<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Cyber Object State Maximal Probability Timing Obtained Through Multi-Optional Technique</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Andriy</forename><surname>Goncharenko</surname></persName>
							<email>andygoncharenco@yahoo.com</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Cyber Object State Maximal Probability Timing Obtained Through Multi-Optional Technique</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">BD4EE6E17EB69C2EE1584D1A57634107</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T13:10+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>cyber hygiene</term>
					<term>conflict management</term>
					<term>global information networks</term>
					<term>effectiveness functions entropy</term>
					<term>hybrid-optional effectiveness</term>
					<term>multi-optionality</term>
					<term>optimal distribution</term>
					<term>variational principle</term>
					<term>entropy maximum principle</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this publication a Doctrine for the Conditional Extremization of the Hybrid-Optional Effectiveness Functions Entropy is discussed as a tool for the Cyber Object State Maximal Probability Assessments. Traditionally, most of the problems having been dealt with in this area must relate with the probabilistic problem settings. Regularly, the optimal solutions are obtained through the probability extremizations. It is shown a possibility of the optimal solutions "derivation", with the help of a model implementing a variational principle which takes into account objectively existing parameters and components of the Markovian process. The presence of an extremum of the objective state probability is observed and determined on the basis of the proposed Doctrine with taking into account the measure of uncertainty of the hybrid-optional effectiveness functions in the view of their entropy. Such approach resembles the well known Jaynes' Entropy Maximum Principle from theoretical statistical physics adopted in subjective analysis of active systems as the subjective entropy maximum principle postulating the subjective entropy conditional optimization. The developed herewith Doctrine implies objective characteristics of the process rather than subjective individual's preferences or choices, as well as the states probabilities maximums are being found without solving a system of ordinary linear differential equations of the first order by Erlang corresponding to the graph of the process.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction 1.Literature Survey</head><p>Cyber hygiene and conflict management in global information networks can be considered from the point of view of the theoretical developments for reliability <ref type="bibr" target="#b0">[1]</ref>.</p><p>The analogy of the hygiene to the maintenance procedures is very good. Therefore, the apparatus of theoretical physics related with the uncertainty measures <ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref> is quite applicable here. Thus, in the field of the Social Networking Services it is critical to take into considerations subjective entropy of preferences <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. The similar to the aircraft maintenance and repair approaches <ref type="bibr" target="#b6">[7]</ref>, combinations with the rationality of the choice behavior <ref type="bibr" target="#b7">[8]</ref>, <ref type="bibr" target="#b8">[9]</ref>, inspire global science and social science entropy research <ref type="bibr" target="#b9">[10]</ref>. In addition, economic issues <ref type="bibr" target="#b10">[11]</ref> in respect of risk <ref type="bibr" target="#b11">[12]</ref>, like in aviation <ref type="bibr" target="#b12">[13]</ref>, are complicated with the group decision making <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>.</p><p>All this initiated search for a new explanation of the described process. The presented doctrine, like developed in <ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref><ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref><ref type="bibr" target="#b29">[30]</ref>, is to demonstrate the possibilities of the entropy paradigm use to the variety of the problems solutions, for example discussed in works <ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref><ref type="bibr" target="#b32">[33]</ref><ref type="bibr" target="#b33">[34]</ref><ref type="bibr" target="#b34">[35]</ref><ref type="bibr" target="#b35">[36]</ref><ref type="bibr" target="#b36">[37]</ref><ref type="bibr" target="#b37">[38]</ref><ref type="bibr" target="#b38">[39]</ref>. Mathematical means intended to be used are of the regular calculus <ref type="bibr" target="#b39">[40]</ref>. Also, adjacent and similar formalism scientific areas, let us say mentioned in publications of <ref type="bibr" target="#b40">[41]</ref><ref type="bibr" target="#b41">[42]</ref><ref type="bibr" target="#b42">[43]</ref><ref type="bibr" target="#b43">[44]</ref><ref type="bibr" target="#b44">[45]</ref><ref type="bibr" target="#b45">[46]</ref><ref type="bibr" target="#b46">[47]</ref><ref type="bibr" target="#b47">[48]</ref><ref type="bibr">[49]</ref>, can implement the presented doctrine results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.2">The Problem Statement</head><p>Management of cyber incidents, warfare and conflicts are considered in terms of the mass service theory <ref type="bibr" target="#b36">[37]</ref><ref type="bibr" target="#b37">[38]</ref><ref type="bibr" target="#b38">[39]</ref>.