<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Optimization of the Activity of Operators of Critical Systems by Methods of Regulating Operational-Tempo Tension</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Evgeniy Lavrov</string-name>
          <email>prof_lavrov@hotmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nadiia Pasko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Sumy National Agrarian University Sumy</institution>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Sumy State University</institution>
          ,
          <addr-line>Sumy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The model of the influence of the available time on the tension of operators and the infallibility of their activity is considered. The productions and methods of solving possible optimization problems are developed to search for ergonomic reserves to increase the efficiency of critical systems.</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Critical system</kwd>
        <kwd>IT resources</kwd>
        <kwd>ergonomics</kwd>
        <kwd>poly-ergative system</kwd>
        <kwd>incident management</kwd>
        <kwd>human operator</kwd>
        <kwd>algorithm of activity</kwd>
        <kwd>operational-tempo tension</kwd>
        <kwd>self-control</kwd>
        <kwd>optimization of activities</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Modern technological, transport, aerospace and energy systems are inherently critical
[
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ] because even minor disruptions to their operation can lead to accidents, being
catastrophic in most cases. Decision-making processes in critical infrastructures
involve the need to process large amounts of information in real time [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ].
Maintenance of IT resources of critical systems in the effective state and the ensuring their
high reliability and efficiency are becoming an increasingly serious problem [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ].
      </p>
      <p>
        The analysis of the real operators’ activity made it possible to determine the
following failure conditions for most cases [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3–5</xref>
        ]:
 Operational-tempo tension of the activity is the cause of erroneous reactions;
 There are no real mechanisms in place to ensure ergonomic quality, aimed at
providing the standards of operator’s activity;
 Management of time constraints on the implementation of activity algorithms can
be one of the main reserves of increasing ergonomics.
      </p>
      <p>
        Scientists working within the framework of the functional structural theory of
ergotechnical systems of Prof. A.I. Gubinsky, have traditionally paid much attention to
the study of optimization problems for operators [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Characteristics of some new
problems, specific for polyergatic systems, are given in the paper [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Unfortunately,
despite the huge scientific reserve of that school, in the field of optimization of the
human-machine interaction, tasks, as a rule, are solved with the assumption of
invariability of the characteristics of the operator in the process of activity and without
taking into account the effect of the time resource on the quality of implementation of the
algorithms available.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Problem Statement</title>
      <p>The task is to identify current problems and develop appropriate models that allow
solving the problems of optimizing the discrete activity of operators by varying the
values of parameters that characterize time resources, i.e. by means of regulation of
operational-tempo intensity.
3
3.1</p>
    </sec>
    <sec id="sec-3">
      <title>Approach</title>
      <sec id="sec-3-1">
        <title>Models for Managing the Operational-Tempo Tensity</title>
      </sec>
      <sec id="sec-3-2">
        <title>A Model for Assessing the Impact of the Operational-Tempo Tension on the</title>
        <p>
          Quality of Activities. Professor P.P. Chabanenko [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] succeeded to identify and
formalize the mechanism of the operator’s flexible response to the available time
resource (based on the study of real engineering and psychological data).
        </p>
        <p>
          Tension, as a psychological fee for achieving the goal of activity, includes several
components, the main ones being the tempo, determined by the time deficit to solve
the problem, and the operational one, determined by the nature of the operations of
the activity algorithm. The joint operational-tempo tension is determined by the
simultaneous influence of two noted factors: The tension H defines the probability P0 of
switching on the self-monitoring of the current operation by the operator [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]:
P0  1.836H 2  0.962H  0.874,
(1)
where H is a ratio of the time required to complete the operation at the maximum rate
to the allowable time actually given to the operator to perform this operation.
