<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Implementation of combined method in constructing a trajectory for structure reconfiguration of a computer system with reconstructible structure and programmable logic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>© Volodymyr Tokariev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Vitalii Tkachov</string-name>
          <email>tkachov@ieee.org</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Iryna Ilina</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>© Stanislav Partyka</string-name>
          <email>stanislav.partyka@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>71</fpage>
      <lpage>81</lpage>
      <abstract>
        <p>In modern conditions providing the continuity of technological processes as well as increasing the reliability and survivability of operation of computer systems with configurable structure and programmable logic is one of the main strategic directions of modern social-economic and technical complexes. This is conditioned by the need to maintain the resilience and stability in the operation of computer systems with a reconstructible structure and programmable logic under various conditions of adverse effects of external and internal factors, both natural and technogenic, as well as those human-induced. It has been found that neutralizing threats and minimizing losses caused by abnormal, critical, emergency and catastrophic situations leading to an avalanche-like increase in degradation processes and destruction of computer systems with a reconstructible structure and programmable logic, requires the development of new principles, approaches, ways and methods of operational monitoring, analysis and forecasting of situations, development of options for control decisions, procedures for their selection and implementation in the framework of theory of structural dynamics control. To solve the optimization problem of constructing scenarios for the structural reconfiguration of computer systems with a reconstructible structure and programmable logic, a method and an algorithm that implements this method are proposed. The novelty of the method is the combined use of the random guided search method and the method of cutting -off unpromising variants of structural reconfiguration of computer systems with a reconstructible structure and programmable logic such as « branch and bound». The proposed approach allows to solve the optimization problems of constructing scenarios for the structural reconfiguration of computer systems with a reconstructible structure and programmable logic, both unconditional and conditional, that can be described using various structural and topological indicators.</p>
      </abstract>
      <kwd-group>
        <kwd>combined method</kwd>
        <kwd>reconfiguration</kwd>
        <kwd>functional element</kwd>
        <kwd>structure</kwd>
        <kwd>computer system</kwd>
        <kwd>survivability</kwd>
        <kwd>graph</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The analysis of existing and predicted critical and emergency situations that are
currently occurring everywhere in various subject areas shows that they stop being
sectoral, and develop into accidents and disasters that are already intersectoral in nature.
Under these conditions, it is necessary to investigate and solve the problems of
increasing the reliability and survivability of computer systems with a reconstructible structure
and programmable logic within the framework of the interdisciplinary approach. The
causes that lead to the emergence of critical situations, accidents and disasters, which
have natural-ecological, technical-industrial or anthropogenic-social causes, are of
particular danger to modern computer systems with a reconstructible structure and
programmable logic. Moreover, the range of threats to economic, physical and information
security, as well as the list of vulnerabilities in the hardware-software and information
structures of computer systems with a reconstructible structure and programmable logic
is constantly growing [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4">1-4</xref>
        ]. Thus, in real life, situations are possible when these threats
are combined and lead to an avalanche-like occurrence and development of negative
events, ultimately resulting in catastrophic consequences. Under these conditions,
ensuring the continuity of technological processes and increasing the reliability and
survivability of the corresponding production systems is one of the most important
strategic directions in the development of modern socio-economic and technical complexes.
This is caused by the need to maintain the resilience and stability in the functioning of
computer systems with a reconstructible structure and programmable logic under
various conditions of adverse effects of external and internal factors, which can be
anthropogenic and/or natural.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Analysis of known solutions</title>
      <p>
        In practice, when solving the problems of ensuring survivability, computer systems
with a reconstructible structure and programmable logic have received such an option
for managing the structures of computer systems as reconfiguration. The standard
(classical) technology for reconfiguring computer systems with a reconstructible structure
and programmable logic in case of failure of one of its resources includes the following
main steps [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">5-7</xref>
        ].
