,153.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_209"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Generalized diagram of technique of estimation of safety and reliability indexes basing on the graph of states and transitions with the split failure state Procedure of filtering inoperable states from whole phase space is carried out by the analysis of the state vector component, comparing them with the critical failure</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_210"><head>Fig. 4 .</head><label>4</label><figDesc>Fig.4. The set of formal parameters</figDesc><graphic coords="573,124.80,291.36,326.16,115.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_211"><head>Fig . 5 .Fig. 3 .</head><label>53</label><figDesc>Fig .5. State vector components and failure condition</figDesc><graphic coords="573,124.80,436.32,309.12,124.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_212"><head>Fig. 6 .</head><label>6</label><figDesc>Fig.6. The tree of modification rules of state vector</figDesc><graphic coords="574,134.16,147.36,304.80,130.56" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_213"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. Graph of state and transitions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_214"><head></head><label></label><figDesc>1.    </figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_215"><head>Fig. 8 .</head><label>8</label><figDesc>Fig.8. Fault tree</figDesc><graphic coords="575,125.04,339.84,243.36,225.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_216"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. Minimal cut sets basing on fault tree</figDesc><graphic coords="576,125.04,175.92,342.72,85.68" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_217"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Graph models of scenarios of web-system availability considering different options of vulnerability elimination</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_218"><head>1 Fig. 2 .</head><label>12</label><figDesc>Fig. 2. Reliability block diagram and Markov's model of the web-system without considering system vulnerabilities</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_220"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Marked Markov's graph for МА-1Marked Markov's graph is shown on Fig.3. As during these activities it is possible to detect and eliminate more than one vulnerability [1…nv], we use a special parameter αj which defines probability of detection of j-th (j  [1…nv]) vulnerabilities. Apparently, Σαj = 1, and values α1, α2,… αj,… αnv are distributes on discreet law. For calculation of geometrical distribution law αj was used with parametersμ р=α1=0.7 (probability of detection of the single vulnerability) and q=1-р=0.3 (Table3).Initially (state S0) web-system works considering failures and recovering of DNS, DHCP и Routing services (states S1-S3). After attack on DNS (transition to state S5</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_221"><head>Fig. 4 .Fig. 5 .</head><label>45</label><figDesc>Fig. 4. Diagram of dependency of availability function for the model МА-1 on different probabilities α1</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_222"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. Marked Markov's graph for МА-2</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_223"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. Combining of the models MA-1 and MA-2 (solid line)</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="44,124.80,147.35,346.55,150.25" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="68,137.16,327.36,321.00,222.84" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="85,143.28,149.28,313.68,165.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="254,184.80,295.90,254.15,220.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="277,124.80,193.45,340.10,190.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2 .</head><label>2</label><figDesc>Quantitative indicators of the use of ICT by graduate students for working with a DC.</figDesc><table><row><cell>Do not Use</cell><cell>Rarely Use</cell><cell>Always use</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 1 .</head><label>1</label><figDesc>The extract from the curriculum of the speciality "Mathematics*"</figDesc><table><row><cell>Course</cell><cell cols="2">Feachers</cell><cell>Note</cell></row><row><cell>Methodology</cell><cell>Semester</cell><cell>6;7;8</cell><cell>The course contains the module "Computer</cell></row><row><cell>of</cell><cell>Credits</cell><cell>2,5;2;2</cell><cell>support for learning mathematics" -7-th</cell></row><row><cell>mathematics</cell><cell cols="2">Class hours 46;46;44</cell><cell>semester, 12 hours.</cell></row><row><cell>Teaching</cell><cell>Semester</cell><cell>8</cell><cell>At the beginning of the third quarter, within 2 months, on the basis of city schools</cell></row><row><cell>practice</cell><cell>Credits</cell><cell>6</cell><cell>It is supposed to teach 10 math lessons at 5-9 classes</cell></row><row><cell>Special course</cell><cell cols="2">Semester Credits Class hours 50 8 3,5</cell><cell>It is supposed to study different dynamic math-ematics software during solving algebra, geome-try, analysis problems</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 .</head><label>2</label><figDesc>The questionnaire</figDesc><table><row><cell>№</cell><cell>Questionnaire</cell><cell>Answers</cell></row><row><cell cols="2">1. Do You need to use DMS at the lessons of algebra (planimetry,</cell><cell>Yes</cell></row><row><cell></cell><cell>solid geometry, mathematical analysis)? Why?</cell><cell>Yes, not at all</cell></row><row><cell></cell><cell></cell><cell>No</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 5 .</head><label>5</label><figDesc>The survey of the willingness to use DMS in teaching of different subjects</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Question. Do You wish to use DMS at the lessons of:</head><label></label><figDesc></figDesc><table><row><cell></cell><cell cols="3">Quantitative indices</cell><cell cols="5">Indices of the McNemar's test (α=0,05)</cell></row><row><cell></cell><cell>a b</cell><cell>c d</cell><cell>N</cell><cell>b+с</cell><cell>Т ек</cell><cell>Р</cell><cell>Н о</cell><cell>Н а</cell></row><row><cell>algebra</cell><cell cols="4">6 11 2 11 30 13</cell><cell>2</cell><cell>0,011</cell><cell>0</cell><cell>1</cell></row><row><cell>planimetry</cell><cell cols="2">2 15 5 8</cell><cell cols="2">30 20</cell><cell>5</cell><cell>0,021</cell><cell>0</cell><cell>1</cell></row><row><cell>analysis</cell><cell cols="4">5 12 3 10 30 15</cell><cell>3</cell><cell>0,018</cell><cell>0</cell><cell>1</cell></row><row><cell>solid geometry</cell><cell cols="2">6 14 4 6</cell><cell cols="2">30 18</cell><cell>4</cell><cell>0,015</cell><cell>0</cell><cell>1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 6 .</head><label>6</label><figDesc>The survey of the willingness to use some DMS</figDesc><table><row><cell>Question. Do You wish to use:</cell><cell>a</cell><cell cols="3">Quantitative indices b c d N</cell><cell cols="5">Indices of the McNemar's test (α=0,05) b+с Т ек Р Н о Н а</cell></row><row><cell>Gran</cell><cell>8</cell><cell>11</cell><cell>2 9</cell><cell>30</cell><cell>13</cell><cell>2</cell><cell>0,011</cell><cell>0</cell><cell>1</cell></row><row><cell>DG</cell><cell>5</cell><cell>12</cell><cell>3 10</cell><cell>30</cell><cell>15</cell><cell>3</cell><cell>0,018</cell><cell>0</cell><cell>1</cell></row><row><cell>GG</cell><cell>2</cell><cell>12</cell><cell>2 14</cell><cell>30</cell><cell>14</cell><cell>2</cell><cell>0,006</cell><cell>0</cell><cell>1</cell></row><row><cell>MathKit</cell><cell>6</cell><cell>14</cell><cell>4 6</cell><cell>30</cell><cell>18</cell><cell>4</cell><cell>0,015</cell><cell>0</cell><cell>1</cell></row><row><cell>GS</cell><cell>12</cell><cell>10</cell><cell>6 2</cell><cell>30</cell><cell>16</cell><cell>6</cell><cell>0,227</cell><cell>1</cell><cell>0</cell></row><row><cell>Cabri</cell><cell>20</cell><cell>6</cell><cell>3 1</cell><cell>30</cell><cell>9</cell><cell>3</cell><cell>0,254</cell><cell>1</cell><cell>0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head>Table 7 .</head><label>7</label><figDesc>The attractiveness of software (%)</figDesc><table><row><cell></cell><cell></cell><cell>Gran</cell><cell></cell><cell>DG</cell><cell></cell><cell>GG</cell></row><row><cell>Year</cell><cell>T</cell><cell>S</cell><cell>T</cell><cell>S</cell><cell>T</cell><cell>S</cell></row><row><cell>2010</cell><cell>0,93</cell><cell>0,59</cell><cell>0,74</cell><cell>0,68</cell><cell>0,28</cell><cell>0,68</cell></row><row><cell>2011</cell><cell>0,75</cell><cell>0,71</cell><cell>0,51</cell><cell>0,80</cell><cell>0,32</cell><cell>0,91</cell></row><row><cell>2012</cell><cell>0,86</cell><cell>0,71</cell><cell>0,83</cell><cell>0,66</cell><cell>0,45</cell><cell>0,79</cell></row><row><cell>2013</cell><cell>0,68</cell><cell>0,43</cell><cell>0,54</cell><cell>0,54</cell><cell>0,68</cell><cell>0,78</cell></row><row><cell>2014</cell><cell>0,40</cell><cell>0,32</cell><cell>0,13</cell><cell>0,48</cell><cell>0,66</cell><cell>0,97</cell></row><row><cell></cell><cell></cell><cell>MathKit</cell><cell></cell><cell>GS</cell><cell></cell><cell>Cabri</cell></row><row><cell>Year</cell><cell>T</cell><cell>S</cell><cell>T</cell><cell>S</cell><cell>T</cell><cell>S</cell></row><row><cell>2010</cell><cell>0,11</cell><cell>0,32</cell><cell>0,00</cell><cell>0,24</cell><cell>0,00</cell><cell>0,00</cell></row><row><cell>2011</cell><cell>0,11</cell><cell>0,57</cell><cell>0,02</cell><cell>0,43</cell><cell>0,00</cell><cell>0,00</cell></row><row><cell>2012</cell><cell>0,17</cell><cell>0,66</cell><cell>0,08</cell><cell>0,32</cell><cell>0,00</cell><cell>0,11</cell></row><row><cell>2013</cell><cell>0,19</cell><cell>0,86</cell><cell>0,03</cell><cell>0,35</cell><cell>0,05</cell><cell>0,08</cell></row><row><cell>2014</cell><cell>0,13</cell><cell>0,94</cell><cell>0,00</cell><cell>0,19</cell><cell>0,07</cell><cell>0,13</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 8 .</head><label>8</label><figDesc>The survey of the readiness to use DMS in teaching of different subjects</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_8"><head>Do You feel the readiness to use DMS at the lessons of:</head><label></label><figDesc></figDesc><table><row><cell></cell><cell cols="4">Quantitative indices</cell><cell cols="3">Indices of the McNemar's test (α=0,05)</cell></row><row><cell></cell><cell>a b</cell><cell>c</cell><cell>d</cell><cell>N</cell><cell cols="3">n=в+с T_2 Н 0 Н а</cell></row><row><cell>algebra</cell><cell>6 17</cell><cell cols="3">7 10 40</cell><cell>24</cell><cell>4,17</cell><cell>0 1</cell></row><row><cell>planimetry</cell><cell>2 21</cell><cell>9</cell><cell></cell><cell>8 40</cell><cell>30</cell><cell>4,80</cell><cell>0 1</cell></row><row><cell>analysis</cell><cell>5 18</cell><cell cols="3">7 10 40</cell><cell>25</cell><cell>4,84</cell><cell>0 1</cell></row><row><cell>solid geometry</cell><cell cols="2">4 17 15</cell><cell></cell><cell>4 40</cell><cell>32</cell><cell>0,13</cell><cell>1 0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_9"><head>Table 4 .</head><label>4</label><figDesc>The feature checklist of video lecture for open source MOOC platforms.</figDesc><table><row><cell>Feature Level</cell><cell>Control</cell><cell></cell><cell></cell><cell>Sakai</cell><cell>Stanford OpenEdX</cell><cell>Univ. of Auckland</cell><cell>CourseBuilder</cell></row><row><cell></cell><cell cols="2">Cuirrent Time</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>Total time</cell><cell></cell><cell></cell><cell>X</cell><cell></cell><cell></cell></row><row><cell></cell><cell>Play/Pause</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">Volume Slider</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Basic</cell><cell cols="2">Full screem mode</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">Modify Speed</cell><cell></cell><cell>X</cell><cell></cell><cell>X</cell></row><row><cell></cell><cell cols="2">Caption On/Off</cell><cell></cell><cell>X</cell><cell></cell><cell></cell></row><row><cell>Video</cell><cell>Navigation</cell><cell></cell><cell></cell><cell>X</cell><cell></cell><cell>X</cell></row><row><cell>Interface</cell><cell cols="2">Report problem</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">Go to Discussion Forum</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Advance</cell><cell cols="3">HD support Caption multilingual support</cell><cell>X</cell><cell> X</cell><cell>X X</cell></row><row><cell></cell><cell>Poster Frame</cell><cell></cell><cell></cell><cell>X</cell><cell></cell><cell>X</cell></row><row><cell>Optional</cell><cell cols="3">Change video player Change Caption format</cell><cell>X</cell><cell>X X</cell><cell>X </cell></row><row><cell></cell><cell cols="3">Keyboard Shortcut Help</cell><cell>X</cell><cell>X</cell><cell>X</cell></row><row><cell>Basic</cell><cell cols="3">Download Transcript Srt Video mp3/mp4</cell><cell></cell><cell>X </cell><cell>X </cell></row><row><cell></cell><cell>Progress bar</cell><cell></cell><cell></cell><cell>X</cell><cell>X</cell><cell>X</cell></row><row><cell></cell><cell cols="3">Download Transcript Text</cell><cell></cell><cell></cell><cell>X</cell></row><row><cell>Advance</cell><cell></cell><cell cols="2">Slides Pdf</cell><cell></cell><cell>X</cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">Video Quality</cell><cell>X</cell><cell>X</cell><cell>X</cell></row><row><cell>Video</cell><cell cols="3">Download Transcript pdf</cell><cell></cell><cell>X</cell><cell>X</cell></row><row><cell>Lecture</cell><cell></cell><cell cols="2">Slides ppt</cell><cell></cell><cell>X</cell><cell></cell></row><row><cell>Content</cell><cell>Progress bar</cell><cell></cell><cell></cell><cell>X</cell><cell>X</cell><cell>X</cell></row><row><cell>Optional</cell><cell>Embedded Quiz</cell><cell>L 2</cell><cell>Grading Controls</cell><cell></cell><cell></cell><cell> X</cell></row><row><cell></cell><cell></cell><cell></cell><cell>Display reponse</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>L</cell><cell>Allowed attempts &gt;1</cell><cell></cell><cell></cell><cell>X</cell></row><row><cell></cell><cell></cell><cell>1</cell><cell>Show Quiz presence</cell><cell></cell><cell></cell></row></table><note>X</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_10"><head>Table 5 .</head><label>5</label><figDesc>The presentation style of Video lecture in some open source MOOC platforms.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_11"><head>Table 6 .</head><label>6</label><figDesc>Percentage of features supported by some open source MOOC platforms.</figDesc><table><row><cell>Component</cell><cell>Controls</cell><cell>Sakai</cell><cell>Stanford OpenEdX</cell><cell>Univ. of Auckland CourseBuilder</cell></row><row><cell></cell><cell>Display Time</cell><cell>50%</cell><cell>100%</cell><cell>100%</cell></row><row><cell>Video Interface</cell><cell>View Setting Advanced Setting</cell><cell>50% 0%</cell><cell>100% 40%</cell><cell>66% 20%</cell></row><row><cell></cell><cell>Help Support</cell><cell>66%</cell><cell>66%</cell><cell>66%</cell></row><row><cell>Video Lecture</cell><cell>Lecture</cell><cell>38%</cell><cell>25%</cell><cell>37%</cell></row><row><cell>Content</cell><cell>Embedded Quiz</cell><cell>0%</cell><cell>0%</cell><cell>50%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_12"><head>Table 7 .</head><label>7</label><figDesc>Percentage of feature level by some open source MOOC platforms.</figDesc><table><row><cell>Component</cell><cell>Level of Feature</cell><cell>Sakai</cell><cell>Stanford OpenEdX</cell><cell>Univ. of Auckland CourseBuilder</cell></row><row><cell></cell><cell>Basic</cell><cell>60%</cell><cell>100%</cell><cell>80%</cell></row><row><cell>Video Interface</cell><cell>Advance</cell><cell>0%</cell><cell>50%</cell><cell>0%</cell></row><row><cell></cell><cell>Optional</cell><cell>0%</cell><cell>25%</cell><cell>25%</cell></row><row><cell>Video Lecture Content</cell><cell>Basic Advance</cell><cell>50% 33%</cell><cell>50% 33%</cell><cell>50% 33%</cell></row><row><cell></cell><cell>Optional</cell><cell>12%</cell><cell>12%</cell><cell>24%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_13"><head>Table 1 .</head><label>1</label><figDesc>Coordinates of membership function transition lines</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_14"><head>Table 2 .</head><label>2</label><figDesc>Points accrued for a completed task depending on student's answer matching the reference answer</figDesc><table><row><cell>Type of task</cell><cell></cell><cell></cell><cell cols="7">Student's answer matches the reference one</cell><cell></cell></row><row><cell>Type 1</cell><cell></cell><cell>False</cell><cell></cell><cell>¼</cell><cell></cell><cell>1/2</cell><cell></cell><cell>¾</cell><cell></cell><cell>True</cell></row><row><cell>Type 2</cell><cell></cell><cell>½</cell><cell></cell><cell>5/8</cell><cell></cell><cell>3/4</cell><cell></cell><cell>7/8</cell><cell></cell><cell>1</cell></row><row><cell>Strictness pa-rameter value</cell><cell>Strict</cell><cell>Not strict</cell><cell>Strict</cell><cell>Not strict</cell><cell>Strict</cell><cell>Not strict</cell><cell>Strict</cell><cell>Not strict</cell><cell>Strict</cell><cell>Not strict</cell></row><row><cell>Answer eval-uated, points</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>30</cell><cell>3</cell><cell>70</cell><cell>6</cell><cell>90</cell><cell>100</cell><cell>100</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_18"><head>Table 1 .</head><label>1</label><figDesc>Results of comparative analysis for different POOT</figDesc><table><row><cell>POOT features / Estimation marks</cell><cell></cell><cell cols="2">Type of POOT</cell></row><row><cell></cell><cell cols="2">AOSD FOSD</cell><cell>COSD</cell></row><row><cell>Modeling CF features at a higher level of abstraction</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Implementation of homogeneous CF</cell><cell>+</cell><cell>+/-</cell><cell>+/-</cell></row><row><cell>Implementation of heterogeneous CF</cell><cell>+/-</cell><cell>+</cell><cell>+</cell></row><row><cell>Provide CF layers separately from a OOA-class</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Context-dependent activation/deactivation of layers</cell><cell>-</cell><cell>-</cell><cell>+</cell></row><row><cell>Possibility to use several approaches simultaneously</cell><cell>+ /-</cell><cell>+ /-</cell><cell>-</cell></row><row><cell>Availability of CASE-tools to support this POOT</cell><cell>+</cell><cell>+</cell><cell>+ /-</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_19"><head></head><label></label><figDesc>for more details);</figDesc><table><row><cell>Connector</cell><cell>=</cell><cell>*# 2 . 0</cell><cell>ector BinaryConn</cell><cell>+</cell><cell>*# 3 . 0</cell><cell>ctor MultyConne</cell><cell>+</cell><cell>*# 5 . 0</cell><cell>tor CaseConnec</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_20"><head>Table 2 .</head><label>2</label><figDesc>The values of architectural complexity for the different POOT</figDesc><table><row><cell>POOT type</cell><cell>CC for</cell><cell>CC for</cell><cell>CC for ports</cell><cell>Summarized</cell></row><row><cell></cell><cell>components</cell><cell>connectors</cell><cell>(a.u.)</cell><cell>values of CC</cell></row><row><cell></cell><cell>(a.u.)</cell><cell>(a.u.)</cell><cell></cell><cell>(a.u.)</cell></row><row><cell>AOSD</cell><cell>4,8</cell><cell>1</cell><cell>4,3</cell><cell>10,1</cell></row><row><cell>FOSD</cell><cell>3,6</cell><cell>1</cell><cell>3,9</cell><cell>8,5</cell></row><row><cell>COSD</cell><cell>2,8</cell><cell>0,7</cell><cell>4,1</cell><cell>7,6</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_21"><head>Table 3 .</head><label>3</label><figDesc>A symbolic representation form for the description for FPR</figDesc><table><row><cell>Symbolic form</cell><cell>Description</cell></row><row><cell>Z</cell><cell>Zero</cell></row><row><cell>PS</cell><cell>Positive Small</cell></row><row><cell>PM</cell><cell>Positive Middle</cell></row><row><cell>PB</cell><cell>Positive Big</cell></row><row><cell>PH</cell><cell>Positive Huge</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_23"><head>Table 4 .</head><label>4</label><figDesc>Effectiveness of usage of POOT in a target system</figDesc><table><row><cell>(P)OOT</cell><cell>Architectural</cell><cell>Residual crosscutting</cell><cell>Effectiveness</cell></row><row><cell></cell><cell>complexity (a.u.)</cell><cell>ratio (%)</cell><cell>level</cell></row><row><cell></cell><cell></cell><cell></cell><cell>(%)</cell></row><row><cell>OOP</cell><cell>122.51</cell><cell>69.52</cell><cell>6,7</cell></row><row><cell>AOSD</cell><cell>79.43</cell><cell>0,15</cell><cell>73,3</cell></row><row><cell>FOSD</cell><cell>116.16</cell><cell>29.06</cell><cell>34,4</cell></row><row><cell>COSD</cell><cell>115.88</cell><cell>8.78</cell><cell>32,8</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_26"><head>Table 1 .</head><label>1</label><figDesc>Predicted relative values of characteristics, calculated integrative indicators and degree of success of four software projects implementation</figDesc><table><row><cell>Characteristics and indica-</cell><cell>Values for</cell><cell>Values for</cell><cell>Values for</cell><cell>Values for</cell></row><row><cell>tors of software project</cell><cell>Project1</cell><cell>Project2</cell><cell>Project3</cell><cell>Project4</cell></row><row><cell>Cost Cs ANN</cell><cell>0.8</cell><cell>0.22</cell><cell>0.39</cell><cell>0.59</cell></row><row><cell>Duration Dsp ANN</cell><cell>0.9</cell><cell>0.19</cell><cell>0.41</cell><cell>0.57</cell></row><row><cell>Complexity Cx ANN</cell><cell>0.75</cell><cell>0.31</cell><cell>0.37</cell><cell>0.62</cell></row><row><cell>Usability Ub ANN</cell><cell>0.85</cell><cell>0.15</cell><cell>0.5</cell><cell>0.56</cell></row><row><cell>Cross-platformCp ANN</cell><cell>0.87</cell><cell>0.21</cell><cell>0.47</cell><cell>0.57</cell></row><row><cell>Quality Qs ANN</cell><cell>0.89</cell><cell>0.17</cell><cell>0.49</cell><cell>0.61</cell></row><row><cell>Integrative indicator Iip Sp</cell><cell>1,847</cell><cell>0,113</cell><cell>0,501</cell><cell>0,894</cell></row><row><cell>The degree of success P Iip</cell><cell>0.7111</cell><cell>0,0435</cell><cell>0.1929</cell><cell>0.3442</cell></row><row><cell>Thus, the results of Table</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_27"><head>Table 2 .</head><label>2</label><figDesc>Examples of compensation of characteristics for different software projects</figDesc><table><row><cell>Characteristics and indica-</cell><cell>Values</cell><cell>Values</cell><cell>Values</cell><cell>Values</cell><cell>Values</cell></row><row><cell>tors of project</cell><cell>for Pr.4</cell><cell>for Pr.5</cell><cell>for Pr.6</cell><cell>for Pr.7</cell><cell>for Pr.8</cell></row><row><cell>Cost Cs ANN</cell><cell>0.59</cell><cell>0.7</cell><cell>1</cell><cell>1</cell><cell>0.93</cell></row><row><cell>Duration Dsp ANN</cell><cell>0.57</cell><cell>0.57</cell><cell>0.57</cell><cell>0.57</cell><cell>0.57</cell></row><row><cell>Complexity Cx ANN</cell><cell>0.62</cell><cell>0.62</cell><cell>0.62</cell><cell>0.62</cell><cell>0.62</cell></row><row><cell>Usability Ub ANN</cell><cell>0.56</cell><cell>0.56</cell><cell>0.56</cell><cell>0.403</cell><cell>0.56</cell></row><row><cell>Cross-platformCp ANN</cell><cell>0.57</cell><cell>0.57</cell><cell>0.57</cell><cell>0.57</cell><cell>0.57</cell></row><row><cell>Quality Qs ANN</cell><cell>0.61</cell><cell>0.503</cell><cell>0.289</cell><cell>0.403</cell><cell>0.33</cell></row><row><cell>Integrative indicator Iip Sp</cell><cell>0.894</cell><cell>0.894</cell><cell>0.894</cell><cell>0.894</cell><cell>0.894</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_28"><head>Table 3 .</head><label>3</label><figDesc>Testing of the stability and acceptability of compensatory effects of the characteristics for eight software projects</figDesc><table><row><cell>Values</cell><cell>Pr.1</cell><cell>Pr.2</cell><cell>Pr.3</cell><cell>Pr.4</cell><cell>Pr.5</cell><cell>Pr.6</cell><cell>Pr.7</cell><cell>Pr.8</cell></row><row><cell>Sine of angle Qs</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>-</cell><cell>+</cell><cell>-</cell></row><row><cell>Sine of angle Cs</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Sine of angle Cx</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Sine of angle Dsp</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Sine of angle Ub</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Sine of angle Cp</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Indicator Ace Sp</cell><cell cols="8">True True True True True False True False</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_31"><head>Table 1 .</head><label>1</label><figDesc>Values of the coordinate function</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">  X i</cell><cell> / 3 ,</cell><cell>i </cell><cell>(1) 1   1,12</cell><cell>  i</cell><cell>for random sequence</cell></row><row><cell></cell><cell>2</cell><cell>3</cell><cell>4</cell><cell></cell><cell>5</cell><cell></cell><cell></cell><cell>6</cell><cell>7</cell><cell></cell><cell>8</cell><cell>9</cell><cell>10</cell><cell>11</cell><cell>12</cell></row><row><cell>1</cell><cell cols="12">0,14 1,46 0,12 0,92 1,49 0,06 0,22 3,06 -0,36 7,11</cell><cell>5,66</cell></row><row><cell>2</cell><cell>1</cell><cell cols="11">6,50 0,34 3,81 5,70 0,37 1,56 12,5 -2,41 28,72 22,1</cell></row><row><cell>3</cell><cell>0</cell><cell>1</cell><cell cols="10">0,08 0,63 1,01 0,04 0,15 2,13 -0,24 4,91</cell><cell>3,92</cell></row><row><cell>4</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell cols="9">4,22 9,07 0,72 1,12 14,1 -0,18 33,40 25,3</cell></row><row><cell>5</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>1</cell><cell></cell><cell cols="6">1,22 0,20 0,29 3,02 -0,25 6,42</cell><cell>5,46</cell></row><row><cell>6</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>1</cell><cell cols="4">0,08 0,15 1,61 -0,14 3,79</cell><cell>2,79</cell></row><row><cell>7</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>0</cell><cell>1</cell><cell></cell><cell cols="2">0,24 2,70 -0,53 6,16</cell><cell>5,05</cell></row><row><cell>8</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>0</cell><cell>0</cell><cell></cell><cell>1</cell><cell>5,69 -0,50 11,17 9,52</cell></row><row><cell>9</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell>1</cell><cell>-0,07 2,12</cell><cell>1,82</cell></row><row><cell>10</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>-6,08 -4,1</cell></row><row><cell>11</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>0,83</cell></row><row><cell>12</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell></cell><cell></cell><cell>0</cell><cell>0</cell><cell></cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell></row><row><cell cols="13">2. Outcoming signal of each of separate neuron of outcoming layer was forming as</cell></row><row><cell></cell><cell></cell><cell></cell><cell cols="2">  y k</cell><cell></cell><cell>1 M</cell><cell>f</cell><cell cols="5">00 KN ki ij w f    ij w x       </cell><cell>.</cell></row><row><cell cols="13">3. As activation function of each separate neuron continuous sigmoid bipolar func-tion     f x th x  was being used.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_32"><head>Table 2 .</head><label>2</label><figDesc>Results of the diagnostics of cardiovascular diseases (% of correct solutions)</figDesc><table><row><cell></cell><cell>Healthy heart</cell><cell>Hypertrophy of myocardium</cell><cell>Severe arrhythmia</cell><cell>Stenocardia of the 2d function-al class</cell><cell>Neurocirculatory dystonia of light degree</cell></row><row><cell>Method on the</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>basis of canoni-cal expansion</cell><cell>100%</cell><cell>100%</cell><cell>100%</cell><cell>98%</cell><cell>97%</cell></row><row><cell>Method on the</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>basis of neural network</cell><cell>89%</cell><cell>92%</cell><cell>94%</cell><cell>86%</cell><cell>83%</cell></row><row><cell>Method on the</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>basis of fuzzy logic</cell><cell>91%</cell><cell>90%</cell><cell>93%</cell><cell>91%</cell><cell>89%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_34"><head>Table 1 . The Prognostic Values of Time Series Forecasting Models Elements of Time Series t</head><label>1</label><figDesc></figDesc><table><row><cell cols="16">Thus we obtain optimal value of the prehistory parameter in the autoregression model for a fixed   k τ n 2 1 δ δ ,..., δ , δ min   . The variable *  k determines the  * τ   0    .</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="12">After determining the *  k for a fixed t </cell><cell>    , consider the main base 0</cell></row><row><cell cols="10">forecasting models</cell><cell cols="2">M 1</cell><cell cols="2">M , 2</cell><cell cols="2">M ,...</cell><cell>q</cell><cell>of time series with the fixed step of the forecast  ,</cell></row><row><cell cols="16">i.e. models on the bases of which a new forecasting scheme are synthesized. Using the</cell></row><row><cell cols="16">results of the forecasting models mentioned above on the time interval</cell></row><row><cell>t</cell><cell></cell><cell>n</cell><cell></cell><cell>k  *</cell><cell></cell><cell>, 1</cell><cell>n</cell><cell></cell><cell>k  *</cell><cell></cell><cell cols="2">, 2</cell><cell cols="2">, </cell><cell>n</cell><cell>, we draw the following table</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_36"><head>Table 3 .</head><label>3</label><figDesc>The Original and Forecasted Volumes of Passenger Traffic</figDesc><table><row><cell>Year</cell><cell>Railway</cell><cell>Sea</cell><cell>River</cell><cell>Automobile (coaches) 1</cell><cell>Aircraft</cell><cell>Under-ground railway</cell></row><row><cell>1980</cell><cell>648869</cell><cell>28478.4</cell><cell>24789</cell><cell>7801058</cell><cell>12492.4</cell><cell>430040</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_37"><head>Table 4 .</head><label>4</label><figDesc>Forecast Errors of Passenger Traffic according to MRE criterion</figDesc><table><row><cell>Forecasting methods</cell><cell cols="3">Kinds of passenger traffic</cell></row><row><cell></cell><cell>Railway</cell><cell>River</cell><cell>Automobile</cell></row><row><cell></cell><cell>Step of the forecast</cell><cell></cell><cell></cell></row><row><cell>Autoregression method</cell><cell></cell><cell>0.0148</cell><cell>0.0115</cell></row><row><cell></cell><cell>0.0041</cell><cell></cell><cell></cell></row><row><cell>The method of least</cell><cell></cell><cell>0.7975</cell><cell>0.1680</cell></row><row><cell>squares with weights</cell><cell>0.015</cell><cell></cell><cell></cell></row><row><cell>Brown's linear model</cell><cell>0.0358</cell><cell>0.0917</cell><cell>0.1478</cell></row><row><cell>Brown's quadratic</cell><cell></cell><cell></cell><cell></cell></row><row><cell>model</cell><cell>0.0159</cell><cell>0.5516</cell><cell>0.086</cell></row><row><cell>Forecasting scheme</cell><cell>0.0039</cell><cell>0.0148</cell><cell>0.0115</cell></row><row><cell></cell><cell>Step of the forecast</cell><cell></cell><cell></cell></row><row><cell>Autoregression method</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0.0045</cell><cell>0.0111</cell><cell>0.0233</cell></row><row><cell>The method of least</cell><cell></cell><cell></cell><cell></cell></row><row><cell>squares with weights</cell><cell>0.0048</cell><cell>0.0683</cell><cell>0.0595</cell></row><row><cell>Brown's linear model</cell><cell>0.0585</cell><cell>0.0757</cell><cell>0.1482</cell></row><row><cell>Brown's quadratic</cell><cell></cell><cell></cell><cell></cell></row><row><cell>model</cell><cell>0.0317</cell><cell>0.2295</cell><cell>0.0797</cell></row><row><cell>Forecasting scheme</cell><cell>0.0031</cell><cell>0.0108</cell><cell>0.0225</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_42"><head></head><label></label><figDesc>Let us consider the set U from Example 1 and construct the (minimal) inference of from U in IR is as follows:</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell>QED.</cell></row><row><cell cols="4">Theorem 2 (Soundness and completeness of IR-calculus). A set S of c-clauses</cell></row><row><cell cols="2">is unsatisfiable if and only if S ⊢</cell><cell>IR</cell><cell>.</cell></row><row><cell cols="4">Proof. The soundness is provided by Prop. 4.</cell></row><row><cell cols="4">Completeness. If S is unsatisfiable set, then S ⊢</cell><cell>IR</cell><cell>by Theorem 1. By Prop.</cell></row><row><cell>3, any inference of</cell><cell cols="3">from S in CR can be transformed into an inference of</cell></row><row><cell cols="4">from S but already in the IR-calculus, that is S ⊢</cell><cell>IR</cell><cell>. QED.</cell></row><row><cell>Example 2.</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_43"><head></head><label></label><figDesc>) ≃ f (x 1 , . . . , x 0 , . . . , x p ) for each p-arity function symbol f occurring in S and for each i = 1, 2, . . . , p.A set S of c-clauses is called equationally unsatisfiable if and only if the set S ∪ S ≃ is unsatisfiable.</figDesc><table><row><cell>∨ f (x 1 , . . . , x</cell><cell>i , . . . , x</cell><cell></cell><cell></cell></row><row><cell></cell><cell>x 1 , . . . , x</cell><cell>i , . . . , x</cell><cell>p ) ∨ R(x 1 , . . . , x 0 , . . . , x</cell><cell>p ) for each</cell></row><row><cell cols="5">p-arity predicate symbol R occurring in S and for each i = 1, 2, . . . , p, (5) x</cell><cell>i ≃ x</cell><cell>o</cell></row></table><note>p</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_46"><head>Table 1 .</head><label>1</label><figDesc>List of indicators</figDesc><table><row><cell>Indicator</cell><cell>Institution</cell><cell>Source</cell><cell>Type of influence</cell></row><row><cell>School life expectancy</cell><cell>UNESCO Statistics Institute for</cell><cell>http://www.uis.unesco.org</cell><cell>Positive</cell></row><row><cell>School enrollment, secondary (% net)</cell><cell>World Bank</cell><cell>http://data.worldbank.org/indica tor/SE.SEC.NENR</cell><cell>Positive</cell></row><row><cell>Internet</cell><cell></cell><cell>http://www.itu.int/en/ITU-</cell><cell></cell></row><row><cell>subscriptions per</cell><cell>ITU</cell><cell>D/Statistics/Pages/stat/default.a</cell><cell>Positive</cell></row><row><cell>100 inhabitants</cell><cell></cell><cell>spx</cell><cell></cell></row><row><cell>Main phone</cell><cell></cell><cell>http://www.itu.int/en/ITU-</cell><cell></cell></row><row><cell>subscriptions per</cell><cell>ITU</cell><cell>D/Statistics/Pages/stat/default.a</cell><cell>Positive</cell></row><row><cell>100 inhabitants</cell><cell></cell><cell>spx</cell><cell></cell></row><row><cell>Cellular</cell><cell></cell><cell>http://www.itu.int/en/ITU-</cell><cell></cell></row><row><cell>subscriptions per</cell><cell>ITU</cell><cell>D/Statistics/Pages/stat/default.a</cell><cell>Positive</cell></row><row><cell>100 inhabitants Gov't Health Expenditures (% of total gov't exp)</cell><cell>World Health Organization</cell><cell>spx http://apps.who.int/gho/data/?th eme=main</cell><cell>Positive</cell></row><row><cell>R&amp;D expenditure as % of GDP</cell><cell>UNESCO Statistics Institute for</cell><cell>http://www.uis.unesco.org</cell><cell>Positive</cell></row><row><cell>Military</cell><cell></cell><cell></cell><cell></cell></row><row><cell>expenditures (% of</cell><cell>SIPRI</cell><cell>http://www.sipri.org/</cell><cell>Negative</cell></row><row><cell>GDP)</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Pupils per teacher in primary school</cell><cell>World Bank</cell><cell>http://data.worldbank.org/indica tor/SE.PRM.ENRL.TC.ZS</cell><cell>Negative</cell></row><row><cell>Corruption perception</cell><cell>Transparency International</cell><cell>http://www.transparency.org/re search/cpi/overview</cell><cell>Positive</cell></row><row><cell>Child mortality</cell><cell></cell><cell></cell><cell></cell></row><row><cell>(children under 5 years per 1000</cell><cell>World Bank</cell><cell>http://data.worldbank.org/indica tor/SH.DYN.MORT</cell><cell>Negative</cell></row><row><cell>births)</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Gini Index</cell><cell>World Bank</cell><cell>http://data.worldbank.org/indica tor/SI.POV.GINI</cell><cell>Negative</cell></row><row><cell>Terrestrial and</cell><cell></cell><cell></cell><cell></cell></row><row><cell>marine protected areas (% of total</cell><cell>World Bank</cell><cell>http://data.worldbank.org/indica tor/ER.PTD.TOTL.ZS</cell><cell>Positive</cell></row><row><cell>territorial area)</cell><cell></cell><cell></cell><cell></cell></row><row><cell>CO2 emissions (metric tons per capita)</cell><cell>World Bank</cell><cell>http://data.worldbank.org/indica tor/EN.ATM.CO2E.PC</cell><cell>Negative</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_47"><head>Table 3 .</head><label>3</label><figDesc>Last 10 countries by K-society Index 2013</figDesc><table><row><cell></cell><cell>The Assets</cell><cell>The Advancement</cell><cell>The Foresightedness</cell><cell>KS</cell><cell>Rank</cell></row><row><cell></cell><cell>Index</cell><cell>Index</cell><cell>Index</cell><cell>Index</cell><cell></cell></row><row><cell>Paraguay</cell><cell>0,280</cell><cell>0,359</cell><cell>0,569</cell><cell>0,402</cell><cell>78</cell></row><row><cell>Senegal</cell><cell>0,145</cell><cell>0,432</cell><cell>0,633</cell><cell>0,403</cell><cell>79</cell></row><row><cell>India</cell><cell>0,278</cell><cell>0,327</cell><cell>0,589</cell><cell>0,398</cell><cell>80</cell></row><row><cell>Madagascar</cell><cell>0,133</cell><cell>0,334</cell><cell>0,543</cell><cell>0,337</cell><cell>81</cell></row><row><cell>Gambia</cell><cell>0,145</cell><cell>0,359</cell><cell>0,455</cell><cell>0,320</cell><cell>82</cell></row><row><cell>Kenya</cell><cell>0,206</cell><cell>0,249</cell><cell>0,492</cell><cell>0,315</cell><cell>83</cell></row><row><cell>Ethiopia</cell><cell>0,052</cell><cell>0,284</cell><cell>0,637</cell><cell>0,324</cell><cell>84</cell></row><row><cell>Mozambique</cell><cell>0,183</cell><cell>0,260</cell><cell>0,494</cell><cell>0,312</cell><cell>85</cell></row><row><cell>Pakistan</cell><cell>0,107</cell><cell>0,182</cell><cell>0,578</cell><cell>0,289</cell><cell>86</cell></row><row><cell>Nigeria</cell><cell>0,074</cell><cell>0,304</cell><cell>0,433</cell><cell>0,270</cell><cell>87</cell></row></table><note>The next one is Mozambique. In accordance to the Fund for Peace methodology the state's current pressure assessment is "Very High Warning". The more dangerous indicators are: Demographic Pressure, Uneven Economic Development, Economy and Public Services.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_48"><head>Table 1 .</head><label>1</label><figDesc>Accuracy comparison of Land Cover30-2010 and GlobeLand30-2010</figDesc><table><row><cell>Product</cell><cell cols="2">Land Cover30-2010</cell><cell cols="2">GlobeLand30-2010</cell></row><row><cell>Class</cell><cell>UA, %</cell><cell>PA, %</cell><cell>UA, %</cell><cell>PA, %</cell></row><row><cell>Artificial</cell><cell>100</cell><cell>87.8</cell><cell>79.5</cell><cell>3.4</cell></row><row><cell>Cropland</cell><cell>93.5</cell><cell>96.2</cell><cell>99.4</cell><cell>85.3</cell></row><row><cell>Forest</cell><cell>95.4</cell><cell>96.2</cell><cell>89.9</cell><cell>95.9</cell></row><row><cell>Grassland</cell><cell>81.4</cell><cell>71.2</cell><cell>34.4</cell><cell>60.5</cell></row><row><cell>Bare Land</cell><cell>91.7</cell><cell>96.4</cell><cell>0.4</cell><cell>57.1</cell></row><row><cell>Water</cell><cell>99.5</cell><cell>99.6</cell><cell>96.6</cell><cell>99.9</cell></row><row><cell>Overall accuracy, %</cell><cell>94.7</cell><cell></cell><cell>89.7</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_49"><head>Table 2 .</head><label>2</label><figDesc>Classification results</figDesc><table><row><cell>No</cell><cell>Class</cell><cell>PA, %</cell><cell>UA, %</cell></row><row><cell>1</cell><cell>Artificial</cell><cell>100.0</cell><cell>97.9</cell></row><row><cell>2</cell><cell>Winter wheat</cell><cell>95.7</cell><cell>91.8</cell></row><row><cell>3</cell><cell>Winter rapeseed</cell><cell>93.5</cell><cell>99.4</cell></row><row><cell>4</cell><cell>Spring crops</cell><cell>40.6</cell><cell>34.6</cell></row><row><cell>5</cell><cell>Maize</cell><cell>90.5</cell><cell>86.8</cell></row><row><cell>6</cell><cell>Sugar beet</cell><cell>94.9</cell><cell>89.6</cell></row><row><cell>7</cell><cell>Sunflower</cell><cell>84.1</cell><cell>85.4</cell></row><row><cell>8</cell><cell>Soybeans</cell><cell>69.7</cell><cell>77.1</cell></row><row><cell>9</cell><cell>Other cereals</cell><cell>70.9</cell><cell>78.0</cell></row><row><cell>10</cell><cell>Forest</cell><cell>96.9</cell><cell>92.9</cell></row><row><cell>11</cell><cell>Grassland</cell><cell>91.0</cell><cell>89.0</cell></row><row><cell>12</cell><cell>Bare land</cell><cell>86.7</cell><cell>99.0</cell></row><row><cell>13</cell><cell>Water</cell><cell>100.0</cell><cell>98.1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_50"><head>Table 3 .</head><label>3</label><figDesc>Comparison of official statistics and crop areas derived from Landsat-8 imagery</figDesc><table><row><cell>Class no.</cell><cell>Class</cell><cell>Crop area:</cell><cell>Crop</cell><cell>area:</cell><cell>Relative</cell></row><row><cell></cell><cell></cell><cell>official</cell><cell>Landsat-8</cell><cell></cell><cell>error, %</cell></row><row><cell></cell><cell></cell><cell>statistics, x</cell><cell cols="2">derived, x 1000,</cell><cell></cell></row><row><cell></cell><cell></cell><cell>1000, ha</cell><cell>ha</cell><cell></cell><cell></cell></row><row><cell>2</cell><cell>Winter wheat</cell><cell>187.3</cell><cell>184.5</cell><cell></cell><cell>-1.5</cell></row><row><cell>3</cell><cell>Winter rapeseed</cell><cell>46.7</cell><cell>59.9</cell><cell></cell><cell>28.3</cell></row><row><cell>5</cell><cell>Maize</cell><cell>291.7</cell><cell>342.4</cell><cell></cell><cell>17.4</cell></row><row><cell>6</cell><cell>Sugar beet</cell><cell>15.5</cell><cell>11.2</cell><cell></cell><cell>-27.9</cell></row><row><cell>7</cell><cell>Sunflower</cell><cell>108.2</cell><cell>117.6</cell><cell></cell><cell>8.7</cell></row><row><cell>8</cell><cell>Soybeans</cell><cell>145.9</cell><cell>168.5</cell><cell></cell><cell>15.5</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_51"><head>Table 1 .</head><label>1</label><figDesc>Structure of Land Resources of UkraineThe main types of land and economic activity</figDesc><table><row><cell>Total area</cell><cell></cell></row><row><cell>Thousand sq. km</cell><cell>% of total area</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_52"><head>Table 2 .</head><label>2</label><figDesc>Main Features of Reservoirs</figDesc><table><row><cell></cell><cell>The average depth, m</cell><cell>The height of the dam,</cell><cell>m</cell><cell>Volume, million cubic m</cell><cell>The potential energy of man-made tsunami, J *10 14</cell><cell>Area, square km</cell><cell>The natural area,</cell><cell>square km</cell><cell>Flooded area, square km</cell><cell>Capacity, MW</cell><cell>Average annual production, mln kW • h</cell></row><row><cell></cell><cell>1</cell><cell>2</cell><cell></cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell></cell><cell>8</cell><cell>9</cell></row><row><cell>Kyiv</cell><cell cols="3">4.0 11.5</cell><cell>3730</cell><cell>3.4</cell><cell cols="2">922 44</cell><cell cols="2">878</cell><cell cols="2">408.5 683</cell></row><row><cell>Kaniv</cell><cell cols="3">4.3 10.5</cell><cell>2500</cell><cell>2.04</cell><cell cols="4">581 110.7 470.3</cell><cell cols="2">444 972</cell></row><row><cell>Kremenchuk</cell><cell cols="2">6.0 17</cell><cell></cell><cell cols="2">13520 19.8</cell><cell cols="6">2252 166.5 2085.5 632.9 1506</cell></row><row><cell cols="4">Dniprodzerginsk 4.3 12.6</cell><cell>2460</cell><cell>2.5</cell><cell cols="4">567 102.6 464.4</cell><cell cols="2">352 1328</cell></row><row><cell>Dnipro</cell><cell cols="3">8.1 35.4</cell><cell>3320</cell><cell>10.2</cell><cell cols="4">410 154.8 255.2</cell><cell cols="2">1569 4008</cell></row><row><cell>Kakhovske</cell><cell cols="2">8.4 16</cell><cell></cell><cell cols="4">18180 21.04 2155 276</cell><cell cols="2">1879</cell><cell cols="2">351 1489</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>6887</cell><cell></cell><cell cols="2">6032</cell><cell></cell><cell>9986</cell></row><row><cell cols="2">Source: [3;10]</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_53"><head>Table 3 .</head><label>3</label><figDesc>General characteristics of the agricultural sector for the period 2010-2013</figDesc><table><row><cell></cell><cell></cell><cell>2010</cell><cell>2011</cell><cell>2012</cell><cell>2013</cell><cell>( ( x x </cell><cell>))</cell></row><row><cell>Volume</cell><cell>of</cell><cell>194.9</cell><cell>233.7</cell><cell>223.2</cell><cell>252.9</cell><cell cols="2">226.2(10.3)</cell></row><row><cell cols="2">production (billion</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>UAH)*</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Area (sq. km)</cell><cell></cell><cell>246.4</cell><cell>247.1</cell><cell>261.3</cell><cell>262.0</cell><cell cols="2">254.2(3.7)</cell></row><row><cell cols="2">Agriculture return</cell><cell>21.1</cell><cell>27.0</cell><cell>20.5</cell><cell>11.2</cell><cell cols="2">20.0(2.8)</cell></row><row><cell>(%)</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">* prices of 2012</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="6">Source: AgriculturalUkraine 2013 / Kyiv.-2014-p.187-200.</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_54"><head>Table 4 .</head><label>4</label><figDesc>The effeciency of the flooded areas in monetary terms</figDesc><table><row><cell>Name of reservoir</cell><cell>Flooded area, square km.</cell><cell>Output agricultural of products on the flooded USD. areas, bln.</cell><cell>Price electricity produced, bln. of included) USD. (VAT</cell><cell>The efficiency of the flooded areas, %</cell></row><row><cell>Kyiv</cell><cell>878</cell><cell>0.78</cell><cell>0.22</cell><cell>28.2</cell></row><row><cell>Kaniv</cell><cell>470.3</cell><cell>0.42</cell><cell>0.31</cell><cell>74.8</cell></row><row><cell>Kremenchuk</cell><cell>2085.5</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>1.86</cell><cell>0.49</cell><cell>26.1</cell></row><row><cell>Dniprodzerginsk</cell><cell>464.4</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>0.41</cell><cell>0.43</cell><cell>103.5</cell></row><row><cell>Dnipro</cell><cell>255.2</cell><cell>0.23</cell><cell>1.29</cell><cell>568.6</cell></row><row><cell>Kakhovske</cell><cell>1879</cell><cell>1.67</cell><cell>0.48</cell><cell>28.7</cell></row><row><cell>Total</cell><cell>6032</cell><cell>5.37</cell><cell>3.22</cell><cell>60</cell></row><row><cell cols="3">Source: own calculations</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_56"><head>Table 2 .</head><label>2</label><figDesc>Foreign direct investment (equity) in Ukraine's economy,%</figDesc><table><row><cell>Indicators</cell><cell>2010</cell><cell>2011</cell><cell>2012</cell><cell>2013</cell><cell>2014</cell></row><row><cell>Total</cell><cell>100,0</cell><cell>100,0</cell><cell>100,0</cell><cell>100</cell><cell>100,0</cell></row><row><cell>Which includes</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Cyprus</cell><cell>22,2</cell><cell>25,6</cell><cell>31,7</cell><cell>32,7</cell><cell>29,9</cell></row><row><cell>Germany</cell><cell>15,8</cell><cell>15,0</cell><cell>11,6</cell><cell>10,8</cell><cell>12,5</cell></row><row><cell>Netherlands</cell><cell>10,5</cell><cell>9,8</cell><cell>9,5</cell><cell>9,6</cell><cell>11,1</cell></row><row><cell>Russia</cell><cell>7,6</cell><cell>7,3</cell><cell>7,0</cell><cell>7,4</cell><cell>5,9</cell></row><row><cell>Austria</cell><cell>5,9</cell><cell>6,9</cell><cell>6,2</cell><cell>5,6</cell><cell>5,5</cell></row><row><cell>United Kingdom</cell><cell>5,3</cell><cell>5,1</cell><cell>4,7</cell><cell>4,7</cell><cell>4,7</cell></row><row><cell>Virginia Islands (Brit.)</cell><cell>5,1</cell><cell>4,5</cell><cell>3,5</cell><cell>4,3</cell><cell>4,4</cell></row><row><cell>France</cell><cell>3,9</cell><cell>3,5</cell><cell>3,2</cell><cell>3,1</cell><cell>3,5</cell></row><row><cell>Switzerland</cell><cell>3,3</cell><cell>3,3</cell><cell>2,9</cell><cell>2,3</cell><cell>3,0</cell></row><row><cell>Italy</cell><cell>2,7</cell><cell>2,1</cell><cell>2,0</cell><cell>2,2</cell><cell>2,2</cell></row><row><cell>USA</cell><cell>2,2</cell><cell>2,0</cell><cell>1,9</cell><cell>1,8</cell><cell>1,9</cell></row><row><cell>Poland</cell><cell>2,1</cell><cell>1,9</cell><cell>1,7</cell><cell>1,7</cell><cell>1,8</cell></row><row><cell>Belize</cell><cell>1,9</cell><cell>1,8</cell><cell>1,7</cell><cell>1,5</cell><cell>1,4</cell></row><row><cell>Other</cell><cell>11,5</cell><cell>11,2</cell><cell>12,4</cell><cell>12,3</cell><cell>12,2</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_57"><head>Table 3 .</head><label>3</label><figDesc>Game Matrix: Investor and the Government</figDesc><table><row><cell>The choice of</cell><cell>the investor</cell><cell>A B C</cell><cell>A (1;2) (1; 1) (0; 0)</cell><cell>The choice of the Government B (1; 2) (1;1) (0; -1)</cell><cell>C (-2; 2) (0; -1) (0; -2)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_58"><head>Table 4 .</head><label>4</label><figDesc>The results of the activity of tax police in Ukraine for 2007-2013, million UAH</figDesc><table><row><cell>Indicators</cell><cell>2007</cell><cell>2008</cell><cell>2009</cell><cell>2010</cell><cell>2011</cell><cell>2012</cell><cell>2013</cell></row><row><cell>Extra revenue for</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>budget, discovered</cell><cell>259.94</cell><cell>382.1</cell><cell cols="5">502.68 4370.59 1052.2 2082.76 2014.5</cell></row><row><cell>by tax police</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Charge involving tax police</cell><cell>130.39</cell><cell cols="3">173.53 3461.81 451.67</cell><cell>568.67</cell><cell>978.6</cell><cell>1023.2</cell></row><row><cell>The amount</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>stipulated damages in criminal cases</cell><cell cols="7">2429.78 2662.84 2406.57 2008.86 2173.89 1997.6 2117.4</cell></row><row><cell>of tax evasion</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Refunded the sum</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>of damages in criminal cases of</cell><cell cols="3">878.30 1155.97 829.52</cell><cell>816.78</cell><cell>869.71</cell><cell>888.2</cell><cell>902.3</cell></row><row><cell>tax evasion</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_59"><head>Table 1 .</head><label>1</label><figDesc>Expected value devaluation factors for different classes of national and world economies in 2015</figDesc><table><row><cell>1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_64"><head>Table 3 .</head><label>3</label><figDesc>Optimization of deposit portfolio according to the criterion of profit maximi-</figDesc><table><row><cell>zation for 2002-2005 deposit interests:</cell><cell>%; 10</cell><cell>%; 5</cell><cell>$</cell><cell>% 6</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_67"><head>Table 4 .</head><label>4</label><figDesc>Optimization of deposit portfolio according to the criterion of profit maximi-</figDesc><table><row><cell>d</cell><cell>2006</cell><cell></cell><cell>, 0 ; 0 (</cell><cell>).... 551 , 0 ; 449 r</cell><cell>2006</cell><cell></cell><cell>, 11</cell><cell>%, 4</cell><cell></cell><cell>2 2006</cell><cell></cell><cell>, 5</cell><cell>2</cell><cell></cell><cell>10</cell><cell>4 </cell></row><row><cell cols="8">zation for 2006-2007 deposit interests:</cell><cell></cell><cell></cell><cell cols="2">%; 14</cell><cell></cell><cell></cell><cell></cell><cell cols="2">%; 9</cell><cell>$</cell><cell>% 9</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_68"><head>Table 1 .</head><label>1</label><figDesc>DТfferent ways of ТnterpretatТon tСe category "e-commerce" , goods or services, making payments, sale or purchase of goods or services, whether between businesses, households, individuals, Governments and other public or private organizations, conducted over the Internet. The goods and services are ordered over the Internet, but the payment and the ultimate delivery of the good or service may be conducted on-or offline.</figDesc><table><row><cell cols="2">Meaning</cell><cell>Original</cell><cell>Definition</cell></row><row><cell></cell><cell></cell><cell>OECD</cell><cell></cell></row><row><cell cols="2">«narrow» (e-commerce=e-trade)</cell><cell>(Ogranization for Economic Cooperation and Development) R. Doernberg, L Hinnekens, W. Hellerstein,</cell><cell>An e-commerce transaction is the sale or purchase of goods or services over computer mediated networks (broad definition) or via the Internet (narrow definition) 1 . E-commerce means the ability to perform transactions involving the exchange of goods or services between two or more parties using electronic tools and techniques.</cell></row><row><cell></cell><cell></cell><cell>J. Li</cell><cell></cell></row><row><cell>«wТde» (е-comerce = totality of business</cell><cell>processes)</cell><cell>A. Sammer, Gr. Dunkan UN Experts</cell><cell>E-commerce means any form of business process in which the interaction between the actors happens by using the Internet -technology E-commerce includes searching for information, contracting, supply of products</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_69"><head>Table 2 .</head><label>2</label><figDesc>Aspects of e-commerce</figDesc><table><row><cell>№</cell><cell>Aspect</cell><cell>Essence</cell></row><row><cell cols="2">1. Connections</cell><cell>It is a method of delivery via telephone lines, computer networks, electronic means</cell></row><row><cell>2.</cell><cell>Process</cell><cell>It is a technology to automate business operations.</cell></row><row><cell>3.</cell><cell>Services</cell><cell>It is a tool to reduce costs, improve quality of goods and services and accelerate delivery.</cell></row><row><cell>4.</cell><cell>Time</cell><cell>E-commerce allows to carry out operation online (24 hr. per day).</cell></row><row><cell>5.</cell><cell>Space</cell><cell>Open Internet infrastructure makes it a global environment.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_70"><head>Table 4 .</head><label>4</label><figDesc>Comparative analysis of the development of B2C e-commerce segment all over the world in 20134   </figDesc><table><row><cell>Regions</cell><cell>Sales, bln. dol.</cell><cell>Growth rates, %</cell><cell>Level of coverage, %</cell><cell cols="2">Share of sales, %</cell><cell cols="2">Deviation %</cell></row><row><cell>North America</cell><cell>419,53</cell><cell>12,5</cell><cell>72</cell><cell>28,3</cell><cell>31,2</cell><cell>2</cell><cell></cell></row><row><cell>Asia Pacific</cell><cell>388,75</cell><cell>23,1</cell><cell>44,6</cell><cell>2,1</cell><cell>2,3</cell><cell></cell><cell>2,9</cell></row><row><cell>Western Europe</cell><cell>291,47</cell><cell>14</cell><cell>72,3</cell><cell>26,4</cell><cell>25,4</cell><cell>1</cell><cell></cell></row><row><cell>Central and Eastern Europe</cell><cell>48,56</cell><cell>20,9</cell><cell>41,6</cell><cell>4,1</cell><cell>4</cell><cell>0,1</cell><cell></cell></row><row><cell>Latin America</cell><cell>45,98</cell><cell>22,1</cell><cell>33</cell><cell>34,9</cell><cell>32,9</cell><cell></cell><cell>0,1</cell></row><row><cell>Middle East and Africa</cell><cell>27</cell><cell>31</cell><cell>31,3</cell><cell>4,2</cell><cell>4,3</cell><cell></cell><cell>0,2</cell></row><row><cell>Total</cell><cell>1,22129</cell><cell>17,1</cell><cell>40,4</cell><cell>-</cell><cell>-</cell><cell>-</cell><cell>-</cell></row></table><note>Fig. 2. Growth rates of B2C sales from 2012 to 2014, %</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_71"><head>Table 5</head><label>5</label><figDesc>Problems and prospects of e-business in Ukraine5   </figDesc><table><row><cell>Factor</cell><cell>Essence</cell></row><row><cell></cell><cell> insufficient development of IT;</cell></row><row><cell>Factors</cell><cell> limited using of IT;</cell></row><row><cell>impeding the</cell><cell> conservatism and distrust of innovations;</cell></row><row><cell>development of</cell><cell> low purchasing power of the population;</cell></row><row><cell>e-business in Ukraine</cell><cell> lack of specialists;  contractor's mТstrust of tСe bankТng system;  lack of legal regulation</cell></row><row><cell>Prospects for e-</cell><cell> creating jobs for skilled workers;</cell></row><row><cell>business in</cell><cell> access to Western capital investment;</cell></row><row><cell>Ukraine</cell><cell> increasing in tax revenues from the use of electronic payments</cell></row><row><cell>Factors</cell><cell> development of electronic payment systems on the Internet;</cell></row><row><cell>accelerating</cell><cell> legislative regulation of the e-commerce, the legal recognition of</cell></row><row><cell>development of</cell><cell>electronic records and electronic signatures;</cell></row><row><cell>e-business in</cell><cell> protecting commercial information during network transmission</cell></row><row><cell>Ukraine</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_72"><head>Table 6 .</head><label>6</label><figDesc>DТversТty of Іnternet -auctions</figDesc><table><row><cell>Type</cell><cell></cell><cell>Subspecies</cell><cell>Essence</cell></row><row><cell>Order According to the degree of openness</cell><cell>Closed</cell><cell>Descending Growing sealed bid first-price auction sealed bid second price auction</cell><cell>Next bid is lower than the previous. Next bid must be higher than the previous. TСТs auctТon does not dТsclose tСe partТcТpants' offers. TСe buyer who offers and pays the maximum price will win. Vickrey auction means the partТcТpants don't dТsclose tСeТr proposals. The winner, who has offered the maximum price, pays the second after it.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_77"><head>Table 1 .</head><label>1</label><figDesc>t-statistics of autocorrelation (ACF) and partial autocorrelation functions (PACF)</figDesc><table><row><cell>Lag</cell><cell></cell><cell></cell><cell>ACF</cell><cell></cell><cell></cell><cell cols="2">PACF</cell><cell></cell></row><row><cell>№</cell><cell>ETF FXE</cell><cell>ETF FXY</cell><cell>ETF UUP</cell><cell>CLS</cell><cell>ETF FXE</cell><cell>ETF FXY</cell><cell>ETF UUP</cell><cell>CLS</cell></row><row><cell>1</cell><cell>6,59*</cell><cell>4,64*</cell><cell>5,74*</cell><cell>1,73</cell><cell cols="3">6,48* 4,56* 5,64*</cell><cell>1,62</cell></row><row><cell>2</cell><cell>5,37*</cell><cell>4,30*</cell><cell>4,93*</cell><cell>0,29</cell><cell>0,48</cell><cell cols="2">2,42* 1,82</cell><cell>-0,31</cell></row><row><cell>3</cell><cell>4,34*</cell><cell>3,14*</cell><cell>4,24*</cell><cell>0,95</cell><cell>-0,03</cell><cell>0,13</cell><cell>0,63</cell><cell>0,97</cell></row><row><cell>4</cell><cell>3,15*</cell><cell>2,90*</cell><cell>3,10*</cell><cell>0,69</cell><cell>-0,90</cell><cell>0,56</cell><cell>-0,80</cell><cell>0,01</cell></row><row><cell>5</cell><cell>2,19*</cell><cell>2,66*</cell><cell>3,16*</cell><cell>-1,13</cell><cell>-0,25</cell><cell>0,61</cell><cell>1,17</cell><cell>-1,32</cell></row><row><cell>6</cell><cell>1,28</cell><cell>1,99</cell><cell>3,06*</cell><cell>-1,79</cell><cell cols="2">-0,52 -0,35</cell><cell>0,74</cell><cell>-1,03</cell></row><row><cell>7</cell><cell>0,29</cell><cell>2,87</cell><cell>2,01*</cell><cell>0,31</cell><cell>-0,82</cell><cell>1,63</cell><cell>-1,33</cell><cell>1,13</cell></row><row><cell>8</cell><cell>-0,12</cell><cell>1,68</cell><cell>2,16*</cell><cell>-0,15</cell><cell>0,47</cell><cell>-0,85</cell><cell>0,64</cell><cell>-0,32</cell></row><row><cell>9</cell><cell>-0,62</cell><cell>0,86</cell><cell>1,97</cell><cell>-1,05</cell><cell cols="2">-0,45 -1,49</cell><cell>0,47</cell><cell>-0,11</cell></row><row><cell>10</cell><cell>-1,17</cell><cell>1,02</cell><cell>1,03</cell><cell>-0,59</cell><cell>-0,58</cell><cell>0,76</cell><cell>-1,21</cell><cell>-0,39</cell></row><row><cell>11</cell><cell>-1,05</cell><cell>0,92</cell><cell>1,32</cell><cell>-0,09</cell><cell>0,83</cell><cell>0,33</cell><cell>0,43</cell><cell>-0,6</cell></row><row><cell>12</cell><cell>-0,69</cell><cell>0,64</cell><cell>1,39</cell><cell>-1,59</cell><cell>0,75</cell><cell>-0,63</cell><cell>0,91</cell><cell>-1,19</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_79"><head></head><label></label><figDesc>. Do you like the lesson? 