<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Diagnostics Methods for Modern Communication Tools in the Armed Forces of Ukraine Based on Neural Network Approach</article-title>
      </title-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>Timely diagnostics of the technical state and technical support of complex multifaceted systems that provide comprehensive automation of control processes requires the development of new, high-precision and reliable troubleshooting methods. Using one of these methods may include a neural network apparatus.</p>
      </abstract>
      <kwd-group>
        <kwd>Communication Tools</kwd>
        <kwd>Diagnostics Method</kwd>
        <kwd>Armed Forces</kwd>
        <kwd>Neural Network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>The level of preparedness of the Armed Forces of Ukraine (AFU) to perform
assignment directly depends on the availability of state-of-the-art weapons and military
equipment, but neither weapons nor any equipment will be able to ensure effective
performance of combat missions without quality command and weapons. Modern control and
communication systems must not only have high combat readiness, bandwidth,
stability, mobility, accessibility, controllability, but also ensure trouble-free operation of the
system and guarantee the quality of information exchange.</p>
      <p>
        In recent years, the AFU have been expanding and improving the system of
communication and the automatic control of forces. With the introduction of the widespread
use of modern digital radio stations of the Harris, Aselsan and Elbit companies, the
performance and functionality has increased, while the element base of electronic
equipment has become more complicated [
        <xref ref-type="bibr" rid="ref1 ref2">1-2</xref>
        ]. The complexity of the equipment
reduces the reliability of modern radio electronic equipment, which increases the
likelihood of failure and complicates its search. The main contradiction of modern
technology is that the more complex the instrument, the less reliable it is, the more accurate
the measuring (diagnostic) tool, the more expensive it is. Thus, it is necessary to find
the optimal ratio of parameters for measurement during diagnostics and accuracy class
of measuring equipment.
      </p>
      <p>
        The requirement of reliable operation of electronic equipment in the system of
complex automation of control processes with the use of complex multifaceted systems,
communication and automation tools (CAT) is especially acute. Therefore, the
development of new, high precision and reliable faultfinding methods is becoming
increasingly urgent. Considering the complexity of modern CAT, there is a need to automate
the process of diagnostics for troubleshooting of equipment. One such method may be
the development and use of a neural network apparatus [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3-5</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Problem Formulation</title>
      <p>In connection with the use in the Armed Forces of modern CATs, the improvement of
their diagnostics should carried out based on the use of scientifically grounded criteria,
modern diagnostic tools and the necessary specialized software. During the Joint Forces
Operation (JFO), the search for expedient ways of creating and improving a
scientifically grounded, economically feasible system of diagnostics of the CAT is continued,
aimed at ensuring that the accumulated knowledge, scientific achievements work
primarily to ensure national security and defense of Ukraine.</p>
      <p>The purpose of the article is to increase the efficiency of the diagnosis of CAT by
using a basic method of the neural network tool to assess the reliability and ensure the
guaranteed quality of operation of the means of this class.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>
        A variety of research methods can used in the diagnostic system, which include theories
of graphs, decision support systems, fuzzy sets, neural networks, multi-criteria
optimization methods, expert methods [
        <xref ref-type="bibr" rid="ref10 ref11 ref3 ref4 ref5 ref6 ref7 ref8 ref9">3-11</xref>
        ].
      </p>
      <p>
        According to the graph theory, it is possible to solve many problems in the field of
economics, technology and many other areas of human activity. An abstract oriented
graph is the basis for planning the actions of a human operator, changing the order of
the sequence of his actions, performing various operations. The setting of network
planning tasks begins with the identification of the nodal moments (events) of the operation,
which determine the beginning and end of its main stages, after which the measures
(work) are defined that lead to the implementation of each event and are accompanied
by the cost of time and resources. Then the events and the corresponding stages of work
are presented in the form of some logical sequence, namely a project graph that reflects
all the ways to achieve the goal of the operation. In the general case, the network graph
(Fig. 1) is a graph which nodes а x is events and oriented arcs Axy is the stages of work,
x  y . Thus in the graph any arc reflects only one stage of work, and in a case of a
situation when two stages of work have the same output and input nodes (events) an
additional fake stage of work is added, not related to the time and other resources.
