<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cognitive-Impulse Model For Assessing Complex Technical Systems Survivability</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Odessa National Polytechnic University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Odessa</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine vint</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@yandex.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>nickolay.rud@gmail.com</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>nati.shibaeva@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kherson State Maritime Academy</institution>
          ,
          <addr-line>Kherson</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Petro Mohyla Black Sea National University</institution>
          ,
          <addr-line>Mykolayiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1832</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>The article proposes to assess the system components failure risk during diagnostics based on the research methods analysis results and complex technical systems models, in order to ensure their survivability. The authors developed a method for assessing the survivability of systems based on cognitiveimpulse modeling and interaction with a complex technical system, as with a digraph subjected to the impulse action of simulation modeling impulses. The created cognitive-impulse model allows us to evaluate the survivability, the degree of structural and functional damage to the complex technical system components and intercomponent connections. The developed cognitive-impulse model of survivability assessment has flexibility - the ability to use the method at any level of subsystem components failure risk assessment with their various configurations; adaptability - the ability to adapt to changes in the configuration of complex technical systems subsystems. The developed software allows to obtain both numerical and graphical results of various classes technical systems cognitive-impulse models studies and complexity. The developed cognitiveimpulse model effects over a complex technical system makes it possible to establish emergency and pre-emergency conditions for its subsystems.</p>
      </abstract>
      <kwd-group>
        <kwd>complex technical system</kwd>
        <kwd>survivability</kwd>
        <kwd>cognitive impulse modeling</kwd>
        <kwd>software</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The structure and functional properties of complex technical systems (CTS) are
determined by numerous heterogeneous components interacting with each other, the
number of which can reach thousands. In CTS design and operation, the reliability
requirements for systems are constantly being tightened. This is associated with the
failures risk, accidents and disasters arising from the technical systems operation. The
disruption of such systems functioning is possible if the connectivity of their
structures is broken. The system cannot perform its functions when there are no
interactions between all or its vital components. From the point of view of the security
concept, CTS must be studied from the standpoint of reliability, survivability.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Description of Problem</title>
      <p>
        Among the models used to assess CTS survivability, we can distinguish: normative
and descriptive approaches; probabilistic and deterministic models; fault trees;
logical-probabilistic and analytical methods [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7 ref8">1-8</xref>
        ]. Methods associated with structured
objects and fuzzy knowledge are used to assess the survivability of CTS. In practice,
these methods are rarely found in their pure form. Therefore, one of the most common
survivability assessment systems is combined systems (for example, combining
normative and logical-probabilistic approaches). The most developed methods are
logical-probabilistic models and fault trees. Another rapidly developing area is
cognitivesimulation modeling [
        <xref ref-type="bibr" rid="ref10 ref7 ref9">7,9,10</xref>
        ].
      </p>
      <p>
        CTS survivability assessment is impossible without taking into account the
structural and functional relationships of their subsystems and components [
        <xref ref-type="bibr" rid="ref11 ref12">11,12</xref>
        ]. To do
this, the CTS failure risk assessment should take into account the division of systems
into subsystems (complexes, aggregates), components (components and parts). As
part of the subsystem, structurally and functionally completed components of the
system can be considered, the interaction of which should ensure its reliable
operation. Each CTS component is associated with other components in a specific way.
Therefore, when assessing the CTS subsystems component failures risk it is necessary
to identify their interconnections and interactions, conducting a structural systems
analysis. When researching the CTS model, it is necessary to establish the features of
the system's functioning in various operating conditions and reduce the failure risk of
its subsystems and components. If we consider the problem of assessing the failures
risk in diagnosing CTS state from risk management theory view point [
        <xref ref-type="bibr" rid="ref13 ref14">13,14</xref>
        ], then
the corresponding model for assessing the survivability of a system should contain the
main components that affect its quality and functioning efficiency. Such an approach
in studies without detailing CTS, processes and phenomena occurring in them is a
system synthesis [
        <xref ref-type="bibr" rid="ref15 ref16">15,16</xref>
        ].