2. Student's estimation of the knowledge received at the lesson. 3. Is an explanation clear? 4. Were students' answers clear and adequate? 5. Weather the explanations are filled enough by examples. 6. Using of various approaches during studying. 7. Does the teacher aspire to interest and motivate students? 8. Lessons atmosphere: is it comfortable, is it pleasant to you at the lesson? 9. Availability of the teacher, his inclination to listen the students, to lead a discussion with them. 10. Teacher's competence. 11. Insistence (regular and frequent control of knowledge).</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_80"><head>Table 1 Data</head><label>1</label><figDesc></figDesc><table><row><cell>Factor</cell><cell>Average</cell><cell>Root-mean-square</cell></row><row><cell></cell><cell>value</cell><cell>deviations</cell></row><row><cell>Teaching level at the university</cell><cell>7,2</cell><cell>2,17</cell></row><row><cell>Regularly attendance of lessons</cell><cell>8,85</cell><cell>2,3</cell></row><row><cell>Regularly prepare homework</cell><cell>8,4</cell><cell>2,6</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_81"><head></head><label></label><figDesc>Organization and method of assembly management report using a definition of EBITDA indicator (Earnings before interest and tax, amortization and depreciation) are considered on the practical example of Kherson river port's activity. The process of constructing a multidimensional model, that is necessary for determining EBITDA of integrated accounting using the program "1C: Accounting for Ukraine", and implementation of the model using PivotTable in MS Excel are represented. The range of possibilities to implement the process named "Data Mining" of the models is demonstrated.</figDesc><table><row><cell>Yatsenko Viktoria</cell></row><row><cell>Kherson National Technical University, 24, Beruslavske st., Kherson, 73008 Ukraine</cell></row><row><cell>Viktorijajacenko@rambler.ru</cell></row><row><cell>Abstract.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_82"><head>Table 1 .</head><label>1</label><figDesc>The multidimensional organization model of the integrated accounting of the Kherson river port.</figDesc><table><row><cell>Characteristic</cell><cell cols="2">Period</cell><cell>Subject</cell><cell></cell><cell>Object</cell><cell cols="2">Area</cell><cell></cell><cell>Dimension</cell></row><row><cell>Dimension of characteristics</cell><cell cols="2">Month</cell><cell>Business Unit (BU activity)</cell><cell></cell><cell>(+/-) Impact on the result of activity</cell><cell cols="3">Type of activity</cell><cell>Data unit</cell></row><row><cell></cell><cell></cell><cell></cell><cell>loading and</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>January</cell><cell>unloading</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Meaning of characteristics</cell><cell>Year І half-year І quarter ІІ quarter ІІІ quarter ІІ half-year ІV quarter</cell><cell>February March April May June July August September October November December</cell><cell>operations Elevator Complex fleet service Mechanization Cargo and passenger services Another Sand Non-core assets Port</cell><cell>Internal turnover</cell><cell>Income Costs</cell><cell>Operating</cell><cell>Financial</cell><cell>Another</cell><cell>Result of dimension</cell></row><row><cell>4</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_83"><head>Table 2 .</head><label>2</label><figDesc>The management report items in the Pivot Tables in MS Excel of the Kherson river port.</figDesc><table><row><cell>Status</cell><cell>The management report items</cell><cell>Abbreviation</cell></row><row><cell>(=)</cell><cell>Total revenue</cell><cell>TR</cell></row><row><cell>(-)</cell><cell>Logistics costs</cell><cell>LC</cell></row><row><cell>(-)</cell><cell>Special engineering</cell><cell>SE</cell></row><row><cell>(=)</cell><cell>Present revenue</cell><cell>PR</cell></row><row><cell>(=)</cell><cell>Variable costs</cell><cell>VC</cell></row><row><cell>(=) (=)</cell><cell>Marginal revenue Marginal revenue, %</cell><cell>МR МR, %</cell></row><row><cell>(-)</cell><cell>Material costs</cell><cell>MC</cell></row><row><cell>(-)</cell><cell>Energy</cell><cell>E</cell></row><row><cell>(-)</cell><cell>Insurance</cell><cell>I</cell></row><row><cell>(=)</cell><cell>Services of external organizations</cell><cell>SEO</cell></row><row><cell>(-)</cell><cell>Staff costs</cell><cell>SC</cell></row><row><cell>(-)</cell><cell>Depreciation</cell><cell>D</cell></row><row><cell>(-)</cell><cell>Change of residues unfinished goods and finished goods, corrections of balance residues</cell><cell>CBR</cell></row><row><cell>(-)</cell><cell>Operating taxes</cell><cell>OT</cell></row><row><cell>(=)</cell><cell>Fixed costs</cell><cell>FC</cell></row><row><cell>(=)</cell><cell>Total profit</cell><cell>TP</cell></row><row><cell>(+)</cell><cell>Other income</cell><cell>OІ</cell></row><row><cell>(-)</cell><cell>Other costs</cell><cell>OC</cell></row><row><cell>(=)</cell><cell>Profit before taxes 1</cell><cell>TP1</cell></row><row><cell>(+)</cell><cell>Financial income</cell><cell>FI</cell></row><row><cell>(-)</cell><cell>Financial costs</cell><cell>FC</cell></row><row><cell>(=)</cell><cell>Profit before taxes 2</cell><cell>TP2</cell></row><row><cell>(-)</cell><cell>Income tax</cell><cell>IT</cell></row><row><cell>(=)</cell><cell>Net profit</cell><cell>NP</cell></row><row><cell>(=)</cell><cell>Net profit, %</cell><cell>NP,%</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_84"><head>Table 3 .</head><label>3</label><figDesc>The calculating algorithm of performance indicators of the management report in the Pivot Tables in MS Excel of the Kherson river port.</figDesc><table><row><cell>Indicators</cell><cell>Abbreviation</cell><cell>Algorithm for calculating</cell></row><row><cell></cell><cell></cell><cell>SUM (TR_ cargo fleet: TR_</cell></row><row><cell></cell><cell></cell><cell>transportation fleet ports; TR_ cargo</cell></row><row><cell>Total revenue</cell><cell>TR</cell><cell>handling; TR_ comprehensive fleet maintenance; TR_ rental income; TR_</cell></row><row><cell></cell><cell></cell><cell>industrial activities; TR_ non-core</cell></row><row><cell></cell><cell></cell><cell>activity; TR_ other income)</cell></row><row><cell>Present revenue</cell><cell>PR</cell><cell>SUM (TR; LC; SE)</cell></row><row><cell>Variable costs</cell><cell>VC</cell><cell>SUM (v_ fuel; v_ material costs; v_ port charges; v_ energy; v_ taxes)</cell></row><row><cell>Marginal revenue</cell><cell>МR</cell><cell>SUM (PR; VC)</cell></row><row><cell>Marginal revenue, %</cell><cell>МR, %</cell><cell>IF (TR=0;0;МR/PR)</cell></row><row><cell>Services of external organizations</cell><cell>SEO</cell><cell>SUM (f_ assignment; f_ repair; f_ rent; f_ connection; f_ other costs)</cell></row><row><cell></cell><cell></cell><cell>SUM (f_ material costs; f_ energy, f_</cell></row><row><cell></cell><cell></cell><cell>insurance; f_ services of external</cell></row><row><cell>Fixed costs</cell><cell>FC</cell><cell>organizations; f_ staff costs; f_</cell></row><row><cell></cell><cell></cell><cell>depreciation; f_ corrections of balance</cell></row><row><cell></cell><cell></cell><cell>residues; f_ operating taxes)</cell></row><row><cell>Total profit</cell><cell>TP</cell><cell>SUM (МR; FC)</cell></row><row><cell>Profit before taxes 1</cell><cell>TP1</cell><cell>SUM (TP;OІ;OC)</cell></row><row><cell>Profit before taxes 2</cell><cell>TP2</cell><cell>SUM (TP1;FI;FC)</cell></row><row><cell>Net profit</cell><cell>NP</cell><cell>SUM (TP2; IT)</cell></row><row><cell>Net profit, %</cell><cell>NP,%</cell><cell>IF (PR =0;0; NP / PR)</cell></row></table><note>EBITDASUM (NP; IT; FC; FI ; D)</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_86"><head>Table 1 .</head><label>1</label><figDesc>Ukrainian companies at the WSE</figDesc><table><row><cell>Name of the com-</cell><cell>Date of IPO</cell><cell>The percentage of</cell><cell>Sum of the capitali-</cell></row><row><cell>pany</cell><cell></cell><cell>capitalization</cell><cell>zation</cell></row><row><cell>Astarta Kiev</cell><cell>August 2006</cell><cell>20% of shares</cell><cell>23,7 bl. Euro</cell></row><row><cell>Kernel Holding</cell><cell>November 2007</cell><cell>37,98% of shares</cell><cell>136,5 bl. Euro</cell></row><row><cell>Agroton public</cell><cell>November 2010</cell><cell>26,2% of shares</cell><cell>38,25 bl. Euro</cell></row><row><cell>limited</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Milikiland</cell><cell>December 2010</cell><cell>22,4% of shares</cell><cell>60 bl. Euro</cell></row><row><cell>Sadovaya Group</cell><cell>December 2010</cell><cell>25% of shares</cell><cell>23,15 bl. Euro</cell></row><row><cell>Industrial Milk</cell><cell>May 2011</cell><cell>23,9% of shares</cell><cell>20,7 bl. Euro</cell></row><row><cell>Copmany</cell><cell></cell><cell></cell><cell></cell></row><row><cell>KSG Agro</cell><cell>May 2011</cell><cell>33% of shares</cell><cell>27 bl. Euro</cell></row><row><cell>Westa</cell><cell>June 2011</cell><cell>25% of shares</cell><cell>32 bl. Euro</cell></row><row><cell>Ovostar Union</cell><cell>June 2011</cell><cell>25% of shares</cell><cell>22,2 bl. Euro</cell></row><row><cell>N.V</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_87"><head>Table 2 .</head><label>2</label><figDesc>The composition of WIG-Ukraine</figDesc><table><row><cell>Instrument</cell><cell>ISIN</cell><cell>Share</cell><cell>Market value</cell><cell>Quota</cell></row><row><cell></cell><cell></cell><cell></cell><cell>of shares (PLN)</cell><cell>(%)</cell></row><row><cell>KERNEL</cell><cell>LU03273</cell><cell>9,509,000</cell><cell>286,601,260</cell><cell>37.877</cell></row><row><cell></cell><cell>57389</cell><cell></cell><cell></cell><cell></cell></row><row><cell>ASTARTA</cell><cell>NL00006</cell><cell>9,253,000</cell><cell>227,346,210</cell><cell>30.046</cell></row><row><cell></cell><cell>86509</cell><cell></cell><cell></cell><cell></cell></row><row><cell>OVOSTAR</cell><cell>NL00098</cell><cell>1,725,000</cell><cell>122,233,500</cell><cell>16.154</cell></row><row><cell></cell><cell>05613</cell><cell></cell><cell></cell><cell></cell></row><row><cell>IMCOMPANY</cell><cell>LU06072</cell><cell>9,809,000</cell><cell>63,169,960</cell><cell>8.348</cell></row><row><cell></cell><cell>03980</cell><cell></cell><cell></cell><cell></cell></row><row><cell>MILKILAND</cell><cell>NL00095</cell><cell>8,276,000</cell><cell>26,152,160</cell><cell>3.456</cell></row><row><cell></cell><cell>08712</cell><cell></cell><cell></cell><cell></cell></row><row><cell>KDMSHIPNG</cell><cell>CY01024</cell><cell>3,329,000</cell><cell>18,775,560</cell><cell>2.481</cell></row><row><cell></cell><cell>92119</cell><cell></cell><cell></cell><cell></cell></row><row><cell>COALENERG</cell><cell>LU06461</cell><cell>11,252,000</cell><cell>6,638,680</cell><cell>0.877</cell></row><row><cell></cell><cell>12838</cell><cell></cell><cell></cell><cell></cell></row><row><cell>KSGAGRO</cell><cell>LU06112</cell><cell>5,093,000</cell><cell>5,755,090</cell><cell>0.761</cell></row><row><cell></cell><cell>62873</cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_88"><head>Table 3 .</head><label>3</label><figDesc>The effect of Ukrainian companies to index Obtained results in the table are equal to the following equation multiple linear re-</figDesc><table><row><cell>gressions:</cell></row><row><cell>y=6.079+4.956*X1+2.686*X2+0.385*X3+1.379*X4+2.693*X5+0.889*X6-</cell></row><row><cell>1.705*X7+1.473*X8</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_90"><head>Table 1 .</head><label>1</label><figDesc>The questionnaire.</figDesc><table><row><cell></cell><cell>Parameter</cell><cell></cell><cell></cell><cell></cell><cell>Value</cell></row><row><cell>1</cell><cell>Ease of access</cell><cell cols="3">Is the electronic</cell><cell>0 (no),</cell></row><row><cell></cell><cell></cell><cell cols="3">resource access easy</cell><cell>1 (low),</cell></row><row><cell></cell><cell></cell><cell cols="2">and convenient?</cell><cell></cell><cell>2 (good),</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>3 (excellent)</cell></row><row><cell>2</cell><cell>Ease of use</cell><cell>Is</cell><cell>the</cell><cell>user</cell><cell>0 (no),</cell></row><row><cell></cell><cell></cell><cell cols="3">interface clear and</cell><cell>1 (low),</cell></row><row><cell></cell><cell></cell><cell cols="2">convenient?</cell><cell></cell><cell>2 (good),</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>3 (excellent)</cell></row><row><cell>3</cell><cell>Usefulness</cell><cell cols="3">Is this resource</cell><cell>0 (no),</cell></row><row><cell></cell><cell></cell><cell cols="2">useful?</cell><cell></cell><cell>1 (low),</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>2 (good),</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>3 (excellent)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_91"><head>Table 1 .</head><label>1</label><figDesc>The weighting factors of EER types.</figDesc><table><row><cell cols="2"># Name of EER Type</cell><cell>Description</cell><cell>Weighting</cell></row><row><cell></cell><cell></cell><cell></cell><cell>factor</cell></row><row><cell>1</cell><cell>Electronic textbooks and books</cell><cell>Full course of lectures, encyclopedia</cell><cell>24,9</cell></row><row><cell>2</cell><cell>Lectures notes, laboratory and</cell><cell>Lectures annotations, laboratory and</cell><cell>21,2</cell></row><row><cell></cell><cell>practical work notes</cell><cell>practical work annotations</cell><cell></cell></row><row><cell>3</cell><cell>Lecture Presentation</cell><cell>Author lecture in Power Point format</cell><cell>16,0</cell></row><row><cell>4</cell><cell>Video Lecture</cell><cell>Author lecture in video format</cell><cell>19,5</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_92"><head>Table 2 .</head><label>2</label><figDesc>The EER quality indicators.</figDesc><table><row><cell>Name of EER quality indicator.</cell><cell>What EER types is</cell><cell>Quality charac-</cell><cell>Quality</cell></row><row><cell>Description</cell><cell>applied to</cell><cell>teristics</cell><cell>indicator</cell></row><row><cell>Completeness of methodical support</cell><cell>All types</cell><cell>1. Full</cell><cell>5</cell></row><row><cell>of discipline</cell><cell></cell><cell>2. Incomplete</cell><cell>4</cell></row><row><cell></cell><cell></cell><cell>3. Average</cell><cell>3</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_93"><head>Table 3 .</head><label>3</label><figDesc>Expert data on weights of EER types.</figDesc><table><row><cell>Ex-</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="2">ERR Types</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>pert</cell><cell cols="15">#1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 #16</cell></row><row><cell>1</cell><cell>2</cell><cell cols="3">11 14 7</cell><cell>9</cell><cell>4</cell><cell>5</cell><cell>3</cell><cell>6</cell><cell cols="2">12 8</cell><cell cols="4">10 13 15 16 1</cell></row><row><cell>2</cell><cell>2</cell><cell cols="3">11 14 4</cell><cell>8</cell><cell>9</cell><cell cols="2">10 5</cell><cell>6</cell><cell cols="2">16 3</cell><cell>7</cell><cell cols="3">12 13 15 1</cell></row><row><cell>3</cell><cell>3</cell><cell cols="3">10 12 7</cell><cell>8</cell><cell>2</cell><cell>6</cell><cell>4</cell><cell>5</cell><cell cols="2">11 9</cell><cell cols="4">13 14 15 16 1</cell></row><row><cell>4</cell><cell>4</cell><cell>7</cell><cell cols="2">10 6</cell><cell>8</cell><cell>2</cell><cell>5</cell><cell>3</cell><cell>9</cell><cell cols="6">12 11 14 13 15 16 1</cell></row><row><cell>5</cell><cell>2</cell><cell cols="3">10 14 9</cell><cell>8</cell><cell>3</cell><cell cols="2">12 4</cell><cell>5</cell><cell>6</cell><cell>7</cell><cell cols="4">11 13 15 16 1</cell></row><row><cell>6</cell><cell>3</cell><cell>9</cell><cell cols="2">10 8</cell><cell>7</cell><cell>2</cell><cell>6</cell><cell>4</cell><cell>5</cell><cell cols="6">11 12 14 15 13 16 1</cell></row><row><cell>7</cell><cell>2</cell><cell cols="3">12 11 8</cell><cell cols="2">10 5</cell><cell>4</cell><cell>3</cell><cell>7</cell><cell cols="2">13 6</cell><cell>9</cell><cell cols="3">14 15 16 1</cell></row><row><cell>8</cell><cell>3</cell><cell>8</cell><cell cols="2">13 4</cell><cell>7</cell><cell>2</cell><cell>6</cell><cell>9</cell><cell>5</cell><cell cols="6">12 10 11 16 14 15 1</cell></row><row><cell>9</cell><cell>4</cell><cell cols="3">10 11 6</cell><cell>8</cell><cell>2</cell><cell>3</cell><cell>5</cell><cell>7</cell><cell cols="2">12 9</cell><cell cols="4">13 14 15 16 1</cell></row><row><cell>10</cell><cell>2</cell><cell>5</cell><cell cols="2">13 8</cell><cell>7</cell><cell>3</cell><cell>6</cell><cell>4</cell><cell cols="3">10 11 9</cell><cell cols="4">12 16 14 15 1</cell></row><row><cell>11</cell><cell>2</cell><cell cols="3">11 12 6</cell><cell cols="2">10 5</cell><cell>4</cell><cell>3</cell><cell>8</cell><cell cols="2">13 7</cell><cell>9</cell><cell cols="3">14 15 16 1</cell></row><row><cell>12</cell><cell>2</cell><cell>9</cell><cell cols="2">11 7</cell><cell>8</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell cols="6">10 12 13 14 15 16 1</cell></row><row><cell>13</cell><cell>3</cell><cell cols="2">10 9</cell><cell>8</cell><cell cols="2">13 2</cell><cell>5</cell><cell>4</cell><cell>6</cell><cell cols="2">12 7</cell><cell cols="4">11 14 16 15 1</cell></row><row><cell>14</cell><cell>3</cell><cell cols="3">12 13 7</cell><cell>9</cell><cell>2</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell cols="2">11 8</cell><cell cols="4">10 14 16 15 1</cell></row><row><cell>15</cell><cell>2</cell><cell>8</cell><cell cols="2">12 6</cell><cell cols="2">10 3</cell><cell>5</cell><cell>4</cell><cell>7</cell><cell cols="2">13 9</cell><cell cols="4">11 14 15 16 1</cell></row><row><cell>16</cell><cell>5</cell><cell cols="3">10 11 8</cell><cell>6</cell><cell>2</cell><cell>3</cell><cell>9</cell><cell>4</cell><cell cols="2">12 7</cell><cell cols="4">13 14 15 16 1</cell></row><row><cell>17</cell><cell>2</cell><cell>9</cell><cell cols="2">10 7</cell><cell>8</cell><cell>4</cell><cell cols="2">14 3</cell><cell>6</cell><cell cols="2">12 5</cell><cell cols="4">11 13 16 15 1</cell></row><row><cell>18</cell><cell>2</cell><cell cols="3">13 11 8</cell><cell cols="2">10 5</cell><cell>4</cell><cell>3</cell><cell>7</cell><cell cols="2">14 6</cell><cell>9</cell><cell cols="3">12 15 16 1</cell></row><row><cell>19</cell><cell>2</cell><cell>6</cell><cell cols="3">13 11 9</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>8</cell><cell cols="2">12 7</cell><cell cols="4">10 14 15 16 1</cell></row><row><cell>20</cell><cell>4</cell><cell cols="3">11 10 7</cell><cell>8</cell><cell>2</cell><cell>3</cell><cell>5</cell><cell>6</cell><cell cols="2">13 9</cell><cell cols="4">12 15 16 14 1</cell></row><row><cell>21</cell><cell>2</cell><cell cols="2">12 7</cell><cell>8</cell><cell cols="2">13 3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell cols="3">11 10 9</cell><cell cols="3">14 15 16 1</cell></row><row><cell>22</cell><cell>5</cell><cell cols="3">14 13 9</cell><cell>2</cell><cell>3</cell><cell>6</cell><cell>4</cell><cell>7</cell><cell cols="2">11 8</cell><cell cols="4">12 16 10 15 1</cell></row><row><cell>23</cell><cell>3</cell><cell cols="3">11 14 7</cell><cell>9</cell><cell>5</cell><cell>4</cell><cell>2</cell><cell>6</cell><cell cols="2">10 8</cell><cell cols="4">13 12 16 15 1</cell></row><row><cell>24</cell><cell>2</cell><cell cols="3">12 13 8</cell><cell>7</cell><cell>3</cell><cell>6</cell><cell>4</cell><cell>5</cell><cell cols="2">11 9</cell><cell cols="4">10 16 14 15 1</cell></row><row><cell>Δi</cell><cell cols="2">-138 37</cell><cell>77</cell><cell>-30</cell><cell>-2</cell><cell cols="2">-125 -71</cell><cell>-99</cell><cell>-51</cell><cell>77</cell><cell>-8</cell><cell>63</cell><cell>132</cell><cell>149</cell><cell>169</cell><cell>-180</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_94"><head></head><label></label><figDesc>′ ), u ′′ ) ↓= δ * P (s, u ′ u ′′ ) .</figDesc><table><row><cell cols="2">partial action of the monoid X  *  on the set S P , i.e. it is a partial mapping</cell></row><row><cell>δ  *  P : S P × X</cell><cell>S P such that</cell></row><row><cell cols="2">1. δ  *  P (s, ε) ↓= s for all s ∈ S P ; 2. if δ  *  P (s, u ′ ) ↓ and δ  *  P (δ  *  P (s, u ′ ), u ′′ ) ↓ then</cell></row><row><cell></cell><cell>δ  *  P (s, u ′ u ′′ ) ↓= δ  *  P (δ  *  P (s, u ′ ), u ′′ ) ;</cell></row><row><cell cols="2">3. if δ  *  P (s, u ′ ) ↓ and δ  *  P (s, u ′ u ′′ ) ↓ then</cell></row><row><cell></cell><cell>δ  *  P (δ  *  P (s, u</cell></row><row><cell cols="2">Definition 4. A triple P(X, S P , δ  *  P ) is called a pre-automaton if X is a finite alphabet of stimuli, S P is a set of states of the pre-automaton, δ  *  P is a right</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_102"><head></head><label></label><figDesc>, in Example 1 operators are statically permutable, but after applying init operator formula will contain predicate that combines memory of operators 1</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>a , 0 b</cell></row><row><cell cols="16">and 1 a , 1 b . So, we have to use sufficient condition for dynamic permutability of pairs</cell></row><row><cell cols="16">of operators, 1 a , 0 b and 1 a , 1 b regarding the state of the environment after</cell></row><row><cell cols="13">application of init operator . So,</cell><cell>E</cell><cell></cell><cell>) ( b a </cell><cell>. Let's statically compute sufficient</cell></row><row><cell cols="15">condition of permutability of operators:</cell></row><row><cell>(</cell><cell>1</cell><cell>,</cell><cell>)</cell><cell>:</cell><cell>(</cell><cell>,</cell><cell>)</cell><cell>(</cell><cell>,</cell><cell>)</cell><cell>(</cell><cell>) 1</cell><cell>(</cell><cell></cell><cell>) 0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_104"><head></head><label></label><figDesc>.</figDesc><table><row><cell>Theorem 6.</cell><cell cols="5">punfold</cell><cell cols="2">(</cell><cell cols="2">E</cell><cell>,</cell><cell cols="2">u</cell><cell>,</cell><cell>i</cell><cell>)</cell><cell>Function which was represented in fig. 1 saves</cell></row><row><cell cols="16">property of reachability checking.</cell></row><row><cell cols="16">Proof. Let's suppose opposite that the function</cell><cell>punfold</cell><cell>(</cell><cell>E</cell><cell>,</cell><cell>u</cell><cell>,</cell><cell>i</cell><cell>)</cell><cell>does not save the property</cell></row><row><cell cols="16">of reachability checking. This means that for some state of environment E such</cell></row><row><cell cols="16">operator a exists, which is applied to the E(</cell><cell>E a  </cell><cell>E</cell><cell></cell><cell>) and doesn't exist as first</cell></row><row><cell cols="4">action in components</cell><cell cols="5">( i A</cell><cell>),</cell><cell cols="4">( B</cell><cell cols="2">E</cell><cell>,</cell><cell>i</cell><cell>),</cell><cell>C</cell><cell>(</cell><cell>E</cell><cell>,</cell><cell>i</cell><cell>)</cell><cell>. So, the operator will be dynamically</cell></row><row><cell cols="16">permutable regarding the environment E and all other operators resulting behavior</cell></row><row><cell>components</cell><cell>( i A</cell><cell>),</cell><cell>( B</cell><cell>E</cell><cell cols="2">,</cell><cell>i</cell><cell cols="2">),</cell><cell cols="2">C</cell><cell cols="2">(</cell><cell cols="2">E</cell><cell>,</cell><cell>i</cell><cell>)</cell><cell>(according to Choosing Operator, Partial</cell></row><row><cell cols="16">Unfolding). In addition, operator a can be applied after the application of the first</cell></row><row><cell cols="16">operators in the resulting behavior of components</cell><cell>( i A</cell><cell>),</cell><cell>( B</cell><cell>E</cell><cell>,</cell><cell>i</cell><cell>),</cell><cell>C</cell><cell>(</cell><cell>E</cell><cell>,</cell><cell>i</cell><cell>)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_106"><head>Table 1 .</head><label>1</label><figDesc>Experiments result for static interleaving reduction algorithm</figDesc><table><row><cell>No.</cell><cell>Total number of operators pairs</cell><cell>Number of non-permutable operator's pairs</cell><cell>Time</cell></row><row><cell>1</cell><cell>660</cell><cell>30</cell><cell>25 min (on prototype)</cell></row><row><cell>2</cell><cell>780</cell><cell>14</cell><cell>47 min 4 sec</cell></row><row><cell>3</cell><cell>12882</cell><cell>225</cell><cell>1 min 42 sec</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_109"><head>Table 1 .</head><label>1</label><figDesc>Failure detection frequency for each component</figDesc><table><row><cell>Component</cell><cell>Failures detection frequency</cell></row><row><cell>Input</cell><cell>0.11</cell></row><row><cell>Calculation</cell><cell>0.18</cell></row><row><cell>Output</cell><cell>0.09</cell></row><row><cell>Exit</cell><cell>0.01</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_110"><head>Table 2 .</head><label>2</label><figDesc>The first order probability transition matrix</figDesc><table><row><cell>Component</cell><cell>Input</cell><cell>Calculation</cell><cell>Output</cell><cell>Exit</cell></row><row><cell>Input</cell><cell>0.2987</cell><cell>0.66233</cell><cell>0</cell><cell>0.03897</cell></row><row><cell>Calculation</cell><cell>0.2666</cell><cell>0.05</cell><cell>0.6333</cell><cell>0.0501</cell></row><row><cell>Output</cell><cell>0.5</cell><cell>0</cell><cell>0.3148</cell><cell>0.1852</cell></row><row><cell>Exit</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_111"><head>Table 3 .</head><label>3</label><figDesc>The first order initial probability vector</figDesc><table><row><cell>Components</cell><cell>Input</cell><cell>Calculation</cell><cell>Output</cell><cell>Exit</cell></row><row><cell>Probability</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_112"><head>Table 4 .</head><label>4</label><figDesc>The values of АІС for different chain orders</figDesc><table><row><cell>The process order</cell><cell>AIC value</cell></row><row><cell>1</cell><cell>223.7</cell></row><row><cell>2</cell><cell>203.5</cell></row><row><cell>3</cell><cell>352.7</cell></row><row><cell>4</cell><cell>1082.8</cell></row><row><cell cols="2">The initial graph   i C indicating the program components and control flow, as well as graph  </cell></row></table><note>i C of the equivalent second order (see</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_113"><head>Table 4 )</head><label>4</label><figDesc>Markov process are shown in Fig.2and 3 correspondingly. The notations in these figures are as follows: I correspond to Input state, Cto Calculation, Oto Output, and E to Exit state (see Table 2); indexes indicates the previous state in control flow history (thus state OC means that the current state Output has been reached from previous state Calculation).</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_114"><head>Table 1 .</head><label>1</label><figDesc>SWQM characteristics associated with GSW.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_115"><head>Table 2 .</head><label>2</label><figDesc>Reliability characteristics of SWQM.</figDesc><table><row><cell>№</cell><cell>SWQMs (years)</cell><cell>GSW characteristics</cell><cell>№</cell><cell>SWQMs (years)</cell><cell>Reliability characteristics</cell></row><row><cell>1.</cell><cell>McCall (1977)</cell><cell>4. Efficiency 4.1 Execution efficiency 4.2 Storage efficiency</cell><cell>1.</cell><cell>McCall (1977)</cell><cell>2. Reliability 2.1 Accuracy 2.2 Error tolerance</cell></row><row><cell>2. 3.</cell><cell>Boehm (1978) Carlo Ghezzi</cell><cell>2.2 Efficiency 2.2.1 Accountability 2.2.2 Accessibility -</cell><cell>2.</cell><cell>Boehm (1978)</cell><cell>2.3 Consistency 2.1 Reliability 2.2.1 Self contentedness 2.2.2 Integrity 2.2.3 Accuracy</cell></row><row><cell></cell><cell>(1991)</cell><cell></cell><cell>3.</cell><cell>zzi (1991) CarloGhe</cell><cell>3. Reliability</cell></row><row><cell></cell><cell></cell><cell>4 Performance</cell><cell></cell><cell></cell><cell>3. Reliability</cell></row><row><cell></cell><cell></cell><cell>4.1 Velocity</cell><cell></cell><cell></cell><cell>3.1 Frequency and</cell></row><row><cell>4.</cell><cell>FURPS (1992)</cell><cell>4.2 Efficiency 4.3 Availability 4.4 Time of answer</cell><cell>4.</cell><cell>FURPS (1992)</cell><cell>servity of failures 3.2 Recoverability 3.3 Time among</cell></row><row><cell></cell><cell></cell><cell>4.5 Time of recovery</cell><cell></cell><cell></cell><cell>failures</cell></row><row><cell></cell><cell></cell><cell>4.6 Utilization of resources</cell><cell></cell><cell></cell><cell>2. Reliability</cell></row><row><cell>5. 6. 7.</cell><cell>IEEE (1993) Dromey (1995) ISO 9126-1 (2001)</cell><cell>1.2 Capacity 1 Efficiency 1.1 Temporal efficiency 1.2 Resource efficiency 2.2 Efficiency 4 Efficiency 4.1 Time behavior 4.2 Resource utilization</cell><cell>5. 6. 7.</cell><cell>IEEE (1993) Dromey (1995) ISO 9126-1 (2001)</cell><cell>2.1 Non deficiency 2.1 Error tolerance 1.3 Availability 1.2 Reliability 2. Reliability 2.1 Maturity 2.2 Fault tolerance 2.3 Recoverability</cell></row><row><cell>8.</cell><cell>QMOOD (2002)</cell><cell>6 Effectiveness</cell><cell>8.</cell><cell>(2002) QMOOD</cell><cell>-</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>5. Reliability</cell></row><row><cell>9.</cell><cell>ISO 25010 (2010)</cell><cell>2 Performance efficiency 2.1 Time behavior 2.2 Resource utilization 2.3 Capacity</cell><cell>9.</cell><cell>ISO 25010 (2010)</cell><cell>5.1 Maturity 5.2 Availability 5.3 Fault tolerance 5.4 Recoverability</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_117"><head>Table 3 .</head><label>3</label><figDesc>Results of GSW characteristics comparison and CMCM calculation.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_119"><head>Table 4 .</head><label>4</label><figDesc>Results of reliability characteristics comparison and CMCM calculation.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_120"><head>Table 1 .</head><label>1</label><figDesc>Competitive analysis of existing solutions within the use of decentralization approach for content sharing</figDesc><table><row><cell>Name</cell><cell cols="2">Key features</cell><cell>Advantages</cell><cell>Disadvantages</cell></row><row><cell></cell><cell>Storage</cell><cell>solution</cell><cell></cell></row><row><cell></cell><cell cols="2">based on P2P tech-</cell><cell></cell></row><row><cell>SpaceMonkey</cell><cell cols="2">nology that saves users' data both lo-cally and remotely in a separate, remote 1 TB hard drive with 2</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_122"><head></head><label></label><figDesc>illustrates an implementation of the proposed approach.</figDesc><table><row><cell></cell><cell></cell><cell>Access to</cell></row><row><cell></cell><cell></cell><cell cols="2">Resource Using</cell></row><row><cell></cell><cell></cell><cell cols="2">Received Address</cell></row><row><cell></cell><cell>Resource owner</cell><cell></cell><cell>Nodes that are non-participants</cell></row><row><cell></cell><cell></cell><cell></cell><cell>of the Distributed Cloud</cell></row><row><cell cols="3">Participants' Nodes in the Distributed Cloud with Full</cell><cell>Requesting Resource's Address</cell><cell>Responding with Resource's Address</cell></row><row><cell></cell><cell>Resource</cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">Resource Publication</cell></row><row><cell>Peer-to-Peer</cell><cell cols="2">Peer-to-Peer</cell></row><row><cell>Protocols</cell><cell cols="2">Protocols</cell></row><row><cell></cell><cell></cell><cell></cell><cell>DNS-Server</cell></row><row><cell cols="3">Participant's Node in the</cell></row><row><cell></cell><cell>Distributed Cloud</cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">Modified Resource Records</cell></row><row><cell>...</cell><cell>Peer-to-Peer Protocols</cell><cell>...</cell></row><row><cell cols="3">Participant's Node in the</cell></row><row><cell></cell><cell>Distributed Cloud</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_123"><head>Table 2 .</head><label>2</label><figDesc>Initial data Available user goodput, G 10 Mb/s Available server goodput, Gserv 10 Gb/s Available link goodput, Glink 8 Mb/s Available goodput of i node, Gi 2 Mb/s Available link to the i node goodput, Glink_i 5 Mb/s The data response size, V 100 kB</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_124"><head>Table 3 .</head><label>3</label><figDesc>Input data and estimation results</figDesc><table><row><cell></cell><cell>b</cell><cell>c</cell><cell>n</cell><cell>bn</cell><cell>A(WS)</cell><cell>A(NS)</cell></row><row><cell>1</cell><cell>3000</cell><cell>100</cell><cell>1</cell><cell>7</cell><cell>0.99966</cell><cell>0.999927</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_125"><head>Table 4 .</head><label>4</label><figDesc>Customer segments and needs</figDesc><table><row><cell>Segment</cell><cell>Needs</cell></row><row><cell></cell><cell>-Interested in a small number of websites</cell></row><row><cell>Private individuals, blogs,</cell><cell>-Personal use mainly</cell></row><row><cell>small societies</cell><cell>-Not significantly big amounts of data</cell></row><row><cell></cell><cell>-Seek low prices and easy-to-use solutions</cell></row><row><cell></cell><cell>-Minimize IT costs</cell></row><row><cell>Professionals, freelancers,</cell><cell>-Flexibility &amp; reliability</cell></row><row><cell>businesses</cell><cell>-Scalability "Value for money"</cell></row><row><cell></cell><cell>-Security</cell></row><row><cell></cell><cell>-Low costs to create their web identity</cell></row><row><cell>Startup companies and spe-cial organizations</cell><cell>-Accessibility -Scalability</cell></row><row><cell></cell><cell>-Use of innovative tools</cell></row><row><cell></cell><cell>-Promotional tools</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_126"><head>Table 5 .</head><label>5</label><figDesc>Suggested implementation stages</figDesc><table><row><cell>Stage</cell><cell>Description</cell></row><row><cell>Stage 1. Implementation of the</cell><cell></cell></row><row><cell>PaaS (platform as a service) service</cell><cell></cell></row><row><cell>model, based on the distribution of</cell><cell></cell></row><row><cell>tasks, services, websites and stor-</cell><cell></cell></row><row><cell>age between the users.</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_127"><head>6</head><label></label><figDesc>Procedure 1. Detection of failure of the FTCS (hardware failure, software failure, temporary failure). Failure can occur in the main and diverse system. Procedure 2. Detection of failure in the main or diverse subsystems of the FTCS. Procedure 3. Connection of the module from hot standby to faulty subsystem. Procedure 4. Connection of the module from hot standby to cold standby. Procedure 5. Loading the software on the module with connections from cold to hot standby. Procedure 6. Software restart. Procedure 7. Development the software updates. Procedure 8. Repair (replacement) of the HW of the FTCS.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_132"><head>Table 2 .</head><label>2</label><figDesc>Description of the function F(x5, x4, x3, x2, x1) and ranges RN and RE</figDesc><table><row><cell cols="2">X for x5</cell><cell></cell><cell cols="2">Variables</cell><cell></cell><cell cols="2">F for x5</cell><cell></cell><cell cols="4">Ranges RN and RE</cell><cell></cell></row><row><cell>1</cell><cell>0</cell><cell>x4</cell><cell>x3</cell><cell>x2</cell><cell>x1</cell><cell>1</cell><cell>0</cell><cell>a</cell><cell></cell><cell>b</cell><cell></cell><cell>c</cell><cell></cell></row><row><cell>16</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>16</cell><cell>0</cell><cell>16</cell><cell>0</cell><cell>16</cell></row><row><cell>17</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>18</cell><cell>2</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>19</cell><cell>3</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>20</cell><cell>4</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell>RN</cell><cell></cell><cell></cell><cell cols="2">RE RN</cell></row><row><cell>21</cell><cell>5</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>22</cell><cell>6</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>23</cell><cell>7</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell></cell><cell>23</cell><cell></cell><cell></cell><cell>7</cell><cell>23</cell></row><row><cell>24</cell><cell>8</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>RN</cell><cell>24</cell><cell>RN</cell><cell>RE</cell><cell>8</cell><cell>24</cell></row><row><cell>25</cell><cell>9</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>26</cell><cell>10</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>27</cell><cell>11</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell></cell><cell>RE</cell><cell></cell><cell></cell><cell>RN</cell><cell>RE</cell></row><row><cell>28</cell><cell>12</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>29</cell><cell>13</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>30</cell><cell>14</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>0</cell><cell>1</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>31</cell><cell>15</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>0</cell><cell>15</cell><cell>31</cell><cell>15</cell><cell>31</cell><cell>15</cell><cell>31</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_133"><head>Table 3 .</head><label>3</label><figDesc>Description of input variables and functions for LUT 1 and LUT 2</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_134"><head>The Control Technology of Integrity and Legitimacy of LUT-Oriented Information Object Usage by Self- Recovering Digital Watermark</head><label></label><figDesc>The paper proposes the technology of control of integrity and legitimacy of information object usage with the Look Up Table-oriented (LUToriented) architecture. The technology is based on embedding the self-recovery digital watermark into information objects of such kind. The technology is the composition of approaches to forming the self-recovery digital watermarks in the passive multimedia containers, and approaches to embedding the extra information into LUT-containers. The process of embedding the extra information occurs with the help of classification of container elements and their purposeful modification withi n t h e s e t o f t h e f o r m e d c l a s ses. The procedure of immediate embedding the data at the level of LUT-container elementary parts includes the value inversion of current processed LUT unit and propagation of the inversion around all the inputs of LUT units connected to the current unit output. The description of practical realization of the proposed technology is represented.</figDesc><table><row><cell>Kostiantyn Zashcholkin and Olena Ivanova</cell></row><row><cell>Odessa National Polytechnic University, 1, Shevchenko Avenue, Odessa, Ukraine</cell></row><row><cell>(const-z@te.net.ua, en.ivanova.ua@gmail.com)</cell></row><row><cell>Abstract.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_135"><head></head><label></label><figDesc>The element classification is organized as a determination of zero and one value proportion in LUT unit codes. It is performed according to the following principle: if LUT unit contains zero values more than one values it is classified as a regular unit (R-unit); if a unit contains more one values than zero values it is classified as a singular unit (S-unit); if the number of zero values of LUT unit equals the number of its one values the unit is classified as an unused unit (U-unit).</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_136"><head>Table 1 .</head><label>1</label><figDesc>The rules of LUT-unit move from one class to another</figDesc><table><row><cell>Class of the current LUT-unit LUT i</cell><cell>Value of a bit, corresponding to the LUT i in vector RS current LUT-unit</cell><cell>The current bit of vector</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_137"><head>Table 2 .</head><label>2</label><figDesc>Initial values of codes of LUT units lying in embedding path</figDesc><table><row><cell>i Unit code 51F0 FF96 56EC E8FE 2002 0008 8040 1000 0FF0 CCCD 1 2 3 4 5 6 7 8 9 10 n 1 7 12 9 11 2 1 2 1 8 9 R S S S R R R R U S Class of unit RS-v e c t o r 0 1 1 1 0 0 0 0 -1</cell></row><row><cell>i Unit code 0220 88F8 F128 3F00 0001 9B94 AABA A340 B0E1 EE00 11 12 13 14 15 16 17 18 19 20 n 1 2 7 7 6 1 8 9 5 7 6 Class of</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_138"><head>Table 4 .</head><label>4</label><figDesc>Values of LUT-unit codes after embedding the DWM in the container</figDesc><table><row><cell>i Unit code AE0F 0069 56EC E8FE 2002 0008 8040 EFFF 0FF0 CCCD 1 2 3 4 5 6 7 8 9 10 n 1 9 4 9 11 2 1 2 15 8 9 S R S S R R R S U S Class of unit RS-vector 1 0 1 1 0 0 0 1 -1</cell></row><row><cell>i Unit code 0220 7707 0ED7 C0FF 0001 9B94 AABA A340 4F1E EE00 11 12 13 14 15 16 17 18 19 20 n 1 2 9 9 10 1 8 9 5 9 6 S S S R U S R S R Class of unit R RS-vector 0 1 1 1 0 -1 0 1 0</cell></row><row><cell>4</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_139"><head>The Proposed Procedure of DWM Extraction from LUT- Container</head><label></label><figDesc></figDesc><table /><note>Within the frame of the proposed technology the stego-key dedicated for data extraction consists of the following four components: key = (order, classification, RSrule, ΔL),</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_140"><head>Table 5 .</head><label>5</label><figDesc>The results of energy consumption and processing speed estimation</figDesc><table><row><cell>Project P min P max δ P min P max δ P min P max δ P min P max δ</cell><cell>Total core energy consumption (mA) Cyclone II EP2C35F672C6 Dynamic power supply (mA) F = 420,18 MHz 699, 17 629,98 701,40 632,19 0,31 % 0,34 % Cyclone III EP3C40F780C6 F = 516,26 MHz 495,6 491,49 497,37 493,39 0,35 % 0,38 % Cyclone III LS EP3CLS70F780C7 F = 516,26 MHz 494,6 482,91 496,23 484,73 0,32 % 0,37% Cyclone IV E EP4CE30F29C6 F = 600,6 MHz 477,42 470.42 479,64 472,22 0,46 % 0,38 %</cell><cell>Static power supply (mA) 69,19 69,22 0,04 % 4,11 3,98 3,16 % 11,69 11,51 1,5 % 7,00 7,41 5,5 %</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_141"><head></head><label></label><figDesc>1, two types of well-characterized redundant architectures (2oo3 and 1oo2D) have equal functional structure schemes A  B  C and therefore cy- cle's synchronization procedures within sub-channels are required. As a result, extra data connection lines between sub-channels are used to establish additional information exchange and projects very often become fed up with wiring L and sophisticated inter-channel redundancy management.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_142"><head>Table 1 .</head><label>1</label><figDesc>Summary of diversity usage</figDesc><table><row><cell>Diversity</cell><cell>Aviation</cell><cell>Railway</cell><cell></cell><cell>Chemical</cell><cell>NPP</cell></row><row><cell>Equipment</cell><cell>x</cell><cell></cell><cell></cell><cell>x</cell><cell>x</cell></row><row><cell>Design</cell><cell></cell><cell></cell><cell></cell><cell>x</cell><cell>x</cell></row><row><cell>Function Human</cell><cell>x x</cell><cell>x x</cell><cell>1oo2S</cell><cell>x x</cell><cell>x x</cell></row><row><cell>Signal</cell><cell></cell><cell>x</cell><cell></cell><cell>x</cell><cell>x</cell></row><row><cell>Software</cell><cell>x</cell><cell>x</cell><cell></cell><cell>x</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_151"><head>Table 1 .</head><label>1</label><figDesc>Information Quality Model</figDesc><table><row><cell></cell><cell>Conforms to Specifications</cell><cell>Meets or Exceeds</cell></row><row><cell></cell><cell></cell><cell>Consumer Expectations</cell></row><row><cell>Product</cell><cell>Sound Information:</cell><cell>Useful Information</cell></row><row><cell>Quality</cell><cell></cell><cell></cell></row><row><cell></cell><cell>-Free-of-Error</cell><cell>-Appropriate Amount</cell></row><row><cell></cell><cell>-Concise Representation</cell><cell>-Relevancy</cell></row><row><cell></cell><cell>-Completeness</cell><cell>-Understandability</cell></row><row><cell></cell><cell>-Consistent representation</cell><cell>-Interpretability</cell></row><row><cell></cell><cell></cell><cell>-Objectivity</cell></row><row><cell>Service</cell><cell>Dependable Information:</cell><cell>Usable Information:</cell></row><row><cell>Quality</cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_152"><head>Table 2 .</head><label>2</label><figDesc>Interrelations between IQ Indicators and CAP-requirements</figDesc><table><row><cell></cell><cell>Consistency</cell><cell>Availability</cell><cell>Partition Tolerance</cell></row><row><cell>Consistent</cell><cell>+</cell><cell></cell><cell>+</cell></row><row><cell>representation</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Free-of-Error</cell><cell>+</cell><cell>+</cell><cell>+</cell></row><row><cell>Concise</cell><cell>+</cell><cell></cell><cell></cell></row><row><cell>representation</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Accessibility</cell><cell></cell><cell>+</cell><cell>+</cell></row><row><cell>Timeliness</cell><cell>+</cell><cell></cell><cell>+</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_154"><head>Table 2 .</head><label>2</label><figDesc>The structure function of the simple service system represented as an incompletely specified MVL function</figDesc><table><row><cell cols="2">Components states</cell><cell></cell><cell>x3</cell><cell></cell><cell></cell></row><row><cell>x1</cell><cell>x2</cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell>0</cell><cell>0</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_155"><head>Table 3 .</head><label>3</label><figDesc>The structure functions of parallel MSS (n = 2, m1 = m2 = M = 3)</figDesc><table><row><cell cols="2">Components states</cell><cell></cell><cell cols="2">Structure function of parallel MSS</cell><cell></cell></row><row><cell>x1</cell><cell>x2</cell><cell>1(x)</cell><cell>2(x)</cell><cell>3(x)</cell><cell>4(x)</cell></row><row><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell><cell>0</cell></row><row><cell>0</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell>0</cell><cell>2</cell><cell>2</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell>1</cell><cell>0</cell><cell>1</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell>1</cell><cell>1</cell><cell>1</cell><cell>2</cell><cell>1</cell><cell>1</cell></row><row><cell>1</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>1</cell><cell>2</cell></row><row><cell>2</cell><cell>0</cell><cell>2</cell><cell>1</cell><cell>1</cell><cell>1</cell></row><row><cell>2</cell><cell>1</cell><cell>2</cell><cell>2</cell><cell>1</cell><cell>2</cell></row><row><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell><cell>2</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_157"><head></head><label></label><figDesc>A Direct Partial Logic Derivatives of a structure function (x) of n variables with respect to variables vector x (p) = (xi 1 , xi 2 , …, xi p ) reflects the fact of changing of function from j to j ~ when the value of every variable of vector x (p) is changing from</figDesc><table><row><cell cols="4">s to s ~ [15]:</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>j</cell><cell></cell><cell> ( ) x j i</cell><cell>s</cell><cell>(p)</cell><cell></cell><cell> ( ) s (p)</cell><cell>   0 , , 1</cell><cell>other ( if s i 1</cell><cell>,..., s i</cell><cell>p</cell><cell>,</cell><cell>x</cell><cell>)</cell><cell></cell><cell>j</cell><cell>and</cell><cell>(</cell><cell>1 i s</cell><cell>,..., s i</cell><cell>p</cell><cell>,</cell><cell>x</cell><cell></cell><cell>) j</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_158"><head></head><label></label><figDesc>) can be defined for estimation of exact boundary state for MSS performance level j of p components xi 1 , xi 2 , …, xi p</figDesc><table><row><cell>     j s s s p j ~1  i i i 1  i i p s x x 1 ...</cell><cell>i</cell><cell>p</cell><cell>   </cell><cell>.</cell></row><row><cell>Consider some examples for calculation of measures (</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_159"><head>Table 4 .</head><label>4</label><figDesc>The components states probabilities of the simple service system</figDesc><table><row><cell>0</cell><cell></cell><cell></cell><cell></cell><cell cols="2">Components states</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>x1</cell><cell></cell><cell>x2</cell><cell></cell><cell>x3</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>0</cell><cell>1</cell><cell>2</cell><cell>3</cell></row><row><cell>pi,s</cell><cell>0.3</cell><cell>0.7</cell><cell>0.2</cell><cell>0.8</cell><cell>0.2</cell><cell>0.6</cell><cell>0.1</cell><cell>0.1</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_160"><head>Table 1 .</head><label>1</label><figDesc>Minimal cut sets of the system</figDesc><table><row><cell>Failed modules</cell><cell>The number of failed modules</cell><cell>MCS values</cell><cell>Percentage values, %</cell></row><row><cell>E, D</cell><cell>2</cell><cell>0,009</cell><cell>84,6</cell></row><row><cell>A, C, E</cell><cell>3</cell><cell>0,00084</cell><cell>7,92</cell></row><row><cell>B, C, E</cell><cell>3</cell><cell>0,00084</cell><cell>7,92</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_161"><head></head><label></label><figDesc>and</figDesc><table><row><cell cols="2">without removal vulnerability</cell><cell>S 0</cell><cell>Sd</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>a)</cell></row><row><cell>With the removal vulnerabilities</cell><cell></cell><cell>S 0 n v S 0 S 0</cell><cell>S d S d S d</cell><cell>S u n v -1 S u S u</cell><cell></cell><cell>S u S u 1 S u</cell><cell>S d S d S d</cell><cell>S u 0 S u S u</cell><cell>b) c) d)</cell></row><row><cell></cell><cell></cell><cell>S 0</cell><cell>S d</cell><cell>S u</cell><cell>S d</cell><cell>S u</cell><cell>S d</cell><cell>S u</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>e)</cell></row><row><cell>With preventive</cell><cell></cell><cell>S p S0</cell><cell>Sd</cell><cell>S p Su</cell><cell>Sd</cell><cell>S p Su</cell><cell>Sd</cell><cell>Su</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>f)</cell></row><row><cell></cell><cell></cell><cell>Sp</cell><cell></cell><cell>Sp</cell><cell></cell><cell>Sp</cell><cell></cell><cell></cell><cell></cell></row><row><cell>With attacks on several</cell><cell>vulnerabilities</cell><cell>S0 Sd Sd Sd</cell><cell>Sd</cell><cell>Su Sd Sd Sd</cell><cell>Sd</cell><cell>Su</cell><cell>Sd</cell><cell>Su</cell><cell>g)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_162"><head>Table 2 .</head><label>2</label><figDesc>Values of input parameters for availability models</figDesc><table><row><cell>#</cell><cell>Name</cell><cell>Symbol</cell><cell>Value</cell><cell>Unit</cell></row><row><cell cols="2">1. DNS service software failure rate</cell><cell>ladns</cell><cell>3e-5</cell><cell>1/hr</cell></row><row><cell cols="2">3. DHCP service software failure rate</cell><cell>ladhcp</cell><cell>1.5e-5</cell><cell>1/hr</cell></row><row><cell cols="2">4. Route service software failure rate</cell><cell>laroute</cell><cell>5e-4</cell><cell>1/hr</cell></row><row><cell cols="2">5. DNS service software recovery rate</cell><cell>mudns</cell><cell>0.67</cell><cell>1/hr</cell></row><row><cell cols="2">6. DHCP service software recovery rate</cell><cell>mudhcp</cell><cell>1</cell><cell>1/hr</cell></row><row><cell cols="2">7. Route service software recovery rate</cell><cell>muroute</cell><cell>0.33</cell><cell>1/hr</cell></row><row><cell cols="2">8. Attack rate on availability (accessibility) of DNS service</cell><cell>laatdns</cell><cell>6.3e-3</cell><cell>1/hr</cell></row><row><cell cols="2">9. Criticality of attack on availability of DNS service</cell><cell>d1dns</cell><cell>0.77</cell><cell></cell></row><row><cell cols="2">10. Restart (recovery) rate after attack on availability</cell><cell>mureboot</cell><cell>0.5</cell><cell>1/hr</cell></row><row><cell cols="4">11. Restart (recovery) rate after attack on availability with VE murecovery 0.22</cell><cell>1/hr</cell></row><row><cell cols="2">12. Rate of maintenance (security audit)</cell><cell>laprof</cell><cell>4.5e-4</cell><cell>1/hr</cell></row><row><cell cols="2">13. Recovery rate of service after security audit</cell><cell>muprof</cell><cell>0.5</cell><cell>1/hr</cell></row><row><cell cols="2">14. Probability of successful recovery with VE</cell><cell>d2p</cell><cell>0.5</cell><cell></cell></row><row><cell>15.</cell><cell>Probability of vulnerability elimination during security audit</cell><cell>p (р=α1)</cell><cell>0.7</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_163"><head>Table 3 .</head><label>3</label><figDesc>Probabilities of detection of j vulnerabilities</figDesc><table><row><cell>j</cell><cell>1</cell><cell>2</cell><cell>3</cell><cell>…</cell><cell>nv-1</cell><cell>nv</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">https://www.coursera.org</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_1">https://www.edx.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_2">www.udacity.com</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_3">www.futurelearn.com</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_4">https://iversity.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_5">https://www.france-universite-numerique-mooc.fr/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_6">https://www.miriadax.net/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_7">www.youtube.com</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_8">http://www.ti.inf.uni-due.de/research/tools/raven</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_9">http://semweb.salzburgresearch.at/apps/rdf-gravity/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_10">http://www.graphviz.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_11">http://www.eclipse.org/Xtext/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_12">http://jena.apache.org/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_13">Method of evaluating the success of software project implementation based on analysis of SRS consists of next stages: 1) neuronet prediction of characteristics of software project based on the analysis of specification; 2) interpretation of the received relative</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_14">In 1989, V. Lifschitz independently introducing the notion of a c-clause under the name of a super-clause improved such interpretation[13]. In[14], T. Bollinger extended Loveland's model elimination method[15]  to the case of c-clauses using the name of a generalized clause for a c-clause.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_15">IR calculus and Maslov's inverse methodBelow, we give the description of MIM in the form of a special strategy for IR.Maslov's inverse method deals with so-called favorable assortments. In this connection, we consider MIM as a calculus of favorable assortments that has two inference rule: A and B. The A rule determines an initial set of favorable</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_16">Related workThe concept of using agents for production is not new. Among others a multiagentbased production system has also been developed by Jennings and Bussmann[3][4]. Jennings and Bussmann introduce the concept of a product agent, in their</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_17">Publication information in Ukrainian is at 23% and 20% of Web-sites respectively, in English -41% for both groups. Obviously, multilingual information is essential for companies interested in attracting a great number of customers and business partners.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_18">Ecommerce Sales Topped $1 Trillion for First Time in</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2012" xml:id="foot_19">. Available www.emarketer.com 2 E-commerce and Development Key Trends and Issues Available www.wto.org/english/tratop_e/devel_e/wkshop_apr13_e/fredriksson_ecommerce_e.pdf</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_20">The Statistics Portal. Available www.statista.com</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_21">Internet business in Ukraine. Available http://ain.ua</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_22">Ukraine overview. Available www.ebrd.com/where-we-are/ukraine/overview.html time direct contact price а</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_23">IPO calendar, http://www.fixygen.ua/calendar/ipo/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_24">WSE, http://www.ipowse.com.ua/about/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="3" xml:id="foot_25">Kernel, http://www.kernel.ua/en/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_26">Ovostar, http://www.ovostar.ua/ru/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="5" xml:id="foot_27">Industrial Milk Company, http://www.imcagro.com.ua/ru/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="6" xml:id="foot_28">Milkiland, http://www.milkiland.nl/ru</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="7" xml:id="foot_29">KDM Shipping, http://kdmshipping.com/</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="8" xml:id="foot_30">Wig-Ukraine, http://www.gpw.pl/opis_indeksu_WIG-Ukraine_ru</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_31">This property informally means that a "black box" cannot use an information from the future.</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="4" xml:id="foot_32">Limits of the Equivariance / Finite Support PrincipleIn order to translate a general ZF result into FSM, one must prove that several structures are finitely supported. There exist two general methods of proving</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_33">This response is either a successful report on request or an error message.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgements We are grateful to María Espinoza who has helped us explore the applicability of graph transformations to the RDF world [20].</p><p>Acknowledgements. The work was supported by a grant of the Romanian National Authority for Scientific Research, CNCS-UEFISCDI, project number PN-II-ID-PCE-2011-3-0919.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusion</head><p>We have proposed the notion of an Y -strongly viable set X for nonlinear switched systems. This notion follows naturally from interpretation of viable sets as safety regions. We have considered the case when X is the complement of the origin (i.e. the origin may be interpreted as a safety hazard) and proposed a convenient sufficient condition which can be used to verify that for a given system, X, and Y , X is Y -strongly viable. In the forthcoming papers we plan to investigate other cases give the corresponding conditions. channels. The additional benefit from such approach could be significant protection against vulnerability of most common cause failures when software design shortcomings and hardware faults are came to light.</p><p>Acknowledgment. Authors express a deep gratefulness to Grygoriy Zholtkevych and Iryna Zaretska for their help and their criticism.</p><p>Acknowledgments. This work was partially supported by grant of Scientific Grant Agency of the Ministry of Education of Slovak Republic (Vega 1/0498/14) and the project "Innovation and internationalization of education -instruments for increasing quality of the University of Žilina in the European educational space".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>maintenance.</head><p>Besides, other types of the vulnerabilities for confidentiality and integrity issues and more detailed model taking into account routing processes can be researched.</p></div>
			</div>