</p><p>The considered cyber object (space) can change its states. Illustration of that is in the simplified graph (see Fig. <ref type="figure">1</ref>). Here, in Fig. <ref type="figure">1</ref>, "0", "1", and "2" designate the states of the cyber object. The corresponding values of the rates ij  and ji  will determine the process going on in the system.</p><p>The problem is to find the timing for the maximal values of the states probabilities, for instance of   t P 1 , analytically and in an easier than the traditional way. The proposed is the multi-optional way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Main Content</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Traditional Methods</head><p>Even for the simplified (partial to Fig. <ref type="figure">1</ref>) case, although implying the possible return of the system from the state "D" into the state of "A" without the transition into the state "F" (this transition is carried out with the parameter of Fig. <ref type="figure">2</ref>. A simplified graph of three states of a cyber space.</p><p>The corresponding, to the graph of Fig. <ref type="figure">2</ref>, system of differential equations by Erlang will have the view of</p><formula xml:id="formula_0">                        . ; ; 2 1 2 1 1 1 D F D A D D A A P dt dP P P dt dP P P dt dP (1)</formula><p>The characteristic equation for system (1) will be similarly <ref type="bibr" target="#b39">[40]</ref>:</p><formula xml:id="formula_1">  0 0 0 0 0 2 1 2 1 1 1              k k k . (<label>2</label></formula><formula xml:id="formula_2">)</formula><formula xml:id="formula_3">Determinant (2) yields                          0 0 0 0 1 2 1 1 2 1 k k k         0 0 0 0 0 2 1 1 1 1 2                    k k k . (<label>3</label></formula><formula xml:id="formula_4">)</formula><p>Which means</p><formula xml:id="formula_5">   0 1 1 1 2 1            k k k k . (<label>4</label></formula><formula xml:id="formula_6">)      0 1 2 1 1 1           k k k .<label>(5)</label></formula><p>Thus, we have already known at least one root:</p><formula xml:id="formula_7">0 1  k . (<label>6</label></formula><formula xml:id="formula_8">)</formula><p>Then, for finding two other roots from Eq. ( <ref type="formula" target="#formula_6">5</ref>)</p><formula xml:id="formula_9">0 2 1 2 1 1 1 2 1 1 1                 k k k k . (<label>7</label></formula><formula xml:id="formula_10">)</formula><p>Reducing Eq. ( <ref type="formula" target="#formula_9">7</ref>) and cancelling the similar members</p><formula xml:id="formula_11">1 1   and 1 1    , 1  A D F 2  1    0 2 1 1 2 1 2            k k . (<label>8</label></formula><formula xml:id="formula_12">)</formula><p>The sought roots are</p><formula xml:id="formula_13">a ac b b k 2 4 2 2     ; a ac b b k 2 4 2 3     ;<label>(9)</label></formula><p>where</p><formula xml:id="formula_14">1   a ,   1 2 1        b , 2 1     c</formula><p>are corresponding coefficients of <ref type="bibr" target="#b7">(8)</ref>.</p><p>For each root i k of Eq. ( <ref type="formula" target="#formula_1">2</ref>)-( <ref type="formula" target="#formula_6">5</ref>), ( <ref type="formula" target="#formula_9">7</ref>), ( <ref type="formula" target="#formula_11">8</ref>), namely 1 k , 2 k , 3 k Eq. ( <ref type="formula" target="#formula_7">6</ref>) and (9) we will write down the system of linear algebraic equations for</p><formula xml:id="formula_15">  i 1  ,   i 2  ,   i 3  [40]:                                               . 0 0 0 ; 0 0 ; 0 0 3 2 2 1 3 2 1 2 1 1 3 2 1 1 1 k k k (<label>10</label></formula><formula xml:id="formula_16">)</formula><p>The system of Eq. ( <ref type="formula" target="#formula_15">10</ref>) derives from an assumption of a partial solution existence</p><formula xml:id="formula_17">kt A e P 1   ; kt D e P 2   ; kt F e P 3   ;<label>(11)</label></formula><p>for the system of Eq. ( <ref type="formula">1</ref>). Since having three roots in the stated problem setting <ref type="bibr" target="#b39">[40]</ref>, the solution of (1):</p><formula xml:id="formula_18">    t k A e P 1 1 1 1   ;     t k D e P 1 1 2 1   ;     t k F e P 1 1 3 1   ; (<label>12</label></formula><formula xml:id="formula_19">)     t k A e P 2 2 1 2   ;     t k D e P 2 2 2 2   ;     t k F e P 2 2 3 2   ; (<label>13</label></formula><formula xml:id="formula_20">)     t k A e P 3 3 1 3   ;     t k D e P 3 3 2 3   ;     t k F e P 3 3 3 3   . (<label>14</label></formula><formula xml:id="formula_21">)</formula><p>In the way of direct substitution of partial solutions ( <ref type="formula" target="#formula_18">12</ref>)-( <ref type="formula" target="#formula_20">14</ref>) into equations, one can be convinced that the system of functions, similarly to <ref type="bibr" target="#b39">[40]</ref>:  where 1 C ; 2 C ; 3 C are arbitrary constants; also is the solution of the differential equations system (1). This is the general solution of the differential equations system (1), <ref type="bibr" target="#b39">[40]</ref>.</p><formula xml:id="formula_22">                                                                      ; ; ;</formula><formula xml:id="formula_23">t k t k t k F F F F t k t k t k D D D D t k t k t k A A A A e C e C</formula><p>Satisfying the condition of Eq. ( <ref type="formula" target="#formula_7">6</ref>) for root 0 1  k from the system of Eq. ( <ref type="formula" target="#formula_15">10</ref>)</p><formula xml:id="formula_24">                                                                . 0 0 0 ; 0 0 ; 0 0 1 3 1 1 2 2 1 1 1 3 1 2 1 1 2 1 1 1 1 3 1 2 1 1 1 1 1 k k k (16)                                                    . 