      </p>
      <p>
        In order to ensure CTS survivability under various operating conditions, to
successfully investigate systems reliability during their transitions between different state
variants, further development of methods for assessing CTS survivability, taking into
account the structural, functional interactions and interactions CTS subsystems and
components [
        <xref ref-type="bibr" rid="ref17 ref18 ref19 ref20">17- 20</xref>
        ] is necessary. It is actual to develop methods and models, new
solutions for CTS survivability assessment informatization to ensure: flexibility - the
ability to use methods at any level to assess the subsystems components failure risk
with their various configurations; adaptability - methods must have the ability to
adapt when changing CTS subsystems configuration.
      </p>
      <p>Thus, the solution of the systems ensuring the survivability problem upon receipt
of information about failures in their components and subsystems remains relevant in
the technical condition diagnosis.</p>
    </sec>
    <sec id="sec-3">
      <title>Principles of constructing a cognitive-impulse model for assessing complex technical systems survivability</title>
      <p>
        In order to ensure CTS survivability, taking into account the structural and
functional interactions and interactions of components and subsystems, it is proposed to
use system synthesis based on a probabilistic-deterministic model that describes
impulse propagation effects on system components. CTS research experience shows that
at the stage of assessing the survivability of its components and subsystems, it is
advisable to represent them as an oriented graph, the vertices of which are components
(subsystems) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] that have certain properties, and describe the interaction of
components (subsystems) using oriented graph edges. The survivability measure in this case
is the minimum number of CTS components (vertex connectivity [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]) or connections
(edge connectivity [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]), the failure of which under the influence of external
influences leads to a breakdown in the system structure connectivity.The proposed method
uses complex cognitive-impulse modeling and interacts with CTS, as with a digraph
subjected to impulse effects of different modeling and distribution modeling
simulation impulses. The essence of this modeling is that at one of oriented graph vertices a
certain change is specified. This vertex actualizes the entire indicators system, i.e.
peaks associated with it. Passing along the vertices and edges of the oriented graph,
the impulse changes their states and changes itself (depending on the model, the
impulse impact modulus can change). In assessing CTS structural threats, the effect of
the unchanging striking modeling impulse (SMI) is used, when propagating through a
oriented graph that modifies the state of individual components (subsystems).
Functional threats are evaluated using a varying diagnostic modeling impulse (DMI),
which propagates through the oriented graph and does not affect the vertices.
      </p>
      <p>The method uses the concepts of threats and risks. The threat is a dimensionless
off-scale assessment component vulnerability in terms system structural survivability
as a whole. CTS survivability is considered as a combination of two main factors
CTS vulnerability as a complex structure and the likelihood of CTS certain
components failure as a result of external or internal adverse effects. Threat analysis reveals
vulnerabilities - “weaknesses” in the CTS structure. The basic concepts in the
proposed method are the concepts of potential structural and functional threats. A
potential structural threat is a component position assessment in the CTS structure and its
role in the system topology. A functional threat also takes into account the position
and role of the component in the system, but from the point of view of potential
changes in the system’s operability, where operability means the probability that the
system will successfully complete tasks after exposure to adverse and damaging
factors. CTS is considered to be affected by external influences. An increase in the load
can be observed not only in those system components that are influenced by external
influences, but also in the components interacting (connected) with them. It should be
noted that we are talking only about loads that are not normative, i.e. taken into
account in the system design and operation. Short-term and powerful external (pulsed)