			<div type="availability">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Availability Considering Attacks on Vulnerabilities</head><p>Vyacheslav Kharchenko 1 , Yurij Ponochovny 2 , Artem Boyarchuk 1  and Anatoliy</p></div>
			</div>


			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"> ⋆  <p>The research reported in this paper was supported by the Austrian Forschungsförderungsgesellschaft (FFG) for the Bridge Early Stage project "Advanced Adaptivity and Exception Handling in Formal Business Process Models" (adaBPM) under contract 842437.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Pedagogical Aspects of Electronic Resources Delivery and Indicators of Research</head><p>Cloud computing technology is now one of the leading trends in the formation of the information society. It constitutes an innovative learning concept and its implementation significantly affects the content and form of different types of activities in the sphere of education <ref type="bibr">[4,</ref><ref type="bibr">13,</ref><ref type="bibr">18]</ref>. Notoriously this problem is algorithmically unsolvable. It means that you could always prepare example where interleaving reduction will be impossible (for example, all operators will be non-permutable etc).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Methods and Technologies for the Quality Monitoring of</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Abstracting an operational semantics to finite automata</head><p>Nadezhda Baklanova, Wilmer Ricciotti, Jan-Georg Smaus, Martin Strecker IRIT (Institut de Recherche en Informatique de Toulouse) Université de Toulouse, France firstname.lastname @irit.fr ⋆,⋆⋆ Abstract. There is an apparent similarity between the descriptions of small-step operational semantics of imperative programs and the semantics of finite automata, so defining an abstraction mapping from semantics to automata and proving a simulation property seems to be easy. This paper aims at identifying the reasons why simple proofs break, among them artifacts in the semantics that lead to stuttering steps in the simulation. We then present a semantics based on the zipper data structure, with a direct interpretation of evaluation as navigation in the syntax tree. The abstraction function is then defined by equivalence class construction.</p><p>To make this precise, we need some auxiliary functions. We first define a function all-locations of type stmt ⇒ stmt-path ⇒ stmt-location list which gathers all locations in a statement, and a function nodes-of-stmt-locations which adds the Boolean flags.</p><p>As for the edges, the function synt-step-image yields all possible successor configurations for a given syntactic configuration. This is of course an overapproximation of the behavior of the semantics, since some of the source tree locations may be unreachable during execution. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Simulation Property</head><p>We recall that the nodes of the automaton generated by stmt-to-ta are labeled by configurations (location, Boolean flag) of the syntax tree. The simulation lemma (Lemma 1) holds for automata with appropriate closure properties: a successor configuration wrt. a transition of the semantics is also a label of the automaton (nodes-closed ), and analogously for edges (edges-closed ) or both nodes and edges (synt-step-image-closed ).</p><p>The simulation statement is a typical commuting-diagram property: a step of the program semantics can be simulated by a step of the automaton semantics,</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The Static Analysis of Linear Loops</head><p>Michael Lvov 1 , Yulia Tarasich 1 , 1 Kherson State University, 40 rokiv Zhovtnya St. <ref type="bibr">27</ref> 73000, Kherson, Ukraine {Lvov, YuTarasich}@ksu.ks.ua Abstract. In the first part of the paper, we consider the problem of generation of polynomial invariants of iterative loops with operator of initialization of loop and non-singular linear operator in the loop body. In the article we also show the algorithm for calculating the basic invariants for linear operator of the Jordan cell, and an algorithm for calculating the basic invariants of diagonalizable linear operator with an irreducible minimal characteristic polynomial. The second part presents a new method for proving the invariance of the system of linear inequalities and of termination of certain linear iterative loops of imperative programs whose data are elements of the constructive linearly ordered field. The theoretical material of the paper is illustrated by examples. for the loop ( <ref type="formula">9</ref>) is algorithmically solvable.</p><p>The main content of the proof of theorem 9 is formulated in lemmas 1-5 <ref type="bibr">[13]</ref>. Definition 9. The linearly defined loop <ref type="bibr">(10)</ref>  <ref type="bibr">(11)</ref> for some natural</p><p>, on which the loop ( <ref type="formula">9</ref>) is completed.</p><p>finding the maximum of the linear form in the orbit of a linear operator, and various algorithms of computation in the field of algebraic number.</p><p>There is a need to assume that this method can be used as a basis for a general algorithm of proving the invariance of a system of linear inequalities for linear-certain programs, similar to the method of proof of invariance of polynomial equations <ref type="bibr">[5,</ref><ref type="bibr">6]</ref>, and to prove the invariance of polynomial inequalities for linear-certain programs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 2. Let S</head><p>A be the set of all permutations of A. 1. Let X be a ZF set. An S A -action on X is a function</p><p>where X is a ZF set, and • : S A × X → X is an S A -action on X. 2. Let (X, •) be an S A -set. We say that S ⊂ A supports x whenever for each π ∈ F ix(S) we have π • x = x, where F ix(S) = {π | π(a) = a, ∀a ∈ S}.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Let (X, •) be an S</head><p>A -set. We say that X is an invariant set if for each x ∈ X there exists a finite set S</p><p>x ⊂ A which supports x. Invariant sets are also called nominal sets if we work in the ZF framework <ref type="bibr">[24]</ref>, or equivariant sets if they are defined as elements in the cumulative hierarchy F M A <ref type="bibr">[16]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Let X be an S</head><p>A -set and let x ∈ X. If there exists a finite set supporting x, then there exists a least finite set supporting x <ref type="bibr">[16]</ref> which is called the support of x and is denoted by supp(x). An element supported by the empty set is called equivariant.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Proposition 1. Let (X, •) be an S</head><p>A -set and π ∈ S A . If x ∈ X is finitely supported, then π • x is finitely supported, and supp(π • x) = π(supp(x)).</p><p>Example 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">The set A of atoms is an S</head><p>A -set with the S A -action</p><p>A , and all subsets Y of X. For each invariant set (X, •) we denote by ℘ f s (X) the set formed from those subsets of X which are finitely supported according to the action ⋆ . (℘ f s (X), ⋆| ℘ f s (X) ) is an invariant set, where ⋆| ℘ f s (X) represents the action ⋆ restricted to ℘ f s (X). 4. Let (X, •) and (Y, ⋄) be S A -sets. The Cartesian product X × Y is also an S A -set with the S A -action ⋆ : S A ×(X ×Y ) → (X ×Y ) defined by π ⋆(x, y) = (π • x, π ⋄ y) for all π ∈ S A and all x ∈ X, y ∈ Y . If (X, •) and (Y, ⋄) are invariant sets, then (X × Y, ⋆) is also an invariant set.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">The FM cumulative hierarchy F M</head><p>A described in <ref type="bibr">[16]</ref> is an invariant set with S A -action</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>is a finitely supported element in F M</head><p>A ; additionally an FM-set has the recursive property that all its elements are also FM-sets. An FM-set which is empty supported as an element in F M</p><p>A is an invariant set. Definition 3. Let (X, •) be an invariant set. A subset Z of X is called finitely supported if and only if Z ∈ ℘ f s (X) with the notations of Example 1 (3). Definition 4. Let X and Y be invariant sets, and let Z be a finitely supported subset of X.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>On a Strong Notion of Viability for Switched Systems</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Ievgen Ivanov</head><p>Taras Shevchenko National University of Kyiv, Ukraine ivanov.eugen@gmail.com</p><p>Abstract. We propose a strong notion of viability for a set of states of a nonlinear switched system. This notion is defined with respect to a fixed region of the state space and can be interpreted as a condition under with a system can be forced to stay in a given safe set by applying a specific control strategy only when its state is outside the fixed region.</p><p>When the state of the system is inside the fixed region, the control can be kept constant without the risk of driving the system into unsafe set (the complement of the safe set).</p><p>We investigate and give a convenient sufficient condition for strong viability of the complement of the origin for a nonlinear switched system with respect to a fixed region.</p><p>Let T = [0, +∞), I be the set of all functions from T to I which are piecewiseconstant on each compact segment [a, b] ⊂ T , and • denote the Euclidean norm on R n . Consider a switched dynamical system <ref type="bibr">[18]</ref> of the form</p><p>where, σ ∈ I, t ≥ 0. Assume that for each i ∈ I:</p><p>1. f i is continuous and bounded on [0, +∞) × R n ; 2. there exists a number L &gt; 0 such that</p><p>Under these conditions Caratheodory existence theorem <ref type="bibr">[8]</ref> implies that for each t 0 ∈ T and x 0 ∈ R n , and σ ∈ I the problem</p><p>x(t 0 ) = x 0 For any X ⊆ R n and x 0 ∈ X denote by V S(X, x 0 ) (set of viable switchings) the set of all σ ∈ I such that x(t; 0; x 0 ; σ) ∈ X for all t ≥ 0;</p><p>If V S(X, x 0 ) = ∅ for each x 0 ∈ X, then X is a viable set of (1) and functions t → x(t; 0; x 0 ; σ), σ ∈ V S(X, x 0 ) are viable solutions for X.</p><p>Let Y ⊆ R n be a set. Let us say that a set X ⊆ R n is Y -strongly viable, if for each x 0 ∈ X there exists σ ∈ V S(X, x 0 ) such that σ(t) is constant on each interval (t 1 , t 2 ) ⊂ [0, +∞) such that x(t; 0; x 0 ; σ) ∈ Y for all t ∈ (t 1 , t 2 ).</p><p>In particular, X is viable if and only if X is ∅-strongly viable. Thus strong viability is a generalization of viability.</p><p>This notion has the following natural interpretation: the state of the system (1) can be forced to stay in a given "safe" set X by applying a specific control strategy (σ) only when its state is outside Y . When the state of the system is inside Y , one can keep the control constant (i.e. do not make any switchings) without the risk of driving the system into the "unsafe" region R n \X. Then Y can be interpreted as a set of states where "nothing specific needs to be done" to ensure safety of the system and the complement of Y can be interpreted as a set of states upon reaching which "something may need to be done" to ensure safety.</p><p>In this paper we will consider the case when X is the complement of the origin (i.e. the origin may be interpreted as a safety hazard) and propose a convenient</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 13. ([15]) A right dead-end path</head><p>Theorem 2. ( <ref type="bibr">[15]</ref>, About right dead-end path) Assume that f + is a normal right extensibility measure and Σ satisfies LFE. Then each right dead-end path is strongly escapable if and only if each right dead-end path is f + -escapable. Lemma 1. ( <ref type="bibr">[15]</ref>) Σ satisfies GFE if and only if Σ satisfies LFE and each right dead-end path is strongly escapable.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 3. ([15], Criterion of the existence of global trajectories of NCMS)</head><p>Let (l, r) be a LR representation of Σ. Then Σ has a global trajectory if and only if there exists a pair</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Main result</head><p>Let I, I, and f i , i ∈ I, and x(t; t 0 ; x 0 ; σ) be defined as in Section 1.</p><p>Let us state the main result:</p><p>Theorem 4. Assume that:</p><p>(1) for each t ∈ T there exist</p><p>Then X is Y -strongly viable.</p><p>We will need several lemmas to prove this theorem. Let us fix an element x * 0 ∈ X. Let Q = R n × I. Denote by pr 1 : Q → R n , pr 2 : Q → I the projections on the first and second component, i.e. pr 1 ((x 0 , i)) = x 0 and pr 2 ((x 0 , i)) = i.</p><p>Let T r be the set of all functions s : A → Q, where A ∈ T, such that the following conditions are satisfied, where x = pr 1 • s and σ = pr 2 • s:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>r is a CPR, Markovian, and complete set of trajectories).</head><p>Let us find a sufficient condition which ensures that Σ has a global trajectory.</p><p>Then s * is an escape from s and s is f + 1 -escapable. Now consider the case when x l = 0. Let us choose i 1 , i 2 ∈ I such that v 1 = f i 1 (b, 0) and v 2 = f i 2 (b, 0) are noncollinear (this is possible by the assumption 1 of the lemma). Then the function h</p><p>Let ε = M/2 &gt; 0. Because f is continuous, there exists δ &gt; 0 such that for each j = 1, 2, t ∈ T , and</p><p>Let us choose an arbitrary c</p><p>Then the following two cases are possible. a) There exists j ∈ {1, 2} such that 0 / ∈ range(x j ). Let us choose any d ∈ (max{2b  3. GSW characteristic cannot be explicitly included in SWQM, but subcharacteristics can be explicitly included (Fig. <ref type="figure">8</ref>). Resources saving is included in SWQM as subcharacteristic in place of resource utilization. Sustainability is included in SWQM as subcharacteristic to characteristic security. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">SWQM in Use. Analysis in Context of GSW</head><p>The standards ISO/IEC9126 and 25010 describe a separate type of modelssoftware quality models in use (SWQM-U). SWQM-U is a capability of the software product to enable specified users to achieve specified goals with effectiveness, productivity, safety and satisfaction in specified contexts of use <ref type="bibr">[18]</ref>. The SWQM-Us include characteristics, which can be associated with GSW subcharacteristics, in particular resources saving and sustainability:</p><p> for SWQM-U, ISO/IEC 9126: resources savingproductivity; sustainability safety. Productivity is a capability of the software product to enable users to expend appropriate amounts of resources in relation to the effectiveness achieved in a specified context of use. Safety is a capability of the software product to achieve acceptable levels of risk of harm to people, business, software, property or the</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.4</head><p>The parameters of the FTCS Markov's model Developing Markov's model of the FTCS, its composition and separate components should be set to relevant parameters in particular: nnumber of modules that are the part of the main system; knumber of modules that are the part of the diverse system; mh -number of the modules in the hot standby; mcnumber of the modules in the cold standby; hwthe failure rate that is in main (diverse) system and in the hot standby; sw11, sw12the failure rate of first and second software versions; swerrorthe temporary failure rate of software; Tup1, Tup2duration of the first and second software updates; Trestduration of software restart on the module; Tswitchduration of the module connections of the slight standby; Trep-hardware repair duration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5">Model of the FTCS for the automated development of the Markovian chain with software update and restart</head><p>According to the technology of analytical modeling, the discrete-continuous stochastic systems <ref type="bibr">[9]</ref> based on certain events using the component vector state and the parameters that describe FTCS, and model of the FTCS for automated development of the Markovian chains are presented on the table 1.  <ref type="table">1</ref>, the model can be easily adapted for other fault-tolerant hardware configurations, or any number of software updates can be provided. For example, if the main and diverse system built with rule of voting 2-out-of-3, the description of the terms and conditions for the events of 1-6 should be replaced with (V1=n)  (V1&lt;=2) і (V2=k)  (V2&lt;=2). In this way, we obtain the FTCSC for the automated development of the Markovian chains in which permanent and diverse fault-tolerant systems are built with rule of voting 2-of-3.</p><p>The number of software updates can be also changed. It is necessary to change vectors V5 and V6 the event 11, that are responsible for the number of updates. For example, if there are three software updates, the entry component of the event will be as follows:   In I&amp;CS the checkability of DC is diversified, becoming different for normal and emergency mode. A model of dual-mode structural-functional checkability is offered in <ref type="bibr">[13]</ref>. On its basis controllability and observability of a point of the circuit is diversified and the method of detection in the DC circuit of the potentially hazardous points (PHP) in which during a normal mode there can be a hidden fault reducing fault tolerance of the DC upon transition of I&amp;CS to emergency mode is offered. It is proposed to identify PHP on their observability which is defined for normal and emergency mode by simulating the operation of simultaneous DC in the ranges of input data of these modes. The method allows estimating the circuit of the DC in probability of reducing the fault tolerance of the DC upon transition to emergency mode, whereas the percentage of possible hidden faults of certain type <ref type="bibr">[14]</ref>.</p><p>The offered paper is aimed at development of models and methods for determining the observability to identify PHP for pipeline DC used in I&amp;CS. Section 2 discusses a model of activated path that determines the DC input data required to assess the observability of the circuit point. A method of pipeline DC simulation for an assessment of the observability of the circuit points at the input data processed in a mode of I&amp;CS and detection of the PHP is proposed in section 3. A method of detecting internal PHP of the DC circuit with LUT-oriented architecture in FPGA projects is offered in section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2</head><p>The Model of the Activated Path of Pipeline DC Circuit</p><p>Typically, DC for I&amp;CS are built under construction the pipeline. The sections of pipeline are simultaneous units that perform one or more arithmetic and logical operations with numbers represented in parallel codes. In each clock cycle the input words made up of operands of the operations, including the processing numbers and control bits come at the inputs of pipeline DC.</p><p>For stuck-at faults, belonging of a circuit point to a set of PHP is completely determined by the values of its observability in normal and emergency mode, using the formulas <ref type="bibr">[14]</ref>, or as it is shown in Table <ref type="table">1</ref>. </p><p>Rows and columns of Table <ref type="table">1</ref> contain the values of observability ON and OE for normal and emergency modes of I&amp;CS, respectively. At their intersection the types of stuck-at faults: '0' or '1', which include the point of the circuit to the set of PHP are shown. Observability ON or OE of a point takes on the values 0, 1, 2 or 3 if this point is not observable, observed in '1' value, '0' value or both values '0' and '1', respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Computer's Analysis Method and Reliability Assessment of Fault-Tolerance Operation of Information Systems</head><p>Igor P. Atamanyuk 1 , Yuriy P. Kondratenko 2 1 Mykolaiv National Agrarian University, Commune of Paris str. 9, 54010 Mykolaiv, Ukraine atamanyukip@mnau.edu.ua 2 Petro Mohyla Black Sea State University, 68 th Desantnykiv Str. 10, 54003 Mykolaiv, Ukraine yuriy.kondratenko@chdu.edu.ua Abstract. In this paper there was obtained an calculation method of the assessment of the probability of fail-safe operation of information systems in the future instants of time. The method is based on the algorithm for modeling a posteriori nonlinear random sequence of change of values of the controlled parameters which is imposed a limitation of belonging to a certain range of possible values. The probability of fail-safe operation is defined as the ratio of the number of realizations that fell in the allowable range to the total number of them, formed as a result of the numerical experiment. The realization of an a posteriori random sequence is an additive mixture of optimal from the point of view of mean-square nonlinear estimate of the future value of the parameter analyzed and of the value of a random variable, which may not be predicted due to the stochastic nature of the parameters. The model of a posteriori random sequence is based on the Pugachev's canonical expansion. The calculation method offered does not impose any significant constraints on the class of random sequences analyzed (linearity, stationarity, Markov behavior, monotoneness, etc.).</p><p>Keywords. calculation method, random sequence, canonical decomposition, estimation, probability. Key Terms. computation, mathematical model.</p><p>where</p><p>( ) </p><p>The constant d is selected depending on the number of observations subject to the conditions</p><p>When selected as the kernel function () gu the uniform density distribution blur coefficient is determined on the basis of the correlation</p><p>The casual coefficients of canonical presentation <ref type="bibr">(9)</ref> are defined by the expressions:</p><p>.</p><p>The coefficients    ,... ; ,... </p><p>' ' () 1 <ref type="bibr">12</ref> 11    </p><p>converts the a priori random sequence into the a posteriori one: data quality standards in <ref type="bibr">[6]</ref>. Below we give the list of IQ indicators according to this paper: accessibility is the indicator that characterises the extent of availability and fast retrievability of information; appropriate amount of information is used to denote if the scope of information is appropriate for the task at hand; believability means that the information is considered as true and credible; completeness evaluates whether information is sufficiently broad and deep to solve the task at hand; concise representation characterises the compactness of data representation; consistent representation means that all the information processes operate with the same data; ease-of-manipulation envisages that information is easy manipulated and applied to different tasks; free-of-error means that information is correct and reliable; interpretability characterises that information is in appropriate languages, symbols and units, and the definitions are clear; objectivity denotes that information is considered as unbiased and impartial; relevancy envisages that information is applicable and helpful for the task at hand; reputation determines that information should be highly regarded in the terms of its source or content; security is satisfied if the access to information is restricted appropriately in accordance with the access rights; timeliness is fulfilled if information is up-to-date for the task at hand; understandability means that information is well-comprehended; value-added assumes that information is beneficial and provides advantages from its use.</p><p>These indicators are used to define different views of an information system. We stress that the consideration is given from the next points of view: product and service quality. These quality indicators are also classified taking into account different views, namely, system specifications and consumer expectations. Therefore they had been grouped in a two-dimensional Table <ref type="table">1</ref> presented below.</p><p>(See more complete description of this classification in <ref type="bibr">[7]</ref>). Focusing on our subject, we consider only those of indicators, that depend on CAP-properties. Let us explain the reasons that has motivated us to take exactly these indicators of IQ model.</p><p>Obviously, by the definition the consistency has the direct impact on the consistent representation indicator. Also, consistency ensures the correct information, thus the free-of-error indicator directly depends on it. Furthermore, if the consistency is fulfilled, there may be a lot of replicas in the system, that is decreasing the concise representation indicator. And one can simply see that the consistency definition involves up-to-date information and then timeliness immediately depends on the consistency. Consistency does not have an influence For instance, imagine if two employees in a company use the same datastore. They need to modify some file. And, unfortunately, it turns off that two employees download the file from the data storage and modify it in a different way and in different places. First one upload the file back and later the second one does the same. But the problem is that the file is modified in different places and there will be some conflicts. This is the simplest example, but if this datastore is distributed on many servers, there are a lot of copies of files in the data storage and more people use the same distributed system, it causes a complete mess in the storage. Therefore these protocols for controlling consistency should prevent such errors when a lot of write operations may occur.</p><p>The second one, client-centric model, is used for retrieval systems, where mostly read operations occur, but write ones are rare. Thus it is very costly and not necessary needed to use complex protocols. That is why for this model there exist such a type of the consistency as eventual consistency that ensures such a guarantee for the distributed system that eventually all the data units become same and consistency is fulfilled. The protocols for the client-centric model are also invented (see more in <ref type="bibr">[10,</ref><ref type="bibr">Chapter 7]</ref>).</p><p>So as soon as we described different types of distributed datastores and established the problem to use different models and protocols for datastores that we focused on, we can go to the next section, where we specify the architecture and important behaviour elements for a distributed datastore.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conceptual and Behavioral Model of Distributed Datastore</head><p>Above we described the general accepted model of the information quality that determines indicators which are needed for our research purpose, described models that are used for distributed datastore to satisfy consistency guarantees. But in order to come to the estimation step for the distributed datastore guarantees, obviously, we should also discuss the model of a distributed datastore. Therefore in this section we represent the model of such systems in two views: structural and behavioural. Below there is given the structural one (Fig. <ref type="figure">1</ref>).</p><p>The main component of our system is a distributed datastore. By definition it is a set of nodes (servers) connected by links between each other. Each node may have one or more neighbours. That is why this entity is composed of nodes and links. Obviously, each link is two-sided and a node entity may have many incidences.</p><p>Every node stores data units in replicas. If a node receives a new data unit it finds the data unit with the same identifier and replaces the old replica.</p><p>Nodes are classified into ready, busy and dead ones. If a node is busy or dead it ignores all the messages, so in this case the request will be lost. That is why the behaviour in this case is trivial.</p><p>The behaviour of a ready node is represented below, in the activity diagram (see Fig. <ref type="figure">2</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Direct Partial Logic Derivatives in Analysis of Boundary States of Multi-State System</head><p>Elena Zaitseva 1 , Vitaly Levashenko 1 , Jozef Kostolny 1 , Miroslav Kvassay 1</p><p>1 University of Zilina, Department of Infromatics, Univerzitna 8215/1, 010 26, Zilina, Slovakia {elena.zaitseva, vitaly.levashenko, jozef.kostolny, miroslav.kvassay}@fri.uniza.sk</p><p>Abstract. Multi-State System (MSS) is mathematical model that is used in reliability engineering for the representation of initial investigated object (system). In a MSS, both the system and its components may experience more than two states (performance levels). One of possible description of MSS is a structure function that is defined correlation between a system components states and system performance level. The investigation of a structure function allows obtaining different properties, measures and indices for MSS reliability.</p><p>For example, boundary system's states, probabilities of a system performance levels and other measures are calculated based a structure function. In this paper mathematical approach of Direct Partial Logical Derivatives is proposed for calculation of boundary states of MSS.</p><p>3. The calculation of MSS boundary states for every system performance level is considered section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">MSS Structure Function</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Structure Function of MSS</head><p>Consider the system of n components. Each component of this system has m states: from the complete failure (it is 0) to the perfect functioning (it is m-1). The i-th system component state is denoted as xi (i = 1, …, n). Suppose, that this system has m performance level too: from the complete failure (it is 0) to the perfect functioning (it is m-1). The dependence of the system performance level on components states is defined by the structure function (x) identically:</p><p>(</p><p>The function <ref type="bibr">(1)</ref> agrees with the definition of a MVL function <ref type="bibr">[19]</ref>. Therefore the mathematical approaches of MVL can be used in quantification analysis of MSS. But the structure function (1) allows representing the very small class of real system for which the number of system performance levels and number of every component states are equal. As a rule, the real-world system has different numbers of states for different components. And the number of performance levels can be different too. Therefore the structure function of real-word system must be defined as:</p><p>where mi is number of states for i-th system component (i = 1, …, n) and M is number of a system performance levels.</p><p>The equation ( <ref type="formula">2</ref>) can be interpreted as a MVL function. But some formal changes allow transforming this structure function definition into an incompletely specified MVL function. This transformation suppose the interpretation of the function (2) as incompletely specified MVL function for maximal value of number mi and M: mmax=MAX{m1, …, mn, M}. In this case, the structure function ( <ref type="formula">2</ref>) is defined as:</p><p>The interpretation of the structure function (2) as an incompletely specified MVL function (3) permits to use mathematical approaches of MVL without principal restriction for analysis of properties of the structure function (2).</p><p>(minimal cut set) is comparable to the complexity of the building the reliability models as graph of states and transitions.</p><p>From the above it arises the urgent task of further improvement and development of automated methods for modeling reliability behavior of CTSCA which are focused on reliability and safety indexes estimation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Current State of Modeling the Reliability and Safety of Complex Technical Systems Critical Application and Directions for Its Improvement</head><p>For reliability estimation of CTSCA nowadays there are enough formal and in some cases software implemented approaches, but for safety estimation there are only partially formalized methodologies which involve manual building of logical and probabilistic models in GUI. These models provide the automated determination of selected safety indexes -risk indexes (minimal cut sets).</p><p>Well-known software suites such as RAM Commander (ALD, Israel) <ref type="bibr">[3]</ref>, PTC Windchill QualitySolutions (PTC, USA) <ref type="bibr">[4]</ref>, ReliaSoft Synthesis Master Suite (ReliaSoft USA) <ref type="bibr">[5]</ref>, Item Toolkit (Item Software, USA, UK) <ref type="bibr">[6]</ref>, Reliability Workbench (Isograph, US, UK) <ref type="bibr">[7]</ref> allow building reliability models as reliability block diagrams (RBD) with the automated estimation of reliability. Models as graph of states and transitions are built manually with further automation of reliability analysis.</p><p>For safety estimation these software suites have graphical tools for forming fault trees in manual mode with the automated determination of minimum cut sets and special tools to carry out FMEA / FMECA analysis. The main advantage of these software suites is that they contain integrated frameworks of elements models (electronic, electromechanical, mechanical, etc.) in accordance with international standards: MIL-HDBK-217, Telcordia SR-332, IEC TR 62380, 217Plus, FIDES, which are required for reliability and safety analysis.</p><p>In monograph <ref type="bibr">[1]</ref> the general principles of automation of building reliability models as matrix of states and transitions and matrix with subsequent transition to the graph of states and transitions are given as guidelines and recommendations. Also, this approach does not have tools to analyze safety. In monograph <ref type="bibr">[8]</ref> the fundamental principles of logical and probabilistic models as fault trees for the reliability and safety estimation are provided. Actually, this approach is widely used to analyze safety indexes, namely, risk by the minimal cut sets determination. However, this approach isn't formalized and in the case of CTSCA it requires significant time costs for building the fault tree and computational costs for the analysis of safety indexes. In addition, any changes in the structure of the system require the construction of its new model. Therefore, for multivariate analysis at the design stage this approach is rarely used, it is usually provided for certification, when the structure of CTSCA is established.</p><p>Currently the most powerful method for building reliability models of CTSCA is the state space method. It allows us to adequately reflect the functional and reliability behavior of CTSCA. Generated by this method model is represented by yhe system of linear differential equations of Chapman-Kolmogorov which adequately describes all This index according to <ref type="bibr">[13,</ref><ref type="bibr">14]</ref> is called minimal cut set. Minimal cut set (MCS)is a minimal combination of events which lead to catastrophic system failure. If when any of event is removed from the MCS the remaining events collectively cannot cause to catastrophic system failure <ref type="bibr">[13]</ref>.</p><p>Thus, when designing CTSCA we must have a single model that is based on the state space method and provides:</p><p> adequate reflection of system behavior while disability;  consideration of strategies for maintenance and repair;  consideration of controls and diagnostics;  possibility of obtaining reliability indexes (probability of faultless work , availability, MTTF, MTBF);  possibility of obtaining safety indexes (MCS);  consideration of system downtime;  the opportunity to obtain indexes of economic efficiency;  to carry out the multivariate analysis.</p><p>To achieve this goal it is necessary to make a number of modifications of the state space method, as described below. The behavior of CTSCA is described by graph of states and transitions. Vertices of graph are the states in which the system can be. These states are characterized by probabilities. Edges of the graph are the possible transitions from state to state and are characterized by the transition intensities.</p><p>In all known methods the catastrophic failure condition is a combination of all inoperable states, which are united in one state. This is used, on the one hand, to obtain the required reliability indexes when only operable states are used, on the other hand, inoperable states significantly increase the phase space, dimensionality of which is great.</p><p>Therefore, for safety indexes estimation (MCS), you must split the state of catastrophic failure (CF) in separate states. Thus, the set of inoperable states contains a subset of accidents (AS1, ..., ASi, ...), accordingly to CTSCA (Fig. <ref type="figure">1</ref>). Each of these accidents can be represented by the corresponding fault tree.</p><p>The dimension of the system of differential equations Chapman -Kolmogorov increases proportionally to the expansion of phase space and the system of equations consists of two parts -the equations that describe the operable states (Pi (t)) and the equations that describe inoperable states (Qj (t)).</p><p>The solution of the equation system can be implemented by analytical methods (matrix exponential, Laplace transform) and numerical methods (Runge-Kutta, Rosenbrock). As a result of solution the probability distribution of CTSCA being in all states is obtained.</p><p>The next step is filtration of obtained probability distribution for the separation of states to operable and inoperable. Filter is in this case the condition of critical failure. As a result of filtration, we obtain a set of probability of CTSCA being in operable states {Pi (t)} and the set of probability of CTSCA being in inoperable states {Qj (t)}, where i is the serial number for operable states and j is the serial number for inoperable states.</p><p>The initial value of each component is equal to one: Vi1=1;  Type of connection of RBD elements (serial, parallel, combined) is given by the inoperable condition  If the limited number of renewals of system is planned, for each item is added  Parametres of each element (failure ratei, the intensity of repairi, the number of repairs -RCi etc.) is transmitted to set of formal parametres;  Limited values of each RBD element repair, the number of repair crews, repair priority are transmitted to set of formal parametres;  Inoperable conditions are transmitted to SAM and serves to filter the operablebodied and inoperable states. Thus all components of SAM can be automatically formed. Generated data can be represented as a file that is sent to ASNA software module as input data. ASNA software module enables automated obtaining of the graph of states and transitions with split failure state. Basing on the graph of states and transitions ASNA software makes it possible to assess reliability. CutSetDefiner software, basing on the graph of states and transitions, can generate MCS and basing on MCS through software <ref type="bibr">[16]</ref> we can automatically get the fault tree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>1. Split of critical failure state in graph of states and transitions, in contrast to the known approaches, allows estimation of reliability and safety indexes, that makes the impact of maintenance strategies on safety and reliability, impact of the fault tolerance on safety to be considered. This will increase the accuracy (certainty) of efficiency indexes estimation of complex technical systems for critical application. 2. Minimal cut sets obtaining on the basis of the graph of states and transitions allows taking into account the interrelations of accidents directly from the analysis of system states for identification weaknesses. It gives only reasonable means for providing fault tolerance that reasonably reduces the cost of improving the system. 3. Using binary structural-automatic model allows automated obtaining of split critical failure state and reducing time costs for building the graph of states and transitions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Scenario-Based Markovian Modeling of Web-System</head><p>semi-Markov's chains <ref type="bibr">[7,</ref><ref type="bibr">8]</ref> or use of Petri nets <ref type="bibr">[9,</ref><ref type="bibr">10]</ref> as a mathematical apparatus. However, known models do not explicitly consider attacks on system vulnerabilities causing inaccessibility of the provided services (accessibility vulnerabilities) and do not take into account different security policies and vulnerability elimination strategies.</p><p>In the paper we analyze web-system availability considering failures caused by HW/SW faults as well as attacks on system vulnerabilities. With this purpose we propose and examine a set of Markov's availability models implementing different scenarios of vulnerability elimination. This paper continues research described in <ref type="bibr">[6]</ref> using scenario-based approach.</p><p>The rest of the paper is organized as follows. In the second section we suggest a set of scenarios to assess web-system availability taking into account different vulnerability elimination procedures. In the third section we discuss a technique of estimating input parameters of Markov's models by use of information about software component vulnerabilities from the open vulnerability databases. The forth section presents a case study and the set of Markov's models and also examines simulation results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The Scenario-Based Approach to Web-System Availability Modeling with Regards to System Vulnerabilities and their Elimination</head><p>Attacks on vulnerabilities of web-systems can be simulated using Markov's models <ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref>. However, for that we should take into account that parameters of the vulnerabilities (numbers and types) are changed as a result of elimination and patching procedures.</p><p>In the Fig. <ref type="figure">1</ref> we propose a set of common state-transitional models capturing different attack and recovery scenarios. The scenarios are differed by a number of attacked vulnerabilities: one (a-f) or several (g); with (b-g) or without (a) vulnerability elimination; with vulnerability elimination after system been successfully attacked (b-d) or during (e,f) preventive maintenance actions.</p><p>We have marked model states as following: double circles correspond to up-states, single line marked circles correspond to maintenance states, thick line marked circles correspond to down-states after attacks.</p><p>The simplest scenario is shown in Fig. <ref type="figure">1</ref>,а. After successful attack a web-system is recovered (e.g. rebooted) without vulnerability elimination. However not all attacks can be successful and lead to web system unavailability. This is why we consider two transitions from up-state S0: the first transition with the rate attack*Da leads to down (unavailable)-state Sd; the second one with the rate attack*(1-Da) returns back to upstate S0 (Da is a probability of attack to be successful).</p><p>The second scenario (Fig. <ref type="figure">1,b</ref>) illustrates vulnerability elimination during system recovery after successful attack. We assume that during recovery action it is possible to eliminate from 0 to all (nv) vulnerabilities. Hence, web-system may return from the down-state Sd to the initial state S0 without vulnerability elimination with the rate ′a*(1-Dp), where Dp is a probability of successful recovery and vulnerability elimination, or may transit to the next up-state Su with the rate ′a*Dp. vulnerabilities, their criticality, availability impact and vector of access. However, vulnerabilities define only the capability of a system to be attacked. On the other hand, unlike random system failures, vulnerabilities are exploited by various intended (hacker, computer criminals, industrial espionage, insiders, etc.) and unintended (viruses, worms, malware, etc.) threat agents. Motivation of intended threat agents is also depended on the system itself (its value and interest for the attacker). Last two factors are really difficult to define quantitatively. Thus, in the paper we propose to define the attack rate by the average per year frequency of vulnerability disclosure in the system components.</p><p>Criticality of attack is determined as an average value of basic CVSS estimation. We propose the following technique to estimate attack rate:</p><p>1) development of availability block diagram (ABD) of web-systems as a sequentially-parallel connection of components influencing on accessibility (similar to RBD);</p><p>2) extraction from NVD the vulnerability subsets for all components of ABD;</p><p>3) calculation of average per year frequency of vulnerability disclosure in these subsets;</p><p>4) determination of attack rate as the maximum of these frequencies of vulnerability disclosure; 5) calculation of attack criticality as an average value of basic CVSS estimation for selected set per year.</p><p>According with Table <ref type="table">1</ref>, average attack rate on DNS vulnerabilities causing unavailability could be estimated in 2013 as 1,26*10-3 1/h while the average criticality equals 6,75. The scenarios corresponding to the models MA-1 and MA-2 can be superposed to increase availability due to increasing of minimum and duration of system transition to the stationary state of availability function. To combine these two scenarios we have developed a set of Matlab programs. Filing of coefficient matrixes was done according with the same initial data (Table3). To solve systems of Kolmogorov-Chapman's differential equations the method ode15s for time span [0…20000] hours. The results of solving are shown on the Fig. <ref type="figure">9</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Author Index</head></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Semantically enhanced business process modelling notation</title>
		<author>
			<persName><forename type="first">W</forename><surname>Abramowicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Filipowska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kaczmarek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kaczmarek</surname></persName>
		</author>
		<ptr target="CEUR-WS.org" />
	</analytic>
	<monogr>
		<title level="m">S-BPM. CEUR Workshop Proceedings</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Hepp</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">251</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Approaches to modeling business processes: a critical analysis of BPMN, workflow patterns and YAWL</title>
		<author>
			<persName><forename type="first">E</forename><surname>Börger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software &amp; Systems Modeling</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="305" to="318" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">On defining the behavior of OR-joins in business process models</title>
		<author>
			<persName><forename type="first">E</forename><surname>Börger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sörensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Thalheim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Universal Computer Science</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="32" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Abstract State Machines</title>
		<author>
			<persName><forename type="first">E</forename><surname>Börger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Stärk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin Heidelberg New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Fundamentals of Business Process Management</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dumas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>La Rosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">A</forename><surname>Reijers</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Subject-Oriented Business Process Management</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fleischmann</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin Heidelberg New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Event-based gateways: Open questions and inconsistencies</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kossak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Illibauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Geist</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Business Process Model and Notation</title>
		<title level="s">Lecture Notes in Business Information Processing</title>
		<editor>
			<persName><forename type="first">J</forename><surname>Mendling</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Weidlich</surname></persName>
		</editor>
		<imprint>
			<biblScope unit="volume">125</biblScope>
			<biblScope unit="page" from="53" to="67" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">A Rigorous Semantics for BPMN 2.0 Process Diagrams</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kossak</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">BPMN to Deontic BPMN: A trusted model transformation</title>
		<author>
			<persName><forename type="first">C</forename><surname>Natschläger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Kossak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">D</forename><surname>Schewe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Software and Systems Modelling</title>
		<imprint>
			<biblScope unit="page">pear</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>to ap</note>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Extending BPMN with Deontic Logic</title>
		<author>
			<persName><forename type="first">C</forename><surname>Natschläger-Carpella</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Logos Verlag</publisher>
			<pubPlace>Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<title level="m" type="main">ARIS -Business Process Modeling</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">W</forename><surname>Scheer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Horizontal business process model integration</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">D</forename><surname>Schewe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Transacions on Large-Scale Data-and Knowledge-Centered Systems</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="30" to="52" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m">Modern Business Process Automation: YAWL and its Support Environment</title>
				<editor>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Ter Hofstede</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Business Process Management. Concepts, Languages, Architectures</title>
		<author>
			<persName><forename type="first">M</forename><surname>Weske</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A process semantics for BPMN</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">Y</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gibbons</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Formal Methods and Software Engineering</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">S</forename><surname>Liu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Maibaum</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Araki</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5256</biblScope>
			<biblScope unit="page" from="355" to="374" />
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">The Learning Abilities as a Key Competence of Secondary Education Competence Approach in a Modern Education</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">Y</forename><surname>Savchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">World Experience and Ukrainian Prospects: Library of Educational Policy</title>
				<editor>
			<persName><forename type="first">S</forename></persName>
		</editor>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="35" to="46" />
		</imprint>
	</monogr>
	<note>К.І. In Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Understanding the emergence of &apos;open science&apos; institutions: functionalist economics in historical context</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>David</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Industrial and Corporate Change</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="571" to="589" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">What is E-science and How Should it Be Managed? Nature</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bohle</surname></persName>
		</author>
		<ptr target="http://www.scilogs.com/scientific_and_medical_libraries/what-is-e-science-and-how-should-it-be-managed" />
	</analytic>
	<monogr>
		<title level="s">Spektrum der Wissenschaft</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<ptr target="http://unesdoc.unesco.org/images/0014/001418/141843e.pdf" />
		<title level="m">Towards knowledge societies: UNESCO world report</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="https://escience-conference.org" />
		<title level="m">IEEE International Conference on eScience</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<ptr target="http://habrahabr.ru/post/190046" />
		<title level="m">Science under lock</title>
				<imprint/>
	</monogr>
	<note>The second part</note>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<ptr target="http://www.michaeleisen.org" />
		<title level="m">PLOS is anti-elitist! PLOS is elitist! The weird world of open access journalism</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">The crash of the knowledge economy</title>
		<author>
			<persName><forename type="first">U</forename><surname>Pagano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Rossi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Camb. J. Econ</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="665" to="683" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="http://www.webometrics.info" />
		<title level="m">Ranking Web or Webometrics</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">On-Line Education: Developing Competitive</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">G</forename><surname>Gardner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informational Technologies in Education</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="22" to="25" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">UNIT-NET IEDI: An Infrastructure for Electronic Data Interchange</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Ermolayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Spivakovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">N</forename><surname>Zholtkevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informational Technologies in Education</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="26" to="42" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">University as a corporation which serves educational interests</title>
		<author>
			<persName><forename type="first">A</forename><surname>Spivakovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Alferova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Alferov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information and Communication Technologies in Education, Research, and Industrial Applications. ICT in Education, Research and Industrial Applications</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Ermolayev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Mayr</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Nikitchenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Spivakovsky</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Zholtkevych</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">347</biblScope>
			<biblScope unit="page" from="60" to="71" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Use of Computer Communication Means for Future Software Engineers&apos; Preparing</title>
		<author>
			<persName><forename type="first">M</forename><surname>Vinnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Lazarenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Korzh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tarasich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Pedagogical almanac</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="100" to="108" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>In Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Research of Influence of Quality of Electronic Educational Resources on Quality of Training With Use of Distance Technologies</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Kravtsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">O</forename><surname>Vinnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">H</forename><surname>Tarasich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Informational Technologies in Education</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="83" to="94" />
		</imprint>
	</monogr>
	<note>In Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">The Problem of Architecture Design in a Context of Partially Known Requirements of Complex Web Based Application &quot;KSU Feedback</title>
		<author>
			<persName><forename type="first">A</forename><surname>Spivakovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Klymenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Litvinenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informational Technologies in Education</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="83" to="95" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">To the Problem of ICT Management in Higher Educational Institutions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Spivakovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vinnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tarasich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Technologies and Learning Tools</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="page" from="99" to="116" />
		</imprint>
	</monogr>
	<note>In Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Information Competence of University Students in Ukraine: Development Status and Prospects</title>
		<author>
			<persName><forename type="first">E</forename><surname>Spivakovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Osipova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vinnik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tarasich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICT in Education, Research and Industrial Applications CCIS</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Ermolayev</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Mayr</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Nikitchenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Spivakovsky</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Zholtkevych</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">469</biblScope>
			<biblScope unit="page" from="194" to="216" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">The Necessity to Reform the Mathtmatics Education in the Ukraine</title>
		<author>
			<persName><forename type="first">E</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Research in Innovative Teaching</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="51" to="62" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Consequences of the Spread of IT and the Shift in Emphasis of Teaching Mathematics in Higher School</title>
		<author>
			<persName><forename type="first">O</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Shishenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Vyscha Osvita Ukrainy</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="71" to="79" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Use of Computer Toos of IGE CABRY 3D at a Solving of Stereometry Problems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informatika ta informatsiyni tehnologiyi v navchalnih zakladah</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="36" to="41" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Computer Tools of Dynamic Mathematics Software and Methodical Problems of Their Use</title>
		<author>
			<persName><forename type="first">O</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
		<ptr target="http://journal.iitta.gov.ua/index.php/itlt/article/view/1055#.VCqAD0Hj5nE" />
	</analytic>
	<monogr>
		<title level="j">Information Technologies and Learning Tools</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="109" to="117" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">On Checking Tools in the IGE MathKit. Naukoviy visnik Melitopilskogo derzhavnogo pedagogichnogo universitetu</title>
		<author>
			<persName><forename type="first">O</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Seriya: Pedagogika</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="189" to="195" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Geometric Transformations of the Plane and Computer Tools for Their Implementation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Komp&apos;yuter v shkoli i sim&apos;yi</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">119</biblScope>
			<biblScope unit="page" from="25" to="29" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Computer Mathematical Tools: Practical Experience of Learning to Use Them</title>
		<author>
			<persName><forename type="first">E</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Contemporary Education</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="175" to="183" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Computer Tools &quot;Trace&quot; and &quot;Locus&quot; in Dynamic Mathematics Software</title>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Contemporary Education</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="204" to="214" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Creation of Own Computer Tools in the Dynamic Mathematics Environment</title>
		<author>
			<persName><forename type="first">E</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informatika ta informatsiyni tehnologiyi v navchalnih zakladah</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">53</biblScope>
			<biblScope unit="page" from="60" to="69" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">GeoGebra 5.0 Tools and Their Use in Solving Solid Geometry Problems</title>
		<author>
			<persName><forename type="first">E</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
		<ptr target="http://journal.iitta.gov.ua/index.php/itlt/article/view/1138/866#.VKKRJc-eABM" />
	</analytic>
	<monogr>
		<title level="j">Information Technologies and Learning Tools</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="124" to="133" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">The Course for the Study of Dynamic Mathematics Software as a Necessary Component of Training of Modern Math Teacher</title>
		<author>
			<persName><forename type="first">E</forename><surname>Semenikhina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Modern Trends in Physics and Mathematics Education: School -University. Revised Extended Papers of International scientific-practical conference</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="75" to="78" />
		</imprint>
		<respStmt>
			<orgName>Solikamsk State Pedagogical Institute</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">On the Nessesity to Introduce Special Courses on Computer Mathematics</title>
		<author>
			<persName><forename type="first">E</forename><surname>Semenikhina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Vestnik TulGU. Seriya. Sovremennyie obrazovatelnyie tehnologii v prepodavanii estestvenno-nauchnih distsiplin</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="102" to="107" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">The Study of Specialized Mathematics Software in the Context of the Development of the System of Math Teachers Preparation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Semenikhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drushlyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IX International Conference ITEA-2014</title>
				<meeting>IX International Conference ITEA-2014<address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>International Research</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="61" to="66" />
		</imprint>
		<respStmt>
			<orgName>Training Center for Information Technologies and Systems</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">The Application of Mathematical Statistics in Educational Research</title>
		<author>
			<persName><forename type="first">M</forename><surname>Grabar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Krasnyanskaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Nonparametric Methods</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Pedagogika</publisher>
			<date type="published" when="1977">1977</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b46">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">D</forename><surname>Voss</surname></persName>
		</author>
		<ptr target="http://agb.org/sites/agb.org/files/report_2013_MOOCs.pdf" />
		<title level="m">Massive Open Online Courses (MOOCs): A Primer for University and College, Board Members</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Designing Your First MOOC from Scratch: Recommendations After Teaching</title>
		<author>
			<persName><forename type="first">C</forename><surname>Alario-Hoyos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Sanagustin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Kloss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">G</forename><surname>Rojas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Leony</surname></persName>
		</author>
		<ptr target="www.openeducationeuropa.eu/en/elearning_papers" />
	</analytic>
	<monogr>
		<title level="m">Digital Education of the Future</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">Studying learning in the worldwide classroom: Research into edX&quot;s first MOOC</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">B</forename><surname>Breslow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">E</forename><surname>Pritchard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Deboer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">S</forename><surname>Stump</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">D</forename><surname>Ho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">T</forename><surname>Seaton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Research &amp; Practice in Assessment</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="13" to="25" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<monogr>
		<title level="m" type="main">Who does what in a massive open online course</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">T</forename><surname>Seaton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Bergner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Chuang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mitros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">E</forename><surname>Pritchard</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="58" to="65" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Shah</surname></persName>
		</author>
		<ptr target="https://www.class-central.com/report/coursera-10-million-students/" />
		<title level="m">Class central report</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Smith</surname></persName>
		</author>
		<ptr target="http://www.educationdive.com/news/5-mooc-providers/44506/(2012" />
		<title level="m">EducationDIVE, 5 education providers offering MOOCs now or in the future</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<ptr target="http://www.nytimes.com/2012/11/04/education/edlife/massive-open-online-courses-are-multiplying-at-a-rapid-pace.html?pagewanted=all&amp;_r=0" />
	</analytic>
	<monogr>
		<title level="m">The Year of the MOOC</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<monogr>
		<ptr target="http://www.nytimes.com/2012/11/04/education/edlife/the-big-three-mooc-providers.html?_r=0" />
		<title level="m">Article: the Big three at a glance</title>
				<meeting><address><addrLine>The New York Times</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Deconstructing disengagement: analyzing learner subpopulations in massive open online courses</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">F</forename><surname>Kizilcec</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Piech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Schneider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Third International Conference on Learning Analytics and Knowledge</title>
				<meeting><address><addrLine>New York, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="170" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">Your click decides your fate: Inferring Information Processing and Attrition Behavior from MOOC Video Clickstream Interactions</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sinha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Jermann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dillenbourg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2014 Empirical Methods in Natural Language Processing Workshop on Modeling Large Scale Social Interaction in Massively Open Online Courses</title>
				<meeting>the 2014 Empirical Methods in Natural Language Processing Workshop on Modeling Large Scale Social Interaction in Massively Open Online Courses</meeting>
		<imprint>
			<date type="published" when="2014-10">October 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<analytic>
		<title level="a" type="main">Demographic Differences in How Students Navigate Through MOOCs</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Reinecke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">First ACM conference on Learning@ scale conference</title>
				<meeting><address><addrLine>, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="21" to="30" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">Engaging with Massive Online Courses</title>
		<author>
			<persName><forename type="first">A</forename><surname>Anderson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Huttenlocher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kleinberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Leskovec</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">23rd international conference on World wide web International World</title>
				<meeting><address><addrLine>Seoul, Korea</addrLine></address></meeting>
		<imprint>
			<publisher>Wide Web Conferences Steering Committee</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="687" to="698" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">How Video Production Affects Student Engagement: An empirical study of MOOC videos</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rubin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">First ACM conference on Learning@ scale conference</title>
				<meeting><address><addrLine>, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="41" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<analytic>
		<title level="a" type="main">Usability design for video lectures</title>
		<author>
			<persName><forename type="first">K</forename><surname>Chorianopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Giannakos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">11th European conference on Interactive tv and video</title>
				<meeting><address><addrLine>New York, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="163" to="164" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<analytic>
		<title level="a" type="main">Understanding In-Video Dropouts and Interaction Peaks in Online Lecture Videos</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">T</forename><surname>Seaton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mitros</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">Z</forename><surname>Gajos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Miller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">first ACM conference on Learning@ scale conference</title>
				<meeting><address><addrLine>USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="31" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<monogr>
		<author>
			<persName><forename type="first">Sergio</forename><surname>Ortega</surname></persName>
		</author>
		<author>
			<persName><surname>Francis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Brouns</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Gutiérrez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tomasini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rocio</surname></persName>
		</author>
		<title level="m">D2. 1 Analysis of existing MOOC platforms and services</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b62">
	<monogr>
		<title level="m" type="main">E-Learning and the Science of Instruction: Proven Guidelines for Consumers and Designers of Multimedia Learning</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">C</forename><surname>Clark</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Mayer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>John Wiley &amp; Sons</publisher>
			<pubPlace>San Francisco</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b63">
	<monogr>
		<title/>
		<author>
			<persName><surname>Sakai Overview</surname></persName>
		</author>
		<ptr target="https://sakaiproject.org/overview" />
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b64">
	<analytic>
		<title level="a" type="main">A simulation model of the test control of knowledge and skills. Computer-oriented educational system</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Alexeyev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Alexeyeva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Kyiv, NPU. M. Dragomanov</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">14</biblScope>
			<biblScope unit="page" from="65" to="71" />
			<date type="published" when="2009">2009</date>
			<publisher>Ukrainian</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b65">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Glass</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Stanley</surname></persName>
		</author>
		<title level="m">Statistical methods in education and psychology -Englewood Cliffs</title>
				<imprint>
			<publisher>Prentice-Hall</publisher>
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b66">
	<monogr>
		<ptr target="http://www.imsglobal.org/question" />
		<title level="m">IMS Global Learning Consortium</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b67">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Korneev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Gareev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Vasyutin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Reich</surname></persName>
		</author>
		<title level="m">Databases. Intelligent Processing of Information</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
	<note>: Knowledge. in Russian</note>
</biblStruct>