One possible sequence of events and workflows from the original event to the final
event is the path of the project graph, and the path that has the maximum execution time
of each of the work stages and the total execution time of the entire operation is a critical
path. Decision Support Systems (DSS) are special interactive information systems that
use hardware, software, data, model databases and manager work to support all stages
of decision making in the analytical modeling process. In other words, DSS is a set of
software tools that includes a set of different decision support algorithms, a model base,
a database, ancillaries, and a management program (Fig. 2). The leading program
provides the decision-making process based on the specificity of the problem [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15 ref16 ref17 ref18">12-18</xref>
        ]. DSS
is used to support various decision-making activities specifically for:
 Facilitating interaction between data, data analysis and processing procedures and
decision-making models, on the one hand, and the decision-maker, as a user of these
systems, on the other;
 Providing supporting information, especially for performing non-structured or
semistructured tasks, for which it is difficult to determine in advance the data and
procedures of the relevant decisions.
Decision-making in problem-oriented information systems and systems of control is
carried out in the conditions of a priori uncertainty due to inaccuracy or incompleteness
of input data, stochastic nature of external influences, and lack of adequate
mathematical model of functioning, fuzzy purpose and human factor [
        <xref ref-type="bibr" rid="ref19 ref20 ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref4">4, 19-28</xref>
        ]. Uncertainty in
the system increases the risk of inefficient decision making, which can result in negative
economic, technical and social consequences. The uncertainties in decision-making
systems are the outcome of the variety of artificial intelligence methods. Methods based
on the rules of fuzzy logic are used for effective decision-making in case of uncertain
conditions of system operation. Such methods are based on fuzzy sets and use linguistic
quantities and utterances to describe decision-making strategies [
        <xref ref-type="bibr" rid="ref10 ref29 ref3 ref30 ref31 ref32 ref33 ref34 ref35 ref36 ref37 ref38 ref7 ref9">3, 7, 9, 10, 29-38</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>The Diagnostics Methods</title>
      <p>The method of expert evaluation gives an objective description of the qualitative and
quantitative aspects of the object of forecasting based on processing and analysis of a
set of individual opinions of experts.</p>
      <p>The quality of the experts’ review, its reliability and validity are crucially dependent
on the developed methodology and processing of individual expert values, which
includes the following steps:
 Selection of experts and assessment of their competence;
 Preparation of questionnaires for expert interviews;
 Obtaining expert opinions;
 Assessing the consistency of expert opinions;
 Evaluation of the reliability of the results.</p>
      <p>The advantage of expert methods is their relative simplicity for predicting almost any
situation, including in the context of incomplete information. An important feature of
these methods is the ability to predict the qualitative characteristics of the process for
the diagnosis of CAT. The disadvantages of expert methods include the subjectivity of
the opinions of experts and the limitations of their judgment.</p>
      <p>Multi-criteria optimization or programming is the process of simultaneously
optimizing two or more conflicting target functions in each given areas. A multi-criteria
problem is often understood not as a verbal description of the problem itself, but rather
by its model, namely: a multi-criteria task is a mathematical model of making the
optimal decision by several criteria. These criteria may reflect evaluations of the various
qualities of the object or process of diagnosis of a protected area that is being decided.</p>
      <p>Formal instrument for processing expert information is a mathematical apparatus of
fuzzy sets, which allows you to formulate decision rules for the diagnosis of CAT. It is
possible to formalize the relevant information using the linguistic variables "A", "B",
"C", "D". The linguistic variables "A", "B", "C" are the input variables, the linguistic
variable "D" is the output variable. Affiliation functions are built for each linguistic
variable, a fuzzy knowledge base is formed based on production rules, which is
necessitated by the need to account for the real time scale and convenience of presenting
information on procedures and conditions of their execution. Therefore, the solution of
Input signals</p>
      <sec id="sec-4-1">
        <title>Input layer</title>
      </sec>
      <sec id="sec-4-2">
        <title>Output signals</title>
        <p>
          Output layer
the problem of determining the order of diagnostics of system nodes is based on the use
of the instrument of fuzzy sets theory [
          <xref ref-type="bibr" rid="ref3 ref7">3, 7</xref>
          ]. In the future, the result of the evaluation
of the diagnostic system of the CAT can used with the application of the theory of
neural networks. The essence of a neural network (NN) is to approximate the functions
of many variables through linear operations. A set of values is given to the network
input and a corresponding set of output values is set in parallel (Fig. 3) [
          <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
          ].