impacts can instantly and significantly reduce the reliability indicators of individual
components and the entire system as a whole, but CTS is able to maintain its
operability.</p>
    </sec>
    <sec id="sec-4">
      <title>Model of striking effects spread on CTS</title>
      <p>In the CTS digraph, vertices correspond to components (complexes, systems,
subsystems, elements), and directed arcs correspond to one of the types of
intercomponent connections (transfer of matter, information, or energy). Many vertices
(components) of a oriented graph V – (V = {vi}, i = 1, N ) . Pair vertices vi – oriented graph
edge – component interconnection (CI). CI set A − ( A = {a j}, j = 1, M ) . SMI impacts
are determined by the pulse vector impi, j (t ) for discrete time t = 0,1,2,3... Each
component (CI) characterized by specific properties, the combination of which
determine the state of the components (CI). The qualitative state of the CTS components is
expressed by the state functional</p>
      <p>vi = (Fvi , a ji , aij , H mvi (t ), K vi ) ,
where Fvi – current component performance; a ji , aij – quality state of incoming and
outgoing for a component CI; Kvi – component structural striking degree coefficient
(SSDC); H mvi (t) – amplitude change SMI coefficient, passing through the CTS
com, (2)
mi, j (t) , impmi+1, j (t) – SMI amplitude value at the CTS component input and
(1)
(3)
(4)
ponent
where imp
output
where Fa j
the CI beginning and end; Ka j
coefficient passing through CI.</p>
      <p>H mvi (t) =
imp
imp
mi+1, j
mi, j
(t)
(t)
w (t +1)
Kv = H mvi (t)  vi
i
wv (t)
i
where wv (t) , wv (t + 1) - the value of the component (vertex) weight at time points t ,
i i
t + 1 as a result of exposure to SMI.</p>
      <p>Qualitative state of CI CTS is expressed by the state functional
a j = ( Fa j , vij , v ji , H ma j (t ), K
a j ) ,
– CI current performance; vi, j , v j,i – quality condition of components at
– SSDC CI strike; H ma j (t) – SMI change amplitude</p>
      <p>a
H mj (t) =
imp
mi, j+1</p>
      <p>(t)
impmi, j (t)</p>
      <p>,
Ka j</p>
      <p>a
= H mj (t) 
w
ai, j
w
,
where impmi, j (t) , impmi, j+1</p>
      <p>(t) – amplitude value SMI at input and output CI.
where w</p>
      <p>(t ) , wai, j (t + 1) - weight value CI (edges) at time points t , t + 1 as a result
ai, j
SMI exposure.</p>
      <p>The structural vulnerability vertices (edges) structural damage degree coefficients
(SVC) reflect the level of threat assessment of the system, allowing us to rank the
CTS components according to the degree of structural significance and highlight the
least reliable.</p>
      <p>SMI impact on the vertex (edge) of the graph at a discrete time t determined by
(5)
(6)
(8)
(9)
• in parallel (before passing vi and v j ), t+1 (passing vi and v j ), t+2 (after
passing the junction point of the oriented graph)</p>
      <p>imp(t + 2)= imp(t ) vi + imp(t ) v j = imp(t )(vi + v j ) .</p>
      <p>Similarly, one can obtain relations for more complex series-parallel structures.
1 − impi(i, j) (t ) =</p>
      <p>wvi (ai, j ) (t )
wvi (ai, j ) (t −1)  Kvi  Ka j
(7)
where impi( j ) (t ) – impulse vector for vertex (edge) with number i ( i, j );
w</p>
      <p>vi (ai, j ) (t ) , wvi (ai, j ) (t − 1) – value edge (vertex) weight at a time t and at the
previous moment in time t − 1 . Oriented graph vertex weight wvi (t ) - the magnitude of
its reliability for the top vi vertex. Edge weight wai, j (t ) is determined by a
numerical value from 0 to 1 and is equal to the proportion of SMI from vi to v j . When
DMI passes through the CTS components at time t, the impulse actions are
determined for the connected components:
• sequentially (to the top vi ), t+1 (after passing v j ), t+2 (after going through the
vi and v j )</p>
      <p>imp(t + 2) = imp(t +1) v j = imp(t ) vi  v j .</p>
      <p>Representation of CTS in the form of a oriented graph and formalization of the
external influence on the system as an impulse action (1) - (6) defines a model of the
distribution of damaging effects across the system. Consider the impulse effect on the
CTS, the components of which have survivability and bonds equal to unity, using
SMI. The impact simulates the defeat of the object number i by a force impact 1.0 and
is equivalent to the complete defeat of the component and its failure. In a single
system, struck by a single impulse, the connections between the vertices of the oriented
graph are also single, so the SMI will propagate through the CTS until it disables all
available components. This is a case of the “worst case scenario” for a single hit.