<biblStruct xml:id="b68">
	<analytic>
		<title level="a" type="main">Simple and Reliable Method of Scoring the Thurstone Attitude Scales</title>
		<author>
			<persName><forename type="first">R</forename><surname>Likert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Roslow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">A</forename><surname>Murphy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Social Psychology</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="228" to="238" />
			<date type="published" when="1934">1934. 1934</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b69">
	<monogr>
		<title level="m" type="main">Software Engineering</title>
		<author>
			<persName><forename type="first">I</forename><surname>Sommerville</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Addison Wesley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b70">
	<monogr>
		<title level="m" type="main">Reversing: Secrets of Reverse Engineering</title>
		<author>
			<persName><forename type="first">E</forename><surname>Eilam</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Wiley Publishing</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b71">
	<analytic>
		<title level="a" type="main">On the Structure of Crosscutting Concerns: Using Aspects of Collaboration?</title>
		<author>
			<persName><forename type="first">Sven</forename><surname>Apel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshop on Aspect-Oriented Product Line Engineering</title>
				<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b72">
	<analytic>
		<title level="a" type="main">Post Object-oriented Paradigms in Software Development: A Comparative Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Przybyłek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Multi-conference on Computer Science and Information Technology</title>
				<meeting>the International Multi-conference on Computer Science and Information Technology</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="1009" to="1020" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b73">
	<monogr>
		<ptr target="http://www.hpi.uni-potsdam.de/hirschfeld/cop/events" />
		<title level="m">Official Web-site of Aspect-oriented Software Development community</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b74">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Highsmith</surname></persName>
		</author>
		<title level="m">Agile Project Management</title>
				<imprint>
			<publisher>Addison-Wesley</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b75">
	<monogr>
		<title level="m" type="main">Design Patterns: Elements of Reusable Object-Oriented Software</title>
		<author>
			<persName><forename type="first">E</forename><surname>Gamma</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Addison-Wesley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b76">
	<analytic>
		<title level="a" type="main">Metrics for Maintainability of Class Inheritance Hierarchies</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sheldon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kh</forename><surname>Jerath</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Chung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Software Maintenance and Evolution</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="1" to="14" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b77">
	<analytic>
		<title level="a" type="main">The Role of Inheritance in the Maintainability of Object-Oriented Systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Harrison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Counsell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of ESCOM &apos;98</title>
				<meeting>ESCOM &apos;98</meeting>
		<imprint>
			<date type="published" when="1998">1998</date>
			<biblScope unit="page" from="449" to="457" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b78">
	<analytic>
		<title level="a" type="main">The Relationship between Design Patterns Defects and Crosscutting Concern Scattering Degree: An Empirical Study</title>
		<author>
			<persName><forename type="first">L</forename><surname>Aversano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cerulo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Penta</surname></persName>
		</author>
		<author>
			<persName><surname>Di</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. IET Software</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="395" to="409" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b79">
	<analytic>
		<title level="a" type="main">Design Pattern Implementation in Java and AspectJ</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hannemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kiczales</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of OOPSLA&apos;02</title>
				<meeting>OOPSLA&apos;02</meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
			<biblScope unit="page" from="161" to="173" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b80">
	<analytic>
		<title level="a" type="main">Do Crosscutting Concerns Cause Defects?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Eaddy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Softw. Eng</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="497" to="515" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b81">
	<monogr>
		<title level="m" type="main">Aspect-Oriented Software Development</title>
		<author>
			<persName><forename type="first">R</forename><surname>Filman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Elrad</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">M</forename><surname>Aksit</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Addison Wesley Professional</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b82">
	<monogr>
		<title level="m" type="main">Concern-Oriented Heuristic Assessment of Design Stability</title>
		<author>
			<persName><forename type="first">E</forename><surname>Figueiredo</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>Lancaster University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b83">
	<analytic>
		<title level="a" type="main">Separating Concerns throughout the Development Lifecycle</title>
		<author>
			<persName><forename type="first">S</forename><surname>Clarket</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intl. Workshop on Aspect-Oriented Programming ECOOP</title>
				<imprint>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b84">
	<monogr>
		<title level="m" type="main">The Role of Features and Aspects in Software Development</title>
		<author>
			<persName><forename type="first">S</forename><surname>Apel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
		<respStmt>
			<orgName>Ottovon-Guericke University Magdeburg</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD thesis</note>
</biblStruct>