      </p>
      <p>Step 1. Determination and analysis of the time and place of a resource failure;
removal of the function (task) performed on this resource from the solution; transfer of
the function (task) to another resource (with/without saving the obtained intermediate
results).</p>
      <p>Step 2. Exclusion of a failed resource from the configuration of computer systems
with a reconstructible structure and programmable logic; an attempt to replace it with
a backup (of the same type), or a backup of a different type with similar functionality.</p>
      <p>Step 3. Exclusion of links to a failed resource, denial of access to it and for the
failed resource itself – an attempt to restore it. In case if a high-priority function (task)
has been solved on a failed resource, which, when transferred to other resources, begins
to conflict with functions (tasks) assigned to this resource, then, depending on the
service discipline, the execution of less priority functions (tasks) is interrupted; or simple
removal from the solution. Thus, in the framework of the standard reconfiguration in
case of failures and violations of the correct functioning of the corresponding node in
the computer system in order to maintain the highest priority functions of the specified
object or acceptable operating conditions, they “sacrifice” other functions or part of the
operable elements. In some cases, this reconfiguration is called a “blind”
reconfiguration, since during its implementation, as a rule, the following operations are not carried
out: accounting and analysis of the current characteristics of tasks and functions
performed in the computer system; analysis and assessment of the current state of the
computer system as a whole; operative calculation, evaluation and analysis of the target and
information-technical capabilities of the computer system for a reasonable
redistribution of the functions of a computer system between its operable elements and
subsystems. A prerequisite for the implementation of standard reconfiguration technology is
the presence of a multi-level model of the computer system. operability. A possible
graphical description of this model for one of the subsystems (structures) is shown in
Figure 1. In Figure 1, the vertices of the graph are associated with the technical states
(TSs) of a computer system. During operation, its elements can fall into various types
of TSs: a functioning TS, a faulty TS, an operative TS, an inoperative TS, as well as
correct and incorrect functioning. Figure 1 shows the main classes of the computer
system TSs:
- the class of fully operative and functioning states:</p>
      <p>S (u)  {S(u) },   1,..., N (u) .</p>
      <p>Elements of this class differ from each other in the level of accumulated deviations
from the norm of performance parameters in certain elements of the computer system;
- the class of partially operative states with the Вth level of efficiency and the yth
number of accumulated deviations. At the same time, it is believed that with an increase
in the index number, the Bth level of the computer system operability will decrease:</p>
      <p>S ( p)  {S B(yp)}, B  1,..., N1( p) , y  1,..., N2( p) .</p>
      <p>In the graph, operability levels are separated by horizontal dashed lines;
- the class of inoperative (failure) states of the computer system caused by the
appearance of the Cth type with the Nth amount of losses:</p>
      <p>S (o)  {SC(oN)}, C  1,..., N1(O) , N  1,..., N2(O) .</p>
      <p>In Figure, 1 SL is the limit state, i.e. the state, in which all elements of the computer
system are inoperative and the level of losses is maximum.</p>
      <p>In this Figure, the arcs of the graph correspond to transitions of the computer system
from one state to another. These transitions, as noted earlier, have a different nature:
some are structurally functional, others are not structurally functional. There exists the
following classification:</p>
      <p>- D-transitions, which are caused by failures of elements of a computer system and
its transition into a state with a lower level of performance or a higher amount of losses;
- A-transitions, which are caused by the achievement of the established threshold
values of the accumulated deviations number;</p>
      <p>- R-transitions, which are caused by partial or complete recovery of the computer
system operability;</p>
      <p>- C-transitions, which are caused by compensation of the accumulated deviations in
the parameters of both the elements and the computer system as a whole.</p>
      <p>In Figure 1, D-transitions are depicted by arcs directed from top to bottom;
A-transitions are given by horizontal arcs going from left to right; R-transitions are shown by
arcs going from bottom to top; C-transitions are the arcs from right to left. The dashed
line in Figure 1 marks the boundary between the operational and failure states of a
computer system. Given the above, the dynamics of the computer system operability in
the general case assumes the simultaneous implementation of the following processes
of changing the technical state of both elements of the computer system and the system
as a whole:
- degradation processes (D-processes);
- recovery processes (R-processes); - processes of accumulating parameter
deviations (A-processes);
- compensation processes of accumulated parameter deviations (C-processes).</p>
      <p>In this case, one of the goals of controlling the structural dynamics of computer
systems with a reconstructible structure and programmable logic is to provide the
highest possible level of operability of a computer system and its elements at every moment
in time. This goal is achieved by two complementary processes. First, by influencing
(controlling) the D-process (degradation) the possibility (probability) of transitions of
the computer system to the least desirable states is eliminated or reduced. Second, it is
done by using the organization (management) of the R-process (recovery) and the
Cprocess (compensation). To implement these processes both in the computer system
itself and in each of its elements (subsystems), a structural control loop is formed. Due
to this loop, the scheduling processes are realized by reconfiguring computer systems
with a reconstructible structure and programmable logic. Speaking about the possible
classes of tasks for reconfiguring computer systems, one should, first of all, proceed
from the so-called functional-structural approach (FSA) to the description of objects of
any nature (including computer systems). Characteristic of FSA features are:
- considering the dialectical relationship of functions and structure of objects with
the decisive role of the function in relation to the structure;
- a holistic approach to the analysis and synthesis of multi-level systems;
- considering material, energy and information links between elements of the system;
- considering the relationship of the investigated (created) system with the external
environment.</p>
      <p>The analysis of problems of reconfiguring computer systems taking into account the
FSA allowed to identify the basic concepts and definitions that are shown in Figure 2.