Consequently, the criticality of an element (and with it the degree of damage to the
system) can be estimated by damage volume it causes to the CTS. As an example of
such an impact, consider a oriented graph (fig. 1). We sequentially act on each of its
vertices with a single impulse and follow the propagation of the impulse along the
oriented graph. We believe that in Fig. 1, the final phase of the impact of a single SMI
falls on the peak of V9.</p>
      <p>Consider the scenario of the defeat of a system unit by a single impulse (assuming
that the vertices of the oriented graph have unit conductivity). The pulse will
propagate through the system until it disables all available components. Hence, the
criticality of the edge (and with it the vulnerability of the system) can be estimated by the
extent to which the damage to the CTS as a whole causes the damage. We
sequentially act on each edge of the oriented graph with a single SMI and trace the propagation
of the impulse along the oriented graph. For example, Fig. 1 shows the final phase of
an impulse propagation in the event of a connection failure E8, 10 (failed digraph
connections are indicated by a dotted line). Peak and link structural vulnerability
assessments provide, as a first approximation, a weight estimate of the vertex or link
significance to ensure CTS survivability. Numerically, such an estimate is the greater,
the more vulnerable system component.</p>
      <p>As an example, lets study a numerical simulation of the oriented graph vertices
(edges) strike shown in Fig. 1. As a result, we obtained the following SSDC values of
oriented graph vertices.</p>
      <p>In accordance with the obtained results (Table 1) in the oriented graph under
consideration, the vertices V1, V2, V3 are structurally important, V4, V5, V6, V7, V8,
V9 are less structurally significant, the others are V10, V12, V11, V13, V14.</p>
      <p>It should be noted that a change in a single DMI in the case of passing through the
oriented graph vertices, provided that vertices weights are numerically equal to the
assessment of their performance, will be numerically equal to the overall performance
of the system. Therefore, modeling the passage through CTS of a single DMI allows
us to evaluate system performance according to the above criteria.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Cognitive impulse simulation software</title>
      <p>The following tools were chosen to simulate DMI effect on the system:
presentation of the original models in JSON format; high level Python programming
language; graphviz graph visualization tools; make utilities; Debian GNU / Linux
distribution tools. The simulation was carried out on the basis of the Debian GNU / Linux
distribution, with widespread use of shell software (makefiles, bash scripting
language).</p>
      <p>The utility uses special make-files, which indicate the dependencies of the files
from each other and the rules for satisfying them. Based on the information about the
time of each file last change, make determines and runs the necessary programs.
Technologically, the modeling process using the make-utility looked as follows: the
original model was formulated in terms of the JSON format, then transferred to the
Python program input. Program result was an array of tables in *.csv format and files
in *.dot language format. Then the array of dot-files using the make utility was batch
transferred to the input of the graphviz program, the result of which was an array of
the corresponding diagrams in *.png format. Analysis of the results was carried out by
means of Calc Libre Office. To simulate the damaging and simulating impulses, two
separate scripts were created, each of which contains a set of common functions. Both
programs include the main part, auxiliary functions and the SMI or DMI simulation
module, depending on the program purpose. The set of auxiliary functions is the same
for both programs and contains the following functions: GetJson - analyzes the JSON
file and builds a CIM based on it; DotFileDot - generates a dot-file with damaged
nodes and passing pulses; DotFile - generates a sequence of dot-files for graphviz;
Meet_In_Other - performs auxiliary functions (search for a node intersecting with
vectors of other nodes); TablesToCsv - saves the results of the program to an array of
csv tables. The HitPulse and DiagPulse routines, respectively, are used to model the
effects of DMI. Programs are organized in such a way that they can be called both on
their own (in stand alone mode) and as part of more complex software systems (in the
form of plug-in libraries of the Python language).</p>
      <p>Further processing of the results is performed using the GNU make utility and the
grpaphviz visualization utility. A file in the dot language format is a text description
of the graph in which the design of the nodes and the links between them is specified.