<biblStruct xml:id="b85">
	<analytic>
		<title level="a" type="main">Towards Effectiveness Estimation of Post Object-oriented Technologies in Software Maintenance</title>
		<author>
			<persName><forename type="first">M</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Nagornyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Problems in Programming</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="252" to="260" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
	<note>special issue</note>
</biblStruct>

<biblStruct xml:id="b86">
	<analytic>
		<title level="a" type="main">Agile Requirements Traceability Using Domain-Specific Modeling Languages</title>
		<author>
			<persName><forename type="first">M</forename><surname>Taromirad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Paige</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Extreme Modeling Workshop</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="45" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b87">
	<analytic>
		<title level="a" type="main">N Degrees of Separation: Multi-Dimensional Separation of Concerns</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">L</forename><surname>Tarr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Software Engineering (ICSE)</title>
				<meeting>the International Conference on Software Engineering (ICSE)<address><addrLine>Los Angeles, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="107" to="119" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b88">
	<monogr>
		<ptr target="http://www.systems-thinking.org/kmgmt/kmgmt.htm" />
		<title level="m">Official Web-site of System Thinking World community</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b89">
	<analytic>
		<title level="a" type="main">Models and Tools for Multi-dimensional Approach to Requirements Behavior Analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Martinkus</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">UNISCON 2012</title>
		<title level="s">LNBIP</title>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Mayr</surname></persName>
		</editor>
		<meeting><address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">137</biblScope>
			<biblScope unit="page" from="191" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b90">
	<monogr>
		<title level="m" type="main">Fundamentals of the Analytic Hierarchy Process</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Saaty</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>RWS Publications</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b91">
	<monogr>
		<title level="m" type="main">Fuzzy Sets</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Zadeh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1976">1976</date>
			<publisher>WorldSciBook</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b92">
	<analytic>
		<title level="a" type="main">ACME: An Architecture Description Interchange Language</title>
		<author>
			<persName><forename type="first">D</forename><surname>Garlan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Monroe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wile</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of CASCON&apos;97</title>
				<meeting>CASCON&apos;97<address><addrLine>Toronto, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="169" to="183" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b93">
	<monogr>
		<ptr target="http://wwwiti.cs.uni-magdeburg.de/iti_db/research/cide/" />
		<title level="m">Official Web-site of CIDE-project</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b94">
	<analytic>
		<title level="a" type="main">Elaboration and Usage of Method for Post Object-oriented Technologies Effectiveness&apos;s Assessment</title>
		<author>
			<persName><forename type="first">K</forename><surname>Nagornyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. East-European on Advanced Technologies</title>
		<imprint>
			<biblScope unit="volume">63</biblScope>
			<biblScope unit="page" from="21" to="25" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b95">
	<monogr>
		<title level="m" type="main">Eclipse Modeling Framework</title>
		<author>
			<persName><forename type="first">F</forename><surname>Budinsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Brodsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Merks</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Pearson Education</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b96">
	<monogr>
		<title level="m" type="main">RDF 1.1 Concepts and Abstract Syntax</title>
		<author>
			<persName><forename type="first">R</forename><surname>Cyganiak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lanthaler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wood</surname></persName>
		</author>
		<ptr target="http://www.w3.org/TR/rdf11-concepts(2014" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b97">
	<analytic>
		<title level="a" type="main">Henshin: Advanced concepts and tools for in-place EMF model transformations</title>
		<author>
			<persName><forename type="first">T</forename><surname>Arendt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Biermann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jurack</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Krause</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Taentzer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of MoDELS&apos;10</title>
				<meeting>MoDELS&apos;10</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">6394</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b98">
	<analytic>
		<title level="a" type="main">The boundary between decidability and undecidability for transitive-closure logics</title>
		<author>
			<persName><forename type="first">N</forename><surname>Immerman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rabinovich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Reps</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sagiv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Yorsh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Science Logic</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Marcinkowski</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Tarlecki</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin / Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">3210</biblScope>
			<biblScope unit="page" from="160" to="174" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b99">
	<analytic>
		<title level="a" type="main">Hoare-style verification of graph programs</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Poskitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Plump</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">118</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="135" to="175" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b100">
	<analytic>
		<title level="a" type="main">The pointer assertion logic engine</title>
		<author>
			<persName><forename type="first">A</forename><surname>Møller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Schwartzbach</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">PLDI</title>
		<imprint>
			<biblScope unit="page" from="221" to="231" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b101">
	<analytic>
		<title level="a" type="main">Modelling and analysis using GROOVE</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Ghamarian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>De Mol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rensink</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Zambon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zimakova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">STTT</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="15" to="40" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b102">
	<analytic>
		<title level="a" type="main">Weakest preconditions for high-level programs</title>
		<author>
			<persName><forename type="first">A</forename><surname>Habel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">H</forename><surname>Pennemann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rensink</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Graph Transformations (ICGT)</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Corradini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Ehrig</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">U</forename><surname>Montanari</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Ribeiro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Rozenberg</surname></persName>
		</editor>
		<meeting><address><addrLine>Natal, Brazil; Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2006-09">September 2006</date>
			<biblScope unit="volume">4178</biblScope>
			<biblScope unit="page" from="445" to="460" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b103">
	<analytic>
		<title level="a" type="main">Correctness of high-level transformation systems relative to nested conditions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Habel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">H</forename><surname>Pennemann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">MSCS</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">02</biblScope>
			<biblScope unit="page" from="245" to="296" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b104">
	<analytic>
		<title level="a" type="main">Resolution-like theorem proving for high-level conditions</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">H</forename><surname>Pennemann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Graph Transformations</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Ehrig</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Heckel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Rozenberg</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Taentzer</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin / Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">5214</biblScope>
			<biblScope unit="page" from="289" to="304" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b105">
	<analytic>
		<title level="a" type="main">HR* graph conditions between counting monadic second-order and second-order graph formulas</title>
		<author>
			<persName><forename type="first">H</forename><surname>Radke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ECEASST</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b106">
	<analytic>
		<title level="a" type="main">Formal specification and analysis of functional properties of graph rewriting-based model transformation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Asztalos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Lengyel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Levendovszky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software Testing, Verification and Reliability</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="405" to="435" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b107">
	<monogr>
		<title level="m" type="main">Software Abstractions: Logic, language, and analysis</title>
		<author>
			<persName><forename type="first">D</forename><surname>Jackson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>MIT Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b108">
	<analytic>
		<title level="a" type="main">On the use of Alloy to analyze graph transformation systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Baresi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Spoletini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Graph Transformations</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Corradini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Ehrig</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">U</forename><surname>Montanari</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Ribeiro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Rozenberg</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">4178</biblScope>
			<biblScope unit="page" from="306" to="320" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b109">
	<analytic>
		<title level="a" type="main">Isabelle/HOL. A Proof Assistant for Higher-Order Logic</title>
		<author>
			<persName><forename type="first">T</forename><surname>Nipkow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Paulson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wenzel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">2283</biblScope>
			<date type="published" when="2002">2002</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b110">
	<analytic>
		<title level="a" type="main">Expressive number restrictions in description logics</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Logic and Computation</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="319" to="350" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b111">
	<analytic>
		<title level="a" type="main">Explicit substitutions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Cardelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">L</forename><surname>Curien</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Lévy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Functional Programming</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="375" to="416" />
			<date type="published" when="1991-10">October 1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b112">
	<monogr>
		<title level="m" type="main">Concrete Semantics</title>
		<author>
			<persName><forename type="first">T</forename><surname>Nipkow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Klein</surname></persName>
		</author>
		<ptr target="http://www21.in.tum.de/~nipkow/Concrete-Semantics/" />
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b113">
	<analytic>
		<title level="a" type="main">Tableau algorithms for description logics</title>
		<author>
			<persName><forename type="first">F</forename><surname>Baader</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Sattler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Automated Reasoning with Analytic Tableaux and Related Methods</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Dyckhoff</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="volume">1847</biblScope>
			<biblScope unit="page" from="1" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b114">
	<monogr>
		<title level="m" type="main">Transformation de graphes en RDF</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">V</forename><surname>Espinoza</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
		<respStmt>
			<orgName>Université de Toulouse</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Master&apos;s thesis</note>
</biblStruct>

<biblStruct xml:id="b115">
	<analytic>
		<title level="a" type="main">Search based software engineering</title>
		<author>
			<persName><forename type="first">M</forename><surname>Harman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">F</forename><surname>Jones</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Software Technology</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">14</biblScope>
			<biblScope unit="page" from="833" to="839" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b116">
	<analytic>
		<title level="a" type="main">Why the virtual nature of software makes it ideal for search based optimization</title>
		<author>
			<persName><forename type="first">M</forename><surname>Harman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Conference on Fundamental Approaches to Software Engineering (FASE&apos;10)</title>
		<title level="s">LNCS</title>
		<meeting>the 13th International Conference on Fundamental Approaches to Software Engineering (FASE&apos;10)<address><addrLine>Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">6013</biblScope>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b117">
	<analytic>
		<title level="a" type="main">A study of the bi-objective next release problem</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Durillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Alba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Harman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Nebro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Empirical Software Engineering</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="29" to="60" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b118">
	<monogr>
		<ptr target="http://crestweb.cs.ucl.ac.uk/resources/sbse_repository/repository.html" />
		<title level="m">Repository of Publications on Search Based Software Engineering</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b119">
	<analytic>
		<title level="a" type="main">Automatic Clustering of Software Systems using a Genetic Algorithm</title>
		<author>
			<persName><forename type="first">D</forename><surname>Doval</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mancoridis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Mitchell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Software Technology and Engineering Practice</title>
				<meeting>Software Technology and Engineering Practice</meeting>
		<imprint>
			<date type="published" when="1998">1998. 2013</date>
			<biblScope unit="page" from="73" to="91" />
		</imprint>
		<respStmt>
			<orgName>CHAOS Knowledge Center</orgName>
		</respStmt>
	</monogr>
	<note>References 1. The Standish Group International: CHAOS Manifesto -Think big, act small. Technical report</note>
</biblStruct>

<biblStruct xml:id="b120">
	<monogr>
		<title level="m" type="main">Guide to the software engineering body of knowledge (SWEBOK): Version 3.0. A project of the</title>
		<author>
			<persName><forename type="first">P</forename><surname>Bourque</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fairley</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>IEEE Computer Society</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b121">
	<monogr>
		<title level="m" type="main">Code complete</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mcconnell</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Microsoft Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b122">
	<analytic>
		<title level="a" type="main">The modern problems of software quality evaluation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hovorushchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Radioeletronic and computer systems</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="319" to="327" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b123">
	<analytic>
		<title level="a" type="main">Systemic factors in software-related spacecraft accidents</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">G</forename><surname>Levenson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">AIAA Space Conference and Exposition</title>
				<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="1" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b124">
	<analytic>
		<title level="a" type="main">Software challenges in achieving space safety</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">G</forename><surname>Levenson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the British Interplanetary Society</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="265" to="272" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b125">
	<analytic>
		<title level="a" type="main">Hazard analysis of complex spacecraft using systems-theoretic process analysis</title>
		<author>
			<persName><forename type="first">T</forename><surname>Ishimatsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Levenson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Thomas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Fleming</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Katahira</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Miyamoto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ujiie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Spacecraft and Rockets</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="509" to="522" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b126">
	<monogr>
		<title level="m" type="main">Software for people: fundamentals, trends and best practices</title>
		<author>
			<persName><forename type="first">A</forename><surname>Maedche</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Botzenhardt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Neer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin Heidelberg; Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b127">
	<analytic>
		<title level="a" type="main">Modelling of process of prediction of software characteristics based on the analysis of specifications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Krasiy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer-Integrated Technologies: Education, Science, Industry</title>
		<imprint>
			<biblScope unit="page" from="66" to="76" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b128">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Fenton</surname></persName>
		</author>
		<title level="m">Software metrics: A rigorous approach</title>
				<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>3 rd edition</note>
</biblStruct>

<biblStruct xml:id="b129">
	<monogr>
		<title level="m" type="main">Visual models for software requirements</title>
		<author>
			<persName><forename type="first">A</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Beatty</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>MS Press</publisher>
			<pubPlace>Washington</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b130">
	<analytic>
		<title level="a" type="main">Software requirements specification analysis using natural language processing technique</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fatwanto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Quality in Research</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="105" to="110" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b131">
	<analytic>
		<title level="a" type="main">Analysis of requirement engineering processes, tools/techniques and methodologies</title>
		<author>
			<persName><forename type="first">T</forename><surname>Rehman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N A</forename><surname>Khan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Riaz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">I.J. Information Technology and Computer Science</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page">48</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b132">
	<analytic>
		<title level="a" type="main">Demographic Problems as a Mirror of Nation&apos;s Health</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">G</forename><surname>Organov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">M</forename><surname>Komarov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">Y</forename><surname>Maslennikova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Prophylactic Medicine</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="3" to="8" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b133">
	<monogr>
		<title level="m" type="main">New Mathematical Approaches to the Problems of Medical Diagnostics</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">B</forename><surname>Kotov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Editorial EPCC</publisher>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b134">
	<analytic>
		<title level="a" type="main">Intellectual Technologies of Identification: Fuzzy Logic, Genetic Algorithms</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Rotshtein</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Neuron Networks</title>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>UNIVERSUM</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b135">
	<monogr>
		<title level="m" type="main">Medical Diagnostics on the Fuzzy Logic</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Rotshtein</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<publisher>Kontingent-Prim</publisher>
			<pubPlace>Vinnitsa</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b136">
	<analytic>
		<title level="a" type="main">Analysis of clinical data in medical research based on methods of computational intelligence</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Boyko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">V</forename><surname>Bodyansky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Vinokurova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Sushkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Pavlov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">TO Exclusive</title>
				<meeting><address><addrLine>Kharkov</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b137">
	<analytic>
		<title level="a" type="main">A Case Based Expert System for Supporting Diagnosis of Heart Diseases</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abdel-Badeeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mohamed</forename><surname>Salem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rania</forename><forename type="middle">A</forename><surname>Roushdy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. ICGST International Journal on Artificial Intelligence and Machine Learning</title>
		<imprint>
			<biblScope unit="page" from="33" to="39" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b138">
	<analytic>
		<title level="a" type="main">Neural Networks in Medicine</title>
		<author>
			<persName><forename type="first">A</forename><surname>Yezhov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Chechetkin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Open Systems</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="34" to="37" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b139">
	<analytic>
		<title level="a" type="main">Electrocardiogram Classification Sensor System Supporting an Autonomous Mobile Cardiovascular Disease Detection Aid</title>
		<author>
			<persName><forename type="first">P</forename><surname>Dasilva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Fortier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sethares</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Sensors &amp; Transducers</title>
		<imprint>
			<biblScope unit="volume">184</biblScope>
			<biblScope unit="page" from="92" to="100" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b140">
	<analytic>
		<title level="a" type="main">Detection of Characteristic Points of ECG using Quadratic Spline Wavelet Transform</title>
		<author>
			<persName><forename type="first">M</forename><surname>Niknazar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">V</forename><surname>Vahdat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">R</forename><surname>Mousavi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd nternational Conference on Signals, Circuits and Systems (SCS&apos;09)</title>
				<meeting>the 3rd nternational Conference on Signals, Circuits and Systems (SCS&apos;09)<address><addrLine>Medenine, Tunisia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009-06-01">6-7 November, 1-6 (2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b141">
	<analytic>
		<title level="a" type="main">Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform</title>
		<author>
			<persName><forename type="first">P</forename><surname>Sasikala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wahida</forename><surname>Banu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. International Journal of Computer Science and Information Technologies</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="489" to="493" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b142">
	<analytic>
		<title level="a" type="main">ECG Analysis Using Wavelet Transform: Application to Myocardial Ischemia Detection</title>
		<author>
			<persName><forename type="first">P</forename><surname>Ranjith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Baby</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Joseph</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. ITBM-RBM</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="44" to="47" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b143">
	<monogr>
		<title level="m" type="main">Introduction into the Problem of Taking Decisions in Medicine</title>
		<author>
			<persName><forename type="first">L</forename><surname>Lasted</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1971">1971</date>
			<publisher>Mir</publisher>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b144">
	<analytic>
		<title level="a" type="main">The university of Glasgow (Uni-G) ECG analysis program</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">W</forename><surname>Macfarlane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Devine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Clark</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers in Cardiology</title>
		<imprint>
			<biblScope unit="page" from="451" to="454" />
			<date type="published" when="2005">2005</date>
			<publisher>IEEE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b145">
	<analytic>
		<title level="a" type="main">Design of hybrid architectures based on neural classifier and RBF pre-processing for ECG analysis</title>
		<author>
			<persName><forename type="first">R</forename><surname>Silipo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bortolan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Marchesi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Approximate Reasoning</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="177" to="196" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b146">
	<analytic>
		<title level="a" type="main">LEADS: an interactive research oriented ECG/VCG analysis system</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">H M</forename><surname>Draisma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">A</forename><surname>Swenne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Van De Vooren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Maan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Hooft Van Huysduynen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">E</forename><surname>Van Der Wall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Schalij</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computers in Cardiology, IEEE</title>
				<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="515" to="518" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b147">
	<analytic>
		<title level="a" type="main">Principal component analysis in ECG signal processing</title>
		<author>
			<persName><forename type="first">F</forename><surname>Castells</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Laguna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sörnmo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bollmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Roig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EURASIP Journal on Applied Signal Processing</title>
		<imprint>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="98" to="98" />
			<date type="published" when="2007">2007. 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b148">
	<analytic>
		<title level="a" type="main">An autonomic cloud environment for hosting ECG data analysis services</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pandey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Voorsluys</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khandoker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Buyya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="147" to="154" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b149">
	<analytic>
		<title level="a" type="main">MPSoC ECG biochip: a multiprocessor system-on-chip for real-time human heart monitoring and analysis</title>
		<author>
			<persName><forename type="first">Al</forename><surname>Khatib</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Bertozzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Poletti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Benini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Jantsch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bechara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename></persName>
		</author>
		<author>
			<persName><forename type="first">.</forename><forename type="middle">.</forename><surname>Jonsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd Conference on Computing Frontiers</title>
				<meeting>the 3rd Conference on Computing Frontiers</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="21" to="28" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b150">
	<analytic>
		<title level="a" type="main">Prediction of atrial fibrillation from surface ECG: review of methods and algorithms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Poli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Barbaro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Bartolini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Calcagnini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Censi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annali dell&apos;Istituto superiore di sanità</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="195" to="203" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b151">
	<analytic>
		<title level="a" type="main">Feature extraction for ECG time-series mining based on chaos theory</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bogunovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Technology Interfaces</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="63" to="68" />
		</imprint>
	</monogr>
	<note>29th International Conference on.</note>
</biblStruct>

<biblStruct xml:id="b152">
	<analytic>
		<title level="a" type="main">Electrocardiogram analysis using a combination of statistical, geometric, and nonlinear heart rate variability features</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bogunovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial intelligence in medicine</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="175" to="186" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b153">
	<analytic>
		<title level="a" type="main">Semantic web ontology utilization for heart failure expert system design</title>
		<author>
			<persName><forename type="first">M</forename><surname>Prcela</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gamberger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Jovic</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Studies in health technology and informatics</title>
		<imprint>
			<biblScope unit="volume">136</biblScope>
			<biblScope unit="page" from="851" to="856" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b154">
	<analytic>
		<title level="a" type="main">Learning system for computer-aided ECG analysis based on support vector machines</title>
		<author>
			<persName><forename type="first">S</forename><surname>Jankowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Oreziak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Bioelectromagnetism. ISBEM</title>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b155">
	<analytic>
		<title level="a" type="main">ECG analysis: a new approach in human identification</title>
		<author>
			<persName><forename type="first">L</forename><surname>Biel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pettersson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Philipson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Wide</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Instrumentation and Measurement</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="808" to="812" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
	<note>IEEE Transactions on</note>
</biblStruct>

<biblStruct xml:id="b156">
	<analytic>
		<title level="a" type="main">Impact analysis of body movement in ambulatory ECG</title>
		<author>
			<persName><forename type="first">T</forename><surname>Pawar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Anantakrishnan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chaudhuri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Duttagupta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">EMBS 2007. 29th Annual International Conference of the IEEE</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="5453" to="5456" />
		</imprint>
	</monogr>
	<note>Engineering in Medicine and Biology Society</note>
</biblStruct>

<biblStruct xml:id="b157">
	<analytic>
		<title level="a" type="main">ECG analysis using nonlinear PCA neural networks for ischemia detection</title>
		<author>
			<persName><forename type="first">T</forename><surname>Stamkopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Diamantaras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Maglaveras</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Strintzis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="3058" to="3067" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
	<note>Signal Processing</note>
</biblStruct>

<biblStruct xml:id="b158">
	<analytic>
		<title level="a" type="main">The use of the SPSA method in ECG analysis</title>
		<author>
			<persName><forename type="first">L</forename><surname>Gerencsér</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kozmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Vágó</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Haraszti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Biomedical Engineering, IEEE Transactions on</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1094" to="1101" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b159">
	<monogr>
		<title level="m" type="main">A mobile device based ECG analysis system</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Fang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Sufi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Cosic</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>NTECH Open Access Publisher</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b160">
	<analytic>
		<title level="a" type="main">The use of the Hilbert transform in ECG signal analysis</title>
		<author>
			<persName><forename type="first">D</forename><surname>Benitez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Gaydecki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zaidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Fitzpatrick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers in biology and medicine</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="399" to="406" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b161">
	<monogr>
		<title level="m" type="main">Filtering, extrapolation and recognition realizations of random functions</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">D</forename><surname>Kudritsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>FADA Ltd</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b162">
	<monogr>
		<title level="m" type="main">The Theory of Random Functions and its Application</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Pugachev</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1962">1962</date>
			<publisher>Fitmatgiz</publisher>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b163">
	<analytic>
		<title level="a" type="main">The Algorythm of Optimal Nonlinear Extrapolation of the Realizations of Random Process with the Filtration of Errors Changes</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Electronic Modelling</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="23" to="40" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b164">
	<analytic>
		<title level="a" type="main">The algorithm of optimal polynomial extrapolation of random processes</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">Y</forename><surname>Kondratenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Kozlov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Modeling and Simulation in Engineering</title>
		<title level="s">Economics and Management, LNBIP</title>
		<meeting><address><addrLine>New-York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="page" from="78" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b165">
	<analytic>
		<title level="a" type="main">The Algorithm to Determine the Optimal Parameters of a Wiener Filterextrapolator for Non-stationary Stochastic Processes Observed with Errors</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="154" to="159" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b166">
	<analytic>
		<title level="a" type="main">The Synthesis of Optimal Linear Stochastic Systems of Control on the Basis of the Apparatus of Canonical Decompositions of Random Sequences</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Controlling Systems and Machines</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="8" to="12" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b167">
	<analytic>
		<title level="a" type="main">On the estimation of probability density function and the mode</title>
		<author>
			<persName><forename type="first">E</forename><surname>Parzen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Analysis of Mathematical Statistics</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="1065" to="1076" />
			<date type="published" when="1962">1962</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b168">
	<analytic>
		<title level="a" type="main">The application of neural network and discrete wavelet transform for the analysis and classification of electrocardiograms</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Grigoriev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Spitsin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Bulletin of the Tomsk Polytechnic University</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="57" to="61" />
			<date type="published" when="1996">2012. 1996</date>
		</imprint>
	</monogr>
	<note>References 1. Blank, І.A. Strategy and Tactics of Financial Management. The Item LTD. in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b169">
	<analytic>
		<title level="a" type="main">Iinstability and Economic Growth</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Heyets</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Institute of Economic Forecasting of</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
		<respStmt>
			<orgName>National Academy of Sciences of Ukraine</orgName>
		</respStmt>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b170">
	<analytic>
		<title level="a" type="main">Fuzzy Neural Networks and Genetic Algorithms in Problems of Macroeconomic Forecasting</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Zaychenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Moamed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">V</forename><surname>Shapovalenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science news</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="20" to="30" />
			<date type="published" when="2002">2002</date>
		</imprint>
		<respStmt>
			<orgName>Kyiv Polytechnic Institute</orgName>
		</respStmt>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b171">
	<monogr>
		<title level="m" type="main">Course of Economic Analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Ivakhnenko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Znannya Press</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b172">
	<monogr>
		<title level="m" type="main">Prediction of Rrandom Processes</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">H</forename><surname>Ivakhnenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">G</forename><surname>Lapa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1969">1969</date>
			<publisher>Naukova Dumka</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b173">
	<analytic>
		<title level="a" type="main">Econometric Modeling in the Management of Business Risks</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Yarkina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Finance of Ukraine</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="77" to="80" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b174">
	<analytic>
		<title level="a" type="main">Economic-mathematical Evaluation Model of Enterprise in Market Economy</title>
		<author>
			<persName><forename type="first">L</forename><surname>Timashova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Stepanenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Academy of Labour and Social Affairs Federation of Trade Unions of Ukraine</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">27</biblScope>
			<biblScope unit="page" from="79" to="90" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b175">
	<analytic>
		<title level="a" type="main">Modern Сomputer Tools and Technologies for the Information of the Financial System</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Stepanenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">New Computer Tools, Computers and Networks</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="25" to="31" />
			<date type="published" when="2001">2001</date>
		</imprint>
		<respStmt>
			<orgName>Institute of Cybernetics by V.Glushkov of National Academy of Sciences of Ukraine</orgName>
		</respStmt>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b176">
	<analytic>
		<title level="a" type="main">Approaches to forecast electricity consumption in power distribution companies // Bulletin</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pavlyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Engineering and Information Technology</title>
		<imprint>
			<biblScope unit="volume">468</biblScope>
			<biblScope unit="page" from="145" to="151" />
			<date type="published" when="2002">2002</date>
		</imprint>
		<respStmt>
			<orgName>Lviv Polytechnic</orgName>
		</respStmt>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b177">
	<monogr>
		<title level="m" type="main">Modeling of Economic Processes Using Fuzzy Logic Methods</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Matviichuk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Kyiv National Economic University</orgName>
		</respStmt>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b178">
	<monogr>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">E</forename><surname>Hanke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Arthur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dean</forename><forename type="middle">W</forename><surname>Reitsch</surname></persName>
		</author>
		<author>
			<persName><surname>Wichern</surname></persName>
		</author>
		<title level="m">Business forecasting. Up per Saddle River</title>
				<meeting><address><addrLine>NJ</addrLine></address></meeting>
		<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b179">
	<monogr>
		<title level="m" type="main">Industrial and business forecasting methods: A practical guide to exponential smoothing and curve fitting</title>
		<author>
			<persName><forename type="first">Colin</forename><surname>Lewis</surname></persName>
		</author>
		<author>
			<persName><surname>David</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1982">1982</date>
			<publisher>Butterworth-Heinemann</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b180">
	<monogr>
		<title level="m" type="main">Time series analysis: forecasting and control</title>
		<author>
			<persName><forename type="first">George</forename><forename type="middle">Ep</forename><surname>Box</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gwilym</surname></persName>
		</author>
		<author>
			<persName><surname>Jenkins</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1976">1976</date>
			<publisher>Holden-Day</publisher>
		</imprint>
	</monogr>
	<note>revised ed</note>
</biblStruct>

<biblStruct xml:id="b181">
	<analytic>
		<author>
			<persName><forename type="first">G</forename><surname>Tail</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Economic forecasts and decision making / G</title>
				<imprint>
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
	<note type="report_type">Statistics. -448</note>
	<note>in Russian)</note>
</biblStruct>

<biblStruct xml:id="b182">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Kukharev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Sally</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Erpert</surname></persName>
		</author>
		<title level="m">Economic-mathematical Methods and Models in the Planning and Management</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
	<note>Vyshcha shcola. in Russian</note>
</biblStruct>

<biblStruct xml:id="b183">
	<analytic>
		<title level="a" type="main">Forecasting seasonals and trends by exponentially weighted moving averages</title>
		<author>
			<persName><forename type="first">Charles</forename><forename type="middle">C</forename><surname>Holt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Forecasting</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="5" to="10" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b184">
	<analytic>
		<title level="a" type="main">Forecasting sales by exponentially weighted moving averages</title>
		<author>
			<persName><forename type="first">Peter</forename><forename type="middle">R</forename><surname>Winters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management Science</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="324" to="342" />
			<date type="published" when="1960">1960</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b185">
	<monogr>
		<title level="m">State Statistics Service. Statistical Yearbook</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>Transport and Communication in Ukraine -2013. in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b186">
	<analytic>
		<title level="a" type="main">A machine-oriented logic based on the resolution principle</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Robinson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Assoc. Comput. Mach</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="2" to="20" />
			<date type="published" when="1965">1965</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b187">
	<analytic>
		<title level="a" type="main">The inverse method for establishing the deducibility in the classical predicate calculus</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Maslov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">DAN SSSR</title>
		<imprint>
			<biblScope unit="volume">159</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="17" to="20" />
			<date type="published" when="1964">1964</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b188">
	<analytic>
		<title level="a" type="main">An Overview of mechanical theorem proving</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Robinson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Operations Research and Mathematical Systems</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="2" to="20" />
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b189">
	<analytic>
		<title level="a" type="main">A calculus of c-clauses based on the clashresolution rule</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Lyaletski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Malashonok</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical Issues of Intellectual Machines Theory</title>
				<meeting><address><addrLine>Kiev</addrLine></address></meeting>
		<imprint>
			<publisher>GIC AS UkrSSR</publisher>
			<date type="published" when="1975">1975</date>
			<biblScope unit="page" from="3" to="33" />
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b190">
	<analytic>
		<title level="a" type="main">On a calculus of c-clauses</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Lyaletski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematical Issues of Intellectual Machines Theory</title>
				<meeting><address><addrLine>Kiev</addrLine></address></meeting>
		<imprint>
			<publisher>GIC AS UkrSSR</publisher>
			<date type="published" when="1975">1975</date>
			<biblScope unit="page" from="34" to="48" />
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b191">
	<monogr>
		<title level="m" type="main">Symbolic Logic and Mechanical Theorem Proving</title>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Richard</forename><surname>Chang</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1987">1987. 1997</date>
			<publisher>Academic Press</publisher>
			<biblScope unit="page">331</biblScope>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b192">
	<monogr>
		<title level="m">Handbook of Automated Reasoning</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Robinson</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Voronkov</surname></persName>
		</editor>
		<imprint>
			<publisher>Elsevier and MIT Press</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">981</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b193">
	<analytic>
		<title level="a" type="main">Automatic deduction with hyper-resolution</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Robinson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Mathematics</title>
		<imprint>
			<biblScope unit="page" from="227" to="234" />
			<date type="published" when="1965">1965</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b194">
	<analytic>
		<title level="a" type="main">Paramodulation and theorem-proving in first-order theories with equality</title>
		<author>
			<persName><forename type="first">G</forename><surname>Robinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="135" to="150" />
			<date type="published" when="1969">1969</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b195">
	<analytic>
		<title level="a" type="main">Proving theorems with the modification method</title>
		<author>
			<persName><forename type="first">D</forename><surname>Brand</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">SIAM Journal on Computing</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="412" to="430" />
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b196">
	<analytic>
		<title level="a" type="main">Proof-search strategies for methods of resolution type</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Maslov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="77" to="90" />
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b197">
	<analytic>
		<title level="a" type="main">On the relation between resolution and Maslov&apos;s inverse method</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kuechner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Machine Intelligence</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="73" to="76" />
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b198">
	<analytic>
		<title level="a" type="main">What is the inverse method?</title>
		<author>
			<persName><forename type="first">V</forename><surname>Lifschitz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automated Reasoning</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="1" to="23" />
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b199">
	<analytic>
		<title level="a" type="main">A model elimination calculus for generalized clauses</title>
		<author>
			<persName><forename type="first">T</forename><surname>Bollinger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IJCAI&apos;91</title>
				<meeting>IJCAI&apos;91</meeting>
		<imprint>
			<date type="published" when="1991">1991</date>
			<biblScope unit="page" from="126" to="131" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b200">
	<analytic>
		<title level="a" type="main">A simplified format for the model elimination theorem-proving procedure</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">W</forename><surname>Loveland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the ACM (JACM)</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="349" to="363" />
			<date type="published" when="1969">1969</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b201">
	<analytic>
		<title level="a" type="main">On minimal inferences in the calculi of c-clauses</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Lyaletski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Issues of the Theory of Robots and Artificial Intelligence</title>
				<meeting><address><addrLine>Kiev</addrLine></address></meeting>
		<imprint>
			<publisher>GIC AS UkrSSR</publisher>
			<date type="published" when="1977">1977</date>
			<biblScope unit="page" from="88" to="101" />
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b202">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Kupin</surname></persName>
		</author>
		<title level="m">Intellectual identification and controls in the conditions of processes of concentrating technology</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>Korneychuk&apos;s Publishing house</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>The monograph</note>
</biblStruct>

<biblStruct xml:id="b203">
	<monogr>
		<title level="m" type="main">Emerging computer techniques in the minerals industry</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Scheiner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Stanley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">L</forename><surname>Karr</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<publisher>Society for Mining, Metallurgy, and Exploration, Inc</publisher>
			<pubPlace>Littleton, CO</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b204">
	<analytic>
		<title level="a" type="main">Automatic control in mineral processing</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Wills</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mining Mag. No</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="316" to="320" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b205">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Maryuta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">V</forename><surname>Kochura</surname></persName>
		</author>
		<title level="m">Economic -mathematical methods of optimum control of the enterprises</title>
				<meeting><address><addrLine>Dnepropetrovsk</addrLine></address></meeting>
		<imprint>
			<publisher>Science and education</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b206">
	<analytic>
		<title level="a" type="main">Neural identification of technological process of iron ore beneficiation</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Kupin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications (IDAACS&apos;2007)</title>
				<meeting>4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems Technology and Applications (IDAACS&apos;2007)<address><addrLine>Dortmund</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="225" to="227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b207">
	<analytic>
		<title level="a" type="main">Research of properties of conditionality of task to optimization of processes of concentrating technology is on the basis of application of neural networks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Kupin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Metallurgical and Mining Industry</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="51" to="55" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b208">
	<analytic>
		<title level="a" type="main">Application of neurocontrol principles and classification optimisation in conditions of sophisticated technological processes of beneficiation complexes</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Kupin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Metallurgical and Mining Industry</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="16" to="24" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b209">
	<analytic>
		<title level="a" type="main">Control of liquid level via learning classifier system</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Scheiner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">A</forename><surname>Stanley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">L</forename><surname>Karr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of The Applications of Artificial Intelligence VII Conference</title>
				<meeting>The Applications of Artificial Intelligence VII Conference</meeting>
		<imprint>
			<date type="published" when="1989">No1095. 1989</date>
			<biblScope unit="page" from="78" to="85" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b210">
	<monogr>
		<title level="m" type="main">Information synthesis of intellectual control systems</title>
		<author>
			<persName><forename type="first">А</forename><forename type="middle">S</forename><surname>Krasnopoyasovsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Publishing house SumSU</publisher>
			<pubPlace>Sumy</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b211">
	<analytic>
		<title level="a" type="main">Ore preparation multi-criteria energy-efficient automated control with considering the ecological and economic factors</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Morkun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Tron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Metallurgical and Mining Industry</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="4" to="7" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b212">
	<monogr>
		<title level="m">Foresightedness and K-society Indices&apos; dynamics from</title>
				<imprint>
			<date type="published" when="2008">2008. 2013</date>
			<biblScope unit="page">546</biblScope>
		</imprint>
	</monogr>
	<note>K-society Index equals to 0</note>
</biblStruct>

<biblStruct xml:id="b213">
	<analytic>
		<title level="a" type="main">The Knowledge Society: A Sustainability Paradigm</title>
		<author>
			<persName><forename type="first">Naim</forename><surname>Hamdija Afgan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><forename type="middle">G</forename><surname>Carvalho</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cadmus</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b214">
	<monogr>
		<title level="m" type="main">Knowledge Based Economy: Knowledge and Learning in European Educational Research</title>
		<author>
			<persName><forename type="first">Michael</forename><surname>Kuhn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Massimo</forename><surname>Tomassini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">R J</forename><surname>Simons</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b215">
	<monogr>
		<title level="m" type="main">The Knowledge Society: The Growing Impact of Scientific Knowledge on Social Relations</title>
		<author>
			<persName><forename type="first">Gernot</forename><surname>Bohme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nico</forename><surname>Stehr</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1986">1986</date>
			<publisher>Springer Science &amp; Business Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b216">
	<monogr>
		<title level="m">UNESCO World Report: Towards Knowledge Societies</title>
				<meeting><address><addrLine>UNESCO, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b217">
	<monogr>
		<title level="m">Understanding Knowledge Societies in Twenty Questions and Answers with the Index of Knowledge Societies</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>UNPAN</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b218">
	<monogr>
		<title level="m">Understanding Knowledge Societies</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>United Nations</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b219">
	<monogr>
		<title level="m">Handbook on Constructing Composite Indicators: Methodology and User Guide</title>
				<meeting><address><addrLine>France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>Organization for Economic Co-Operation and Development</note>
</biblStruct>

<biblStruct xml:id="b220">
	<monogr>
		<ptr target="http://wdc.org.ua/" />
		<title level="m">World Data Center for Geoinformatics and Sustainable Development</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b221">
	<monogr>
		<ptr target="http://ffp.statesindex.org/" />
		<title level="m">Fund for Peace: Fragile State Index</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b222">
	<monogr>
		<author>
			<persName><forename type="first">Terry</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anthony</forename><forename type="middle">B</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kim</forename><forename type="middle">R</forename><surname>Holmes</surname></persName>
		</author>
		<title level="m">Highlights of the 2014 Index of Economic Freedom: Promoting Economic Opportunity and Prosperity</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>The Heritage Foundation</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b223">
	<monogr>
		<title level="m">Conflict Barometer 2013</title>
				<meeting><address><addrLine>Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page">22</biblScope>
		</imprint>
		<respStmt>
			<orgName>Heidelberg Institute for International Conflict Research</orgName>
		</respStmt>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b224">
	<monogr>
		<title level="m" type="main">Multi-Agent Programming</title>
		<author>
			<persName><forename type="first">N</forename><surname>Bordini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dastani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Dix</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E F</forename><surname>Seghrouchni</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b225">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">J</forename><surname>Bruner</surname></persName>
		</author>
		<ptr target="http://radar.oreilly.com/2013/01/defining-the-industrial-internet.html" />
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b226">
	<monogr>
		<title level="m" type="main">Multiagent Systems for Manufacturing Control</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bussmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jennings</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Wooldridge</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b227">
	<analytic>
		<title level="a" type="main">Agent-based control system</title>
		<author>
			<persName><forename type="first">N</forename><surname>Jennings</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bussmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Control Systems Magazine</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="61" to="74" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b228">
	<monogr>
		<title level="m">The Information Economy Report</title>
				<meeting><address><addrLine>New York and Geneva</addrLine></address></meeting>
		<imprint>
			<publisher>United Nations Conference on Trade and Development</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="volume">XX</biblScope>
		</imprint>
	</monogr>
	<note>The Development Perspective</note>
</biblStruct>

<biblStruct xml:id="b229">
	<analytic>
		<title level="a" type="main">Predicting the level of B2B e-commerce in industrial organizations</title>
		<author>
			<persName><forename type="first">C</forename><surname>Claycomb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Iyer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">L</forename><surname>Germain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Industrial Marketing Management</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="221" to="234" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b230">
	<analytic>
		<title level="a" type="main">Barriers of B2B e-Business Adoption in Indonesian SMEs: A Literature Analysis</title>
		<author>
			<persName><forename type="first">I</forename><surname>Janita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">K</forename><surname>Chong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="571" to="578" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b231">
	<analytic>
		<title level="a" type="main">On the performance of B2B e-markets: An analysis of organizational capabilities and market opportunities</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-Y</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Archer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Commerce Research and Applications</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="59" to="74" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b232">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Harrison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hague</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Hague</surname></persName>
		</author>
		<ptr target="http://www.b2binternational.com/publications/b2b-marketing(2006" />
		<title level="m">Why Is Business-to-Business Marketing Special?</title>
				<imprint>
			<publisher>B2B International</publisher>
		</imprint>
	</monogr>
	<note>B2B Market Research Company</note>
</biblStruct>

<biblStruct xml:id="b233">
	<monogr>
		<title level="m" type="main">Consumer behavior</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wright</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Cengage Learning</publisher>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b234">
	<analytic>
		<title level="a" type="main">Redefining geospatial intelligence</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">S</forename><surname>Bacastow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Bellafiore</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">American Intelligence Journal</title>
		<imprint>
			<biblScope unit="page" from="38" to="40" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b235">
	<monogr>
		<title level="m" type="main">Multisensor Data Fusion</title>
		<author>
			<persName><forename type="first">D</forename><surname>Hall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Llinas</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001-06-20">June 20, 2001</date>
			<publisher>CRC Press</publisher>
			<biblScope unit="page">568</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b236">
	<monogr>
		<ptr target="http://geoglam-crop-monitor.org/pages/monthlyreport.php?id=201502&amp;type=WT" />
		<title level="m">Maps and Charts</title>
				<imprint>
			<date type="published" when="2015-02">February 2015. April 19, 2015</date>
		</imprint>
	</monogr>
	<note>Crop monitor</note>
</biblStruct>

<biblStruct xml:id="b237">
	<analytic>
		<title level="a" type="main">Geospatial information system for agricultural monitoring</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Voloshin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Kussul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="124" to="132" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b238">
	<analytic>
		<title level="a" type="main">Service-oriented infrastructure for flood mapping using optical and SAR satellite data</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Digital Earth</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="829" to="845" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b239">
	<analytic>
		<title level="a" type="main">Winter wheat yield forecasting: A comparative analysis of results of regression and biophysical models</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Adamenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kryvobok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kolotii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lavrenyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automation and Information Sciences</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="68" to="81" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b240">
	<analytic>
		<title level="a" type="main">Efficiency assessment of using satellite data for crop area estimation in Ukraine</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gallego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Applied Earth Observation and Geoinformation</title>
		<imprint>
			<biblScope unit="issue">29</biblScope>
			<biblScope unit="page" from="22" to="30" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b241">
	<analytic>
		<title level="a" type="main">Efficiency assessment of different approaches to crop classification based on satellite and ground observations</title>
		<author>
			<persName><forename type="first">J</forename><surname>Gallego</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">A</forename><surname>Grypych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automation and Information Sciences</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="67" to="80" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b242">
	<analytic>
		<title level="a" type="main">Assessment of relative efficiency of using MODIS data to winter wheat yield forecasting in Ukraine</title>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kolotii</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Geoscience and Remote Sensing Symposium</title>
				<meeting><address><addrLine>IGARSS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013. 2013. 2013</date>
			<biblScope unit="page" from="3235" to="3238" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b243">
	<analytic>
		<title level="a" type="main">The Wide Area Grid Testbed for Flood Monitoring Using Earth Observation Data</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1746" to="1751" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b244">
	<analytic>
		<title level="a" type="main">Flood Hazard and Flood Risk Assessment Using a Time Series of Satellite Images: A Case Study in Namibia</title>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Risk Analysis</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1521" to="1537" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b245">
	<analytic>
		<title level="a" type="main">Winter wheat yield forecasting in Ukraine based on Earth observation, meteorological data and biophysical models</title>
		<author>
			<persName><forename type="first">F</forename><surname>Kogan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Adamenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lavrenyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Applied Earth Observation and Geoinformation</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="192" to="203" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b246">
	<monogr>
		<ptr target="https://lpdaac.usgs.gov/products/modis_products_table/mcd12q1" />
		<title level="m">MODIS Data Products Table</title>
				<imprint>
			<date type="published" when="2015-04-19">April 19, 2015</date>
		</imprint>
	</monogr>
	<note>Product MCD12Q1</note>
</biblStruct>