At the same time, considering various combinations of independent branches of the
given morphological tree, we can obtain a kaleidoscopic set of reconfiguration tasks for
computer systems with a reconstructible structure and programmable logic.</p>
      <p>These systems operate in conditions of significant non-stationarity and uncertainty
associated with changes in the content of goals and tasks, which computer systems with
a reconstructible structure and programmable logic face, the influence of disturbing
factors from the external environment and factors having a purposeful and/or unfocused
nature. Moreover, in real life, disturbing environmental factors can be deterministic or
unknown, described using probability-statistical or fuzzy-probable formalisms. In the
process of reconfiguring computer systems with a reconstructible structure and
programmable logic, the following main goals are pursued: preservation, implementation
and restoration of the target and information-technological capabilities of the system.
The implementation of reconfiguration can be carried out simultaneously in several
directions.</p>
      <p>
        The "vertical" direction implies the implementation of a reconfiguration of a
computer system when it affects two complementary processes. The first one is the process
of computer system degradation in order to eliminate or reduce the possibility of a
computer system transferring to the least desirable states. The second one is the recovery
process in order to partially or fully achieve an operable state. The "horizontal"
direction is the impact on the process of accumulating deviations of FE parameters (or the
computer system as a whole) and the impact on the process of compensating for
accumulated deviations. In addition, the following can be considered as the most essential
morphological features of the process of a computer system reconfiguration: space,
time, resource allocation mode and the formation of control actions. According to the
"space" feature, the variants for reconfiguring a computer system can be distinguished
into local and global. A local variant of reconfiguration of a computer system deals with
individual FEs, sets of FEs and/or individual subsystems of a computer system. In the
case of global reconfiguration, the process relates generally to the entire computer
system. The "time" classification feature is closely related to the state of the computer
system and its objects during reconfiguration. Static reconfiguration is performed after
the computer system has been interrupted. The main disadvantages of this type of
reconfiguration are: - demand to stop the computer system, which entails not only the
shutdown of the computer system, but also the shutdown of the associated service
objects; - reconfiguration of the computer system should be carried out by external means
since in these conditions the internal resources of the computer system cannot be used.