        </p>
        <p>Neural networks and fuzzy logic are universal approximations of complex
(nonlinear) functional dependencies in many intellectual cybernetics problems.</p>
      </sec>
      <sec id="sec-4-3">
        <title>The inner layers</title>
        <p>
          The main feature of neural networks is their ability to learn, which is implemented using
specially designed algorithms. No prior information about the structure of the requested
functional dependency is required for training the neural network. A training sample in
the form of experimental input-output pairs is. The advantage of fuzzy logic is the
ability to use expert knowledge of the structure of an object in the form of linguistic
expressions: if "inputs", then "output". However, the apparatus of fuzzy logic does not
contain learning mechanisms, so the results of fuzzy inference depend heavily on the
kind of membership functions that formalize fuzzy terms. The result of combining
fuzzy logic with neural networks is a neural-fuzzy network has two major intellectual
properties: linguistics, that is, the use of natural language knowledge, and the ability to
learn in real time [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. The use of different methods of evaluation of the diagnostic
system determines the choice of the basic method. The analysis of the literature showed
that the use of neural networks for the diagnosis of communications (for example,
during routine of technical maintenance (TM), repair, as well as in a state of continuous
operation) is today a poorly understood and relevant direction that will allow to solve
this problem. There are several types of TM, each of which involves performing the
appropriate list of works. For virtually all types of TM work is carried out to check the
performance of the built-in control system or measurement of basic electrical
parameters using many measuring equipment, which has significant dimensions and high cost.
It takes even longer to find repair failures, measurement tools, deployment of
specialized ports, and the involvement of highly qualified personnel.
        </p>
        <p>It is possible to speed up and simplify the diagnosis process by using the neural
network apparatus, which have several important advantages:
 High performance of complex logic operations;
 The possibility of solving difficult formalized problems that share data of logically
incompatible nature (incomplete, incorrect);
 Sustainability of work that is compatible with the expansion, transformation and
improvement of knowledge;
 The reliability that is provided by the many paths to logical inference and the ability
to recover lost data;
 Ability to build self-learning and self-configuring systems;
 It is well combined with the traditional "computing" information processing
algorithms, which allows building complex control systems with maximum reliability,
adaptability and minimum resources used.</p>
        <p>
          To solve the problems logically, it is sufficient to use one of the following functions,
which determine the value of V excitation of a neuron, depending on the magnitude of
Vі and excitation of related neurons, weight ωi of these connections and threshold h [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]:
1.
2.
3.
4.
5.
        </p>
        <p>V :  ( іVіі  h ) ,
 (x) = x, if x  0 ;
  0 , otherwise </p>
        <p>V :  ( іVіі  h ) ,
V : if V  A then A else V ;</p>
        <p>V :  іVіі ,
V : if V  h then V
else</p>
        <p>0 ;</p>
        <p>V :  іVіі ,
V : if V  h  V  1 then V  h else if V  1then 1  h else 0 ;</p>
        <p>V : 1n  іVіі ,</p>
        <p>V : if V  h then V else 0 ;
where n is the amount of neuron’s active inputs.</p>
        <p>Taking into account the advantages of the NN instruments, the task of diagnostics in
TM of different types of CAT can reduced to the process of pattern recognition, where
the image is the state of CAT as a whole or its individual components. In this case, the
decision on the status of the CAT is made using the NN apparatus and it is possible to
carry out both a quantitative assessment of the parameters and to predict its state for a
certain period.</p>
        <p>Depending on the formulation of the problem, the input signals can be the basic
parameters (transmitter power, receiver sensitivity, etc.) and auxiliary (frequencies,
currents, and voltages at different control points of individual blocks) depending on the
problem statement. The output layer of the neural network characterizes the different
states of the system. In the course of training NN, the values of individual parameters
and the state of a particular CAT are generally memorized (image creation). The use of
this image in subsequent TM is the criterion for evaluation of "serviceable - faulty".