<biblStruct xml:id="b247">
	<monogr>
		<ptr target="http://maps.elie.ucl.ac.be/CCI/viewer/index.php" />
		<title level="m">Geoportal ESA CCI Land Cover products: a new generation of satellite-derived global land cover products</title>
				<imprint>
			<date type="published" when="2015-04-19">April 19, 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b248">
	<analytic>
		<title level="a" type="main">The use of satellite SAR imagery to crop classification in Ukraine within JECAM project</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kussul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shelestov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kussul</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Geoscience and Remote Sensing Symposium</title>
				<meeting><address><addrLine>IGARSS</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b249">
	<analytic>
		<title level="a" type="main">Object-based cloud and cloud shadow detection in Landsat imagery</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Woodcock</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.rse.2011.10.028</idno>
	</analytic>
	<monogr>
		<title level="j">Remote Sensing of Environment</title>
		<imprint>
			<biblScope unit="volume">118</biblScope>
			<biblScope unit="page" from="83" to="94" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b250">
	<analytic>
		<title level="a" type="main">Reconstruction of Missing Data in Time-Series of Optical Satellite Images Using Self-Organizing Kohonen Maps</title>
		<author>
			<persName><forename type="first">S</forename><surname>Skakun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Basarab</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automation and Information Sciences</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="19" to="26" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b251">
	<analytic>
		<title level="a" type="main">Congalton Accuracy assessment -A user&apos;s perspective</title>
		<author>
			<persName><forename type="first">M</forename><surname>Story</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Russell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Photogrammetric Engineering and Remote Sensing</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="397" to="399" />
			<date type="published" when="1986-03">March 1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b252">
	<analytic>
		<title level="a" type="main">Ekologichna cina ekonomichnogo zrostannya Ukrainy</title>
		<author>
			<persName><forename type="first">O</forename><surname>Veklych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ekonomika Ukrainy</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="51" to="60" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b253">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">M</forename><surname>Danylyshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">I</forename><surname>Dorogunczov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Mishhenko</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">V</forename><surname>Koval Ya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">S</forename><surname>Novorotov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Palamarchuk</surname></persName>
		</author>
		<title level="m">Pryrodno-resursnyj potencial stalogo rozvytku Ukrayiny</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>RVPS Ukrainy</publisher>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b254">
	<monogr>
		<ptr target="http:uk.wikipedia.org" />
		<title level="m">Electronic resource Dnipro</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b255">
	<monogr>
		<ptr target="http://www.ukrstat.gov.ua/(inUkrainian" />
		<title level="m">Electronic resource of Derzhavnyj komitet statystyky</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b256">
	<monogr>
		<title level="m">Statystychnyj byuleten «Zhytlovyj fond Ukrayiny u 2013 roci» -Kyiv: Derzhavna sluzhba statystyky</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>S.8. in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b257">
	<monogr>
		<author>
			<persName><forename type="first">Dnipro</forename><surname>Siogodni</surname></persName>
		</author>
		<ptr target="http://gazeta.dt.ua(inUkrainian" />
		<title level="m">Electronic resource Dzerkalo tyzhnia</title>
				<imprint/>
	</monogr>
	<note>tilky stogne, ale vzhe ne reve</note>
</biblStruct>

<biblStruct xml:id="b258">
	<monogr>
		<ptr target="http://lifeglobe.net/" />
		<title level="m">Electronic resource Ystoryya Dneprogesa</title>
				<imprint/>
	</monogr>
	<note>Vzryv I vosstanovlenye</note>
</biblStruct>

<biblStruct xml:id="b259">
	<monogr>
		<ptr target="http://undiwep.com.ua/(inUkrainian" />
		<title level="m">Electronic resource Kaskad Dniprovskyh vodosxovyshch: buty chy ne buty?</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b260">
	<analytic>
		<title level="a" type="main">sostoyanya plotyn Kyevskoj GES. Derzhavna ekologichna akademiya pislyadyplomnoyi osvity ta upravlinnya</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">E</forename><surname>Myxajlenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><forename type="middle">S</forename><surname>Lapshyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Vashhenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Naukovopraktychnyj zhurnal «Ekologichni nauky</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="42" to="50" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b261">
	<monogr>
		<ptr target="http://ohranatrud-ua.ru/stati-po-gz/927-gidrodinamichnoji-nebezpeki-v-ukrajini.html" />
		<title level="m">Electronic resource Ocinka zagroz gidrodynamichnoyi nebezpeky v Ukraini</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b262">
	<monogr>
		<author>
			<persName><surname>Pigoua</surname></persName>
		</author>
		<title level="m">Ekonomycheskaya teoriya blagosostoyaniya, Russia: English translation</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Progress</publisher>
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b263">
	<analytic>
		<title level="a" type="main">Coase Ronald The Problem of Social Cost</title>
	</analytic>
	<monogr>
		<title level="j">Journal of Law and Economics</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="44" />
			<date type="published" when="1960">1960</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b264">
	<monogr>
		<title level="m" type="main">Handbook of Hidrology</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">R</forename><surname>Maidment</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1992">1992</date>
			<publisher>Grow-Fill Inc</publisher>
			<pubPlace>NewYork</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b265">
	<analytic>
		<title level="a" type="main">Chapter 1. Energy, Power, and Explosions</title>
		<author>
			<persName><forename type="first">Richard</forename><forename type="middle">A</forename><surname>Muller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physics for Future Presidents</title>
		<imprint>
			<biblScope unit="page" from="2001" to="2002" />
		</imprint>
	</monogr>
	<note>a text book</note>
</biblStruct>

<biblStruct xml:id="b266">
	<analytic>
		<title level="a" type="main">Diagrammatic Exposition of a Theory of Public Expenditure</title>
		<author>
			<persName><forename type="first">Paul</forename><forename type="middle">A</forename><surname>Samuelson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Review of Economics and Statistics</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="350" to="356" />
			<date type="published" when="1955">1955</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b267">
	<analytic>
		<title level="a" type="main">Alan Warren Delivering benefits through evidence</title>
		<author>
			<persName><forename type="first">Charles</forename><surname>Andrew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paul</forename><surname>Tedd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">References</title>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b268">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>North</surname></persName>
		</author>
		<title level="m">Institutions, Institutional Change and Economic Performance</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b269">
	<monogr>
		<title level="m" type="main">The Calculus of Consent: Logical Fundations of Constitutional Democracy</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Buchanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Tullock</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1962">1962</date>
			<publisher>University of Michigan Press</publisher>
			<pubPlace>Ann Arbor</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b270">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Stiglits</surname></persName>
		</author>
		<title level="m">America, Free Markets, and the Sinking of the World Economy</title>
				<meeting><address><addrLine>Moscow, EKSMO</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b271">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Prutska</surname></persName>
		</author>
		<title level="m">Institutionalism and Problems of Economic Behavior in Transition Economy</title>
				<imprint>
			<publisher>Kyiv, Logos</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b272">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Grytsenko</surname></persName>
		</author>
		<title level="m">Features of the Institutional Structure of Ukrainian Society in the 21st Century. Ukraine&apos;s Economy: Strategy and Long-Term Development Policy</title>
				<meeting><address><addrLine>Phoenix</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Kyiv, Institute of Economics and Forecasting</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b273">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Vyshnevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vetkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Vyshnevskaya</surname></persName>
		</author>
		<title level="m">Taxation: Theories, Problems, Solutions</title>
				<meeting><address><addrLine>Donetsk; Donetsk IEP</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b274">
	<analytic>
		<title level="a" type="main">Transaction Costs: Theoretical Concepts and Empirical Analysis</title>
		<author>
			<persName><forename type="first">R</forename><surname>Pustoviyt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Economist</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="26" to="29" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b275">
	<monogr>
		<author>
			<persName><forename type="first">Ivanov</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yeskov</surname></persName>
		</author>
		<title level="m">Modern Taxation: the Motivational Aspect</title>
				<meeting><address><addrLine>Kharkiv, INJEK</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b276">
	<monogr>
		<author>
			<persName><forename type="first">O</forename><surname>Raievneva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Goliad</surname></persName>
		</author>
		<title level="m">Simulation of Anti-Crisis Management of Region</title>
				<meeting><address><addrLine>Kharkiv, INJEK</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b277">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><surname>Paientko</surname></persName>
		</author>
		<title level="m">Institutionalization of Fiscal Regulation of Financial Flows</title>
				<meeting><address><addrLine>Kyiv, DKS center</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b278">
	<analytic>
		<title level="a" type="main">Accumulating of Financial Resources by Financial Intermediaries and its Influence on Economic Development</title>
		<author>
			<persName><forename type="first">T</forename><surname>Paientko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Syrotiuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Business infom</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="237" to="243" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b279">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Vaisberg</surname></persName>
		</author>
		<title level="m">Money and Prices (An Underground Market in the Period of &quot;War Communism</title>
				<meeting><address><addrLine>Moscow,</addrLine></address></meeting>
		<imprint>
			<publisher>State plan publishing</publisher>
			<date type="published" when="1925">1925</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b280">
	<analytic>
		<title level="a" type="main">The Shadow Economy in the USSR</title>
		<author>
			<persName><forename type="first">T</forename><surname>Koriagina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Questions of economy</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="29" to="41" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b281">
	<monogr>
		<author>
			<persName><forename type="first">Von</forename><surname>Neiman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Morgershten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename></persName>
		</author>
		<title level="m">Theory of Games and Economic Behavior</title>
				<meeting><address><addrLine>Moscow, Science</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b282">
	<analytic>
		<title level="a" type="main">Behavioral Corporate Finance and the Company&apos;s Dividend Policy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lukashov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management of Corporate Finance</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="35" to="47" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b283">
	<monogr>
		<ptr target="onlinebank.gov.ua/doccatalog/document?id=52855" />
		<title level="m">Annual report NBU -2007</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b284">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Atkinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Joseph</forename><forename type="middle">E</forename><surname>Stiglitz</surname></persName>
		</author>
		<title level="m">Lecciones sobre economía pública</title>
				<imprint>
			<publisher>Ministerio de Economía y Hacienda. Instituto de Estudios Fiscales</publisher>
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b285">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Bershidsky</surname></persName>
		</author>
		<ptr target=".com/articles/2015-03-06/ukraine-s-economy-is-worse-than-it-looks" />
		<title level="m">Ukraine&apos;s Economy Is Worse Than It Looks. online bloombergview</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b286">
	<monogr>
		<author>
			<persName><forename type="first">Zvi</forename><surname>Bodie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alex</forename><surname>Kane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alan</forename><forename type="middle">J</forename><surname>Marcus</surname></persName>
		</author>
		<title level="m">Investments. 7th edition</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw Hill/Irwin</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b287">
	<analytic>
		<title level="a" type="main">Foreign capital in the banking system of Ukraine: an impact on the currency market development and banks activity</title>
		<author>
			<persName><forename type="first">O</forename><surname>Dzyublyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Vladymyr</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Visnyk Natsionalnoho banku Ukrainy</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="26" to="33" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b288">
	<monogr>
		<author>
			<persName><forename type="first">Edwin</forename><forename type="middle">J</forename><surname>Elton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><forename type="middle">J</forename><surname>Gruber</surname></persName>
		</author>
		<title level="m">Modern Portfolio Theory &amp; Investment Analysis</title>
				<imprint>
			<publisher>John Wiley&amp;Sons, Inc</publisher>
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b289">
	<analytic>
		<title level="a" type="main">Optimization of the structure of the loan portfolio of a commercial bank</title>
		<author>
			<persName><forename type="first">V</forename><surname>Grushko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ivanenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Visnyk Natsionalnoho banku Ukrainy</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="28" to="32" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b290">
	<monogr>
		<title/>
		<author>
			<persName><surname>Investfunds</surname></persName>
		</author>
		<ptr target=".onlineinvestfunds.ua/markets/indicators/usduah-nbu/" />
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note type="report_type">Information portal</note>
</biblStruct>

<biblStruct xml:id="b291">
	<analytic>
		<title level="a" type="main">On the reality of cognitive illusions</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kahneman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Tversky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Psychological Review</title>
		<imprint>
			<biblScope unit="volume">103</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="582" to="591" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b292">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">B</forename><surname>Kaminsky</surname></persName>
		</author>
		<title level="m">Modeling of financial risks</title>
				<imprint>
			<publisher>Publishing center</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>Kyiv University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b293">
	<monogr>
		<title level="m" type="main">Nominal interest rates and stationarity</title>
		<author>
			<persName><forename type="first">Mario</forename><surname>Cerrato</surname></persName>
		</author>
		<author>
			<persName><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><surname>Hyunsok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ronald</forename><surname>Macdonald</surname></persName>
		</author>
		<ptr target="onlinegla.ac.uk/media/media_150448_en" />
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
		<respStmt>
			<orgName>University of Glasgow</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Working Papers Business School -Economics</note>
</biblStruct>

<biblStruct xml:id="b294">
	<monogr>
		<ptr target="onlinebank.gov.ua/control/en/publish/article?art_id=67604&amp;cat_id=37801" />
		<title level="m">Monetary and financial statistics</title>
				<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b295">
	<analytic>
		<title level="a" type="main">Modeling of the financial markets&apos; behavior during the financial crisis with the use of the fractal market hypothesis Visnyk Natsionalnoho banku</title>
		<author>
			<persName><forename type="first">O</forename><surname>Plastun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Makarenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainy</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="38" to="45" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b296">
	<analytic>
		<title level="a" type="main">The Causes of Disproportionate Development of the World Economy</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Vdovichen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of CHTEI. Economics</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">50</biblScope>
			<biblScope unit="page" from="75" to="82" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b297">
	<analytic>
		<title level="a" type="main">The Global Information Network Economy: Prospects for Civilization</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">T</forename><surname>Kovalchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Urgent Economic Problems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="15" to="23" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b298">
	<monogr>
		<title level="m" type="main">The Rise of the Network Society</title>
		<author>
			<persName><forename type="first">M</forename><surname>Castells</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Blackwell Publishing Ltd</publisher>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b299">
	<analytic>
		<title level="a" type="main">Features of Planning and Implementation of E-Commerce System</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Vysotska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academic Journals &amp; Conferences of Lviv Polytechnic National University</title>
		<imprint>
			<biblScope unit="volume">631</biblScope>
			<biblScope unit="page" from="55" to="77" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b300">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Doernberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Hinnekens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hellerstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<title level="m">Electronic Commerce and Multijurisdictional Taxation</title>
				<imprint>
			<publisher>Kluwer Law International</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b301">
	<monogr>
		<title level="m" type="main">Analysis of Recommendation Algorithms for Ecommerce</title>
		<author>
			<persName><forename type="first">B</forename><surname>Sarwar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Dunkan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gr</forename><surname>Karypis</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>NYH Publishing</publisher>
			<biblScope unit="page" from="158" to="167" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b302">
	<analytic>
		<title level="a" type="main">Commerce and Development Report</title>
		<author>
			<persName><surname>Unctad E-</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Electronic Commerce Branch, United Nations Conference on Trade and Development</title>
				<imprint>
			<date type="published" when="2001">2001. 2004</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b303">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">L</forename><surname>Pleskach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">G</forename><surname>Zatonska</surname></persName>
		</author>
		<title level="m">E-commerce</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<publisher>Knowladge</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b304">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Bereza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kozak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Levchenko</surname></persName>
		</author>
		<title level="m">E-commerce</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<publisher>KNEU</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b305">
	<analytic>
		<title level="a" type="main">Systems of E-commerce Content</title>
		<author>
			<persName><forename type="first">A</forename><surname>Berko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vysotskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pasichnuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academic Journals &amp; Conferences</title>
		<imprint>
			<biblScope unit="volume">612</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>Lviv Polytechnic National University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b306">
	<analytic>
		<title level="a" type="main">Technology for Virtual Enterprise</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kameneva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gromov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Open Systems</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="155" to="175" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b307">
	<analytic>
		<title level="a" type="main">Chameleon Hash in the Group of Points on the Elliptic Curve</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">A</forename><surname>Pogrebnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">M</forename><surname>Lyenshyna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing Systems</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">93</biblScope>
			<biblScope unit="page" from="129" to="129" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b308">
	<analytic>
		<title level="a" type="main">The Theory of Economic Mechanisms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yzmalkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sonin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yudkevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Problems of Economics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="4" to="26" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b309">
	<analytic>
		<title level="a" type="main">The Theory of Economic Mechanisms</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">I</forename><surname>Nikolenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge Laboratory</title>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b310">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Nisan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Roughgarden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Tardos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vazirani</surname></persName>
		</author>
		<title level="m">Algorithmic Game Theory</title>
				<imprint>
			<publisher>Cambridge University Press</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b311">
	<analytic>
		<title level="a" type="main">Forming an Evolutionarily Stable Firm Strategy under Cournot Competition Using Social Preferences</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kobets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Poltoratskiy</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-13206-8_17References</idno>
	</analytic>
	<monogr>
		<title level="m">ICT in Education, Research, and Industrial Applications. Revised Extended Papers of ICTERI 2014</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Ermolayev</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Verlag</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">469</biblScope>
			<biblScope unit="page" from="343" to="361" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b312">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Batten</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">G</forename><surname>Szilagyi</surname></persName>
		</author>
		<ptr target="http://ssrn.com/abstract=2325340" />
		<title level="m">The Internationalisation of the RMB: New Starts, Jumps and Tipping Points</title>
				<imprint>
			<publisher>SWIFT Institute Working Paper</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="2012" to="2013" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b313">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Bauwens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Gillain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">V K</forename><surname>Rombouts</surname></persName>
		</author>
		<ptr target="http://www.swift.com./about_swift/shownews?param_dcr=news.data/en/swift_com/2013/PR_index.xml" />
		<title level="m">Forecasting GDP Growth Through SWIFT Information</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note type="report_type">CORE UCL Report</note>
</biblStruct>

<biblStruct xml:id="b314">
	<analytic>
		<author>
			<persName><forename type="first">M</forename><surname>Bench</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sobrun</surname></persName>
		</author>
		<ptr target="http://www.bis.org/publ/qtrpdf/r_qt1312f.htm" />
	</analytic>
	<monogr>
		<title level="m">FX Market Trends Before, Between and Beyond Triennial Surveys</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b315">
	<monogr>
		<ptr target="http://www.bis.org/publ/rpfx13.htm" />
		<title level="m">Triennial Central Bank Survey of Foreign Exchange and Derivatives Market Activity in 2013</title>
				<meeting><address><addrLine>Basel, Switzerland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013-12">December. 2013</date>
		</imprint>
	</monogr>
	<note>Monetary and Economic Department Working Paper</note>
</biblStruct>

<biblStruct xml:id="b316">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">E P</forename><surname>Box</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">M</forename><surname>Jenkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">C</forename><surname>Reinsel</surname></persName>
		</author>
		<title level="m">Time Series Analysis, Forecasting and Control</title>
				<meeting><address><addrLine>Hoboken</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b317">
	<analytic>
		<title level="a" type="main">Option Prices, Implied Price Processes and Stochastic Volatility</title>
		<author>
			<persName><forename type="first">M</forename><surname>Britten-Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Neuberger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Finance</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="839" to="866" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b318">
	<analytic>
		<title level="a" type="main">The global Foreign Exchange Market: An Interpretation of the Bank of International Settlements&apos; Survey of Foreign Exchange and Derivative Market activity</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bryan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Global Society</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="491" to="505" />
			<date type="published" when="2008-10">October. 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b319">
	<analytic>
		<title level="a" type="main">Volatility Transmission in Emerging European Foreign Exchange Markets</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bubak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kocenda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zilkes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Banking and Finance</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="2829" to="2841" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b320">
	<analytic>
		<title level="a" type="main">Systemic Risk in Global Banking: What Available Data Can Tell Us and What More Data are Needed</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cerutti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Claessens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mcgvair</surname></persName>
		</author>
		<ptr target="http://www.bis.org/publ/work376.htm" />
	</analytic>
	<monogr>
		<title level="j">BIS Working Papers</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b321">
	<analytic>
		<title level="a" type="main">FX MT300 Correlation Analysis</title>
		<author>
			<persName><forename type="first">S</forename><surname>Cook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Soramaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mapping Financial Network Analysis (FNA) Report</title>
				<imprint>
			<date type="published" when="2014-03">March (2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b322">
	<monogr>
		<ptr target="http://www.cls-group.com/MarketInsight/Pages/ReportArchive.aspx" />
		<title level="m">Historical Data from Official Website</title>
				<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>CLS bank</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b323">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Guedj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Huang</surname></persName>
		</author>
		<ptr target="http://ssrn.com/abstract=1108728" />
		<title level="m">Are ETFs Replacing Index Mutual Funds? AFA 2009 San-Francisco Meetings Paper</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b324">
	<monogr>
		<ptr target="http://currencyshares.com/products/overview.rails?symbol=FXE" />
		<title level="m">CurrencyShares Euro Trust (Symbol: FXE)</title>
				<imprint/>
	</monogr>
	<note>Historical Data from Official Website</note>
</biblStruct>

<biblStruct xml:id="b325">
	<monogr>
		<ptr target="http://currencyshares.com/products/navs.rails?symbol=FXY" />
		<title level="m">Historical Data from Official Website</title>
				<editor>
			<persName><forename type="first">Yen</forename><surname>Trust</surname></persName>
		</editor>
		<imprint/>
	</monogr>
	<note>CurrencyShares Japanese</note>
</biblStruct>

<biblStruct xml:id="b326">
	<analytic>
		<title level="a" type="main">Examining the Return-Volatility Relation for Foreign Exchange: Evidence From Euro VIX</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Daigler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Hibbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Pavlova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Futures Markets</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="74" to="92" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b327">
	<analytic>
		<title level="a" type="main">Does FOMC News Increase Global FX Trading?</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Fisher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ranaldo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Banking and Finance</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="2965" to="2973" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b328">
	<analytic>
		<title level="a" type="main">Review Essay: The Bank of International Settlements: An Assessment of its Role in International Monetary and Financial Policy Coordination</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fratianni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pattison</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Open Economies Review</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="197" to="222" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b329">
	<analytic>
		<title level="a" type="main">Electronic Indicators of Economic Activity</title>
		<author>
			<persName><forename type="first">T</forename><surname>Gill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Perera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sunner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Australian Reserve Bank Bulletin</title>
		<imprint>
			<date type="published" when="2012-06">June (2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b330">
	<analytic>
		<title level="a" type="main">The Role of Trading Volume in Volatility Forecasting</title>
		<author>
			<persName><forename type="first">V</forename><surname>Le</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Zurbruegg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Financial Markets, Institutions, and Money</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="533" to="555" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b331">
	<analytic>
		<title level="a" type="main">Empirical Studies of ETF Intraday Trading</title>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Klein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Financial Services Review</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="149" to="176" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b332">
	<analytic>
		<title level="a" type="main">The Global Transmission of Volatility in the Foreign Exchange Market</title>
		<author>
			<persName><forename type="first">M</forename><surname>Melvin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Peiers Melvin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Review of Economics and Statistics</title>
		<imprint>
			<biblScope unit="volume">85</biblScope>
			<biblScope unit="page" from="670" to="679" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b333">
	<analytic>
		<title level="a" type="main">Performance of Currency Trading Strategies in Developed and Emerging Markets: Some Striking Differences</title>
		<author>
			<persName><forename type="first">M</forename><surname>Pojarliev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Financial Markets and Portfolio Management</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="297" to="311" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b334">
	<monogr>
		<ptr target="https://www.invesco.com/portal/site/us/financial-professional/etfs/product-detail?productId=uup" />
		<title level="m">PowerShares DB US Dollar Index Bullish Fund (Symbol: UUP). Historical Data from Official Website (click on &apos;historical_navs_uup</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b335">
	<analytic>
		<title level="a" type="main">Foreign Exchange Market Prediction with Multiple Classifiers</title>
		<author>
			<persName><forename type="first">B</forename><surname>Qian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Rasheed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Forecasting</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="271" to="284" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b336">
	<analytic>
		<title level="a" type="main">The Microstructure of the Foreign-Exchange Market: A Selective Survey of the Literature</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sarno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Taylor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Princeton Studies in International economics</title>
		<imprint>
			<biblScope unit="volume">89</biblScope>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b337">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Schwartz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Byrne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Colaninno</surname></persName>
		</author>
		<author>
			<persName><surname>Volatility</surname></persName>
		</author>
		<title level="m">Risk and Uncertainty in Financial Markets</title>
				<imprint>
			<publisher>Springer Science+Business Media</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b338">
	<analytic>
		<title level="a" type="main">A Historical Analysis of Core Financial Services Infrastructure: Society for Worldwide Interbank Financial Telecommunications</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Scott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zachariadis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Working paper series</title>
		<imprint>
			<biblScope unit="page">182</biblScope>
			<date type="published" when="2010">2010</date>
			<publisher>SWIFT</publisher>
		</imprint>
		<respStmt>
			<orgName>Information Systems and Innovation Group ; School of Economics and Political Science</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b339">
	<monogr>
		<ptr target="http://www.swift.com/assets/swift_com/documents/about_swift/2013_SWIFT_" />
		<title level="m">SWIFT Creating Confidence in a Changing World</title>
				<imprint/>
	</monogr>
	<note>Annual Review</note>
</biblStruct>

<biblStruct xml:id="b340">
	<analytic>
		<title/>
	</analytic>
	<monogr>
		<title level="j">Annual_Review</title>
		<imprint>
			<biblScope unit="page">pdf</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b341">
	<monogr>
		<title level="m" type="main">SWIFT Harnessing Timely Data for Better FX Decisions</title>
		<ptr target="http://www.swift.com/assets/swift_com/documents/products_services/Harnessing_Timely_Data_For_Better_FX_Decisions.pdf" />
		<imprint>
			<date type="published" when="2015-01">January. 2015</date>
		</imprint>
	</monogr>
	<note type="report_type">Information Paper</note>
</biblStruct>

<biblStruct xml:id="b342">
	<analytic>
		<title level="a" type="main">The Evolution of Trading Activity in Asian Foreign Exchange Markets</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Tsuyuguchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">D</forename><surname>Wooldridge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Emerging Markets Review</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="231" to="246" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b343">
	<monogr>
		<ptr target="http://www.nea.org/tools" />
		<title level="m">Research Spotlight on Academic Ability Grouping (NEA Reviews</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b344">
	<analytic>
		<title level="a" type="main">Chris Malone Investigating Student Understanding of Histograms</title>
		<author>
			<persName><forename type="first">Jennifer</forename><forename type="middle">J</forename><surname>Kaplan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">G</forename><surname>Gabrosek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Phyllis</forename><surname>Curtiss</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Statistics Education</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">2</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b345">
	<monogr>
		<title level="m" type="main">Econometric Analysis</title>
		<author>
			<persName><forename type="first">William</forename><forename type="middle">H</forename><surname>Greene</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Prentice Hall</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b346">
	<monogr>
		<title level="m" type="main">Six Thinking Hats</title>
		<author>
			<persName><forename type="first">De</forename><surname>Bono</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename></persName>
		</author>
		<imprint>
			<date type="published" when="1997">1997</date>
			<publisher>Penguins Books</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b347">
	<monogr>
		<ptr target="http://www.phpreferencebook.com/" />
		<title level="m">PHP Book</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b348">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">E</forename><surname>Hansen</surname></persName>
		</author>
		<author>
			<persName><surname>Econometrics</surname></persName>
		</author>
		<ptr target="http://www.ssc.wisc.edu" />
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b349">
	<analytic>
		<title level="a" type="main">Building the Numeracy Skills of Undergraduate and Elementary School Students</title>
		<author>
			<persName><forename type="first">Pam</forename><surname>Boger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Statistics Education</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3</biblScope>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b350">
	<analytic>
		<title level="a" type="main">Conceptual model of the analysis of expenses when using process approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kolesov</surname></persName>
		</author>
		<ptr target="http://www.gdrc.org/info-design" />
	</analytic>
	<monogr>
		<title level="m">Factors Affecting Learning</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="257" to="264" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b351">
	<analytic>
		<title level="a" type="main">Evaluation of the profitability of companies financed by venture capital (CVC) listed on the French Market</title>
		<author>
			<persName><forename type="first">M</forename><surname>Khalfallah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">L</forename><surname>Moschetto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Teulon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Business Research (JABR)</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="313" to="328" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b352">
	<analytic>
		<title level="a" type="main">The Effect of Ownership Structure on the Performance of Manufacturing Companies</title>
		<author>
			<persName><forename type="first">M</forename><surname>Strnadova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Karas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Financial Systems</title>
		<imprint>
			<biblScope unit="page" from="588" to="595" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b353">
	<monogr>
		<title level="m" type="main">On Accounting and Financial Reporting in Ukraine</title>
		<ptr target="http://zakon2.rada.gov.ua/laws/show/996-14" />
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="volume">996</biblScope>
			<biblScope unit="page">7</biblScope>
		</imprint>
	</monogr>
	<note>Law of Ukraine</note>
</biblStruct>

<biblStruct xml:id="b354">
	<analytic>
		<title level="a" type="main">Accounting and analytical system of multisegment enterprise: theoretical basis and practical implementation</title>
		<author>
			<persName><forename type="first">V</forename><surname>Yatsenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Accounting and Auditing</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="25" to="37" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b355">
	<analytic>
		<title level="a" type="main">Stock Prices, Asset Portfolios and Macroeconomic Variables in Ten European Countries</title>
		<author>
			<persName><forename type="first">M</forename><surname>Asprem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Banking and Finance</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="589" to="612" />
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b356">
	<analytic>
		<title level="a" type="main">Investor Sentiment in the Stock Market</title>
		<author>
			<persName><forename type="first">M</forename><surname>Baker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wurgler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Economic Perspectives</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="129" to="151" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b357">
	<analytic>
		<title level="a" type="main">Economic Forces and the Stock Market</title>
		<author>
			<persName><forename type="first">F</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Roll</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ross</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Business</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<biblScope unit="page" from="383" to="403" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b358">
	<monogr>
		<title level="m" type="main">Forecasting Stock Market Volatility with Macroeconomic Variables in Real Time</title>
		<author>
			<persName><forename type="first">J</forename><surname>Dopke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Hartmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Pierdzioch</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Deutsche Bundesbank</publisher>
		</imprint>
	</monogr>
	<note type="report_type">Discussion Paper</note>
</biblStruct>

<biblStruct xml:id="b359">
	<analytic>
		<title level="a" type="main">Macroeconomic Determinants of European Stock Market Volatility</title>
		<author>
			<persName><forename type="first">V</forename><surname>Errunza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Hogan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Financial Management</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="361" to="377" />
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b360">
	<analytic>
		<title level="a" type="main">Macroeconomic Determinants of Stock Market Development</title>
		<author>
			<persName><forename type="first">V</forename><surname>Garcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Economics</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="29" to="59" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b361">
	<analytic>
		<title level="a" type="main">The Supply of Money and Common Stock Prices</title>
		<author>
			<persName><forename type="first">K</forename><surname>Homa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Jaffee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Journal of Finance</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="page" from="1045" to="1066" />
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b362">
	<analytic>
		<title level="a" type="main">Stock Markets&apos; Integration Analysis</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">I</forename><surname>Thalassinos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">E</forename><surname>Thalassinos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">European Research Studies</title>
		<imprint>
			<biblScope unit="volume">IX</biblScope>
			<biblScope unit="page" from="3" to="4" />
			<date type="published" when="2006">2006. 2013</date>
		</imprint>
	</monogr>
	<note>References 1. Amazon Virtual Private Cloud. User Guide, API Version 2013-07-15</note>
</biblStruct>

<biblStruct xml:id="b363">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">V</forename><surname>Bard</surname></persName>
		</author>
		<title level="m">Sage for Undergraduates</title>
				<imprint>
			<publisher>AMS</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b364">
	<monogr>
		<title level="m" type="main">Models of Organizational Systems of Open Education</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bykov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Atika</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b365">
	<analytic>
		<title level="a" type="main">Cloud Computing Technologies, ICT Outsourcing, and New Functions of ICT Departments of Educational and Research Institutions</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bykov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Technologies in Education</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="8" to="23" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b366">
	<analytic>
		<title level="a" type="main">The Methodological basis for creating and implementation of the electronic learning tools</title>
		<author>
			<persName><forename type="first">V</forename><surname>Bykov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Lapinskii</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer in school and in family</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">98</biblScope>
			<biblScope unit="page" from="3" to="6" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b367">
	<analytic>
		<title level="a" type="main">Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility</title>
		<author>
			<persName><forename type="first">R</forename><surname>Buyyaa</surname></persName>
		</author>
		<author>
			<persName><surname>Chee Shin Yeoa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Venugopala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Broberga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Brandicc</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future Generation Computer Systems</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="599" to="616" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b368">
	<analytic>
		<title level="a" type="main">Cloud computing and SaaS as new computing platforms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Cusumano</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="27" to="29" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b369">
	<analytic>
		<title level="a" type="main">Private cloud for collaboration and e-Learning services: from IaaS to SaaS</title>
		<author>
			<persName><forename type="first">F</forename><surname>Doelitzscher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sulistio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ch</forename><surname>Reich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kuijs</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wolf</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computing</title>
		<imprint>
			<biblScope unit="volume">91</biblScope>
			<biblScope unit="page" from="23" to="42" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b370">
	<monogr>
		<ptr target="http://bit.ly/2014FutureCloud" />
		<title level="m">The North Bridge Future Of Cloud Computing Survey In Partnership With Gigaom Research</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>The Future of Cloud Computing: 4th Annual Survey 2014</note>
</biblStruct>

<biblStruct xml:id="b371">
	<analytic>
		<title level="a" type="main">Understanding service-oriented software, Software</title>
		<author>
			<persName><forename type="first">N</forename><surname>Gold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mohan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Knight</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Munro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="71" to="77" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b372">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>James</surname></persName>
		</author>
		<ptr target="http://i-programmer.info/news/202-number-crunching/6805-free-sage-math-cloud-python-and-symbolic-math-.html" />
		<title level="m">Free Sage Math Cloud -Python and Symbolic Math. the I Programmer</title>
				<imprint>
			<date type="published" when="2014">Friday. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b373">
	<analytic>
		<title level="a" type="main">and others: Using the Cloud to Facilitate Global Software Development Challenges</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">I</forename><surname>Hashmi1</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Clerc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Razavian</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Sixth IEEE International Conference on Global Software Engineering Workshops</title>
				<imprint>
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b374">
	<analytic>
		<title level="a" type="main">Cloud Computing Benefits for Educational Institutions</title>
		<author>
			<persName><forename type="first">R</forename><surname>Lakshminarayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Raju</surname></persName>
		</author>
		<ptr target="http://arxiv.org/ftp/arxiv/papers/1305/1305.2616.pdf" />
	</analytic>
	<monogr>
		<title level="m">Second International Conference of the Omani Society for Educational Technology</title>
				<meeting><address><addrLine>Muscat, Oman</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>Cornell University Library</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b375">
	<analytic>
		<title level="a" type="main">An approach to engineer communities of web services: Concepts, architecture, operation, and deployment</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Maamar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of E-Business Research (IJEBR)</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1" to="21" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b376">
	<analytic>
		<title level="a" type="main">Access and Accessibility in E-Learning</title>
		<author>
			<persName><forename type="first">C</forename><surname>Matheson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Matheson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Applied E-Learning and E-Teaching in Higher Education</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Donnelly</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Mcsweeney</surname></persName>
		</editor>
		<meeting><address><addrLine>Hershey New York</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="130" to="151" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b377">
	<analytic>
		<title level="a" type="main">Effectively and Securely Using the Cloud Computing Paradigm</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Grance</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">NIST, Information Technology Laboratory</title>
		<imprint>
			<biblScope unit="page" from="10" to="17" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b378">
	<analytic>
		<title level="a" type="main">Applications integration in a hybrid cloud computing environment: modelling and platform</title>
		<author>
			<persName><forename type="first">Qing</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Ze-Yuan</surname></persName>
		</author>
		<author>
			<persName><surname>Wei-Hua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jun</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Cheng</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rui-Yang</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><surname>Du</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Enterprise Information Systems</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="237" to="271" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b379">
	<analytic>
		<title level="a" type="main">Cloud computing: adoption considerations for business and education</title>
		<author>
			<persName><forename type="first">A</forename><surname>Smith</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bhogal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mak</forename><surname>Sharma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Future Internet of Things and Cloud (FiCloud)</title>
				<imprint>
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b380">
	<analytic>
		<title level="a" type="main">Innovative Technologies for Development of Learning Research Space of Educational Institution</title>
		<author>
			<persName><forename type="first">M</forename><surname>Shyshkina</surname></persName>
		</author>
		<ptr target="http://ifets.ieee.org/russian/depository/v16_i1/pdf/15.pdf" />
	</analytic>
	<monogr>
		<title level="j">Information Technologies and Society</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b381">
	<monogr>
		<title level="m" type="main">Emerging Technologies for Training of ICT-Skilled Educational Personnel</title>
		<author>
			<persName><forename type="first">M</forename><surname>Shyshkina</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Springer-Verlag</publisher>
			<biblScope unit="volume">412</biblScope>
			<biblScope unit="page" from="274" to="284" />
			<pubPlace>Berlin-Heidelberg</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Communications in Computer and Information Science</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b382">
	<analytic>
		<title level="a" type="main">Formation of professional competence of computer science bachelors in the cloud based environment of the pedagogical university. Problems of modern teacher preparation</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">U P</forename><surname>Shyshkina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">A</forename><surname>Kohut</surname></persName>
		</author>
		<author>
			<persName><surname>Bezverbnyy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Uman, FOT Zhovtyy O.O</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="136" to="146" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b383">
	<analytic>
		<title level="a" type="main">Cloud Computing for Education: A New Dawn?</title>
		<author>
			<persName><forename type="first">N</forename><surname>Sultan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. of Information Management</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="109" to="116" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b384">
	<analytic>
		<title level="a" type="main">Effective use of cloud computing in educational institutions</title>
		<author>
			<persName><forename type="first">E</forename><surname>Tuncay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Procedia -Social and Behavioral Sciences</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="938" to="942" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b385">
	<analytic>
		<title level="a" type="main">Turning software into a service</title>
		<author>
			<persName><forename type="first">M</forename><surname>Turner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Budgen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Brereton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="38" to="44" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b386">
	<analytic>
		<title level="a" type="main">EduCloud: PaaS versus IaaS cloud usage for a n advanced computer science course</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Vaquero</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Education</title>
		<imprint>
			<biblScope unit="volume">54</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="590" to="598" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b387">
	<analytic>
		<title level="a" type="main">Using VCL technology to implement distributed reconfigurable data centers and computational services for educational institutions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Vouk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rindos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">F</forename><surname>Averitt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bass</surname></persName>
		</author>
		<author>
			<persName><surname>Others</surname></persName>
		</author>
		<idno>NCSU/V19-Draft Feb-2009 1-27</idno>
	</analytic>
	<monogr>
		<title level="m">VCL/Reconfigurable</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note type="report_type">Data Centers &amp; Clouds/</note>
</biblStruct>

<biblStruct xml:id="b388">
	<analytic>
		<title level="a" type="main">Free and open-source software applications for mathematics and education</title>
		<author>
			<persName><forename type="first">D</forename><surname>Wick</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the twenty-first annual international conference on technology in collegiate mathematics</title>
				<meeting>the twenty-first annual international conference on technology in collegiate mathematics</meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="300" to="304" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b389">
	<analytic>
		<title level="a" type="main">A Framework of User-Driven Data Analytics in the Cloud for Course Management</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 18th International Conference on Computers in Education</title>
				<editor>
			<persName><forename type="first">S</forename><forename type="middle">L</forename><surname>Wong</surname></persName>
		</editor>
		<meeting>the 18th International Conference on Computers in Education<address><addrLine>Putrajaya, Malaysia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="698" to="702" />
		</imprint>
	</monogr>
	<note>Asia-Pacific Society for Computers in Education</note>
</biblStruct>

<biblStruct xml:id="b390">
	<analytic>
		<title level="a" type="main">Prospects of the development of the modern educational institutions&apos; learning and research environment: to the 15th anniversary of the Institute of information technologies and learning tools of NAPS of Ukraine</title>
		<author>
			<persName><forename type="first">Yu</forename><surname>Zaporozhchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shyshkina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kravtsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Informational Technologies in Education</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="62" to="70" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b391">
	<analytic>
		<title level="a" type="main">Design and Implementation of a Quality Management System for Electronic Training Information Resources</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Kravtsov</surname></persName>
		</author>
		<idno>P. 88 -98</idno>
		<ptr target="CEUR-WS.org/Vol-716/ICTERI-" />
	</analytic>
	<monogr>
		<title level="m">Proc. 7-th Int. Conf. ICTERI 2011</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Ermolayev</surname></persName>
		</editor>
		<meeting>7-th Int. Conf. ICTERI 2011<address><addrLine>Kherson, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">May 4-7, 2011</date>
			<biblScope unit="volume">716</biblScope>
			<biblScope unit="page" from="88" to="98" />
		</imprint>
	</monogr>
	<note type="report_type">2011-CEUR-WS-paper</note>
</biblStruct>

<biblStruct xml:id="b392">
	<monogr>
		<title level="m" type="main">Structure of the Management System of Quality of Electronic Learning Resources / Information Technologies in Education</title>
		<author>
			<persName><forename type="first">H</forename><surname>Kravtsov</surname></persName>
		</author>
		<idno>-Kherson. -2011.-P. 94-101</idno>
		<imprint/>
	</monogr>
	<note>10th Issue</note>
</biblStruct>

<biblStruct xml:id="b393">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Peris-Ortiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Álvarez-García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rueda-Armengot</surname></persName>
		</author>
		<ptr target="http://www.springer.com/gp/book/9783319172507" />
		<title level="m">Achieving Competitive Advantage through Quality Management</title>
				<meeting><address><addrLine>Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b394">
	<monogr>
		<ptr target="http://www.iso.org/iso/home/standards/manage-ment-standards/iso_9000.htm,Learningservicesfornon-formaleducationandtraining" />
		<title level="m">ISO 9000 -Quality Management</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b395">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Bykov</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<title level="m">Models of the Open Education Organizational Systems: Monograph</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>Atika</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page">684</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b396">
	<analytic>
		<title level="a" type="main">Knowledge Control Model of Distance Learning System on IMS Standard / Innovative Techniques in Instruction Technology</title>
		<author>
			<persName><forename type="first">H</forename><surname>Kravtsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kravtsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">E-learning, E-assessment, and Education</title>
				<imprint>
			<publisher>Springer Science + Business Media V.B</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="195" to="198" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b397">
	<monogr>
		<title level="m" type="main">Evaluation Metrics of Electronic Learning Resources Quality / Information Technologies in Education</title>
		<author>
			<persName><forename type="first">H</forename><surname>Kravtsov</surname></persName>
		</author>
		<idno>. -2009</idno>
		<editor>Kherson</editor>
		<imprint>
			<biblScope unit="page" from="141" to="147" />
		</imprint>
	</monogr>
	<note>3d Issue</note>
</biblStruct>