        </p>
        <p>Optimal tension of the operator’s activity: Hopt = 0.262. The area H &lt; Hopt
corresponds to an insufficient load on the operator, and the area H &gt; Hopt corresponds to an
excessive load on the operator.</p>
        <p>When H = Hopt, there is a probability to start a self-monitoring function P0 = 1,
which corresponds to the case of setting error-free operation.</p>
        <p>When H = 1, the probability P0 = 0, which corresponds to the speed setting. An
illustration of settings types in the operator’s activity is shown in Fig. 1.</p>
      </sec>
      <sec id="sec-3-3">
        <title>Models of Activity Optimization by Means of Management of Operational</title>
        <p>Tempo Tensity. Time limitations are determined by the characteristics of the flows of
incoming signals or orders, or various organizational decisions (including the number
of operators in the shift and distribution of functions among them). They may be set
instructively by the managing operator or they can be established by software and
technical means of activity management.</p>
        <p>Depending on the nature of the activity and the level of optimization (function,
complex of functions, etc.) we distinguish 2 classes of possible tasks.</p>
        <p>Choosing the optimal time constraint for the implementation of activities (1st
class of tasks). Task 1.1 (single criterion):</p>
        <p>There are given: The structure of the activity algorithm; characteristics of
reliability and execution time of operations, permissible time limits for the implementation of
the activity algorithm in the form of the lower limit of Tmin and the upper limit of Tmax
(may not be available); and the maximum permissible activity tensity H0. It is
necessary to choose the limit value T, imposed on the implementation time, which provides
the maximum probability of the error-free execution:</p>
        <p>B(T )  max
H (T )  H0</p>
        <p>Tmin  T  Tmax
where T is the allowable time for activity implementation; B (T) is a probability of
error-free execution; H(T) is an intensity of the activity; H0 is a maximum permissible
intensity; Tmin, Tmax are minimum and maximum times to implement activity.</p>
        <p>Task 1.2 (multiple criterion):</p>
        <p>The criterion for minimizing the intensity is added to the formulation of the Task
1.1. (2) – (4) instead of, or in addition to the restriction on the intensity (3).</p>
        <p>H (T )  min
Task 1.3 (optimization of income from activities):
(2)
(3)
(4)
(5)</p>
        <p>The statement appears due to the need to solve the problem of the type "what is
better: a greater number of implementations of activity algorithm with low infallibility
or high infallibility with fewer implementations". The economic consequences of
correct (incorrect) implementations of activities can be evaluated in various ways, for
example, "income from correct implementation" and "damage from improper
implementation".</p>
        <p>Consider one of the possible formulations of the problem, taking into account the
economic consequences of the activity. The following statements are given in
addition to the initial data of tasks 1.1 and 1.2, where C1 is an income from a single
errorfree implementation of the activity; C2 is a damage from a single implementation of
the algorithm with an error; T’ is a total time during which the activity algorithm
should be repeated (taking into account the deduction of time for various breaks:
technological, for leisure, etc.). If we consider that the number of applications realized
in time is determined by the time allocated for a single implementation n=T’/T, the
target function will have the form</p>
        <p>T '
T</p>
        <p>(C1B(T )  C2 (1 B(T )))  max
under the constraint (3)-(4).</p>
        <p>Task 1.4 (multiple criterion analogue of task 1.3):
The criterion of intensity minimization (5) is added to the statement of task 1.3,
instead of, or in addition to the constraint (3).</p>
        <p>In the formulations of tasks 1.1-1.4, there is no explicit restriction on the timely
implementation of the activity algorithm, since, as follows from the initial
assumptions, the activity is pre-configured and the operator provides (at Tmax not less than the
minimum required time for implementation of the activities) timely execution (by
enabling or disabling the self-monitoring of operations).</p>
        <p>The way to solve the tasks of choosing the optimal time limitations for activity
implementation:</p>
        <p>
          Since the analytic dependence for B(T) cannot be defined in principle, and the
mathematical model, algorithm and program for calculation of the probability of
error-free execution at a given point (for a given T) are developed (see [
          <xref ref-type="bibr" rid="ref3 ref4 ref5">3–5</xref>
          ]), we
propose a numerical approach to the solution, based on determining values
T1,T2,…,Ts ϵ [Tmin,Tmax], the calculation of the criterion function for these values (in
case of single criterion optimization) or the "convolution" of the criteria functions (in
case of multi criterion optimization) and the values of the indices to which the
constraint is imposed (H), and determining the optimal value or search area narrowing
(and the repetition of the procedure).