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Experiment, Result and Discussion</title>
      <p>As an example, a neural network (Fig. 4) is built to diagnose communication equipment
(an example of constructing a network for a task). The method of support vector
networks or tracing is used during the construction. As inputs (standards) working effects
are used: those that get on the device during its intended use, and those that are its main
output parameters (you can also use specially generated test effects). At the output
layer, the expected response to the defined input standard is formed.</p>
      <p>
        Take, for example, the neural network shown in Fig. 4. Suppose that all the same
neurons perform a single transfer function, and that the scales and thresholds realize
equal and general capabilities. We introduce the transfer function of an arbitrary j-th
neuron with the number of inputs m [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ]:
      </p>
      <p>m  0 if х  0
V :  (V jij  hi ),  (x)   ,</p>
      <p>j1  х if х  0
where Vj is the amount of excitation (of another neuron) that arrives at the j-th input; ωij
is weight of connections; hi – thresholds.</p>
      <p>For example, let us define that ωij = 0,8; hi = 0,2 and submit the situation to the input
(standart) {А1, В1, С2} is "distortion of the signal of the 1st path within the normal
range". According to the inputs of neurons 2, 3, 8, they receive single impulses. The
energy data of impulses of the output neurons is calculated then considering the
weighted connections between the neurons. Because of the calculation, we obtain that
the maximum excitation value (1, 4) reached the output neuron 11 (Exit 11).</p>
      <p>Based on the calculations for the construction of the network, we compose a Table
1, which reflects the correct operation of the network when making different decisions.
Analyzing the terms of the table, which correspond to reliable situations, it can seen
that the maximum excitation is determined correctly enough. This allows us to assert
that the neural network, designed directly for the task, is built correctly.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] it was shown the necessity of creating a measuring and diagnostic complex,
which may consist of a personal computer, a neural network (its software
implementation) and a switching device.
      </p>
      <p>For realization of this complex, it is necessary to use the device of neural networks
in carrying out diagnostics of other CATs with the use of a single package of
applications. Thus, one workplace will provide diagnostics during TM and troubleshooting.</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>The analysis showed that the Armed Forces of Ukraine are undergoing a gradual
reequipment of units for CATs, which allows providing a variety of information and
telecommunication services. Timely diagnostics of the technical state and technical
support of complex multifaceted systems that provide comprehensive automation of
control processes requires the development of new, high-precision and reliable
troubleshooting methods. Using one of these methods may include a neural network apparatus.</p>
      <p>Technically, the process of diagnostics of various CATs can implemented by a single
measuring and diagnostic complex based on a personal computer (PC). With a
switching device that connects the outputs of the equipment to the PC input, the status
recognition process takes seconds. The results of the construction of a neural network for
solving the problem of diagnostics of modern CAT are given, which will allow reducing
the time for conducting TM and the number of measuring instruments involved.</p>
      <p>In the future, it is necessary to create a single package of applications for diagnostics
of different types of communication devices based on neural networks, as well as a
switching device by which the outputs of the equipment should connected with the
input of the PC of the operator's workplace.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Lavrut</surname>
            ,
            <given-names>O.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klymovych</surname>
            ,
            <given-names>O.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrut</surname>
            ,
            <given-names>T.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zdorenko</surname>
            ,
            <given-names>Y.M.:</given-names>
          </string-name>
          <article-title>Novitni tekhnolohiyi ta zasoby zvʺyazku u Zbroynykh Sylakh Ukrayiny: shlyakh transformatsiyi ta perspektyvy rozvytku [The latest technologies and means of communication in the Armed Forces of Ukraine: the path of transformation and prospects for development]</article-title>
          .