<biblStruct xml:id="b398">
	<monogr>
		<title level="m" type="main">Modern Control Principles and Applications</title>
		<author>
			<persName><forename type="first">Jay</forename><forename type="middle">C</forename><surname>Hsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Andrew</forename><forename type="middle">U</forename><surname>Meyer</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1968">1968</date>
			<publisher>McGraw-Hill</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b399">
	<analytic>
		<title level="a" type="main">Expert Opinions in Forecasting: The Role of the Delphi Technique</title>
		<author>
			<persName><forename type="first">G</forename><surname>Rowe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Wright</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Principles of Forecasting -A Handbook for Researchers and Practitioners</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Armstrong</surname></persName>
		</editor>
		<meeting><address><addrLine>Boston, MA</addrLine></address></meeting>
		<imprint>
			<publisher>Kluwer Academic Publishers</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="125" to="144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b400">
	<monogr>
		<ptr target="https://en.wikipedia.org/wiki/Monitor-ing_and_Evaluation" />
		<title level="m">Wikipedia -The Free Encyclopedia</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b401">
	<monogr>
		<author>
			<persName><forename type="first">Michael</forename><forename type="middle">J</forename><surname>Kolen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Robert</forename><forename type="middle">L</forename><surname>Brennan</surname></persName>
		</author>
		<title level="m">Test Equating, Scaling, and Linking. Methods and Practices</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b402">
	<monogr>
		<title level="m" type="main">Rank Correlation Methods</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kendall</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1948">1948</date>
			<publisher>Charles Griffen &amp; Company</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b403">
	<monogr>
		<title level="m" type="main">An introduction to cybernetics</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">R</forename><surname>Ashby</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1956">1956</date>
			<publisher>Chapman &amp; Hall</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b404">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Clifford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">B</forename><surname>Preston</surname></persName>
		</author>
		<title level="m">The Algebraic Theory of Semigroups</title>
				<imprint>
			<publisher>AMS</publisher>
			<date type="published" when="1961">1961</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b405">
	<analytic>
		<title level="a" type="main">Partial actions and automata</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dokuchaev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Novikiov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Zholtkevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Alg. and Discr. Math</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="51" to="63" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b406">
	<analytic>
		<title level="a" type="main">Some problems in the synthesis of digital automata</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Glushkov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">USSR Computational Mathematics and Mathematical Physics</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="399" to="446" />
			<date type="published" when="1962">1962</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b407">
	<monogr>
		<title level="m" type="main">Ordered Sets</title>
		<author>
			<persName><forename type="first">E</forename><surname>Harzheim</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Springer Science+Business Media Inc</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b408">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Trakhtenbrot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Barzdin</surname></persName>
		</author>
		<title level="m">Finite automata: behaviour and synthesis</title>
				<meeting><address><addrLine>US</addrLine></address></meeting>
		<imprint>
			<publisher>North-Holland Publishing Company</publisher>
			<date type="published" when="1973">1973</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b409">
	<analytic>
		<title level="a" type="main">Pre-automata and Complex Event Processing</title>
		<author>
			<persName><forename type="first">G</forename><surname>Zholtkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Novikov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dorozhinsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICT in Education, Research, and Industrial Applications</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Ermolayev</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">469</biblScope>
			<biblScope unit="page" from="100" to="116" />
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b410">
	<monogr>
		<ptr target="http://www-i2.informatik.rwth-aachen.de/i2/fileadmin/user_upload/documents/MC08/mc_lec3.pdf" />
		<title level="m">The Interleaving Paradigm</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b411">
	<monogr>
		<ptr target="http://en.wikipedia.org/wiki/Model_checking" />
		<title level="m">Symbolic Modeling</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b412">
	<analytic>
		<title level="a" type="main">Partial Order Reductions for Model Checking Temporal-epistemic Logics over Interleaved Multi-agent Systems</title>
		<author>
			<persName><forename type="first">Alessio</forename><surname>Lomuscio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wojciech</forename><surname>Penczek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hongyang</forename><surname>Qu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundam. Inf</title>
		<imprint>
			<biblScope unit="volume">101</biblScope>
			<biblScope unit="page" from="1" to="2" />
			<date type="published" when="2010-01">2010. January 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b413">
	<analytic>
		<title level="a" type="main">Better Verification through Symmetry</title>
		<author>
			<persName><forename type="first">C</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Norris</forename><surname>Ip</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Form. Methods Syst. Des</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="1" to="2" />
			<date type="published" when="1996-08">1996. August 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b414">
	<analytic>
		<title level="a" type="main">Model Checking and Abstraction</title>
		<author>
			<persName><forename type="first">Edmund</forename><forename type="middle">M</forename><surname>Clarke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Orna</forename><surname>Grumberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">E</forename><surname>Long</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Program. Lang. Syst</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page">5</biblScope>
			<date type="published" when="1994-09">September 1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b415">
	<analytic>
		<title level="a" type="main">Approximation Refinement for Interpolation-Based Model Checking</title>
		<author>
			<persName><forename type="first">D'</forename><surname>Vijay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mitra</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Purandare</surname></persName>
		</author>
		<author>
			<persName><surname>Kroening</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 9th international conference on Verification, model checking, and abstract interpretation (VMCAI&apos;08</title>
				<editor>
			<persName><forename type="first">Francesco</forename><surname>Logozzo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Doron</forename><forename type="middle">A</forename><surname>Peled</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Lenore</forename><forename type="middle">D</forename><surname>Zuck</surname></persName>
		</editor>
		<meeting>the 9th international conference on Verification, model checking, and abstract interpretation (VMCAI&apos;08<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="68" to="82" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b416">
	<monogr>
		<ptr target="http://en.wikipedia.org/wiki/Data-flow_analysis" />
		<title level="m">Data-Flow Analysis</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b417">
	<analytic>
		<title level="a" type="main">Trace Theoretic Verification of Asynchronous Circuits Using Unfoldings</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">L</forename><surname>Mcmillan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 7th Workshop on Computer Aided Verification</title>
		<title level="s">LNCS</title>
		<meeting>the 7th Workshop on Computer Aided Verification<address><addrLine>Liege</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1995">1995</date>
			<biblScope unit="volume">939</biblScope>
			<biblScope unit="page" from="180" to="195" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b418">
	<analytic>
		<title level="a" type="main">Hierarchical Ordering of Sequential Processes</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">W</forename><surname>Dijkstra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Acta Informatica</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="115" to="138" />
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b419">
	<analytic>
		<title level="a" type="main">Properties of Predicate Transformer of VRS System</title>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Godlevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname><genName>Jr</genName></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Potienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Peschanenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and System Analyses</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="13" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b420">
	<analytic>
		<title level="a" type="main">Symbolic Model Checking of Infinite-State Systems Using Narrowing</title>
		<author>
			<persName><forename type="first">J</forename><surname>Escobar</surname></persName>
		</author>
		<author>
			<persName><surname>Meseguer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 18th International Conference on Term Rewriting and Applications</title>
				<meeting>the 18th International Conference on Term Rewriting and Applications</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="volume">4533</biblScope>
			<biblScope unit="page" from="153" to="168" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b421">
	<analytic>
		<title level="a" type="main">Unfolding Concurrent Well-Structured Transition Systems</title>
		<author>
			<persName><forename type="first">Frédéric</forename><surname>Herbreteau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Grrégoire</forename><surname>Sutre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">The</forename><surname>Quang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tran</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems (TACAS&apos;07</title>
				<editor>
			<persName><forename type="first">Orna</forename><surname>Grumberg</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Michael</forename><surname>Huth</surname></persName>
		</editor>
		<meeting>the 13th international conference on Tools and algorithms for the construction and analysis of systems (TACAS&apos;07<address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2007">2007. 2007</date>
			<biblScope unit="page" from="706" to="720" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b422">
	<analytic>
		<title level="a" type="main">About One Efficient Algorithm for Reachability Checking in Modeling and Its Implementation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Letychevskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Peschanenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<imprint>
			<biblScope unit="volume">149</biblScope>
			<biblScope unit="page" from="149" to="165" />
			<date type="published" when="2012">2012. 2012</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
	<note>ICTERI</note>
</biblStruct>

<biblStruct xml:id="b423">
	<analytic>
		<title level="a" type="main">Insertion Modeling System</title>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Letychevskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Peschanenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PSI 2011</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">7162</biblScope>
			<biblScope unit="page" from="262" to="274" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b424">
	<analytic>
		<title level="a" type="main">Better Verification through Symmetry</title>
		<author>
			<persName><forename type="first">C</forename></persName>
		</author>
		<author>
			<persName><forename type="first">Norris</forename><surname>Ip</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Form. Methods Syst. Des</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="1" to="2" />
			<date type="published" when="1996-08">1996. August 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b425">
	<analytic>
		<title level="a" type="main">Specializations in Symbolic Verification</title>
		<author>
			<persName><forename type="first">V</forename><surname>Peschanenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Guba</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Shushpanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<imprint>
			<biblScope unit="volume">412</biblScope>
			<biblScope unit="page" from="332" to="354" />
			<date type="published" when="2013">2013</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b426">
	<monogr>
		<ptr target="http://apsystems.org.uaReferences" />
		<title level="m">APS and IMS systems</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b427">
	<analytic>
		<title level="a" type="main">Model-checking for real-time systems</title>
		<author>
			<persName><forename type="first">Rajeev</forename><surname>Alur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Costas</forename><surname>Courcoubetis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">LICS</title>
				<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="1990">1990</date>
			<biblScope unit="page" from="414" to="425" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b428">
	<analytic>
		<title level="a" type="main">A theory of timed automata</title>
		<author>
			<persName><forename type="first">Rajeev</forename><surname>Alur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">L</forename><surname>Dill</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">126</biblScope>
			<biblScope unit="page" from="183" to="235" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b429">
	<analytic>
		<title level="a" type="main">Separation logic for small-step cminor</title>
		<author>
			<persName><forename type="first">Andrew</forename><forename type="middle">W</forename><surname>Appel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sandrine</forename><surname>Blazy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theorem Proving in Higher Order Logics, 20th int. conf. TPHOLS</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="5" to="21" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b430">
	<monogr>
		<title level="m" type="main">Principles of Model Checking</title>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Baier</surname></persName>
		</author>
		<author>
			<persName><surname>Katoen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>MIT Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b431">
	<monogr>
		<author>
			<persName><forename type="first">Nadezhda</forename><surname>Baklanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wilmer</forename><surname>Ricciotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jan-Georg</forename><surname>Smaus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><surname>Strecker</surname></persName>
		</author>
		<ptr target="https://bitbucket.org/Martin_Strecker/abstracting_op_sem_to_automata" />
		<title level="m">Abstracting an operational semantics to finite automata (formalization</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b432">
	<analytic>
		<title level="a" type="main">Abstraction and verification of properties of a Real-Time Java</title>
		<author>
			<persName><forename type="first">Nadezhda</forename><surname>Baklanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><surname>Strecker</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICTERI</title>
		<title level="s">Communications in Computer and Information Science</title>
		<meeting>ICTERI</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">347</biblScope>
			<biblScope unit="page" from="1" to="18" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b433">
	<analytic>
		<title level="a" type="main">Timed automata: Semantics, algorithms and tools</title>
		<author>
			<persName><forename type="first">Johan</forename><surname>Bengtsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wang</forename><surname>Yi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Lectures on Concurrency and Petri Nets</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="87" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b434">
	<analytic>
		<title level="a" type="main">Functional pearl: The zipper</title>
		<author>
			<persName><forename type="first">Gérard</forename><surname>Huet</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Functional Programming</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="549" to="554" />
			<date type="published" when="1997-09">September 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b435">
	<monogr>
		<title level="m" type="main">Automata Theory and Its Applications</title>
		<author>
			<persName><forename type="first">Bakhadyr</forename><surname>Khoussainov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Anil</forename><surname>Nerode</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<pubPlace>Birkhauser Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b436">
	<analytic>
		<title level="a" type="main">A machine-checked model for a Java-like language, virtual machine, and compiler</title>
		<author>
			<persName><forename type="first">Gerwin</forename><surname>Klein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tobias</forename><surname>Nipkow</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Program. Lang. Syst</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="619" to="695" />
			<date type="published" when="2006-07">July 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b437">
	<analytic>
		<title level="a" type="main">Separation logic for non-local control flow and block scope variables</title>
		<author>
			<persName><forename type="first">Robbert</forename><surname>Krebbers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Freek</forename><surname>Wiedijk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Foundations of Software Science and Computation Structures</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Frank</forename><surname>Pfenning</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">7794</biblScope>
			<biblScope unit="page" from="257" to="272" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b438">
	<analytic>
		<title level="a" type="main">A formally verified compiler back-end</title>
		<author>
			<persName><forename type="first">Xavier</forename><surname>Leroy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automated Reasoning</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">43</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b439">
	<analytic>
		<title level="a" type="main">Isabelle/HOL. A Proof Assistant for Higher-Order Logic</title>
		<author>
			<persName><forename type="first">Tobias</forename><surname>Nipkow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lawrence</forename><surname>Paulson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Markus</forename><surname>Wenzel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">2283</biblScope>
			<date type="published" when="2002">2002</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b440">
	<monogr>
		<title level="m" type="main">The Formal Semantics of Programming Languages: An Introduction</title>
		<author>
			<persName><forename type="first">Glynn</forename><surname>Winskel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1993">1993</date>
			<publisher>MIT Press</publisher>
			<pubPlace>Cambridge, MA, USA</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b441">
	<analytic>
		<title level="a" type="main">Assigning Meanings to Programs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Floyd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Symposium on Applied Mathematics</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Schwartz</surname></persName>
		</editor>
		<meeting>Symposium on Applied Mathematics<address><addrLine>Providence, R.I.</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1967">1967</date>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="19" to="32" />
		</imprint>
	</monogr>
	<note>American Mathematical Society</note>
</biblStruct>

<biblStruct xml:id="b442">
	<analytic>
		<title level="a" type="main">An Axiomatic Basis for Computer Programming</title>
		<author>
			<persName><forename type="first">C</forename><surname>Hoare</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="576" to="580" />
			<date type="published" when="1969">1969</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b443">
	<analytic>
		<title level="a" type="main">About One Approach to Program Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b444">
	<analytic>
		<title level="a" type="main">Iterative Methods of Program Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Godlevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kapitonova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krivoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="9" to="19" />
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b445">
	<analytic>
		<title level="a" type="main">Discovery of Invariant Equalities in Programs over Data Fields</title>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applicable Algebra in Engineering, Communication and Computing</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="21" to="29" />
			<date type="published" when="1993">1993</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b446">
	<analytic>
		<title level="a" type="main">Precise Interprocedural Analysis Through Linear Algebra</title>
		<author>
			<persName><forename type="first">M</forename><surname>Müller-Olm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Seidl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of Symposium on Principles of Programming Languages</title>
				<meeting>of Symposium on Principles of Programming Languages<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="330" to="341" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b447">
	<monogr>
		<title level="m" type="main">About One Algorithm of Program Polynomial Invariants Generation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
	<note type="report_type">RISC Report Series</note>
	<note>electronic</note>
</biblStruct>

<biblStruct xml:id="b448">
	<analytic>
		<title level="a" type="main">Computing Polynomial Program Invariants</title>
		<author>
			<persName><forename type="first">M</forename><surname>Müller-Olm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Seidl</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Process. Lett</title>
		<imprint>
			<biblScope unit="volume">91</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="233" to="244" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b449">
	<analytic>
		<title level="a" type="main">Non-linear Loop Invariant Generation Using Gröbner Bases</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sankaranarayanan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sipma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Manna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of Symposium on Principles of Programming Languages</title>
				<meeting>of Symposium on Principles of Programming Languages<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="318" to="329" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b450">
	<analytic>
		<title level="a" type="main">Finding Invariant Assertions for Proving Programs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Caplain</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the intern. Conf. on Reliable Software</title>
				<meeting>of the intern. Conf. on Reliable Software<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="1975">1975</date>
			<biblScope unit="page" from="165" to="171" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b451">
	<analytic>
		<title level="a" type="main">Automatic Generation of Polynomial Loop Invariants: Algebraic Foundations</title>
		<author>
			<persName><forename type="first">E</forename><surname>Rodríguez-Carbonell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kapur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Of International Symposium on Symbolic and Algebraic Computation</title>
				<meeting>Of International Symposium on Symbolic and Algebraic Computation<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="266" to="273" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b452">
	<analytic>
		<title level="a" type="main">Automatic Generation of Polynomial Invariants of Bounded Degree Using Abstract Interpretation</title>
		<author>
			<persName><forename type="first">E</forename><surname>Rodríguez-Carbonell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kapur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sci. Comput. Program</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="54" to="75" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b453">
	<analytic>
		<title level="a" type="main">A Method of Proving the Invariance of Linear Inequalities for Linear Loops</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="80" to="85" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b454">
	<analytic>
		<title level="a" type="main">An Algorithm for Automated Generation of Invariants for Loops with Conditionals</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">I</forename><surname>Kovács</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Jebelean</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of Intern. Symposium on Symbolic and Numeric Algorithms for Scientific Computing</title>
				<meeting>of Intern. Symposium on Symbolic and Numeric Algorithms for Scientific Computing<address><addrLine>Timisoara</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="245" to="249" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b455">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Kurosh</surname></persName>
		</author>
		<title level="m">Theory of Groups. 3-rd ed</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Science</publisher>
			<date type="published" when="1967">1967</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b456">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Postnikov</surname></persName>
		</author>
		<title level="m">Galois Theory</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Fizmatgiz</publisher>
			<date type="published" when="1963">1963</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b457">
	<analytic>
		<title level="a" type="main">Gröbner Bases. An Algorithmic Method in the Theory of Polynomial Ideals</title>
		<author>
			<persName><forename type="first">B</forename><surname>Buchberger</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer algebra. Symbolic and algebraic computations</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Mir</publisher>
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b458">
	<monogr>
		<author>
			<persName><surname>Van Der Waerden</surname></persName>
		</author>
		<title level="m">Algebra, B. the 2-th edition</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>GRFML</publisher>
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b459">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Dieudonné</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dj</forename><surname>Carroll</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mumford</surname></persName>
		</author>
		<title level="m">Geometric Invariant Theory</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Mir</publisher>
			<date type="published" when="1974">1974</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b460">
	<analytic>
		<title level="a" type="main">Analysis of Linear Defined Iterative Loops</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>In print</note>
</biblStruct>

<biblStruct xml:id="b461">
	<analytic>
		<title level="a" type="main">Polynomial Invariants for Linear Loops</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="159" to="168" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b462">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Hodge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pido</surname></persName>
		</author>
		<title level="m">Methods of Algebraic Geometry</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1954">1954</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b463">
	<analytic>
		<title level="a" type="main">Nonlinear Invariants for Linear Loops and Eigenpolynomials of Linear Operators</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kreknin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="126" to="139" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b464">
	<analytic>
		<title level="a" type="main">Eigenpolynomials of Linear Operators and Polynomial Invariants of Linear Loops of Program</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kreknin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific Journal NEA Dragomanov</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="150" to="169" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b465">
	<monogr>
		<title level="m" type="main">On the Structure of Polynomial Invariants of Linear Loops</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
		<imprint/>
	</monogr>
	<note>In print</note>
</biblStruct>

<biblStruct xml:id="b466">
	<analytic>
		<title level="a" type="main">Automatic Discovery of Linear Restraints among Variables of a Program</title>
		<author>
			<persName><forename type="first">P</forename><surname>Cousot</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Halbwachs</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conference Record of the Fifth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="1978">1978</date>
			<biblScope unit="page" from="84" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b467">
	<analytic>
		<title level="a" type="main">Search of Invariant Linear Dependencies in Programs</title>
		<author>
			<persName><forename type="first">S</forename><surname>Krivoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Raksha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="23" to="28" />
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b468">
	<analytic>
		<title level="a" type="main">Iterative Methods of Programs Analysis</title>
		<author>
			<persName><forename type="first">A</forename><surname>Godlewski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kapitonova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Krivoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Letichevsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Equalities and Inequalities</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="1" to="10" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
	<note>Cybernetics</note>
</biblStruct>

<biblStruct xml:id="b469">
	<analytic>
		<title level="a" type="main">Invariant Inequalities in Programs Interpreted over an Ordered Field</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="22" to="27" />
			<date type="published" when="1986">1986</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b470">
	<analytic>
		<title level="a" type="main">About Invariant Inequalities for States of the Program Schemes, that Interpreted Over the Vector Space</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="111" to="112" />
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b471">
	<analytic>
		<title level="a" type="main">A Method of Proving the Invariance of Linear Inequalities for Linear Loops</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lvov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="80" to="85" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b472">
	<analytic>
		<title level="a" type="main">Nominal event structures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alexandru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Romanian Journal of Information, Science and Technology</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="79" to="90" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b473">
	<analytic>
		<title level="a" type="main">Nominal groups and their homomorphism theorems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alexandru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">131</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="279" to="298" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b474">
	<analytic>
		<title level="a" type="main">On the development of the Fraenkel-Mostowski set theory</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alexandru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin Inst. Politehnic Iasi. LX</title>
		<imprint>
			<biblScope unit="page" from="77" to="91" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b475">
	<analytic>
		<title level="a" type="main">A nominal approach for fusion calculus</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alexandru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Romanian Journal of Information Science and Technology</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b476">
	<analytic>
		<title level="a" type="main">Mathematics of multisets in the Fraenkel-Mostowski framework</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alexandru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin Mathematique de la Societe des Sciences Mathematiques de Roumanie</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="18" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b477">
	<analytic>
		<title level="a" type="main">Admissible Sets and Structures: An Approach to Definability Theory</title>
		<author>
			<persName><forename type="first">J</forename><surname>Barwise</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Perspectives in Mathematical Logic</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<date type="published" when="1975">1975</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b478">
	<analytic>
		<title level="a" type="main">Fraenkel-Mostowski sets with non-homogeneous atoms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">7550</biblScope>
			<biblScope unit="page" from="1" to="5" />
			<date type="published" when="2012">2012</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b479">
	<analytic>
		<title level="a" type="main">Nominal monoids</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Theory of Computing Systems</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="194" to="222" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b480">
	<analytic>
		<title level="a" type="main">Towards nominal computation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Braud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Klin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lasota</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">39th ACM POPL</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="401" to="412" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b481">
	<analytic>
		<title level="a" type="main">Automata with group actions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Klin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lasota</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">26th Symposium on Logic in Computer Science</title>
				<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="355" to="364" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b482">
	<analytic>
		<title level="a" type="main">Turing machines with atoms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Klin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lasota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Torunczyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">28th Symposium on Logic in Computer Science</title>
				<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="183" to="192" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b483">
	<analytic>
		<title level="a" type="main">A Machine-independent characterization of timed languages</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lasota</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">39th ICALP</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="92" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b484">
	<analytic>
		<title level="a" type="main">Imperative programming in sets with atoms</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bojanczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Torunczyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">FSTTCS. LIPIcs</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="4" to="15" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b485">
	<analytic>
		<title level="a" type="main">Zu den grundlagen der Cantor-Zermeloschen mengenlehre</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fraenkel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematische Annalen</title>
		<imprint>
			<biblScope unit="volume">86</biblScope>
			<biblScope unit="page" from="230" to="237" />
			<date type="published" when="1922">1922</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b486">
	<analytic>
		<title level="a" type="main">The pi-calculus in FM. Thirty Five Years of Automating Mathematics</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Gabbay</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Kluwer Applied Logic</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="247" to="269" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b487">
	<analytic>
		<title level="a" type="main">A new approach to abstract syntax with variable binding</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Gabbay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Pitts</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Formal Aspects of Computing</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="341" to="363" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b488">
	<analytic>
		<title level="a" type="main">Church&apos;s thesis and principles for mechanisms</title>
		<author>
			<persName><forename type="first">R</forename><surname>Gandy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Kleene Symposium</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Barwise</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Keisler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Kunen</surname></persName>
		</editor>
		<meeting><address><addrLine>North-Holland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1980">1980</date>
			<biblScope unit="page" from="123" to="148" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b489">
	<analytic>
		<title level="a" type="main">Axiom of Choice</title>
		<author>
			<persName><forename type="first">H</forename><surname>Herrlich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Mathematics</title>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b490">
	<analytic>
		<title level="a" type="main">Consequences of the Axiom of Choice</title>
		<author>
			<persName><forename type="first">P</forename><surname>Howard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E</forename><surname>Rubin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Surveys and Monographs</title>
		<imprint>
			<biblScope unit="volume">59</biblScope>
			<date type="published" when="1998">1998</date>
			<publisher>American Mathematical Society</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b491">
	<analytic>
		<title level="a" type="main">The Axiom of Choice</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">J</forename><surname>Jech</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Studies in Logic and the Foundations of Mathematics</title>
				<meeting><address><addrLine>North-Holland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1973">1973</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b492">
	<analytic>
		<title level="a" type="main">Uber die unabhangigkeit des auswahlsaxioms und einiger seiner folgerungen</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lindenbaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mostowski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comptes Rendus des Seances de la Societe des Sciences et des Lettres de Varsovie</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="27" to="32" />
			<date type="published" when="1938">1938</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b493">
	<monogr>
		<title level="m" type="main">Investigations into Algebra and Topology over Nominal Sets</title>
		<author>
			<persName><forename type="first">D</forename><surname>Petrisan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
		<respStmt>
			<orgName>University of Leicester</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD Thesis</note>
</biblStruct>

<biblStruct xml:id="b494">
	<analytic>
		<title level="a" type="main">Alpha-structural recursion and induction</title>
		<author>
			<persName><forename type="middle">A M</forename><surname>Pitts</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the ACM</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="459" to="506" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b495">
	<monogr>
		<title level="m" type="main">Nominal Sets Names and Symmetry in Computer Science</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Pitts</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Cambridge University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b496">
	<monogr>
		<title level="m" type="main">The Fresh Approach: Functional Programming with Names and Binders</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Shinwell</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
		<respStmt>
			<orgName>University of Cambridge</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">PhD Thesis</note>
</biblStruct>

<biblStruct xml:id="b497">
	<monogr>
		<title level="m" type="main">Nominal Domain Theory for Concurrency</title>
		<author>
			<persName><forename type="first">D</forename><surname>Turner</surname></persName>
		</author>
		<idno>no.751</idno>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
		<respStmt>
			<orgName>University of Cambridge</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b498">
	<analytic>
		<title level="a" type="main">Nominal techniques in Isabelle/HOL</title>
		<author>
			<persName><forename type="first">C</forename><surname>Urban</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automated Reasoning</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="327" to="356" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b499">
	<analytic>
		<title level="a" type="main">Forward completeness, unboundedness observability, and their lyapunov characterizations</title>
		<author>
			<persName><forename type="first">D</forename><surname>Angeli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Sontag</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Systems &amp; Control Letters</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="209" to="217" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b500">
	<monogr>
		<title level="m" type="main">Viability Theory (Modern Birkhauser Classics</title>
		<author>
			<persName><forename type="first">J.-P</forename><surname>Aubin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<pubPlace>Birkhauser Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b501">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">P</forename><surname>Aubin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Cellina</surname></persName>
		</author>
		<title level="m">Differential inclusions: set-valued maps and viability theory</title>
				<imprint>
			<publisher>Springer-Verlag GmbH</publisher>
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b502">
	<analytic>
		<title level="a" type="main">Cyber-physical systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Baheti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Gill</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Impact of Control Technology</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="161" to="166" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b503">
	<analytic>
		<title level="a" type="main">The wazewski topological method for contingent equations</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bebernes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Schuur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annali di Matematica Pura ed Applicata</title>
		<imprint>
			<biblScope unit="volume">87</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="271" to="279" />
			<date type="published" when="1970">1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b504">
	<monogr>
		<title level="m" type="main">Viability, invariance and applications</title>
		<author>
			<persName><forename type="first">O</forename><surname>Cârjȃ</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Necula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">I</forename><surname>Vrabie</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Elsevier Science Limited</publisher>
			<biblScope unit="volume">207</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b505">
	<monogr>
		<title level="m" type="main">Theory of Ordinary Differential Equations</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Coddington</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Levinson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1984">1984</date>
			<publisher>Krieger Pub Co</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b506">
	<analytic>
		<title level="a" type="main">Differential Equations with Discontinuous Righthand Sides: Control Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Filippov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mathematics and its Applications</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b507">
	<analytic>
		<title level="a" type="main">A measurable upper semicontinuous viability theorem for tubes</title>
		<author>
			<persName><forename type="first">H</forename><surname>Frankowska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Plaskacz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nonlinear analysis</title>
		<imprint>
			<biblScope unit="volume">26</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="565" to="582" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b508">
	<analytic>
		<title level="a" type="main">Necessary and sufficient conditions for global-in-time existence of solutions of ordinary, stochastic, and parabolic differential equations</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">E</forename><surname>Gliklikh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Abstract and Applied Analysis</title>
				<imprint>
			<publisher>MANCORP PUBLISHING</publisher>
			<date type="published" when="2006">2006. 2006</date>
			<biblScope unit="page" from="1" to="17" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b509">
	<monogr>
		<title level="m" type="main">Hybrid dynamical systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Goebel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">G</forename><surname>Sanfelice</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Teel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="28" to="93" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b510">
	<analytic>
		<title level="a" type="main">Theory of processes, i</title>
		<author>
			<persName><forename type="first">O</forename><surname>Hájek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Czechoslovak Mathematical Journal</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="159" to="199" />
			<date type="published" when="1967">1967</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b511">
	<analytic>
		<title level="a" type="main">A criterion for existence of global-in-time trajectories of nondeterministic Markovian systems</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ivanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science (CCIS)</title>
		<imprint>
			<biblScope unit="volume">347</biblScope>
			<biblScope unit="page" from="111" to="130" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b512">
	<analytic>
		<title level="a" type="main">On existence of total input-output pairs of abstract time systems</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ivanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science (CCIS)</title>
		<imprint>
			<biblScope unit="volume">412</biblScope>
			<biblScope unit="page" from="308" to="331" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b513">
	<analytic>
		<title level="a" type="main">On representations of abstract systems with partial inputs and outputs</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ivanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Theory and Applications of Models of Computation</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">T</forename><surname>Gopal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Agrawal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Li</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Cooper</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">8402</biblScope>
			<biblScope unit="page" from="104" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b514">
	<monogr>
		<title level="m" type="main">Viability of Hybrid Systems: A Controllability Operator Approach</title>
		<author>
			<persName><forename type="first">G</forename><surname>Labinaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Guay</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<publisher>Springer Netherlands</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b515">
	<monogr>
		<title level="m" type="main">Introduction to embedded systems: A cyber-physical systems approach</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">A</forename><surname>Seshia</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Lulu.com</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b516">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Liberzon</surname></persName>
		</author>
		<title level="m">Switching in Systems and Control (Systems &amp; Control: Foundations &amp; Applications)</title>
				<imprint>
			<publisher>Birkhauser Boston Inc</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b517">
	<analytic>
		<title level="a" type="main">Viability results for nonautonomous differential inclusions</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D M</forename><surname>Marques</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Convex Analysis</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="437" to="443" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b518">
	<monogr>
		<title level="m" type="main">Über die Lage der Integralkurven gewöhnlicher Differentialgleichungen</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nagumo</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1942">1942</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b519">
	<analytic>
		<title level="a" type="main">Existence of solutions and asymptotic equilibrium of multivalued differential systems</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">W</forename><surname>Seah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematical Analysis and Applications</title>
		<imprint>
			<biblScope unit="volume">89</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="648" to="663" />
			<date type="published" when="1982">1982</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b520">
	<analytic>
		<title level="a" type="main">A survey of cyber-physical systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Suo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Wireless Communications and Signal Processing (WCSP), 2011 International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b521">
	<analytic>
		<title level="a" type="main">Rigorous design of cyber-physical systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Sifakis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Embedded Computer Systems (SAMOS), 2012 International Conference on</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="319" to="319" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b522">
	<analytic>
		<title level="a" type="main">A Nagumo type viability theorem</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">I</forename><surname>Vrabie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">An. Stiint. Univ. Al. I. Cuza Iasi. Mat</title>
		<imprint>
			<biblScope unit="volume">51</biblScope>
			<biblScope unit="page" from="293" to="308" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b523">
	<analytic>
		<title level="a" type="main">Describing the Immune System Using Enhanced Mobile Membranes</title>
		<author>
			<persName><forename type="first">B</forename><surname>Aman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Notes in Theoretical Computer Science</title>
		<imprint>
			<biblScope unit="volume">194</biblScope>
			<biblScope unit="page" from="5" to="18" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b524">
	<analytic>
		<title level="a" type="main">Turing Completeness Using Three Mobile Membranes</title>
		<author>
			<persName><forename type="first">B</forename><surname>Aman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">5715</biblScope>
			<biblScope unit="page" from="42" to="55" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b525">
	<analytic>
		<title level="a" type="main">Mobility in Process Calculi and Natural Computing</title>
		<author>
			<persName><forename type="first">B</forename><surname>Aman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Natural Computing Series</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b526">
	<analytic>
		<title level="a" type="main">A P System Description of the Sodium-Potassium Pump</title>
		<author>
			<persName><forename type="first">D</forename><surname>Besozzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3365</biblScope>
			<biblScope unit="page" from="210" to="223" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b527">
	<analytic>
		<title level="a" type="main">Encodings and Arithmetic Operations in Membrane Computing</title>
		<author>
			<persName><forename type="first">C</forename><surname>Bonchiş</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Izbaşa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">3959</biblScope>
			<biblScope unit="page" from="621" to="630" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b528">
	<analytic>
		<title level="a" type="main">Evolution-Communication P Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Cavaliere</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">2597</biblScope>
			<biblScope unit="page" from="134" to="145" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b529">
	<monogr>
		<title level="m">Applications of Membrane Computing</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Ciobanu</surname></persName>
		</editor>
		<editor>
			<persName><surname>Gh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Pȃun</surname></persName>
		</editor>
		<editor>
			<persName><surname>Pérez-Jiménez</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b530">
	<analytic>
		<title level="a" type="main">Constant-Space P Systems with Active Membranes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Leporati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Manzoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Mauri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Porreca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zandron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fundamenta Informaticae</title>
		<imprint>
			<biblScope unit="volume">134</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="111" to="128" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b531">
	<analytic>
		<title level="a" type="main">A Gap in the Space Hierarchy of P Systems With Active Membranes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Leporati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Mauri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Porreca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zandron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automata, Languages and Combinatorics</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">1-4</biblScope>
			<biblScope unit="page" from="173" to="184" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b532">
	<analytic>
		<title level="a" type="main">The Computational Power of Membrane Systems Under Tight Uniformity Conditions</title>
		<author>
			<persName><forename type="first">N</forename><surname>Murphy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Woods</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Natural Computing</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="613" to="632" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b533">
	<analytic>
		<title level="a" type="main">P Systems With Active Membranes: Attacking NP-complete Problems</title>
		<author>
			<persName><surname>Gh</surname></persName>
		</author>
		<author>
			<persName><surname>Pȃun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Automata, Languages and Combinatorics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="75" to="90" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b534">
	<monogr>
		<title level="m">The Oxford Handbook of Membrane Computing</title>
				<editor>
			<persName><surname>Gh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Pȃun</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Rozenberg</surname></persName>
		</editor>
		<editor>
			<persName><surname>Salomaa</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b535">
	<analytic>
		<title level="a" type="main">Complexity-Membrane Division</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Pérez-Jiménez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Riscos-Núñez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Romero-Jiménez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Woods</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Membrane Creation</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="302" to="336" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b536">
	<analytic>
		<title level="a" type="main">Sublinear-Space P Systems with Active Membranes</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Porreca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Leporati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Mauri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Zandron</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes in Computer Science</title>
		<imprint>
			<biblScope unit="volume">7762</biblScope>
			<biblScope unit="page" from="342" to="357" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b537">
	<monogr>
		<title level="m" type="main">Handbook of Software Reliability Engineering</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Lyu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<publisher>A. and IEEE Computer Society Press</publisher>
			<pubPlace>New York, U.S.; Los Alamitos, California, U.S.A.</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b538">
	<monogr>
		<idno>STD-729-1991</idno>
		<title level="m">Standard Glossary of Software Engineering Terminology</title>
				<imprint>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b539">
	<analytic>
		<title level="a" type="main">Validity of Execution Time Theory of Software Reliability</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Musa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Reliability</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="199" to="205" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b540">
	<analytic>
		<title level="a" type="main">Time-Dependent Error Detection Rate Model for Software and other Performance Measures</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Goel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Okumoto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Reliability R</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="206" to="211" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b541">
	<monogr>
		<title level="m" type="main">Software Reliability Modelling</title>
		<author>
			<persName><forename type="first">M</forename><surname>Xie</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1991">1991</date>
			<publisher>World Scientific</publisher>
			<pubPlace>Singapore</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b542">
	<analytic>
		<title level="a" type="main">Architecture-Based Approach to Reliability Assessment of Software Systems</title>
		<author>
			<persName><forename type="first">K</forename><surname>Gošоva-Popstojanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Trivedi Kishor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Performance Evaluation</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="179" to="204" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b543">
	<analytic>
		<title level="a" type="main">An Analytical Approach to Architecture-Based Software Performance Reliability Prediction</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Gokhale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">E</forename><surname>Wong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Horgan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Trivedi Kishor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Performance Evaluation</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="13" to="22" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b544">
	<analytic>
		<title level="a" type="main">Accurate Usage Model Construction Using High-Order Markov Chains</title>
		<author>
			<persName><forename type="first">T</forename><surname>Takagi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Furukawa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yamasaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Supplementary Proc. 17th Int. Symposium on Software Reliability Engineering</title>
				<imprint>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="1" to="2" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b545">
	<analytic>
		<title level="a" type="main">Testing Software and Systems</title>
	</analytic>
	<monogr>
		<title level="m">Proc. 23rd IFIP WG 6.1 Int. Conf. LNCS</title>
				<editor>
			<persName><forename type="first">W</forename><surname>Burkhart</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Z</forename><surname>Fatiha</surname></persName>
		</editor>
		<meeting>23rd IFIP WG 6.1 Int. Conf. LNCS</meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="volume">7019</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b546">
	<analytic>
		<title level="a" type="main">High-Order Markov Chains Usage in Software Reliability Analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Yakovyna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Serdyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Nytrebych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fedasyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin of Lviv Polytechnic National University</title>
		<imprint>
			<biblScope unit="volume">771</biblScope>
			<biblScope unit="page" from="209" to="213" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b547">
	<analytic>
		<title level="a" type="main">Variable State-Based Software Usage Model Based on its Variables</title>
		<author>
			<persName><forename type="first">D</forename><surname>Fedasyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yakovyna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Serdyuk</surname></persName>
		</author>
		<author>
			<persName><surname>Nytrebych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Econtechmod</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="15" to="20" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b548">
	<analytic>
		<title level="a" type="main">The Model for Software Reliability Estimation Using High-Order Continuous-Time Markov Chains</title>
		<author>
			<persName><forename type="first">V</forename><surname>Yakovyna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Masyukevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc.9th Int. Scientific and Technical Conference on Computer Science and Information Technologies</title>
				<meeting>.9th Int. Scientific and Technical Conference on Computer Science and Information Technologies</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="83" to="86" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b549">
	<analytic>
		<title level="a" type="main">The Method of Reliability Prediction and Estimation Based on Model with Dynamic Index of Project Size</title>
		<author>
			<persName><forename type="first">M</forename><surname>Seniv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yakovyna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ya</forename><surname>Chabanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fedasyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computing</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="97" to="107" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b550">
	<analytic>
		<title level="a" type="main">Fundamentals of the Reliability Theory</title>
		<author>
			<persName><forename type="first">A</forename><surname>Polovko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gurov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Practical work</title>
				<imprint>
			<publisher>BHV-Peterburg</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b551">
	<monogr>
		<ptr target="http://kochanski.org/gpk/teaching/0401Oxford/HMM.pdf" />
		<title level="m">Hidden and Otherwise</title>
				<imprint/>
	</monogr>
	<note>Markov Models</note>
</biblStruct>

<biblStruct xml:id="b552">
	<analytic>
		<title level="a" type="main">Formalization of Discrete-Continuous Stochastic Systems Model Building using Erlang Phases Method</title>
		<author>
			<persName><forename type="first">B</forename><surname>Volochiy</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D</forename><surname>Ozirkovskii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">V</forename><surname>Kulyk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Vidbir i Obrobka Informatsii</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="page" from="39" to="47" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b553">
	<monogr>
		<title level="m" type="main">Model Selection and Multimodel Inference: a Practical Information-Theoretic Approach</title>
		<author>
			<persName><forename type="first">P</forename><surname>Burnham</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
			<publisher>Springer</publisher>
			<pubPlace>Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b554">
	<analytic>
		<title level="a" type="main">Application of Markov Chains to Analyze and Predict the Time Series</title>
		<author>
			<persName><forename type="first">T</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Modern Applied Science</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="162" to="166" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b555">
	<analytic>
		<title level="a" type="main">A New Look at the Statistical Model Identification</title>
		<author>
			<persName><surname>Akaike</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Auto. Control</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="716" to="723" />
			<date type="published" when="1974">1974</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b556">
	<analytic>
		<title level="a" type="main">Determination of the Order of a Markov Chain by Akaike&apos;s Information Criterion</title>
		<author>
			<persName><forename type="first">H</forename><surname>Tong</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Appl. Probability</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="488" to="497" />
			<date type="published" when="1975">1975</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b557">
	<analytic>
		<title level="a" type="main">Estimating the Dimension of a Model</title>
		<author>
			<persName><forename type="first">G</forename><surname>Schwarz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Annals of Statistics</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="461" to="464" />
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b558">
	<monogr>
		<title level="m">Dependability of Technics. Terms and Definitions, State Standard of Ukraine DSTU</title>
				<imprint>
			<date type="published" when="1996">1996</date>
			<biblScope unit="volume">94</biblScope>
			<biblScope unit="page">2860</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b559">
	<analytic>
		<title level="a" type="main">Software engineering</title>
	</analytic>
	<monogr>
		<title level="m">NATO SCIENCE COMMITTEE Report</title>
				<meeting><address><addrLine>Germany, Garmisch.</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1968">1968</date>
			<biblScope unit="volume">136</biblScope>
		</imprint>
	</monogr>
	<note>Report on a conference sponsored by the NATO SCIENCE COMMITTEE</note>
</biblStruct>

<biblStruct xml:id="b560">
	<monogr>
		<title level="m">International Standard ISO/IEC 25010. Systems and software engineering -Systems and software Quality Requirements and Evaluation (SQuaRE) -System and software quality models, ISO/IEC JTC1/SC7/WG6</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b561">
	<analytic>
		<title level="a" type="main">Comparison of Software Quality Models: An Analytical Approach</title>
		<author>
			<persName><forename type="first">Sanjay</forename><surname>Kumar Dubey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Soumi</forename><surname>Ghosh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ajay</forename><surname>Rana</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Emerging Technology and Advanced Engineering</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="111" to="119" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b562">
	<monogr>
		<title level="m" type="main">A Life Cycle Software Quality Model Using Bayesian Belief Networks</title>
		<author>
			<persName><forename type="first">Guy</forename><surname>Schiavone</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<pubPlace>Orlando</pubPlace>
		</imprint>
		<respStmt>
			<orgName>University of Central Florida</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b563">
	<monogr>
		<title level="m" type="main">The Unified Software Development Process</title>
		<author>
			<persName><forename type="first">I</forename><surname>Jacobson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Booch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rumbaugh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Addison Wesley Longman, Inc</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b564">
	<analytic>
		<title level="a" type="main">Software Quality Prediction Models Compared</title>
		<author>
			<persName><forename type="first">Rüdiger</forename><surname>Lincke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Tobias</forename><surname>Gutzmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Welf</forename><surname>Löwe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Quality Software</title>
				<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="82" to="91" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b565">
	<analytic>
		<title level="a" type="main">Comparing internal and external software quality measurements</title>
		<author>
			<persName><forename type="first">Xenos</forename><surname>Stavrinoudis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proccedings of the 8th Joint Conference on Knowledge-Based Software Engineering</title>
				<meeting>cedings of the 8th Joint Conference on Knowledge-Based Software Engineering</meeting>
		<imprint>
			<publisher>IOS Press</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="115" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b566">
	<analytic>
		<title level="a" type="main">Comparison of Software Quality Metrics for Object-Oriented System</title>
		<author>
			<persName><forename type="first">Amit</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sanjay</forename><surname>Kumar Dubey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Special Issue of International Journal of Computer Science &amp; Management Studies</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="12" to="24" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b567">
	<monogr>
		<title level="m" type="main">Software product quality control</title>
		<author>
			<persName><forename type="first">Wagner</forename><surname>Stefan</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b568">
	<analytic>
		<title level="a" type="main">Software Sustainability from a Process-Centric Perspective</title>
		<author>
			<persName><forename type="first">G</forename><surname>Lami</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Fabbrini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fusani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of EuroSPI 2012</title>
		<title level="s">Communication in Computer and Information Science CCIS n</title>
		<meeting>EuroSPI 2012<address><addrLine>Vienna (Austria</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">301</biblScope>
			<biblScope unit="page" from="97" to="108" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b569">
	<analytic>
		<title level="a" type="main">Evolution of software quality models in context of the standard ISO 25010</title>
		<author>
			<persName><forename type="first">O</forename><surname>Gordieiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Fominykh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sklyar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 9 th International Conference on Dependability and Complex Systems -DepCoS-RELCOMEX 2014</title>
				<meeting>9 th International Conference on Dependability and Complex Systems -DepCoS-RELCOMEX 2014<address><addrLine>Brunow, Poland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014-07-04">30 Jun-4 July. 2014</date>
			<biblScope unit="page" from="223" to="233" />
		</imprint>
	</monogr>
	<note>, Advances in Intelligent and Soft Computing</note>
</biblStruct>

<biblStruct xml:id="b570">
	<monogr>
		<title level="m" type="main">A software quality model for the evaluation of semantic technologies</title>
		<author>
			<persName><forename type="first">Filip</forename><surname>Radulovic</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
		<respStmt>
			<orgName>Universidad Politecnica de Madrid Facultad de Informatica</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Master thesis</note>
</biblStruct>

<biblStruct xml:id="b571">
	<analytic>
		<title level="a" type="main">Al-Qutaish Quality Models in Software Engineering Literature: An Analytical and Comparative Study</title>
		<author>
			<persName><forename type="first">E</forename><surname>Rafa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of American Science</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="166" to="175" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b572">
	<analytic>
		<title level="a" type="main">An Efficient Software Quality Models for Safety and Resilience</title>
		<author>
			<persName><forename type="first">Namita</forename><surname>Malhotra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Shefali</forename><surname>Pruthi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Recent Technology and Engineering (IJRTE)</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="66" to="70" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b573">
	<monogr>
		<author>
			<persName><forename type="first">San</forename><surname>Murugesan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Gangadharan</surname></persName>
		</author>
		<title level="m">Harnessing Green IT. Principles and Practices</title>
				<meeting><address><addrLine>UK</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley and Sons Ltd</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b574">
	<analytic>
		<title level="a" type="main">Green Computing and Communications in Critical Application Domains: Challenges and Solutions</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sklyar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Phillips</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 9 th International Conference on Digital Technologies</title>
				<meeting>9 th International Conference on Digital Technologies<address><addrLine>Žilina, Slovakia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">May, 29-31, 2013. 2013</date>
			<biblScope unit="page" from="24" to="29" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b575">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<title level="m">Principles, Components and Models -593</title>
				<meeting><address><addrLine>Ukraine</addrLine></address></meeting>
		<imprint>
			<publisher>Society</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University KhAI</orgName>
		</respStmt>
	</monogr>
	<note>Green IT-Engineering</note>
</biblStruct>