0 0 0 ; 0 0 ; 0 0 1 3 1 2 2 1 3 1 2 1 2 1 1 1 1 3 1 2 1 1 1 1 (17)</formula><p>From where, immediately the coefficients are</p><formula xml:id="formula_25">  0 1 2   ;   0 1 1   ;   1 1 3   ; (<label>18</label></formula><formula xml:id="formula_26">) since   1 3</formula><p> is an arbitrary number, supposedly   1</p><formula xml:id="formula_27">1 3   , [40].</formula><p>For the Eq. ( <ref type="formula" target="#formula_11">8</ref>) roots of 2 k and 3 k , Eq. ( <ref type="formula" target="#formula_13">9</ref>), the system of Eq. ( <ref type="formula" target="#formula_15">10</ref>) analogous to the system of Eq. ( <ref type="formula">16</ref>) it yields</p><formula xml:id="formula_28">                                                                . 0 0 0 ; 0 0 ; 0 0 3 , 2 3 3 , 2 3 , 2 2 2 3 , 2 1 3 , 2 3 3 , 2 2 3 , 2 1 2 3 , 2 1 1 3 , 2 3 3 , 2 2 1 3 , 2 1 3 , 2 1 k k k (<label>19</label></formula><formula xml:id="formula_29">)</formula><p>The system of Eq. ( <ref type="formula" target="#formula_28">19</ref>) can be solved for unknown sought coefficients. Since one of the alpha coefficients can be chosen arbitrary, <ref type="bibr" target="#b39">[40]</ref>, let us assume</p><formula xml:id="formula_30">  1 3 , 2 2   . (<label>20</label></formula><formula xml:id="formula_31">)</formula><p>Then, from the first equation of system ( <ref type="formula" target="#formula_28">19</ref>)</p><formula xml:id="formula_32">    0 1 3 , 2 1 3 , 2 1        k ;   3 , 2 1 1 3 , 2 1 k      . (<label>21</label></formula><formula xml:id="formula_33">)</formula><p>Or from the second equation</p><formula xml:id="formula_34">    0 3 , 2 1 2 3 , 2 1 1         k ;   1 3 , 2 1 2 3 , 2 1        k . (<label>22</label></formula><formula xml:id="formula_35">)</formula><p>Or summing the first and second equations</p><formula xml:id="formula_36">      0 3 , 2 2 3 , 2 2 3 , 2 1 3 , 2        k k ;   3 , 2 3 , 2 2 3 , 2 1 k k      . (<label>23</label></formula><formula xml:id="formula_37">)</formula><p>All three expressions for   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>, i.e. Eq. ( <ref type="formula" target="#formula_32">21</ref>)-( <ref type="formula" target="#formula_36">23</ref>) are equivalent because all of them use the roots 2 k and 3 k , Eq. ( <ref type="formula" target="#formula_13">9</ref>) of the initial quadratic equation Eq. (8).</p><p>Indeed. Equalizing Eq. ( <ref type="formula" target="#formula_32">21</ref>) and ( <ref type="formula" target="#formula_34">22</ref>) we get</p><formula xml:id="formula_38">2 3 , 2 3 , 2 1 3 , 2 2 3 , 2 1 1 1 2 1 1 1 k k k k                . (<label>24</label></formula><formula xml:id="formula_39">)</formula><p>And cancelling for 1 1   in both parts of Eq. ( <ref type="formula" target="#formula_38">24</ref>) it yields Eq. ( <ref type="formula" target="#formula_11">8</ref>):</p><formula xml:id="formula_40">  0 2 3 , 2 3 , 2 1 2 1 2 1           k k . (<label>25</label></formula><formula xml:id="formula_41">)</formula><p>The same result is obtained if make equal Eq. ( <ref type="formula" target="#formula_32">21</ref>) and ( <ref type="formula" target="#formula_36">23</ref>):</p><formula xml:id="formula_42">2 3 , 2 3 , 2 2 3 , 2 1 2 1 3 , 2 1 k k k k           ;   0 2 1 3 , 2 1 2 1 2 3 , 2           k k .<label>(26)</label></formula><p>When equalling Eq. ( <ref type="formula" target="#formula_34">22</ref>) and ( <ref type="formula" target="#formula_36">23</ref>) it gives the same. Indeed:</p><formula xml:id="formula_43">  3 , 2 1 2 1 2 3 , 2 3 , 2 1 2 k k k           ;   0 2 1 3 , 2 1 2 1 2 3 , 2           k k . (<label>27</label></formula><formula xml:id="formula_44">) For coefficient   3 , 2 3</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head></head><p>, from the third equation of Eq. ( <ref type="formula" target="#formula_28">19</ref>) and condition <ref type="bibr" target="#b19">(20)</ref>,</p><formula xml:id="formula_45">    0 3 , 2 3 3 , 2 3 , 2 2 2      k ;   3 , 2 2 3 , 2 3 k    .<label>(28)</label></formula><p>Thus, turning back to the system of Eq. ( <ref type="formula">15</ref>), we determine the unknown coefficients of the general solution of the differential equations system (1), <ref type="bibr" target="#b39">[40]</ref>   <ref type="bibr" target="#b28">(29)</ref> From the second equation of the system of Eq. ( <ref type="formula">29</ref>) it yields</p><formula xml:id="formula_46">                                                                                . 0 ; 0 0 ; 0 1 ; ; ; 3 2 3 2 2 2 1 3 2 3 1 1 3 2 1 1 2 0 3 3 3 2 3 2 1 3 1 3 2 3 2 2 2 1 2 1 3 1 3 2 1 2 1 1 1 0 3 2 1 3 2 1 3 2 1 k C k C C C C k C k C e C e C</formula><formula xml:id="formula_47">3 2 C C   . (<label>30</label></formula><formula xml:id="formula_48">)</formula><p>Substituting the values of Eq. ( <ref type="formula" target="#formula_47">30</ref>) for the corresponding members into the first equation of the system of Eq. ( <ref type="formula">29</ref>) we get</p><formula xml:id="formula_49">                2 1 1 3 1 1 3 1 k k C ; 2 1 1 3 1 1 3 1 k k C         . (<label>31</label></formula><formula xml:id="formula_50">)</formula><p>In order to make the notations shorter let us put down the indications with the alpha symbolizations:</p><formula xml:id="formula_51">          2 1 3 1 3 3 1 3 2 1 3 1          C C C ;     2 1 3 1 3 1     C . (<label>32</label></formula><formula xml:id="formula_52">)</formula><formula xml:id="formula_53">    2 1 3 1 2 1      C . (<label>33</label></formula><formula xml:id="formula_54">)</formula><p>From the third equation of the system of Eq. ( <ref type="formula">29</ref>) we obtain</p><formula xml:id="formula_55">    3 3 3 2 3 2 1      C C C . (<label>34</label></formula><formula xml:id="formula_56">)</formula><p>Now, all coefficients are expressed through the given values, hence, the system of Eq. ( <ref type="formula">1</ref>) is successfully solved. The Laplace integral transformation methods give the same results. For the general case described with the graph shown in Figure <ref type="figure">1</ref>  </p><formula xml:id="formula_57">       2 1 1 2 1 2 1 0 2 1 2 1 k k e e a k k e k e k t P t k t k t k t k     t k t k e k k k b e k k b k k k b k k b 2 1 1 2 2 1 2 1 1 1 2 2 1 2 1 1                        . (<label>35</label></formula><formula xml:id="formula_58">)       t k t k t k t k e k k k c e k k c k k k c k k c k k e e t P 2 1 2 1 1 2 2 1 2 1 1 1 2 2 1 2 1 1 2 1 01 1                            . (<label>36</label></formula><formula xml:id="formula_59">)       t k t k t k t k e k k k d e k k d k k k d k k d k k e e t P 2 1 2 1 1 2 2 1 2 1 1 1 2 2 1 2 1 1 2 1 02 2                            .