          <source>In: Nauka i tekhnika Povitryanykh Syl Zbroynykh Syl Ukrayiny</source>
          ,
          <volume>1</volume>
          (
          <issue>34</issue>
          ),
          <fpage>91</fpage>
          -
          <lpage>101</lpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Lavrut</surname>
            ,
            <given-names>O.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klymovych</surname>
            ,
            <given-names>O.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarasjuk</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antonjuk</surname>
            ,
            <given-names>O.L.</given-names>
          </string-name>
          :
          <article-title>Stan ta perspektyvy suchasnykh tekhnologhij ta zasobiv radiozv'jazku v Zbrojnykh Sylakh Ukrajiny [The state and prospects of using and modern technologies and means of radio communication in the Armed Forces of Ukraine]</article-title>
          .
          <source>In: Systems of Arms and Military Equipment</source>
          ,
          <volume>1</volume>
          (
          <issue>49</issue>
          ),
          <fpage>42</fpage>
          -
          <lpage>49</lpage>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rybytska</surname>
            ,
            <given-names>O. M.:</given-names>
          </string-name>
          <article-title>The model of fuzzy expert system for establishing the pollution impact on the mortality rate in Ukraine</article-title>
          .
          <source>In: Computer sciences and information technologies (CSIT)</source>
          ,
          <volume>1</volume>
          ,
          <fpage>253</fpage>
          -
          <lpage>256</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peleshchak</surname>
          </string-name>
          , R.:
          <article-title>Satellite spectral information recognition based on the synthesis of modified dynamic neural networks and holographic data processing techniques</article-title>
          .
          <source>In: Proceedings of the International Conference on Computer Sciences and Information Technologies</source>
          , CSIT,
          <fpage>330</fpage>
          -
          <lpage>334</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Lavrut</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skydan</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lavrut</surname>
            ,
            <given-names>T.V.</given-names>
          </string-name>
          :
          <article-title>Perspektyvy razvytyya tekhnycheskoy dyahnostyky sovremennykh sredstv svyazy v vooruzhennykh Sylakh Ukrayny [Prospects for the development of technical diagnostics of modern communications in the Armed Forces of Ukraine]</article-title>
          .
          <source>In: Zbirnyk naukovykh pranʹ Kharkivsʹkoho universytetu Povitryanykh Syl</source>
          ,
          <volume>3</volume>
          (
          <issue>15</issue>
          ),
          <fpage>72</fpage>
          -
          <lpage>75</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Lokazyuk</surname>
            ,
            <given-names>V.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lyashkevich</surname>
          </string-name>
          , V.Y.:
          <article-title>Informatsiyna systema poshuku diahnostychnoyi infor-matsiyi mikroprotsesornykh prystroyiv</article-title>
          .
          <source>In: Radioelektronni i kompʺyuterni systemy</source>
          ,
          <volume>6</volume>
          (
          <issue>18</issue>
          ),
          <fpage>103</fpage>
          -
          <lpage>109</lpage>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Demkiv</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ukhanska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hladun</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kovalchuk</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petruchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dzyubyk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokulska</surname>
          </string-name>
          , N.:
          <article-title>Design of the architecture of an intelligent system for distributing commercial content in the internet space based on SEO-technologies, neural networks, and Machine Learning</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          -
          <fpage>98</fpage>
          ),
          <fpage>15</fpage>
          -
          <lpage>34</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wojcik</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fefelov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lurie</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voronenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et al.:
          <article-title>Hybrid Methods of GMDH-Neural Networks Synthesis and Training for Solving Problems of Time Series Forecasting</article-title>
          .