The advantages of the dynamic reconfiguration, which is performed during the
operation of a computer system, are the ability to maintain the operability of its service
subsystems during the reconfiguration of a computer system and the ability to use its
internal resources and reserves [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8-10</xref>
        ]. The development of control actions during
reconfiguration of a computer system can be based on both a priori and a posteriori information
about the behavior of individual FEs and subsystems of a computer system. As for the
options for reallocating the resources of a computer system in the process of its
reconfiguration, the following modes can be distinguished: centralized, decentralized, or a
combination of these modes. In the centralized mode, the allocation of resources is
carried out using a unified model that includes both the initial state of the computer system
and all kinds of (most likely) intermediate states caused by destructive influences. In
the decentralized mode, the selection of a resource allocation plan for the initial state
of a computer system is carried out in such a way that subsequent reallocation caused
by adverse effects will allow the rational use of computer system resources. The
determination of optimal control programs for the main elements and subsystems of a
computer system can be performed only after the list of functions and algorithms for
information processing and control becomes known, which should be implemented in these
elements and subsystems [
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14 ref15 ref16">11-16</xref>
        ]. In turn, the distribution of functions and algorithms
by elements and subsystems of a computer system depends on the structure and
parameters of the laws of managing these elements and subsystems. The evolving situation is
closely connected with the principle of the duality of the past and the future. This means
that you can have knowledge about the past, but you cannot control it, and you can
design the future without knowing it.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Algorithm for solving the problem of constructing a trajectory for structural reconfiguration of computer systems with a reconstructible structure and programmable logic</title>
      <p>The task of constructing a trajectory for the structure reconfiguration during the
degradation or recovery of a computer system with a reconstructible structure and
programmable logic can be represented asNthe follo wain)goptaa0ijmxX0i(,mzxxaaajiNtn1i)oxn, problem:
j0 Ffailure (x j xxl (xaj )0,l1f,2,...L
{Qj1,Qj2 ,...,QjN }Qˆ .</p>
      <p>(1)
(2)
(3)</p>
      <p>To solve the considered problem of structural reconfiguration of a computer system,
we use a combined method, which includes the method of random guided search and
cutting off unpromising trajectories for structural reconfiguration of a computer system
using the "branch and bound" method. The random guided search in solving the
problem of scheduling the structural reconfiguration of a computer system can be
implemented as follows. When building a random sequence:</p>
      <p>
        (k)  [xa0 , xa(1k) , xa(2k) ,..., xa(Nk)1 , xaN ] .
of the intermediate states of the trajectory for structural reconfiguratio(kn), we are in some
x
intermediate structural state, which is characterized by the genome aj from which we
through the failure of one of the operable FE sets:
can go to one of the states of the next level of the computer system structure degradation
{Qi1 ,Qi2 ,...,Qip }  Qˆ
. Moreover, the
values ar  Ffailure (xir ), r  1,..., p characterize the contributions to the structural failure
upon failure of these FEs. In the general case, ar  [1,1] . To carry out the guided
search, the interval [
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ] is divided into subintervals so that the coordinates of the ends
of the subintervals form the sequence
      </p>
      <p>0,1  b1, 2  1  b2 ,..., p   p1  bp  1 .
where</p>
      <p>p
br  1 ar    (1 ar )
 ; r1</p>
      <p>. Here, the smaller the contribution ar to the value
of the structural failure index when the FE is removed , the greater the length
Q
of the sub-interval br is assigned to this element, i.e. the element ir is "encouraged"
Qir Qˆ
by the large sub-interval. For random selection of the FE removed from the structure, a
random number  is generated that is distributed uniformly in the interval from 0 to 1,
which falls into a certain sub-interval   ( r 1 , r ) and thereby determines the
selection of the FE removed from the structure of the computer system. Thus, in accordance
with the constructed probabilistic hypothesis, a search for a global extremum is
organized. In addition, in the vicinity of the global extremum, the density of randomly
selected trajectories for a reconfigurable computer system will be the highest. To increase
the efficiency of random guided search, it is proposed for each test to compare the
intermediate values of the total structural failure indicator obtained on this trajectory of
the computer system reconfiguration with the record value and stop the started test as
soon as the intermediate value of this indicator exceeds the record one. If the specified
number of tests has been carried out, then the calculation is considered complete. The
calculation can be considered complete even if subsequent tests do not provide an
improvement in the result. Using the proposed approach allows to guarantee the reception
of the trajectory of the computer system structural reconfiguration in a sufficiently
small vicinity of the optimal trajectory. At the same time, the process of finding a
solution can be limited both by the time allocated for making a decision, by the
productivity of the used computing tools, and by analyzing the nature of the process of taken
decisions convergence to the optimum. The proposed approach can be implemented in
the form of an algorithm consisting of the following steps.</p>
      <p>Step 0. The initial state. We set the number of statistical tests M; the number of tests
dFfrtaehicluoarretd does not give an improvement in the result; current test k = 0; the record
.</p>
      <p>1. The beginning of the next test. List of deleted
Qˆ St{eQpi1 , Qi2 ,..., QiN } ; intermediate total structural failure Ffailure  0 .