<label>(37)</label></formula><p>The values of the parameters in ( <ref type="formula" target="#formula_57">35</ref>) -( <ref type="formula" target="#formula_59">37</ref>) have the mathematical expressions corresponding to the general case (see Fig. <ref type="figure">1</ref>). Then, it has to be found the possible extreme values of the probabilities. For distinctness, let it be  </p><formula xml:id="formula_60">t P 1 .         t k t k t k t k e k k k c k e k k c k k k c k e k e k k k dt t dP 2 1 2 1 1 2 2 1 2 2 1 1 1 2 2 1 1 2 1 2 1 01 1                           .<label>(38)</label></formula><p>After equalizing <ref type="bibr" target="#b37">(38)</ref> to zero, the needed timing is</p><formula xml:id="formula_61">    1 2 1 2 01 1 1 01 * ln ln k k c k c k t p        . (<label>39</label></formula><formula xml:id="formula_62">)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">The Proposed Approach</head><p>Herein it is suggested to formulate the own concept (idea, problem, hypotheses).</p><p>In such respect , the considered example may be given an attention to in regards with the Multi-Optional Hybrid-Effectiveness Functions Uncertainty Measure Conditional Optimization Doctrine (method, approach, concept) applicable (used, implemented) to the cyber object state maximal probability timing determination <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b24">25]</ref>.</p><p>The values can be obtained not only in the entire probabilistic way, but also in a hybrid partially probabilistic partially optional way <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b24">25]</ref>.</p><p>The essence of the doctrine (method, idea, approach, concept) is to consider the process developing in the system from the position of some hybrid optional functions distribution optimality.</p><p>Consider the options essential to the general view three state system (see Fig. <ref type="figure">1</ref>).</p><p>Objective functional, like proposed in references <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b24">25]</ref>, is as follows:</p><formula xml:id="formula_63">                                          1 ln 3 1 1 3 1 12 1 01 * 3 1 1 1 i i i i i p i i i h xF M xF t xF xF ,         1 1 1 1 2 1 01 12 1 d c b pe p p c k M F i i i          M ,   1 01 12 c k M i i    ,     1 1 1 1 2 d c b pe p p       M , (<label>40</label></formula><formula xml:id="formula_64">)</formula><p>where</p><p>x is an unknown parameter;</p><formula xml:id="formula_65">  i i xF h 1 </formula><p>is the multi-optional hybrid functions depending upon the options effectiveness functions of</p><formula xml:id="formula_66">  i F 1 ; 01 *  p t</formula><p>is the intrinsic parameter of the system and the process, which is the ratio of the timing (delivering the sought maximal value to the probability) * p t , it is unknown yet for such problem formulation and the time of * p t is going to be determined as a solution, i.e. it is not the Eq. ( <ref type="formula" target="#formula_61">39</ref>) so far, however it will be, that is why the indication is the same, to the flow intensity 01  ;</p><p>  i M 12 is the algebraic addition of the initial elementary intensities matrix M formed in the style likewise from the Erlang's system, Eq. ( <ref type="formula">1</ref>), element of 12 m ;  is the parameter, coefficient, function (uncertain Lagrange multiplier, weight coefficient) for the normalizing condition.</p><p>Consider an extremum existence necessary conditions for the objective functional of ( <ref type="formula" target="#formula_63">40</ref>), <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b24">25]</ref>:</p><formula xml:id="formula_67">    0 1         i h i h xF h , 3 , 1  i . (<label>41</label></formula><formula xml:id="formula_68">)             1 2 01 01 * 2 1 1 1 01 01 * 1 1 ln 1 ln c k t xF c k t xF p p             . (<label>42</label></formula><formula xml:id="formula_69">)</formula><p>From where</p><formula xml:id="formula_70">            1 2 01 01 * 2 1 1 1 01 01 * 1 1 ln ln c k t xF c k t xF p p          . (<label>43</label></formula><formula xml:id="formula_71">)</formula><p>After that, we have got the law of subjective conservatism on one hand and on the other hand</p><formula xml:id="formula_72">              1 1 01 1 2 01 01 * 2 1 1 1 ln ln c k c k t xF xF p         . (<label>44</label></formula><formula xml:id="formula_73">)                                        01 1 1 01 1 2 * 2 1 1 1 ln ln c k c k t xF xF p . (<label>45</label></formula><formula xml:id="formula_74">)</formula><p>After that likewise Eq. ( <ref type="formula" target="#formula_61">39</ref>)</p><formula xml:id="formula_75">                       1 2 2 1 1 1 * ln ln k k F F t p .