        </p>
        <p>Optimization algorithms based on one-step or multi-step choice are possible. The
one-step choice consists of determining the number of points N, calculating values
Ti  Ti1  Tmax  Tmin ,</p>
        <p>
          N
(6)
(7)
where i=1,…,N, T0=Tmin, computing B(Ti), H(Ti) (using algorithms and programs [
          <xref ref-type="bibr" rid="ref10 ref3 ref4 ref5 ref9">3–
5,9,10</xref>
          ]) or other criteria functions (depending on the task), and determining the
optimal value by a simple search. The disadvantage of the one-step choice is that a large
number of points N are needed to ensure high accuracy.
        </p>
        <p>A multi-step search is implemented in a coherent strategy related to the following
actions:</p>
        <p>1) The use of the selection rule for the first few points T1,T2,…,Ts ϵ [Tmin,Tmax], and
localization of the minimum point on the segment [T’min,T’max];</p>
        <p>2) Choosing points TS+1,…,TK on the localized segment and determining the next
segment;</p>
        <p>3) The analysis of the solution that was obtained for an admissible approximation
to the optimal one, and the optimal sequential search, carried out by one of the known
methods, for example, "Fibonacci search", "Golden section" method, etc.</p>
        <p>Distribution of the directive time for realization of activities between their
fragments (2nd class of tasks):</p>
        <p>
          Task 2: The statement makes sense in the case when the algorithm of the
operator's actions is divided into several parts (fragments): each part is executed in the
interval between two events. And the first event (signal) is synchronized with the
beginning of the implementation of the algorithm corresponding to the activity
fragment, and before the second event (signal) arrives, the algorithm must be completed.
Such a situation usually occurs when fragments of system operation algorithms are
realized in parallel by a human operator and a machine (with a starter and a
functionary of type "AND"[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]).
        </p>
        <p>
          The fact that it is not always expedient to operate the automation machine with the
maximum possible speed is noted in a number of ergonomic studies: For example, in
some cases it is recommended to introduce a delay in the "computer response" in
order to ensure the comfort of the operator [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
        <p>However, there is no way to determine the optimal reaction time in each particular
case. We assume that for technological or economic reasons the maximum
permissible time T for the implementation of the algorithm of functioning (AF) of the entire
system is set. The task is to determine the directive times for the operator to perform
individual fragments performed between the signals of automatic means, ensuring the
maximum probability of error-free realization of the entire AF. At the same time,
restrictions on the intensity of activity on each of the fragments can be introduced.
Here is the definition of vector (T1,T2,…,Tn) that provides:</p>
        <p>F (B1(T1), B2 (T2 ),..., Bn (Tn ))  max</p>
        <p>
          B
FT (T1,T2,...,Tn )  T
Hi (Ti )  Hi0 ,i  1,..., n
(8)
(9)
(10)
where FB is a dependence of the probability of error-free execution of AF from Bi(Ti),
i=1,…,n, determined by the structure of AF; Ti is a directive execution time of the i-th
fragment of AF; Bi(Ti) is a probability of error-free execution of the i-th fragment of
AF; Hi(Ti) is strength of the i-th fragment; H0i is maximum permissible tension for the
i-th fragment; FT(T1,T2,…,Tn) is a dependence of AF execution time on the execution
time of its individual fragments, determined by the structure of AF; n is a number of
AF fragments. FB and FT are determined by the models developed for the typical
operational structures [
          <xref ref-type="bibr" rid="ref10 ref3">3, 10</xref>
          ].