<biblStruct xml:id="b576">
	<monogr>
		<title level="m">International Standard ISO/IEC9126-1. Software engineering -Product quality -Part</title>
				<imprint>
			<publisher>Quality</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">32</biblScope>
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b577">
	<monogr>
		<title/>
		<author>
			<persName><surname>Getsync</surname></persName>
		</author>
		<ptr target="https://www.getsync.com/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b578">
	<analytic>
		<title level="a" type="main">The Concept of Green Cloud Infrastructure Based on Distributed Computing and Hardware Accelerator within FPGA as a Service</title>
		<author>
			<persName><forename type="first">O</forename><surname>Yanovskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yanovsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Design &amp; Test Symposium (EWDTS)</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="45" to="48" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b579">
	<monogr>
		<ptr target="http://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/Cloud_Index_White_Paper.pdf" />
		<title level="m">Cisco Global Cloud Index: Forecast and Methodology</title>
				<imprint>
			<date type="published" when="2013">2013-2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b580">
	<analytic>
		<title level="a" type="main">A Study of Pricing for Cloud Resources</title>
		<author>
			<persName><forename type="first">H</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SIGMETRICS Perform. Eval. Rev</title>
				<meeting><address><addrLine>New York, NY</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="3" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b581">
	<monogr>
		<ptr target="https://www.spacemonkey.com/" />
		<title level="m">Spacemonkey</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b582">
	<monogr>
		<ptr target="http://project-maelstrom.bittorrent.com/" />
		<title level="m">Project Maelstrom</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b583">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Sherly</forename></persName>
		</author>
		<ptr target="https://sher.ly/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b584">
	<monogr>
		<title/>
		<author>
			<persName><surname>Symform</surname></persName>
		</author>
		<ptr target="http://www.symform.com/" />
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b585">
	<monogr>
		<ptr target="https://boinc.berkeley.edu/" />
		<title level="m">Berkeley Open Infrastructure for Network Computing (BOINC</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b586">
	<monogr>
		<title level="m" type="main">Availability Modeling and Evaluation of Web-based Services-A pragmatic approach</title>
		<author>
			<persName><forename type="first">M</forename><surname>Martinello</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b587">
	<analytic>
		<title level="a" type="main">Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response Time</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mamutov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tarasyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Romanovsky</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ninth European Dependable Computing Conference (EDCC)</title>
				<meeting><address><addrLine>Sibiu</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="185" to="190" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b588">
	<analytic>
		<title level="a" type="main">Time-Outing Internet Services</title>
		<author>
			<persName><forename type="first">A</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Romanovsky</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSP.2013.43</idno>
	</analytic>
	<monogr>
		<title level="m">Security &amp; Privacy</title>
				<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="68" to="71" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b589">
	<analytic>
		<title level="a" type="main">Analysis of Computer Network Reliability and Criticality: Technique and Features</title>
		<author>
			<persName><forename type="first">I</forename><surname>Elyasi-Komari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gorbenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mamalis</surname></persName>
		</author>
		<idno type="DOI">10.4236/ijcns.2011.411088</idno>
	</analytic>
	<monogr>
		<title level="j">IJCNS</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="720" to="726" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b590">
	<monogr>
		<ptr target="http://docs.oracle.com/cd/E13218_01/wlp/docs81/capacityplanning/capacityplanning.html" />
		<title level="m">Benchmark Results</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b591">
	<analytic>
		<title level="a" type="main">Designing a DHT for Low Latency and High Throughput</title>
		<author>
			<persName><forename type="first">F</forename><surname>Dabek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Sit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Robertson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Kaashoek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Morris</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conference on Symposium on Networked Systems Design and Implementation (NSDI)</title>
				<meeting><address><addrLine>San Francisco</addrLine></address></meeting>
		<imprint>
			<publisher>USENIX Association Berkeley</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="85" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b592">
	<analytic>
		<title level="a" type="main">A Privacy Service for Location-Based Collaboration among Mobile Users</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sacramento</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Endler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Souza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of the Brazilian Computer Society</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="41" to="57" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b593">
	<analytic>
		<title level="a" type="main">Ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">P</forename><surname>Olshefski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Nieh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Nahum</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">6th conference on Symposium on Operating Systems Design &amp; Implementation</title>
				<meeting><address><addrLine>San Francisco</addrLine></address></meeting>
		<imprint>
			<publisher>USENIX Association Berkeley</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="333" to="346" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b594">
	<analytic>
		<title level="a" type="main">A Reconfigurable Hardware Platform for Prototyping Cellular Architectures</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Mudry</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Vannel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Tempesti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mange</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Parallel and Distributed Processing Symposium. IEEE International</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="96" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b595">
	<analytic>
		<title level="a" type="main">Reconfigurable Multiprocessor System Reliability Estimation</title>
		<author>
			<persName><forename type="first">O</forename><surname>Viktorov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Asian Jounal of Information Technology</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="958" to="960" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b596">
	<analytic>
		<title level="a" type="main">Fault Tolerance in Multicore Processors With Reconfigurable Hardware Unit</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rajesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Vinoth Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Srivatsan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Harini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shanthi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">15 th International conference on high performance computing</title>
				<meeting><address><addrLine>Bangalore, INDIA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="166" to="171" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b597">
	<analytic>
		<title level="a" type="main">A Low-Power Multiprocessor Architecture For Embedded Reconfigurable Systems</title>
		<author>
			<persName><forename type="first">C</forename><surname>Amerijckx</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-D</forename><surname>Legat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Power and Timing Modeling, Optimization and Simulation</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="83" to="93" />
		</imprint>
	</monogr>
	<note>ternational Workshop</note>
</biblStruct>

<biblStruct xml:id="b598">
	<analytic>
		<title level="a" type="main">Reliable Multiprocessor System-On-Chip Synthesis</title>
		<author>
			<persName><forename type="first">Changyun</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Dick</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Shang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference Hardware/Software Codesign and System Synthesis</title>
				<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="239" to="244" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b599">
	<analytic>
		<title level="a" type="main">The Design of a Fault-Tolerant, Realtime, Multi-Core Computer System</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><surname>Gostelow</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Aerospace Conference, IEEE</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b600">
	<monogr>
		<title level="m" type="main">Software Fault Tolerance</title>
		<editor>Lyu M.R.</editor>
		<imprint>
			<date type="published" when="1995">1995</date>
			<publisher>John Wiley &amp; Sons</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b601">
	<analytic>
		<title level="a" type="main">Models and Methods for Testing Software Systems</title>
		<author>
			<persName><forename type="first">Т</forename><surname>Korotun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Programming problems</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="76" to="84" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b602">
	<monogr>
		<title level="m" type="main">Technology of Modeling the Information Systems</title>
		<author>
			<persName><forename type="first">B</forename><surname>Volochii</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Ukranian</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b603">
	<analytic>
		<title level="a" type="main">Effects of Soft Error to System Reliability</title>
		<author>
			<persName><forename type="first">Lei</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Qingping</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jianjun</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Workshops of International Conference on Advanced Information Networking and Applications</title>
				<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="204" to="209" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b604">
	<analytic>
		<title level="a" type="main">The Reliability Modeling Non-Redundant Information and Control Systems with Software Updated</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Ponochonvyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">B</forename><surname>Odarushchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Radioelectronic and computer systems</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="93" to="97" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
	<note>In Russian</note>
</biblStruct>

<biblStruct xml:id="b605">
	<analytic>
		<title level="a" type="main">Development and Verification of Dependable Multi-Version Systems on the Basic of IP-Cores</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sklyar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Volkoviy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Int. Conf. Dependability of Computer Systems</title>
				<meeting>Int. Conf. Dependability of Computer Systems</meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b606">
	<analytic>
		<title level="a" type="main">Availability Assessment of Information and Control Systems with Online Software Update and Verification</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ponochovny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boyarchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ermolayev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information and Communication Technologies in Education</title>
		<title level="s">Research, and Industrial Applications Communications in Computer and Information Science</title>
		<imprint>
			<publisher>Springer International Publishing Switzerland</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">469</biblScope>
			<biblScope unit="page" from="300" to="324" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b607">
	<analytic>
		<title level="a" type="main">An Error Detection Model for Application During Software Development</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">B</forename><surname>Moranda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Reliability</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="309" to="312" />
			<date type="published" when="1981">1981</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b608">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Bobalo</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">B</forename><surname>Volochiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lozynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Mandzii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ozirkovskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fedasuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shcherbovskyh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Yakovyna</surname></persName>
		</author>
		<title level="m">Mathematical Models and Methods for Reliability Analysis of Electronic</title>
				<imprint>
			<publisher>Lviv Polytechnic Press</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>Electrical and Software Systems</orgName>
		</respStmt>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b609">
	<analytic>
		<title level="a" type="main">Design and Qualification of I&amp;C Systems on the Basis of FPGA Technologies</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bakhmach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Siora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sklyar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Tokarev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">7th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies (NPIC&amp;HMIT</title>
				<meeting><address><addrLine>Las Vegas, Nevada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010. 2010</date>
			<biblScope unit="page" from="916" to="924" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b610">
	<monogr>
		<idno>IEC 61508-1</idno>
		<title level="m">Functional Safety of Electrical / Electronic / Programmable Electronic Safety Related Systems -Part 1: General requirements</title>
				<meeting><address><addrLine>Geneva</addrLine></address></meeting>
		<imprint>
			<publisher>International Electrotechnical Commission</publisher>
			<date type="published" when="2010">2010. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b611">
	<analytic>
		<title level="a" type="main">Fault-Tolerant Computer-Aided Control Systems with Multiversion-Threshold Adaptation: Adaptation Methods, Reliability Estimation, and Choice of an Architecture</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Sklyar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Kharchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automation and Remote Control</title>
		<imprint>
			<biblScope unit="volume">63</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="991" to="1003" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b612">
	<analytic>
		<title level="a" type="main">Safety-Related Instrumentation and Control Systems and a Problem of the Hidden Faults</title>
		<author>
			<persName><forename type="first">M</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Conference on Digital Technologies</title>
				<meeting><address><addrLine>Zhilina, Slovak Republic</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="137" to="140" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b613">
	<monogr>
		<title level="m">FPGA-based NPP I&amp;C Systems: Development and Safety Assessment: RPC Radiy</title>
				<editor>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Kharchenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Sklyar</surname></persName>
		</editor>
		<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University ; KhAI</orgName>
		</respStmt>
	</monogr>
	<note>SSTC on Nuclear and Radiation Safety</note>
</biblStruct>

<biblStruct xml:id="b614">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Gillis</surname></persName>
		</author>
		<ptr target="http://www.popmech.ru/go.php?url=http%3A%2F%2Fwww.damninteresting.com%2F%3Fp%3D913" />
		<title level="m">The Apocalypses that Might Have Been</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b615">
	<analytic>
		<title level="a" type="main">A Fuzzy Data Envelopment Analysis Approach for FMECA</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Garcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Schirru</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">F</forename><surname>Frutuoso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Melo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Progress in Nuclear Energy</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="359" to="373" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b616">
	<analytic>
		<title level="a" type="main">Verification of FPGA Electronic Designs for Nuclear Reactor Trip Systems: Test-and Invariant-Based Methods</title>
		<author>
			<persName><forename type="first">A</forename><surname>Andrashov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sklyar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Reva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dovgopolyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Golovir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE East-West Design &amp; Test Symposium (EWDTS&apos;10)</title>
				<meeting><address><addrLine>St. Petersburg, Russia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="92" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b617">
	<monogr>
		<title level="m">Safety of Critical Infrastructures: Mathematical and Engineering Methods of Analysis and Ensuring: Ministry of Education and Science</title>
				<editor>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Kharchenko</surname></persName>
		</editor>
		<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<publisher>KhAI</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b618">
	<monogr>
		<idno>IEEE 1149-1</idno>
		<title level="m">IEEE Standard Test Access Port and Boundary-Scan Architecture</title>
				<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2001">2001. 2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b619">
	<analytic>
		<title level="a" type="main">Checkability of the Digital Components in Safety-Critical Systems: Problems and Solutions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Antoshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sulima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE East-West Design &amp; Test Symposium</title>
				<meeting><address><addrLine>Sevastopol, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="411" to="416" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b620">
	<analytic>
		<title level="a" type="main">The Use of Natural Resources for Increasing a Checkability of the Digital Components in Safety-Critical Systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Antoshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lobachev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Sulima</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE East-West Design &amp; Test Symposium</title>
				<meeting><address><addrLine>Kharkiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="327" to="332" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b621">
	<analytic>
		<title level="a" type="main">Checkability of Safety-Critical I&amp;C System Components in Normal and Emergency Modes</title>
		<author>
			<persName><forename type="first">A</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Antoshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information, Control and Management Systems</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="33" to="40" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b622">
	<analytic>
		<title level="a" type="main">A New Approach to Solving a Problem of the Hidden Faults in Safety-Related Systems Journal of Information</title>
		<author>
			<persName><forename type="first">A</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Control and Management Systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="125" to="132" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b623">
	<monogr>
		<ptr target="http://www.altera.com16.NetlistOptimizationsandPhysicalSynthesis.Qii52007-2.0" />
		<title level="m">Cyclone FPGA Family Data Sheet</title>
				<imprint>
			<publisher>Altera Corporation</publisher>
			<date type="published" when="2003">2003. 2004</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
	<note>Quartus II Handbook</note>
</biblStruct>

<biblStruct xml:id="b624">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Shih</surname></persName>
		</author>
		<title level="m">Multimedia Security: Watermarking, Steganography, and Forensics</title>
				<meeting><address><addrLine>Boca Raton, FL</addrLine></address></meeting>
		<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b625">
	<monogr>
		<title level="m" type="main">Digital Watermarking and Steganography</title>
		<author>
			<persName><forename type="first">I</forename><surname>Cox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bloom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Morgan Kaufmann Publishers</publisher>
			<pubPlace>Amsterdam</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b626">
	<analytic>
		<title level="a" type="main">An Integrity Verification System for Images Using Hashing and Watermarking</title>
		<author>
			<persName><forename type="first">S</forename><surname>Vasu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>George</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Deepthi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Communication Systems and Network Technologies</title>
				<meeting>the International Conference on Communication Systems and Network Technologies</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="85" to="89" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b627">
	<analytic>
		<title level="a" type="main">A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization</title>
		<author>
			<persName><forename type="first">G</forename><surname>Coatrieux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hui</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Huazhong</forename><surname>Shu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Limin</forename><surname>Luo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Roux</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE J. Biomed. Health Inform</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="1057" to="1067" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b628">
	<analytic>
		<title level="a" type="main">Watermarking and ownership problem</title>
		<author>
			<persName><forename type="first">H</forename><surname>Sencar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Memon</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th ACM workshop on Digital rights management -DRM&apos;05</title>
				<meeting>the 5th ACM workshop on Digital rights management -DRM&apos;05</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b629">
	<monogr>
		<title level="m" type="main">Techniques and Applications of Digital Watermarking and Content Protection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Arnold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Schmucker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wolthusen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Artech House</publisher>
			<pubPlace>Boston</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b630">
	<monogr>
		<title level="m" type="main">Security Engineering: A Guide to Building Dependable Distributed Systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Anderson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Wiley</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
	<note>2nd Edition</note>
</biblStruct>

<biblStruct xml:id="b631">
	<monogr>
		<title level="m" type="main">Handbook of FPGA Design Security</title>
		<author>
			<persName><forename type="first">T</forename><surname>Huffmire</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Springer</publisher>
			<pubPlace>Dordrecht</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b632">
	<analytic>
		<title level="a" type="main">Reconfigurable Computing Using Content Addressable Memory for Improved Performance and Resource Usage</title>
		<author>
			<persName><forename type="first">S</forename><surname>Paul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bhunia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. Design Automation Conference ACM/IEEE (DAC-2008)</title>
				<meeting>Design Automation Conference ACM/IEEE (DAC-2008)<address><addrLine>Anaheim</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="786" to="791" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b633">
	<analytic>
		<title level="a" type="main">Method of Steganographical Hiding of Information in LUT-Oriented Hardware Containers</title>
		<author>
			<persName><forename type="first">K</forename><surname>Zashcholkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ivanova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electrical and Computer Systems</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">88</biblScope>
			<biblScope unit="page" from="83" to="90" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b634">
	<analytic>
		<title level="a" type="main">Steganography Data Hiding in LUT-Oriented Hardware Containers Method Development</title>
		<author>
			<persName><forename type="first">K</forename><surname>Zashcholkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ivanova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electrical and Computer Systems</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">89</biblScope>
			<biblScope unit="page" from="231" to="239" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b635">
	<analytic>
		<title level="a" type="main">Lossless Data Embedding -New Paradigm in Digital Watermarking</title>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Goljan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Du</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EURASIP Journal on Adv. Signal Process</title>
		<imprint>
			<biblScope unit="volume">2002</biblScope>
			<biblScope unit="page" from="185" to="196" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b636">
	<analytic>
		<title level="a" type="main">Distortion-Free Data Embedding for Images</title>
		<author>
			<persName><forename type="first">M</forename><surname>Goljan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Du</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 4th International Workshop on Information Hiding (IHW-01)</title>
				<meeting>of the 4th International Workshop on Information Hiding (IHW-01)<address><addrLine>USA, Pittsburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="27" to="41" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b637">
	<analytic>
		<title level="a" type="main">Research in Key Features of FPGA-projects in Case of Changing the Codes in LUT-blocks</title>
		<author>
			<persName><forename type="first">K</forename><surname>Zashcholkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific Herald of Yuriy Fedkovych Chernivtsi National University: Computer Systems and Components</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="82" to="86" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
	<note>in Russian)</note>
</biblStruct>

<biblStruct xml:id="b638">
	<monogr>
		<idno>IEC 61508-3:2010</idno>
		<title level="m">Functional Safety of Electrical/Electronic/ Programmable Electronic Safety-Related Systems -Part 3: Software Requirements</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b639">
	<monogr>
		<title level="m" type="main">Diversity Strategies for NPP I&amp;C Systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Wood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Belles</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cetiner</surname></persName>
		</author>
		<idno>NUREG/CR-7007 ORNL/TM-2009/302</idno>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b640">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Yastrebenetsky</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<title level="m">Nuclear Power Plant Instrumentation and Control Systems for Safety and Security</title>
				<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b641">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Yoshikawa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhang</surname></persName>
		</author>
		<title level="m">Progress of Nuclear Safety for Symbiosis and Sustainability: Advanced Digital Instrumentation, Control and Information Systems for Nuclear Power Plants</title>
				<meeting><address><addrLine>Japan</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b642">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Avizienis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-C</forename><surname>Laprie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Randell</surname></persName>
		</author>
		<title level="m">Fundamental Concepts of Dependability</title>
				<imprint>
			<publisher>LAAS-CNRS</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
	<note>Research Report No 1145</note>
</biblStruct>

<biblStruct xml:id="b643">
	<analytic>
		<title level="a" type="main">A Method for the Realization of Fail-Safe Asynchronous Sequential Circuits</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Mukai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tohma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Computer</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="736" to="739" />
			<date type="published" when="1974">1974</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b644">
	<analytic>
		<title level="a" type="main">Evolution of Shuttle Avionics Redundancy Management/Fault Tolerance</title>
		<author>
			<persName><forename type="first">J</forename><surname>Boykin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Thibodeau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Schneider</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NASA Conference Publication 2342. Part 1</title>
				<meeting><address><addrLine>, Texas</addrLine></address></meeting>
		<imprint>
			<publisher>Johnsons Space Center</publisher>
			<date type="published" when="1983">1983</date>
			<biblScope unit="page" from="1" to="18" />
		</imprint>
	</monogr>
	<note>Space Shuttle Technical Conference</note>
</biblStruct>

<biblStruct xml:id="b645">
	<analytic>
		<title level="a" type="main">Design, Development, Integration: Space Shuttle Primary Flight Software System</title>
		<author>
			<persName><forename type="first">W</forename><surname>Madden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Rone</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="914" to="925" />
			<date type="published" when="1984">1984</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b646">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Astrom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Murray</surname></persName>
		</author>
		<title level="m">Feedback Systems: an Introduction for Scientists and Engineers</title>
				<imprint>
			<publisher>Princeton Univ. Press</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b647">
	<analytic>
		<title level="a" type="main">As Large as You Need and as Small as You Can: Implications of the Brain Size of Homo Floresiensis</title>
		<author>
			<persName><forename type="first">I</forename><surname>Davidson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Mental States. V.1: Evolution, function, nature</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Schalley</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Khlentzos</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="35" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b648">
	<analytic>
		<title level="a" type="main">Multi-Diversity Versus Common Cause Failures: FPGA-Based Multi Version NPP I&amp;C systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Siora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sklyar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceeding of the 76th conference NPIC&amp;HMIT</title>
				<meeting>eeding of the 76th conference NPIC&amp;HMIT<address><addrLine>Las-Vegas, Nevada, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b649">
	<analytic>
		<title level="a" type="main">Using Likely Program Invariants to Detect Hardware Errors</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sahoo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ramachandran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Adve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Adve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conf. Dependable Systems and Networks -DSN</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="70" to="79" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b650">
	<analytic>
		<title level="a" type="main">Fault Diagnosis in Dynamic Systems Using Analytical and Knowledge-Based Redundancy: a Survey and Some New Results</title>
		<author>
			<persName><forename type="first">Paul</forename><forename type="middle">M</forename><surname>Frank</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Automatica</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="459" to="474" />
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b651">
	<monogr>
		<title level="m" type="main">Fault Diagnosis in Dynamic Systems: Theory and Application</title>
		<author>
			<persName><forename type="first">Ron</forename><forename type="middle">J</forename><surname>Patton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Paul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Robert</forename><forename type="middle">N</forename><surname>Frank</surname></persName>
		</author>
		<author>
			<persName><surname>Clarke</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1989">1989</date>
			<publisher>Prentice-Hall Inc</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b652">
	<monogr>
		<title level="m" type="main">Issues of Fault Diagnosis for Dynamic Systems</title>
		<author>
			<persName><forename type="first">Ron</forename><forename type="middle">J</forename><surname>Patton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Robert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paul</forename><forename type="middle">M</forename><surname>Clark</surname></persName>
		</author>
		<author>
			<persName><surname>Frank</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Springer Science &amp; Business Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b653">
	<analytic>
		<title level="a" type="main">Xianchun Ding: Survey of Robust Residual Generation and Evaluation Methods in Observer-Based Fault Detection Systems</title>
		<author>
			<persName><forename type="first">Paul</forename><forename type="middle">M</forename><surname>Frank</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Process Control</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="403" to="424" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b654">
	<analytic>
		<title level="a" type="main">A Unified Approach to the Optimization of Fault Detection Systems</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">X</forename><surname>Ding</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Adaptive Control and Signal Processing</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">7</biblScope>
			<biblScope unit="page" from="725" to="745" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b655">
	<analytic>
		<title level="a" type="main">Towards Making Safety-Critical Systems Safer: Learning from Mistakes</title>
		<author>
			<persName><forename type="first">N</forename><surname>Silva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vieira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)</title>
				<imprint>
			<date type="published" when="2014">2014. 2014. 2014</date>
			<biblScope unit="page" from="162" to="167" />
		</imprint>
	</monogr>
	<note>ISSREW</note>
</biblStruct>

<biblStruct xml:id="b656">
	<analytic>
		<title level="a" type="main">On the Need for Training Failure Prediction Algorithms in Evolving Software Systems</title>
		<author>
			<persName><forename type="first">I</forename><surname>Irrera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Duraes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vieira</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Symposium on. IEEE</title>
				<imprint>
			<date type="published" when="2014">2014. 2014</date>
			<biblScope unit="page" from="216" to="223" />
		</imprint>
	</monogr>
	<note>High-Assurance Systems Engineering (HASE)</note>
</biblStruct>

<biblStruct xml:id="b657">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Boyarchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">B</forename><surname>Brezhnev Ye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Gorbenko</surname></persName>
		</author>
		<title level="m">Safety of Critical Infrastructures: Mathematical Analysis and Engineering Methods of Analysis and Ensuring</title>
				<meeting><address><addrLine>Kharkiv</addrLine></address></meeting>
		<imprint>
			<publisher>KhAI</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University named after N.E.Zhukovsky</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b658">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Palagin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Opanasenko</surname></persName>
		</author>
		<title level="m">Reconfigurable Computer Systems</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<publisher>Prosvita</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b659">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">N</forename><surname>Sokolov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Illyushko</surname></persName>
		</author>
		<title level="m">Applications of Computer Technologies for Software-Hardware Complexes Reliability and Safety Assessment Systems</title>
				<meeting><address><addrLine>Kharkiv</addrLine></address></meeting>
		<imprint>
			<publisher>KhAI</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University named after N.E.Zhukovsky</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b660">
	<monogr>
		<title level="m" type="main">High Availability Systems and Technologies</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">N</forename><surname>Odarushchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">L</forename><surname>Ponochovny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Kharchenko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>KhAI</publisher>
			<pubPlace>Kharkiv</pubPlace>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University named after N.E.Zhukovsky</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b661">
	<monogr>
		<title level="m" type="main">Predictive Control of Radioelectronic Devices</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">D</forename><surname>Kudritsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1982">1982</date>
			<publisher>Technics</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b662">
	<monogr>
		<title level="m" type="main">Filtering, Extrapolation and Recognition Realizations of Random Functions</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">D</forename><surname>Kudritsky</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>FADA Ltd</publisher>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b663">
	<monogr>
		<title level="m" type="main">The Theory of Random Functions and its Application</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Pugachev</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1962">1962</date>
			<publisher>Physmatgis</publisher>
			<pubPlace>Moscow</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b664">
	<analytic>
		<title level="a" type="main">The Method of Forecasting Technical Condition of Objects</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Patent 73885</title>
				<meeting><address><addrLine>Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012-02-23">G05B 23/02. 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b665">
	<analytic>
		<title level="a" type="main">The Algorithm of Optimal Polynomial Extrapolation of Random Processes</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">Y</forename><surname>Kondratenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Kozlov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Modeling and Simulation in Engineering</title>
		<title level="s">Economics and Management</title>
		<meeting><address><addrLine>LNBIP; New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">115</biblScope>
			<biblScope unit="page" from="78" to="87" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b666">
	<analytic>
		<title level="a" type="main">On the Estimation of Probability Density Function and the Mode</title>
		<author>
			<persName><forename type="first">E</forename><surname>Parzen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Analysis of Mathematical Statistics</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="page" from="1065" to="1076" />
			<date type="published" when="1962">1962</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b667">
	<analytic>
		<title level="a" type="main">Algorithm of Extrapolation of a Nonlinear Random Process on the Basis of Its Canonical Decomposition</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="page" from="267" to="273" />
			<date type="published" when="2005">2005</date>
			<publisher>Kluwer Academic Publishers Hingham</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b668">
	<analytic>
		<title level="a" type="main">Algorithm of Extrapolation of a Nonlinear Casual Process on the Basis of Its Canonical Decomposition</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">P</forename><surname>Atamanyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">P</forename><surname>Kondratenko</surname></persName>
		</author>
		<author>
			<persName><surname>Brewer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Тhe First International Workshop on Critical Infrastructure Safety and Security &quot;CrISS-DESSERT-11</title>
				<meeting><address><addrLine>Kharkiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2011">2011. 2012</date>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="308" to="314" />
		</imprint>
	</monogr>
	<note>CAP Twelve Years Later: How the &quot;Rules&quot; Have Changed. Computer</note>
</biblStruct>

<biblStruct xml:id="b669">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Burgess</surname></persName>
		</author>
		<ptr target="http://markburgess.org/blog_cap.html" />
		<title level="m">Deconstructing the &apos;CAP theorem&apos; for CM and DevOps</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b670">
	<monogr>
		<title level="m">Information Quality Survey: Administrators Guide</title>
				<meeting><address><addrLine>Cambridge, MA</addrLine></address></meeting>
		<imprint>
			<publisher>Cambridge Research Group</publisher>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b671">
	<monogr>
		<title level="m" type="main">Information Quality Applied: Best Practices for Improving Business Information, Processes and Systems</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">P</forename><surname>English</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Wiley</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b672">
	<analytic>
		<title level="a" type="main">Brewers Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gilbert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lynch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGACT News</title>
		<imprint>
			<biblScope unit="volume">33</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="51" to="59" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b673">
	<analytic>
		<title level="a" type="main">Information Quality Benchmarks: Product and Service Performance</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">K</forename><surname>Kahn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Strong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">Y</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Comm. ACM</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b674">
	<analytic>
		<title level="a" type="main">Total data quality management: the case of IRI</title>
		<author>
			<persName><forename type="first">R</forename><surname>Kovac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">W</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">L</forename><surname>Pipino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Conf. on Information Quality</title>
				<meeting><address><addrLine>Cambridge, MA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="63" to="79" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b675">
	<monogr>
		<title level="m" type="main">Distributed Storage: Concepts, Algorithms, and Implementations</title>
		<author>
			<persName><forename type="first">Ya</forename><surname>Pessach</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>CreateSpace Independent Publishing Platform</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b676">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Tanenbaum</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Van Steen</surname></persName>
		</author>
		<title level="m">Distributed systems. Principles and Paradigms</title>
				<imprint>
			<publisher>Prentice-Hall, Inc</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>2nd Edition. References</note>
</biblStruct>

<biblStruct xml:id="b677">
	<analytic>
		<title level="a" type="main">Reliability engineering: Old Problems and New Challenges</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zio</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering and System Safety</title>
		<imprint>
			<biblScope unit="volume">94</biblScope>
			<biblScope unit="page" from="125" to="141" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b678">
	<analytic>
		<title level="a" type="main">Multi-State System Reliability</title>
		<author>
			<persName><forename type="first">A</forename><surname>Lisnianski</surname></persName>
		</author>
		<author>
			<persName><forename type="middle">G</forename><surname>Levitin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Assessment, Optimisation and Applications</title>
				<imprint>
			<publisher>World scientific</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b679">
	<analytic>
		<title level="a" type="main">Fundamental Concepts and relations for Reliability Analysis of Multistate System</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Murchland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Reliability and Fault Tree Analysis, Theoretical and Applied Aspects of System Reliability. SIAM</title>
				<imprint>
			<date type="published" when="1975">1975</date>
			<biblScope unit="page" from="581" to="618" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b680">
	<analytic>
		<title level="a" type="main">Coherent System with Multi-State component</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Barlow</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S</forename><surname>Wu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematics of Operations Research</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="275" to="281" />
			<date type="published" when="1978">1978</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b681">
	<analytic>
		<title level="a" type="main">Modules in Coherent Multistate Systems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Hudson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Kapur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Reliability</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="183" to="185" />
			<date type="published" when="1983">1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b682">
	<analytic>
		<title level="a" type="main">Multi-State System reliability</title>
		<author>
			<persName><forename type="first">M</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-S</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-L</forename><surname>Poh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computing System Reliability. Models and Analysis</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Kluwer Academic Publishers</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="207" to="237" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b683">
	<analytic>
		<title level="a" type="main">Optimization of Imperfect Preventive Maintenance for Multi-State System</title>
		<author>
			<persName><forename type="first">G</forename><surname>Levitin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Lisniansi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering and System Safety</title>
		<imprint>
			<biblScope unit="volume">67</biblScope>
			<biblScope unit="page" from="193" to="203" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b684">
	<analytic>
		<title level="a" type="main">A Monte Carlo Simulation Approach to the Availability Assessment of Multi-State Systems with Operational Dependencies</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Marella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Podofillini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering and System Safety</title>
		<imprint>
			<biblScope unit="volume">92</biblScope>
			<biblScope unit="page" from="871" to="882" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b685">
	<analytic>
		<title level="a" type="main">Generalized Multistate Monotone Coherent Systems</title>
		<author>
			<persName><forename type="first">K</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Koren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Guo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans Reliability</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="242" to="250" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b686">
	<analytic>
		<title level="a" type="main">Coherent System with Multi-State Components</title>
		<author>
			<persName><forename type="first">L</forename><surname>Caldarola</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Nuclear Engineering and Design</title>
		<imprint>
			<biblScope unit="volume">58</biblScope>
			<biblScope unit="page" from="127" to="139" />
			<date type="published" when="1980">1980</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b687">
	<analytic>
		<title level="a" type="main">A Combinatorial Algorithm for Performance and Reliability Analysis Using Multistate Models</title>
		<author>
			<persName><forename type="first">M</forename><surname>Veeraraghavan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computers</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="29" to="233" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b688">
	<analytic>
		<title level="a" type="main">Modules in Coherent Multistate Systems</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Hudson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Kapur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Reliability</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="183" to="185" />
			<date type="published" when="1983">1983</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b689">
	<monogr>
		<title level="m" type="main">Application of Graph Theory for Reliability Analysis</title>
		<author>
			<persName><forename type="first">K</forename><surname>Reinske</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Ushakov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1988">1988</date>
			<pubPlace>Moscow, Radio i Sviaz</pubPlace>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b690">
	<analytic>
		<title level="a" type="main">Reliability analysis of Multi-State System</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Dynamical Systems and Geometric Theories</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="213" to="222" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b691">
	<analytic>
		<title level="a" type="main">Importance Analysis of a Multi-State System Based on Multiple-Valued Logic Methods</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recent Advances in System Reliability: Signatures, Multi-state Systems and Statistical Inference</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Lisnianski</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><surname>Frenkel</surname></persName>
		</editor>
		<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="113" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b692">
	<analytic>
		<title level="a" type="main">Multiple-Valued Logic Mathematical Approaches for Multi-State System Reliability Analysis</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Levashenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Logic</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="350" to="362" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b693">
	<analytic>
		<title level="a" type="main">Minimal Cut Sets and Direct Partial Logic Derivatives in Reliability Analysis</title>
		<author>
			<persName><forename type="first">M</forename><surname>Kvassay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Levashenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Safety and Reliability: Methodology and Applications -Proceedings of the European Safety and Reliability Conference</title>
				<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="241" to="248" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b694">
	<analytic>
		<title level="a" type="main">Ant System for Reliability Optimization of a Series System with Multiple-Choice and Budget Constraints</title>
		<author>
			<persName><forename type="first">N</forename><surname>Nahas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nourelfath</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Reliability Engineering and System Safety</title>
		<imprint>
			<biblScope unit="volume">87</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b695">
	<analytic>
		<title level="a" type="main">Multiple Valued Logic: Concepts and Representations</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Miller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Thornton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Synthesis Lectures on Digital Circuits and Systems</title>
				<imprint>
			<publisher>Morgan &amp; Claypool Publishers</publisher>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b696">
	<monogr>
		<title level="m" type="main">Intelligent Fault Diagnosis and Prognosis for Engineering Systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Vachtsevanos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">L</forename><surname>Lewis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Roemer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hess</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Wu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Hoboken. John Wiley and Sons</publisher>
			<pubPlace>NJ</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b697">
	<analytic>
		<title level="a" type="main">A Generalized Multistate Based Path Vector Approach for Multistate Two-Terminal Reliability</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E</forename><surname>Ramirez-Marquez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">W</forename><surname>Coit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tortorella</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IIE Transactions</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="477" to="488" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b698">
	<analytic>
		<title level="a" type="main">A Fast Algorithm for Searching All Multi-State Minimal Cuts</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">C</forename><surname>Yeh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans Reliability</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="581" to="588" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b699">
	<analytic>
		<title level="a" type="main">Customer-Driven Reliability Models for Multistate Coherent Systems</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Boedigheimer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Kapur</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans Reliability</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="46" to="50" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b700">
	<analytic>
		<title level="a" type="main">Algorithm for Dynamic Analysis of Multi-State System by Structure Function</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kovalik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Levashenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Matiaško</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Computer as a tool</title>
				<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="1224" to="1227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b701">
	<analytic>
		<title level="a" type="main">Dynamic Reliability Indices for Multi-State System</title>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">the 33th IEEE Int. Symp. on Multiple-Valued Logic</title>
				<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="287" to="292" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b702">
	<analytic>
		<title level="a" type="main">Customer-Driven Reliability Models and Logical Differential Calculus for Reliability Analysis of Multi State System</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">C</forename><surname>Kapur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Zaitseva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kovalik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Matiasko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of KONBiN. The 4th Int. Conf. on Safety and Reliability</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="39" to="47" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b703">
	<analytic>
		<title level="a" type="main">Multi-State k-out-of-n System Model and its Applications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Zuo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ann. Reliability &amp; Maintainability Symp</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Pres</publisher>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="264" to="268" />
		</imprint>
	</monogr>
	<note>References</note>
</biblStruct>

<biblStruct xml:id="b704">
	<monogr>
		<title level="m" type="main">Basics of reliability theory</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Polovko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Gurov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>BHV Peterburg Publ</publisher>
			<pubPlace>Saint Petersburg</pubPlace>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b705">
	<monogr>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Bobalo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Volochiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Lozynskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Mandziy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ozirkovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fedasyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Shcherbovskykh</surname></persName>
		</author>
		<author>
			<persName><surname>Yakovyna</surname></persName>
		</author>
		<title level="m">Mathematical Models and Methods of Analysis of Radioelectronic, Electromechanic and Software Systems</title>
				<meeting><address><addrLine>Lviv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
		</imprint>
		<respStmt>
			<orgName>Lviv Polytechnic National University Publ.</orgName>
		</respStmt>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b706">
	<monogr>
		<ptr target="http://aldservice.com/en/reliability-products/rams-software.html" />
		<title level="m">RAMS (Reliability, Availability, Maintainability and Safety) Software</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b707">
	<monogr>
		<ptr target="http://www.reliasoft.com/products.htm" />
		<title level="m">ReliaSoft Synthesis Master Suite</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b708">
	<monogr>
		<ptr target="http://www.isograph.com/software/reliability-workbench/" />
		<title level="m">Reliability Workbench</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b709">
	<monogr>
		<title level="m" type="main">Hiromitsu Kumamoto: Probabilistic Risk Assessment: Reliability Engineering, Design and Analysis</title>
		<author>
			<persName><forename type="first">Ernest</forename><forename type="middle">J</forename><surname>Henley</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Wiley-IEEE Press</publisher>
		</imprint>
	</monogr>
	<note>2 edition</note>
</biblStruct>

<biblStruct xml:id="b710">
	<monogr>
		<title level="m" type="main">Reliability and Safety Engineering</title>
		<author>
			<persName><forename type="first">Ajit Kumar</forename><surname>Verma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Srividya</forename><surname>Ajit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Durga</forename><surname>Rao Karanki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ajit</forename><forename type="middle">Kumar</forename><surname>Verma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Srividya</forename><surname>Ajit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Durga</forename><surname>Rao Karanki</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Springer Science &amp; Business Media</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b711">
	<monogr>
		<title level="m" type="main">Reliability Engineering: Theory and Practice</title>
		<author>
			<persName><forename type="first">Alessandro</forename><surname>Birolini</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
	<note>Sixth Edition</note>
</biblStruct>

<biblStruct xml:id="b712">
	<analytic>
		<title level="a" type="main">Extending the features of software for reliability analysis of fault-tolerant systems</title>
		<author>
			<persName><forename type="first">Bohdan</forename><surname>Volochiy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bohdan</forename><surname>Mandziy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Leonid</forename><surname>Ozirkovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computational Problems of Electrical Engineering</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="113" to="121" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b713">
	<analytic>
		<title level="a" type="main">Programming Visualization System of Block Diagram Reliability for Program Complex АSNА-4</title>
		<author>
			<persName><forename type="first">Mandziy</forename><surname>Bogdan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Seniv</forename><surname>Maksym</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mosondz</forename><surname>Natalia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sambir</forename><surname>Andriy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 13-th International Conference &quot;The Experience Of Designing And Application Of Cad Systems In Microelectronics CADSM-2015</title>
				<meeting>of 13-th International Conference &quot;The Experience Of Designing And Application Of Cad Systems In Microelectronics CADSM-2015<address><addrLine>Lviv-Slavsko</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b714">
	<monogr>
		<author>
			<persName><forename type="first">Guangbin</forename><surname>Yang</surname></persName>
		</author>
		<title level="m">Life Cycle Reliability Engineering Hoboken</title>
				<meeting><address><addrLine>, N.J.</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b715">
	<analytic>
		<title level="a" type="main">Technical Risk Management for an Ensured and Efficient Product Development on the Example of Medical Equipment</title>
		<author>
			<persName><forename type="first">T</forename><surname>Zentis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Schmitt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 23rd CIRP Design Conference &quot;Smart Product Engineering</title>
				<meeting>the 23rd CIRP Design Conference &quot;Smart Product Engineering<address><addrLine>Bochum</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">March 11th -13th. 2013</date>
			<biblScope unit="page" from="387" to="398" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b716">
	<analytic>
		<title level="a" type="main">Automation Of Building Reliability Models Of Redundant Restorable Complex Technical Systems</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Mandziy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D</forename><surname>Ozirkovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technology</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">62</biblScope>
			<biblScope unit="page" from="44" to="49" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Ukrainian</note>
</biblStruct>

<biblStruct xml:id="b717">
	<analytic>
		<title level="a" type="main">Fault Tree Build Automation for Safety Estimation of Complex Technical System</title>
		<author>
			<persName><forename type="first">B</forename><surname>Volochiу</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D</forename><surname>Ozirkovskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Mashchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">P</forename><surname>Shkiliuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Inμ Proc. of ІV International conference &quot;Physical and Technological Problems of Wireless Devices, Telecommunications, Nano-and Microelectronics PREDT-2014</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="102" to="103" />
		</imprint>
	</monogr>
	<note>in Ukrainian) References</note>
</biblStruct>

<biblStruct xml:id="b718">
	<analytic>
		<title level="a" type="main">Availability Modeling and Analysis of a Virtualized System</title>
		<author>
			<persName><forename type="first">Dong</forename><surname>Seong Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Machida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">15th IEEE Pacific Rim International Symposium on Dependable Computing</title>
				<meeting><address><addrLine>Shanghai</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="365" to="371" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b719">
	<analytic>
		<title level="a" type="main">A Taxonomy of Network and Computer Attacks Based on Responses</title>
		<author>
			<persName><forename type="first">Zheng</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yang</forename><surname>Ou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yujun</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Information Technology</title>
				<meeting><address><addrLine>Nanjing</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="26" to="29" />
		</imprint>
		<respStmt>
			<orgName>Computer Engineering and Management Sciences</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b720">
	<analytic>
		<title level="a" type="main">Cyber security analysis using attack countermeasure trees</title>
		<author>
			<persName><forename type="first">A</forename><surname>Roy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Seong</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW &apos;10)</title>
				<meeting>the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW &apos;10)<address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b721">
	<analytic>
		<title level="a" type="main">Threat Analysis of Cyber Attacks with Attack Tree+</title>
		<author>
			<persName><forename type="first">Ping</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jia-Chi</forename><surname>Liu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Hiding and Multimedia Signal Processing</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="778" to="788" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b722">
	<analytic>
		<title level="a" type="main">Development of basic Markov&apos;s model research availability of commercial web services</title>
		<author>
			<persName><forename type="first">Alaa</forename><surname>Mohammed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abdul-</forename><surname>Hadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ponochovny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Radioelectronic and computer systems</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="186" to="191" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b723">
	<analytic>
		<title level="a" type="main">Web Systems Availability Assessment Considering Attacks on Service Configuration Vulnerabilities</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alaa</forename><surname>Mohammed Abdul-Hadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boyarchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ponochovny</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing</title>
				<editor>
			<persName><forename type="first">W</forename><surname>Zamojski</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Mazurkiewicz</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Sugier</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Walkowiak</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Kacprzyk</surname></persName>
		</editor>
		<meeting><address><addrLine>Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">286</biblScope>
			<biblScope unit="page" from="275" to="284" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b724">
	<analytic>
		<title level="a" type="main">Model-based evaluation: from dependability to security</title>
		<author>
			<persName><forename type="first">D</forename><surname>Nicol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Sanders</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Trivedi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Dependable and Secure Computing</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="48" to="65" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b725">
	<analytic>
		<title level="a" type="main">Dependability and security models</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">S</forename><surname>Trivedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Seong</forename><surname>Dong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roy</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Medhi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings 7th International Workshop on the Design of Reliable Communication Networks</title>
				<meeting>7th International Workshop on the Design of Reliable Communication Networks<address><addrLine>DRCN; Washington, DC</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Press</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="11" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b726">
	<monogr>
		<title level="m" type="main">Guide to Computer Network Security</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kizza</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Springer</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
	<note>2nd edition</note>
</biblStruct>

<biblStruct xml:id="b727">
	<analytic>
		<title level="a" type="main">A comparative analysis of network dependability, fault-tolerence, reliability, security, and survivability</title>
		<author>
			<persName><forename type="first">M</forename><surname>Al-Kuwaiti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kyriakopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hussein</surname></persName>
		</author>
		<ptr target="http://web.nvd.nist.gov/view/vuln/search-advanced" />
	</analytic>
	<monogr>
		<title level="j">IEEE Communications Surveys &amp; Tutorials</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page">11</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
	<note>NVD -Advanced Search</note>
</biblStruct>

<biblStruct xml:id="b728">
	<monogr>
		<ptr target="http://nvd.nist.gov/download.cfm#XML13.RecommendationX.1521.Commonvulnerabilityscoringsystem.ITU-T" />
		<title level="m">NVD -Data Feeds</title>
				<meeting><address><addrLine>Geneva, The Switzerland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