<label>(46)</label></formula><p>And finally equivalent with Eq. ( <ref type="formula" target="#formula_61">39</ref>) with taking into account the roots, i.e. the second, third, and fourth expressions of the Eq. ( <ref type="formula" target="#formula_63">40</ref>) (48)</p><formula xml:id="formula_76">                         1 2</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Discussion</head><p>Thus, the result of Eq. ( <ref type="formula" target="#formula_61">39</ref>) is obtained in absolutely not probabilistic rather in the Multi-Optional Hybrid-Effectiveness Functions Uncertainty Measure Conditional Optimization Doctrine way <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b19">20,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b24">25]</ref>. The same approach is applicable to   i F 2 with yielding the parallel to the Eq. ( <ref type="formula" target="#formula_61">39</ref>) and ( <ref type="formula">48</ref>) results. Now we ought to say that for the situation when the probability of   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>That is the system according to the developing stationary Poison flow process has the possible states optimal options related with either the system of parameters</p><formula xml:id="formula_77">  1 02 , , d k i  or   1 01 , , c k i <label>(50)</label></formula><p>values for the initial moment probability of the state "0" being equaled to "1". The proposed optional method is more compact and applicable for a cyber object state maximal probability timing determination.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>21 Fig. 1 .</head><label>211</label><figDesc>Fig. 1. A graph of three states of a cyber space.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="1,0.00,190.95,595.32,460.02" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Maintainability, maintenance, and reliability for engineers</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">S</forename><surname>Dhillon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Taylor &amp; Francis Group</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Information theory and statistical mechanics</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Jaynes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physical review</title>
		<imprint>
			<biblScope unit="volume">106</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="620" to="630" />
			<date type="published" when="1957">1957</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Information theory and statistical mechanics</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Jaynes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">II. Physical review</title>
		<imprint>
			<biblScope unit="volume">108</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="171" to="190" />
			<date type="published" when="1957">1957</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">On the rationale of maximum-entropy methods</title>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Jaynes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE</title>
				<meeting>the IEEE</meeting>
		<imprint>
			<date type="published" when="1982">1982</date>
			<biblScope unit="volume">70</biblScope>
			<biblScope unit="page" from="939" to="952" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">An Entropy Theory of Psychology and its Implication to Behavioral Finance</title>
		<author>
			<persName><forename type="first">Ch</forename><surname>Jing</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.465280</idno>
		<ptr target="http://dx.doi.org/10.2139/ssrn.465280" />
		<imprint>
			<date type="published" when="2014-09-07">2014/09/07</date>
		</imprint>
		<respStmt>
			<orgName>Social Science Research Network</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Subjective entropy of preferences. Subjective analysis</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kasianov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Institute of Aviation Scientific Publications</publisher>
			<pubPlace>Warsaw, Poland</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Kroes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">A</forename><surname>Watkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Delp</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sterkenburg</surname></persName>
		</author>
		<title level="m">Aircraft maintenance and repair</title>
				<meeting><address><addrLine>New York, USA</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw-Hill, Education</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>7th edn</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Conditional expected utility</title>
		<author>
			<persName><forename type="first">R</forename><surname>Luce</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Krantz</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Econometrica</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="page" from="253" to="271" />
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Individual choice behavior: A theoretical analysis</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">D</forename><surname>Luce</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Dover Publications</publisher>
			<pubPlace>Mineola, N. Y.</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Study on global science and social science entropy research trend</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">C</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">H</forename><surname>Lv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ye</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 5th International Conference on Advanced Computational Intelligence (ICACI)</title>