To facilitate batch processing of the received dot-files, a make-file was used. Such a
scheme made it possible to generate as all files at once (using the make directive
either make all), or separately (make_st for SMI, make_fun for DMI), as well as to
clean the directory before starting a new modeling cycle (make clean). In addition to
the GNU make utility, GNU core utilities were widely used in modeling, mainly for
converting csv tables to a form convenient for visualization using Calc Libre Office
tools. The main uses were the GNU awk table data processing language and the paste
utility included in the GNU coreutils package.</p>
      <p>The logical concept of the developed software in Python is based on a microservice
architecture with the goal of providing scalability and distribution of computational
operations for complex systems with a large number of elements and
interconnections. The user interface was developed by means of the QT Designer graphical
environment with the connection of the pyQt library; it is a *.ui format file that stores the
hierarchical structure of widget placement for processing user actions (data input,
initialization of computational processes and graph construction) in a declarative
form. The program code is implemented using the PyCharm IDE, based on 6 separate
classes: main (the entry point to the program, contains all external dependencies and
binds the structure of other classes), process (performs the functions of processing
input data from a json file and importing them into dictionary structures), controller
(provides the logic for processing user interaction with interface elements), calculate
(implements the calculation functions for performing the simulation), visualize
(implements the rendering and saving of the simulation results in the form of graph),
logger (logs user operations performed in the program and simulation results into
separate text files in *.log format). The diagram of the main options for using the
simulation system is shown in Fig. 2. The user can import data by starting the json file
parsing procedure. Set parameters for performing calculations, in particular,
restrictions on the number of elements, degree of nesting, or calculation time, as well as
parameters for generating graph images (image resolution, font type and size, color of
edges and vertices). Set parameters for performing calculations for a given system
structure for functional and structural damage, viewing calculation results in the form
of diagrams and tables, saving and loading a model (data serialization and
deserialization), saving generated action logs during the program operation, saving graph models
in the process modeling, as well as exporting data in tabular form in *.xls or *.csv
formats.</p>
      <p>As an illustration CMI software use is shown in Fig. 3. It shows the CTS
(communication network of some control system), depicted as a oriented graph, and Fig. 4
shows modeling signal passage. The network should ensure the passage of the
modeling signal from V6 to V2. A signal is sent to V6, which should reach V2. The main
event S is the signal passing from the V6 to the V2. Intermediate events Si, i =
{1,2,3,4,5,6} - signal not passing to the V2.</p>
      <p>Thus, at a basic level, the structural threat to survivability is assessed by the
sequential impact of SMI on each oriented graph vertices and then SSDC is calculated.
The functional threat to the survivability of each oriented graph vertex is estimated as
total DMI value ratio that passed through a CTS and the total DMI value during the
sequential each vertex model failure. The ratio of the obtained values allows to obtain
the CTS functional degree affection coefficient.</p>
    </sec>
    <sec id="sec-6">
      <title>Cognitive impulse CTS survival assessment research</title>
      <p>To conduct a CIM of assessing CTS survivability, an air conditioning system
(ACS) operating in the “summer” mode of operation was selected as an object (Fig.
5). The system consists of units: Cm - compressor; E - electric motor; K is the
capacitor; V is the evaporator; R1, R2 - control valves; N is the pump; Cn - control system;
A - air cooler. A distinctive feature of the model under consideration is the
nonhierarchical structure of the connections of its aggregates - the presence of a closed
loop "Cn - K - R1 - V", as well as the presence of two types of connections - resource
(solid lines) and information (dashed).</p>
      <p>To calculate SSDC, the vertices of the cognitive-impulse ACS model were
sequentially exposed to SMI. Changes in vertex states for the initial and final stages of SMI
propagation over the oriented graph are shown in Fig. 6.7 (disabled units are indicated
by a dotted line). For aggregate Cm SVC ks = 0.667 (Table 2).