        </p>
        <p>In the particular case, when AF fragments are sequentially performed, the
statement (7)-(9) takes the form:</p>
        <p>The way of solving the task of directive time distribution to realize the activity
between their fragments:</p>
        <p>Step 1: Generation of a set of directive time values of the fragment
implementation for each i-th fragment of i=1,…,n, for example, as follows:</p>
        <p>1a. Definition of the range of research [Timin,Timax],
where Timin is the time required to implement the AF fragment without performing
functional control for all operations (for example, for a sequential chain of operations,
n
 Bi (Ti )  max
i1
n
Ti  T</p>
        <p>i ni
Tmin   TPij ,
j 1
where i=1,…,n and Ti,0=Timin.</p>
        <p>Ti,k  Ti,k 1 </p>
        <p>i i
Tmax  Tmin ,</p>
        <p>Ni
where ni is the number of basic work operations in the i-th fragment, TPij is the
mathematical expectation of the execution time of the j-th operation in the i-th fragment);</p>
        <p>Timax is the maximum time value for the AF fragment implementation, provided
that all operations are performed with self-monitoring and taking into account the
variance of the execution time, for example, for a sequential chain of operations
where TPKij and DPKij are the mathematical expectation and a variance of the execution
time in the i-th fragment of AF of the j-th self-monitoring operation.</p>
        <p>1b. Definition of the number of investigated values of the directive execution time
Ni for each i-th fragment i=1,…,n, and generation of the following values:
Ti,1,Ti,2,…,Ti,Ni ϵ [Timin,Timax], in the simplest case</p>
        <p>Tmi ax  ni TPKij  3( ni DPKij )
j 1 j 1
1/ 2 ,
(11)
(12)
(13)
(14)
(15)
(16)</p>
        <p>Step 2. Evaluation of error-free and activity intensity values on each i-th fragment,
i=1,…,n, with all the generated values of the directive time: Bi(Ti,j), Hi(Ti,j), i=1,…,n,
and j=1,…,Ni. The evaluation is carried out by using models and programs developed
in [3–5, 9 and 10].</p>
        <p>Step 3. An exception for each i-th activity fragment of Ti,j(i=1,…,n, j=1,…,Ni)
those values that do not satisfy the constraints on the activity tensity Hi(Ti,j)≤H0i.</p>
        <p>Step 4. Choosing the best option. With the generated variants of the execution of
fragments with available estimates of the quality indicators, the task is reduced to the
standard problem of maximizing the probability of error-free execution of AF under
the constraint on the mathematical expectation of the execution time [6,7 and 10].</p>
        <p>Step 5. Investigation of the vector obtained as a result of the solution of the
optimization problem. (T*1,T*2,…,T*n); generation of directive time values for each i-th
fragment in the range [T*i – ∆i, T*i + ∆i], (Δi can be determined, for example
i </p>
        <p>i i
Tmax  Tmin</p>
        <p>Ni
(17)
(see 1b)), and transition to step 2 (steps 2-5 should be repeated until the solution with
required accuracy is obtained).</p>
        <p>
          The convenience of the approach is that one of the steps reduces the task to the
known problem of optimizing a human machine system and can be solved by any
known method [
          <xref ref-type="bibr" rid="ref10 ref6 ref7 ref9">6,7, 9,10</xref>
          ] with any structure of connections between operations.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Applications</title>
      <p>
        The models were used in the development of the following systems ensuring
ergonomic quality:
 Automated processing plants for various purposes [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ];
 Systems of technical support of IT resources in telecommunications [
        <xref ref-type="bibr" rid="ref10 ref9">9,10</xref>
        ];
 Distributed banking processing systems [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ];
 Relevant topics of the training courses on "Ergonomics" and "Information
Systems" at the Sumy State University, the Sumy National Agrarian University and
the National University of Bio-Resources and Nature Management (Kyiv).
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>Operational-tempo tension is determined by time constraints on the activity of
operators of critical systems and significantly affects the indicators of error-free
functioning. It is convenient to evaluate the influence of time resources on the efficiency of
ergotechnical systems by using models based on formalisms introduced by Prof.
P.P. Chabanenko.</p>
      <p>Solving the tasks of choosing temporal constraints for the implementation of
activities and the distribution of directive time for the execution of work between its
fragments makes it possible to ensure the fulfillment of specified requirements for the
operation of critical systems while observing the normative indicators of the intensity
of the operators’ activities. Solving the problems of choosing a temporary restriction
on the implementation of activities and the distribution of directive time for the
implementation of activities between its fragments can provide specified requirements
for the effectiveness of critical systems, while observing the normative values of the
activity intensity of operators.</p>
      <p>The models should be used as elements of mathematical support of DSS for
operators-managers of critical systems.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bloomfield</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lala</surname>
          </string-name>
          , J.:
          <string-name>
            <surname>Safety-Critical Systems</surname>
          </string-name>
          .