          <source>In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>513</fpage>
          -
          <lpage>531</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Tarasov</surname>
            ,
            <given-names>V.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymov</surname>
            ,
            <given-names>B.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levin</surname>
            ,
            <given-names>I.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Korniychuk</surname>
            ,
            <given-names>V.O.:</given-names>
          </string-name>
          <article-title>Intelektualʹni systemy pidtrymky pryynyattya rishenʹ: teoriya, syntez</article-title>
          , efektyvnistʹ. Kyyiv,
          <article-title>Mizhnarodna akademiya kompʺyuternykh nauk i system (</article-title>
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krejci</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voronenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakobchuk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kryvoruchko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Bayesian Networks' Development Based on Noisy-MAX Nodes for Modeling Investment Processes in Transport</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Pomorova</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olar</surname>
            ,
            <given-names>O.Y.</given-names>
          </string-name>
          :
          <article-title>Metod predstavlennya znanʹ u bahatokomponentnykh intelektualʹnykh systemakh diahnostuvannya mikroprotsesornykh prystroyiv</article-title>
          .
          <source>In: Radioelektron-ni i kompʺyuterni systemy</source>
          ,
          <volume>6</volume>
          (
          <issue>18</issue>
          ),
          <fpage>110</fpage>
          -
          <lpage>114</lpage>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rybytska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karpiak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matseliukh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Structuring the fuzzy knowledge base of the IT industry impact factors</article-title>
          .
          <source>In: Computer sciences and information technologies (CSIT)</source>
          .
          <article-title>(</article-title>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinina</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Fuzzy cognitive analysis and modeling of water quality</article-title>
          .
          <source>In: International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)</source>
          ,
          <fpage>289</fpage>
          -
          <lpage>294</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , at.:
          <article-title>A fuzzy model for gene expression profiles reducing based on the complex use of statistical criteria and Shannon entropy</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>754</volume>
          , Springer,
          <fpage>545</fpage>
          -
          <lpage>554</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lendyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rippa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sapojnyk</surname>
          </string-name>
          , G.:
          <article-title>Fuzzy Rules for Tests Complexity Changing for Individual Learning Path Construction. Svitlana Sachenko</article-title>
          .
          <source>In: International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <volume>945</volume>
          -
          <fpage>948</fpage>
          . (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chereshnyuk</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panasyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banasik</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golyash</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Fuzzy-multiple Approach in Choosing the Optimal Term for Implementing the Innovative Project</article-title>
          .
          <source>In: International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</source>
          ,
          <volume>533</volume>
          -
          <fpage>537</fpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The control agent with fuzzy logic</article-title>
          .
          <source>In: Perspective Technologies and Methods in MEMS Design, MEMSTECH</source>
          ,
          <fpage>40</fpage>
          -
          <lpage>41</lpage>
          . (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>The game method for orthonormal systems construction</article-title>
          .
          <source>In: The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM</source>
          ,
          <fpage>296</fpage>
          -
          <lpage>298</lpage>
          . (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Kravets</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyrkalo</surname>
          </string-name>
          , R.:
          <article-title>Fuzzy logic controller for embedded systems</article-title>
          .
          <source>In: International Conference on Perspective Technologies and Methods in MEMS Design</source>
          ,
          <volume>58</volume>
          -
          <fpage>59</fpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Paliy</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Turchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koval</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markowsky</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Approach to recognition of license plate numbers using neural networks</article-title>
          .
          <source>In:International Conference on Neural Networks - Conference Proceedings</source>
          ,
          <fpage>2965</fpage>
          -
          <lpage>2970</lpage>
          . (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.:</given-names>
          </string-name>
          <article-title>An Evaluation of the Information Technology of Gene Expression Profiles Processing Stability for Different Levels of Noise Components</article-title>
          .