In order to assess functional threats (FT) and failure risk (FR) of aggregates within
CIM, we expose the ACS digraph to DMI and analyze its distribution. Let us assume
the conditional efficiency of all model vertices equal Fa = 0.9. Having ranked the
results on the risk of failures (Table 4), we establish the most important ACS units for
functioning. The system operability is dependent on the state of the units E and Cm.</p>
      <p>In conducting the ACS studies, eighteen scenarios and one hundred thirty separate
state diagrams were considered for its nine units. As a result of cognitive-impulse
modeling, the values of structural and functional threats and risks were obtained,
vulnerabilities in the CTS were identified. The study of ACS cognitive-simulation
modeling allowed us to determine structural and functional vulnerabilities and determine
the “weight” and “contribution” of aggregates to the overall survivability of the
system, taking into account its layout and structure. The introduction of a reliability
indicator allows us to refine the ranking of aggregates by risk and obtain data that can be
used in the operation of the system and at the stage of its maintenance, modernization
and design. In accordance with the described impulse action on the oriented graph,
one can introduce various criteria (signs) for the system to reach the limit state. It
should be considered that the CTS is in a critical state if the reliability of one or more
of the most significant system components is below a certain acceptable level (critical
level of element reliability). Such a criterion unambiguously separates the CTS
component subcritical and supercritical state.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>The proposed method for assessing CTS survivability is based on integrated
cognitive-impulse modeling and interaction with the system, as with a oriented graph
subjected to impulse action of different modeling impacts of different propagation
patterns and changes. The created cognitive-impulse model makes it possible to evaluate
the survivability of components, intercomponent connections and CTS as a whole, to
determine the degree of structural and functional damage to CTS components and
intercomponent connections. The developed cognitive-impulse model of survivability
assessment has flexibility - the ability to use the method at any level of assessing the
subsystems components failure risk with their various configurations; adaptability
the ability to adapt to changes in the configuration of CTS sub-systems. The
developed software of the cognitive-impulse model for assessing CTS survivability allows
one to obtain both numerical and graphic results models studies systems of various
classes and complexity.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Atamanyuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Computer's Analysis Method and Reliability Assessment of Fault-Tolerance Operation of Information Systems</article-title>
          . In: ICT in Education, Research and Industrial Applications: Integration, Harmonization and
          <string-name>
            <given-names>Knowledge</given-names>
            <surname>Transfer</surname>
          </string-name>
          .
          <source>Proceedings of the 11th International Conference</source>
          ICTERI-2015 // S.Batsakis et al. (Eds.),
          <source>CEUR-WS</source>
          , Vol.
          <volume>1356</volume>
          , pp.
          <fpage>507</fpage>
          -
          <lpage>522</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Atamanyuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shebanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratenko</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volosyuk</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheptylevskyi</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atamaniuk</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Predictive Control of Electrical Equipment Reliability on the Basis of the Non-linear Canonical Model of a Vector Random Sequence</article-title>
          .
          <source>In: Proceedings of the International Conference on Modern Electrical and Energy Systems, MEES</source>
          <year>2019</year>
          ,
          <volume>8896569</volume>
          , рр.
          <fpage>130</fpage>
          -
          <lpage>133</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Hakobyan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aldemir</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Denning</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dunagan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al.:
          <article-title>Dynamic generation of accident progression event trees</article-title>
          .
          <source>In: Nucl. Eng</source>
          . Des., №
          <volume>238</volume>
          , рр.
          <fpage>3457</fpage>
          -
          <lpage>3467</lpage>
          (
          <year>2008</year>
          ). doi:
          <volume>10</volume>
          .1016/j.nucengdes.
          <year>2008</year>
          .
          <volume>08</volume>
          .005
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ibánez</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hortal</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Queral</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gómez-Magán</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sánchez-Perea</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernández</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , et al.:
          <article-title>Application of the integrated safety assessment methodology to safety margins. Dynamic event trees, damage domains, and risk assessment</article-title>
          .
          <source>In:Reliab. Eng. Syst. Saf</source>
          ., №
          <volume>147</volume>
          , рр.
          <fpage>170</fpage>
          -
          <lpage>193</lpage>
          (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .1016/j.ress.
          <year>2015</year>
          .
          <volume>05</volume>
          .016
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Mandelli</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yilmaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aldemir</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Metzroth</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Denning</surname>
          </string-name>
          , R.:
          <article-title>Scenario clustering and dynamic probabilistic risk assessment</article-title>
          .
          <source>In: Reliab. Eng. Syst. Saf</source>
          ., №
          <volume>115</volume>
          , рр.
          <fpage>146</fpage>
          -
          <lpage>160</lpage>
          (
          <year>2013</year>
          ). doi:
          <volume>10</volume>
          .1016/j.ress.
          <year>2013</year>
          .
          <volume>02</volume>
          .013
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Ryabinin</surname>
            <given-names>I.A.</given-names>
          </string-name>
          :
          <article-title>Nadezhnost' i bezopasnost' strukturno-slozhnykh sistem</article-title>
          .
          <source>SPb.: Politekhnika</source>
          , (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Vychuzhanin</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudnichenko</surname>
            <given-names>N.D.</given-names>
          </string-name>
          :
          <article-title>Metody informatsionnykh tekhnologiy v diagnostike sostoyaniya slozhnykh tekhnicheskikh sistem</article-title>
          . Monografiya,
          <string-name>
            <surname>Odessa</surname>
          </string-name>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Tsvetkov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>YA</surname>
          </string-name>
          .:
          <article-title>Slozhnyye tekhnicheskiye sistemy</article-title>
          .