critical FEs
state of the current trajectory is determined</p>
      <p>Step 2. Random selection of the deleted FE. One of the FEs is randomly selected
ˆ Q
from the list Q in the manner described above, let it be ir . The intermediate structural
x(k ) (xa( kj)1  x(k ) )
aj aj</p>
      <p>Step #3. Analysis of the intermediate structural state
Ffailure (xa( kj ) )
.
x(k )
a j . The structural failure
and the change in the current total structural failure Ffailure  Ffailure (xa( kj ) )
Step 4. Analysis of the list of deleted FEs. FE
Qˆ  </p>
      <p>, then the test is over. Moreover, if
are calculated. If - Ffailure  Ffraeicluorred (F record
failure is the current record), then proceed to Step 5.</p>
      <p>Q ˆ</p>
      <p>ir is excluded from the list Q . If
Ffailure  F record
failure , then</p>
      <p>Ffraeicluorred  Ffailure . If
Qˆ  </p>
      <p>, go to Step 2.</p>
      <p>Step 5. rAeconrdalysis of test results. If the number of consecutive tests with no results
Ffailure  Ffailure is greater than d, then the procedure ends. If k&gt; M, then the procedure
ends. Otherwise, go to Step 1. The finiteness of the Qaˆlgo{rQithim constructed according to
this scheme follows from the finiteness of the set 1 , Qi2 ,..., QiN } , the finiteness
oQˆf th{eQin,uQmib,.e..r, Qoif}tests M and the sequential deletion of the FEs from the set
1 2 N .</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions and recommendations</title>
      <p>The analysis of the optimization problem features in constructing scenarios for the
structural reconfiguration of computer systems with a reconstructible structure and
programmable logic was carried out. The results have shown that methods and algorithms
of the theory of search engine optimization of evolutionary type should be used to solve
the considered problem. To solve the given problem, the method and the algorithm that
implements this method are proposed, the novelty of which is the combined use of the
random guided search method and the method of cutting off unpromising structural
reconfiguration options for computer systems with a reconstructible structure and
programmable logic such as “branch and bound”. The proposed approach allows solving
the optimization problems of constructing scenarios for the structural reconfiguration
of computer systems with a reconstructible structure and programmable logic, both
unconditional and conditional, that can be described using various structural and
topological indicators. At the same time, modification of the proposed method allows the
construction of a series of optimistic and pessimistic scenarios for the structural
reconfiguration of computer systems with a reconstructible structure and programmable logic.
The research has been carried out on the basis of the Educational and Scientific
Laboratory of “Reconfigurable and Mobile Systems” at the Department of Electronic
Computers in Kharkov National University of Radio Electronics.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Churyumov</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tkachov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tokariev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diachenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Method for Ensuring Survivability of Flying Ad-hoc Network Based on Structural and Functional Reconfiguration</article-title>
          .
          <source>In: XVIII International Scientific and Practical Conference «Information Technologies and Security» (ITS</source>
          <year>2018</year>
          ), pp.
          <fpage>64</fpage>
          -
          <lpage>76</lpage>
          . Kyiv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Tkachov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tokariev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dukh</surname>
          </string-name>
          , Ya.,
          <string-name>
            <surname>Volotka</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Method of Data Collection in Wireless Sensor Networks Using Flying Ad Hoc Network</article-title>
          .
          <source>In 5th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology</source>
          , pp
          <fpage>197</fpage>
          -
          <lpage>201</lpage>
          , Kharkiv, Ukraine (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. Dodono,v A.,
          <string-name>
            <surname>Gorbachyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznietsova</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Management organization of mobile technical objects group / In: XVII
          <source>International Scientific and Practical Conference «Information Technologies and Security» (ITS</source>
          <year>2017</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . Kyiv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorbachyk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznietsova</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Increasing the survivability of automated systems of organizational management as a way to security of critical infrastructures</article-title>
          .
          <source>In: XVIII International Scientific and Practical Conference «Information Technologies and Security» (ITS</source>
          <year>2018</year>
          ), pp.