				<meeting><address><addrLine>Nanjing, Jiangsu, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="238" to="242" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Silberberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Suen</surname></persName>
		</author>
		<title level="m">The structure of economics. A mathematical analysis</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw-Hill Higher Education</publisher>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Reliability, maintainability and risk. Practical methods for engineers</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Smith</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Elsevier</publisher>
			<pubPlace>London</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">W</forename><surname>Wild</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Kroes</surname></persName>
		</author>
		<title level="m">Aircraft powerplants. 8th edn</title>
				<meeting><address><addrLine>New York, New York, USA</addrLine></address></meeting>
		<imprint>
			<publisher>McGraw-Hill, Education</publisher>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On investigating the cognitive complexity of designing the group decision process</title>
		<author>
			<persName><forename type="first">C</forename><surname>Zamfirescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Duta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Iantovics</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Studies in Informatics and Control</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="263" to="270" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">B</forename><surname>Zamfirescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Duta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Iantovics</surname></persName>
		</author>
		<ptr target="http://ssd.valahia.ro/UICS.pdf" />
		<title level="m">The cognitive complexity in modelling the group decision process</title>
				<imprint>
			<date type="published" when="2014-09-27">2014/09/27</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Airworthiness support measures analogy to the prospective roundabouts alternatives: theoretical aspects</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Advanced Transportation</title>
		<imprint>
			<biblScope unit="volume">2018</biblScope>
			<biblScope unit="page" from="1" to="7" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A multi-optional hybrid functions entropy as a tool for transportation means repair optimal periodicity determination</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Aviation</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="60" to="66" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Adaptive Regulation of Radiated Power Radio Transmitting Devices in Modern Cellular Network Depending on Climatic Conditions</title>
		<author>
			<persName><forename type="first">Al</forename><surname>Mazin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jamil</forename><forename type="middle">S</forename><surname>Hadidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Al-Azzeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><surname>Abakumova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Contemporary Engineering Sciences</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="473" to="485" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Optimal controlling path determination with the help of hybrid optional functions distributions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Radio Electronics, Computer Science, Control</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="page" from="149" to="158" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Aeronautical and aerospace materials and structures damages to failures: theoretical concepts</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Aerospace Engineering</title>
		<imprint>
			<biblScope unit="volume">2018</biblScope>
			<biblScope unit="page" from="1" to="7" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">ZigBee, Bluetooth and Wi-Fi Complex Wireless Networks Performance Increasing</title>
		<author>
			<persName><forename type="first">Mazin</forename><surname>Al Hadidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Samih Al-Azzeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tkalich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Khokhlachova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Communications Antenna and Propagation</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="48" to="56" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Optimal UAV maintenance periodicity obtained on the multioptional basis</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 4th International Conference on Actual Problems of UAV Developments (APUAVD)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="65" to="68" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Relative pseudo-entropy functions and variation model theoretically adjusted to an activity splitting</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th International Conference on Advanced Computer Information Technologies (ACIT&apos;2019)</title>
				<meeting><address><addrLine>Ceske Budejovice, Czech Rep</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="52" to="55" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Improved Method of Routing in UAV Network</title>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zhmurko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tkalich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2015 IEEE 3rd International Conference on Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)</title>