          <source>The Next Generation / IEEE Security &amp; Privacy</source>
          <volume>11</volume>
          (
          <issue>4</issue>
          ),
          <fpage>11</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2013</year>
          ). doi:
          <volume>10</volume>
          .1109/MSP.
          <year>2013</year>
          .
          <volume>95</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Skatkov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anikevich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shevchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Information model of management of IT resources of critical systems</article-title>
          .
          <source>Collection of scientific works of Sevastopol National University of Nuclear Energy and Industry</source>
          <volume>1</volume>
          (
          <issue>37</issue>
          ),
          <fpage>201</fpage>
          -
          <lpage>206</lpage>
          (
          <year>2011</year>
          ). (In Russian)
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krivodub</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barchenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kontsevich</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Ergonomics of IT outsourcing. Development of a mathematical model to distribute functions among operators</article-title>
          .
          <source>Eastern European Journal of Enterprise Technologies</source>
          <volume>4</volume>
          (
          <issue>80</issue>
          ),
          <fpage>32</fpage>
          -
          <lpage>40</lpage>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2016</year>
          .
          <volume>66021</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Ergonomic Reserves for Improving Reliability of Data Processing in Distributed Banking Systems</article-title>
          .
          <source>In: Proceedings of 2nd International Conference on Advanced Information and Communication</source>
          Technologies-2017
          <source>(AICT-2017)</source>
          , pp.
          <fpage>79</fpage>
          -
          <lpage>82</lpage>
          . Lviv, Ukraine,
          <source>July 4-7</source>
          , (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barchenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borozenec</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Development of models for the formalized description of modular e-learning systems for the problems on providing ergonomic quality of human-computer interaction</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies. Ser. “Information technology” 2</source>
          (
          <issue>2</issue>
          /86),
          <fpage>4</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2017</year>
          .
          <volume>97718</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Adamenko</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Asherov</surname>
            ,
            <given-names>A.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.A.</given-names>
          </string-name>
          et al.:
          <article-title>Information controlling humanmachine systems: research, design, testing, Reference book</article-title>
          , Gubinsky,
          <string-name>
            <given-names>A.I.</given-names>
            &amp;
            <surname>Evgrafov</surname>
          </string-name>
          , V.G., eds. Mechanical Engineering, Мoscow, (
          <year>1993</year>
          ). (In Russian).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
          </string-name>
          ,N.:
          <article-title>Approach to optimization models bank forming for distributing of functions between the ACS operators</article-title>
          .
          <source>Eastern-European Journal of Enterprise Technologies. Ser. “Mathematics and Cybernetics - Fundamental and Applied Aspects</source>
          ”
          <volume>1</volume>
          (
          <issue>4</issue>
          /49),
          <fpage>46</fpage>
          -
          <lpage>50</lpage>
          (
          <year>2011</year>
          ). (In Russian).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Chabanenko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Investigation of the safety of the functioning of the "human-technical" systems by ergonomic nets. Publishing House of the P.S. Nahimov Academy of the Navy</article-title>
          , Sevastopol, (
          <year>2012</year>
          ). (In Russian).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krivodub</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Mathematical models for the distribution of functions between the operators of the computer-integrated flexible manufacturing systems</article-title>
          .
          <source>In: Proceedings of the XIII-th international conference TCSET-2016</source>
          “
          <article-title>Modern problems of radio engineering, telecommunications</article-title>
          , and computer science”, pp.
          <fpage>72</fpage>
          -
          <lpage>76</lpage>
          . Lviv-Slavsko, Ukraine, february
          <volume>23</volume>
          - 26, (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lavrov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pasko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolbatov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Cybersecurity of Distributed Information Systems. The Minimization of Damage Caused by Errors of Operators During Group Activity</article-title>
          .
          <source>In: Proceedings of 2nd International Conference on Advanced Information and Communication</source>
          Technologies-2017
          <source>(AICT-2017)</source>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>87</lpage>
          . Lviv, Ukraine,
          <source>July 4 - 7</source>
          , (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>