          <fpage>261</fpage>
          -
          <lpage>270</lpage>
          . Kyiv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Barabash</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kravchenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mukhin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kornaga</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leshchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Optimization of Parameters at SDN Technologie Networks</article-title>
          .
          <source>International Journal of Intelligent Systems and Applications</source>
          .
          <volume>9</volume>
          (
          <issue>9</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lemeshko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yeremenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tariki</surname>
          </string-name>
          , N.:
          <article-title>Solution for the Default Gateway Protection within Fault-Tolerant Routing in an IP Network</article-title>
          .
          <source>International Journal of Electrical and Computer Engineering Systems</source>
          .
          <volume>8</volume>
          (
          <issue>1</issue>
          ),
          <fpage>19</fpage>
          -
          <lpage>26</lpage>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Bielievtsov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruban</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smelyakov</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sumtsov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Network technology for transmission of visual information /</article-title>
          / In: XVIII
          <source>International Scientific and Practical Conference «Information Technologies and Security» (ITS</source>
          <year>2018</year>
          ), pp.
          <fpage>161</fpage>
          -
          <lpage>275</lpage>
          . Kyiv,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Pavlov</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          :
          <article-title>Metodologicheskiye osnovy resheniya problemy planirovaniya struktur-nofunktsional'noy rekonfiguratsii slozhnykh ob"yektov</article-title>
          .
          <source>Izvestiya Vysshikh Uchebnykh Zavedeniy. Priborostroyeniye</source>
          ,
          <volume>55</volume>
          (
          <issue>11</issue>
          ),
          <fpage>7</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorbachik</surname>
          </string-name>
          , Ye.S.:
          <article-title>Vvedeniye v Teoriyu Zhivuchesti Vychis-litel'nykh Sistem, Nauk</article-title>
          . Dumka,
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          (
          <year>1990</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lande</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          :
          <article-title>Zhivuchest' Informatsionnykh Sistem</article-title>
          . Nauk. Dumka,
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
          </string-name>
          , M.G.:
          <article-title>O nekotoroj strategii rekonfiguracii zhivuchih vychislitelnyh sistem</article-title>
          .
          <source>Gibridnye vychislitelnye mashiny i kompleksy</source>
          ,
          <volume>11</volume>
          ,
          <fpage>31</fpage>
          -
          <lpage>35</lpage>
          (
          <year>1988</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsova</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          :
          <article-title>Raspredelenie resursov v zhivuchih vychislitelnyh sistemah</article-title>
          .
          <source>Gibridnye vychislitelnye mashiny i kompleksy</source>
          ,
          <volume>7</volume>
          ,
          <fpage>20</fpage>
          -
          <lpage>23</lpage>
          (
          <year>1984</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Westmark</surname>
            ,
            <given-names>V. R.:</given-names>
          </string-name>
          <article-title>A definition for information system survivability</article-title>
          .
          <source>In 37th Annual Hawaii International Conference on System Sciences</source>
          , p.
          <volume>10</volume>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Romashkova</surname>
            ,
            <given-names>O.N.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Dedova</given-names>
            <surname>Ye</surname>
          </string-name>
          .V.:
          <article-title>Zhivuchest' besprovodnykh setey svyazi v usloviyakh chrezvychaynoy si-tuatsii</article-title>
          .
          <source>T-Comm: Telekommunikatsii i Transport</source>
          ,
          <volume>6</volume>
          ,
          <fpage>40</fpage>
          -
          <lpage>43</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Lande</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          :
          <article-title>Metodi pidvishennya zhivuchosti informacijnoyi skladovoyi korporativnih informacijno-analitichnih sistem pidtrimki prijnyattya rishen</article-title>
          .
          <source>Reyestraciya, zberigannya i obrobka danih</source>
          ,
          <volume>14</volume>
          (
          <issue>2</issue>
          ),
          <fpage>48</fpage>
          -
          <lpage>58</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Dodonov</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lande</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Putyatin</surname>
            <given-names>V.G.</given-names>
          </string-name>
          <article-title>Informacijni potoki v globalnih komp'yuternih merezhah</article-title>
          . Naukova dumka,
          <source>Kyiv</source>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>