				<meeting>the 2015 IEEE 3rd International Conference on Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)<address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">ber 13-15. 2015</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="294" to="297" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Multi-optional hybrid effectiveness functions optimality doctrine for maintenance purposes</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering</title>
				<meeting><address><addrLine>TCSET-; Lviv-Slavske, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="771" to="775" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">An entropy model of the aircraft gas turbine engine blades restoration method choice</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">8th International Conference on Advanced Computer Information Technologies (ACIT&apos;2018)</title>
				<meeting><address><addrLine>Ceske Budejovice, Czech Republic</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="2" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Method For UAV Trajectory Parameters Estimation Using Additional Radar Data</title>
		<author>
			<persName><forename type="first">I</forename><surname>Parkhomey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zhmurko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 4th International Conference on Methods and Systems of Navigation and Motion Control</title>
				<meeting>the 2016 4th International Conference on Methods and Systems of Navigation and Motion Control<address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">October 18-20, 2016</date>
			<biblScope unit="page" from="39" to="42" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Method of Algorithm Building for Modular Reducing by Irreducible Polynomial</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Okhrimenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kovtun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Gancarczyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Karpinskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 16th International Conference on Control, Automation and Systems</title>
				<meeting>the 16th International Conference on Control, Automation and Systems<address><addrLine>Gyeongju, Korea</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">Oct. 16-19. 2016</date>
			<biblScope unit="page" from="1476" to="1479" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Navigational alternatives, their control and subjective entropy of individual preferences</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Goncharenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 3rd International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="99" to="103" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Analysis of self-similar traffic models in computer networks</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Al-Azzeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Al</forename><surname>Hadidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Shevchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Review on Modelling and Simulations</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="328" to="336" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Some hybrid models of subjective analysis in the theory of active systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kasjanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Szafran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Transactions of the Institute of Aviation</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="27" to="31" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Ground effect&quot; inter-modal fast sea transport</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Pagowski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Szafran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The International Journal on Marine Navigation and Safety of Sea Transportation</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="317" to="320" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Bezpieczeństwo lotu -zasada maksymalnej entropii. Bezpieczeństwo na Lądzie</title>
		<author>
			<persName><forename type="first">K</forename><surname>Szafran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Morzu i w Powietrzu w XXI Wieku</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="247" to="251" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Safety of navigation on the approaches to the ports of the republic of Poland on the basis of the radar system on the aerostat platform</title>
		<author>
			<persName><forename type="first">K</forename><surname>Szafran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kramarski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal on Marine Navigation and Safety of Sea Transportation</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">129134</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Bezpieczeństwo operatora pojazdu trakcyjnego -stanowisko prób dynamicznych</title>
		<author>
			<persName><forename type="first">K</forename><surname>Szafran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Logistyka</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="192" to="197" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Mathematical model of movement of the observation and tracking head of an unmanned aerial vehicle performing ground target search and tracking</title>
		<author>
			<persName><forename type="first">I</forename><surname>Krzysztofik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Koruba</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Applied Mathematics</title>
		<imprint>