          <source>In: Data</source>
          ,
          <volume>3</volume>
          (
          <issue>4</issue>
          ),
          <fpage>48</fpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Babichev</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durnyak</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pikh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Senkivskyy</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>An Evaluation of the Objective Clustering Inductive Technology Effectiveness Implemented Using Density-Based and Agglomerative Hierarchical Clustering Algorithms</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>532</fpage>
          -
          <lpage>553</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Boreiko</surname>
            ,
            <given-names>O. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zelinskyy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berezsky</surname>
          </string-name>
          , О.:
          <article-title>Development of models and means of the server part of the system for passenger traffic registration of public transport in the "smart" city</article-title>
          .
          <source>In: Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>1</volume>
          (
          <issue>2</issue>
          -
          <fpage>85</fpage>
          ),
          <fpage>40</fpage>
          -
          <lpage>47</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Kazarian</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teslyuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsmots</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tykhan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Implementation of the Face Recognition Module for the “Smart” Home Using Remote Server</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing III, AISC 871</source>
          , Springer,
          <fpage>17</fpage>
          -
          <lpage>27</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Matseliukh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bublyk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Intelligent System of Visual Simulation of Passenger Flows</article-title>
          .
          <source>In: CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>906</fpage>
          -
          <lpage>920</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Batiuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vysotska</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Intelligent System for Socialization by Personal Interests on the Basis of SEO-Technologies and Methods of Machine Learning</article-title>
          .
          <source>In: CEUR workshop proceedings</source>
          , Vol-
          <volume>2604</volume>
          ,
          <fpage>1237</fpage>
          -
          <lpage>1250</lpage>
          . (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aliekseyeva</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          :
          <article-title>Quality evaluation of information resources in web-projects</article-title>
          .
          <source>In: Actual Problems of Economics</source>
          <volume>136</volume>
          (
          <issue>10</issue>
          ),
          <fpage>226</fpage>
          -
          <lpage>234</lpage>
          . (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kis</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rybak</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Automated Information System for Connection to the Access Point with Encryption WPA2 Enterprise</article-title>
          .
          <source>In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>389</fpage>
          -
          <lpage>404</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Kis</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsymbaliak</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Development of System for Managers Relationship Management with Customers</article-title>
          .
          <source>In: Lecture Notes in Computational Intelligence and Decision Making</source>
          ,
          <volume>1020</volume>
          ,
          <fpage>405</fpage>
          -
          <lpage>421</lpage>
          . (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasevych</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pelekh</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ryshkovets</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Heterogeneous Data with Agreed Content Aggregation System Development</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>35</fpage>
          -
          <lpage>54</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burov</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pohreliuk</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oleshek</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bobyk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Web Resource Changes Monitoring System Development</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>255</fpage>
          -
          <lpage>273</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kowalska-Styczen</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynska</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Uniform Method of Operative Content Management in Web Systems</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2136</volume>
          ,
          <fpage>62</fpage>
          -
          <lpage>77</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Chyrun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gozhyj</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yevseyeva</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dosyn</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tyhonov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zakharchuk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Web Content Monitoring System Development</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>126</fpage>
          -
          <lpage>142</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Veres</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rusyn</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachenko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rishnyak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Choosing the Method of Finding Similar Images in the Reverse Search System</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          ,
          <volume>2136</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>107</lpage>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Basyuk</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasyliuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Mathematical Model of Semantic Search and Search Optimization</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2362</volume>
          ,
          <fpage>96</fpage>
          -
          <lpage>105</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Lytvynenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lurie</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krejci</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voronenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Savina</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taif</surname>
            .,
            <given-names>M. A.</given-names>
          </string-name>
          :
          <article-title>Two Step Density-Based Object-Inductive Clustering Algorithm</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>117</fpage>
          -
          <lpage>135</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Berko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alieksieiev</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lytvyn</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Knowledge-based Big Data Cleanup Method</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>96</fpage>
          -
          <lpage>106</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Leoshchenko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliinyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skrupsky</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subbotin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zaiko</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Parallel Method of Neural Network Synthesis Based on a Modified Genetic Algorithm Application</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , Vol-
          <volume>2386</volume>
          ,
          <fpage>11</fpage>
          -
          <lpage>23</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>