			<biblScope unit="page">11</biblScope>
			<date type="published" when="2014">2014. 2014</date>
		</imprint>
	</monogr>
	<note>Article ID 934250</note>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Smirnov</surname></persName>
		</author>
		<title level="m">Technical operation of aircraft</title>
				<meeting><address><addrLine>Moscow, USSR</addrLine></address></meeting>
		<imprint>
			<publisher>Transport</publisher>
			<date type="published" when="1990">1990</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">V</forename><surname>Gnedenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">N</forename><surname>Kovalenko</surname></persName>
		</author>
		<title level="m">Introduction into the mass service theory</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>URSS</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Ovcharov</surname></persName>
		</author>
		<title level="m">Applicable problems of the theory of mass service</title>
				<meeting><address><addrLine>Moscow, USSR</addrLine></address></meeting>
		<imprint>
			<publisher>Machinebuilding</publisher>
			<date type="published" when="1969">1969</date>
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b39">
	<monogr>
		<title level="m" type="main">Differential and Integral Calculus for Higher Engineering Educational Institutions</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">S</forename><surname>Piskunov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1985">1985</date>
			<publisher>Nauka</publisher>
			<pubPlace>Moscow, USSR</pubPlace>
		</imprint>
	</monogr>
	<note>13th edn. in Russian</note>
</biblStruct>

<biblStruct xml:id="b40">
	<analytic>
		<title level="a" type="main">Method of sequential estimation of statistical distribution parameters</title>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 3rd International Conference Methods and Systems of Navigation and Motion Control (MSNMC)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="135" to="138" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">Estimation of the communication range and bandwidth of UAV communication systems</title>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Polihenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kharlai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Tkalich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 4th International Conf. on Actual Problems of UAV Developments (APUAVD)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="159" to="162" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Improved method of routing in UAV network</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">O</forename><surname>Zhmurko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">P</forename><surname>Tkalich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 3rd International Conference on Actual Problems of UAV Developments (APUAVD)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="294" to="297" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<analytic>
		<title level="a" type="main">Data processing in case of radio equipment reliability parameters monitoring</title>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Herasymenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kozhokhina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yu</forename><surname>Petrova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Wireless and Optical Communications (RTUWO 2018)</title>
				<meeting><address><addrLine>Riga, Latvia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="219" to="222" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">Statistical data processing in radio engineering devices operation system</title>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kuzmin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Zuiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kaminskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET 2018)</title>
				<meeting><address><addrLine>Lviv-Slavske, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">Radioelectronic equipment availability factor models</title>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Zuiev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Signal Processing Symposium 2013 (SPS 2013)</title>
				<meeting><address><addrLine>Poland</addrLine></address></meeting>
		<imprint>
			<publisher>Jachranka Village</publisher>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Research of energy characteristics of QAM modulation techniques for modern broadband radio systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Solomentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Odarchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 IEEE International Conference on Electronics and Information Technology (EIT)</title>
				<meeting>the 2016 IEEE International Conference on Electronics and Information Technology (EIT)<address><addrLine>Odesa, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">May 23-27, 2016</date>
			<biblScope unit="page" from="14" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Data processing in exploitation system of unmanned aerial vehicles radioelectronic equipment</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Solomentsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zaliskyi</surname></persName>
		</author>
		<author>
			<persName><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Zuiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Asanov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments (APUAVD)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="77" to="80" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