          <source>In:Obrazovatel'nyye resursy i tekhnologii</source>
          , №
          <volume>3</volume>
          (
          <issue>20</issue>
          ), рр.
          <fpage>86</fpage>
          -
          <lpage>92</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Rudnichenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Vichuzhanin</surname>
          </string-name>
          , V.:
          <article-title>Information cognitive model of technological interdependence of marine technical recourses</article-title>
          .
          <source>In: Informatics and mathematical methods in simulation</source>
          , Vol.
          <volume>3</volume>
          , №3, рр.
          <fpage>240</fpage>
          -
          <lpage>247</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Vychuzhanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Rudnichenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zenkin</surname>
          </string-name>
          , E.:
          <article-title>Cognitive Model of the Internal Combustion Engine</article-title>
          . In: SAE International,
          <year>2018</year>
          -
          <volume>01</volume>
          -1738, рр. 1-
          <fpage>10</fpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .4271/2018- 01-1738
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Vychuzhanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Rudnichenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sagova</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          , et al.:
          <article-title>Analysis and structuring diagnostic large volume data of technical condition of complex equipment in transport</article-title>
          .
          <source>In: Machine Modelling and Simulations</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1088/
          <fpage>1757</fpage>
          - 899X/776/1/012049
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dorozhko</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarasov</surname>
            ,
            <given-names>A. G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baranovskiy</surname>
            <given-names>A. M.:</given-names>
          </string-name>
          <article-title>Otsenka nadezhnosti strukturno slozhnykh tekhnicheskikh kompleksov s pomoshch'yu modeley bayyesovskikh setey doveriya v srede GeNIe</article-title>
          . Intellectual Technologies on Transport, №
          <volume>3</volume>
          , рр.
          <fpage>36</fpage>
          -
          <lpage>45</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Zhang</surname>
          </string-name>
          , R.,
          <string-name>
            <surname>Brennan</surname>
            ,
            <given-names>T.J.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Lo</surname>
            ,
            <given-names>A.W.:</given-names>
          </string-name>
          <article-title>The origin of risk aversion</article-title>
          .
          <source>In: PNAS Proceedings of the National Academy of Sciences of the United States of America</source>
          , Vol.
          <volume>111</volume>
          , No.
          <volume>50</volume>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>82</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Shevtsov</surname>
          </string-name>
          , U.D.,
          <string-name>
            <surname>Dudnik</surname>
            ,
            <given-names>L.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aref</surname>
            'yeva,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fadeyev</surname>
          </string-name>
          , Ye.D.:
          <article-title>Prognozirovaniye parametrov tekhnicheskogo sostoyaniya dvigateley energeticheskikh ustanovok</article-title>
          . In:
          <article-title>Politematicheskiy setevoy elektronnyy nauchnyy zhurnal Kubanskogo gosudarstvennogo agrarnogo universiteta</article-title>
          , №
          <volume>132</volume>
          , рр.
          <fpage>508</fpage>
          -
          <lpage>517</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kurdyumov</surname>
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malinetskiy</surname>
            <given-names>G.G.</given-names>
          </string-name>
          :
          <article-title>Sinergetika i sistemnyy sintez. Novoye v sinergetike: vzglyad v tret'ye tysyacheletiye</article-title>
          , M.:
          <string-name>
            <surname>Nauka</surname>
          </string-name>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Mosleh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Groen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nejad</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Piers</surname>
          </string-name>
          ,
          <source>T. Simulation Based Probabilistic Risk Analysis Report. Center for Risk and Reliability</source>
          , University of Maryland (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Vychuzhanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudnichenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shibaeva</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Konovalov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Devising a method for the estimation and prediction of technical condition of ship complex systems</article-title>
          .
          <source>In: EasternEuropean Journal of Enterprise Technologies</source>
          , Vol.
          <volume>84</volume>
          , № 6/9, рр. 4 -
          <fpage>11</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Vichuzhanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudnichenko</surname>
          </string-name>
          , N.:
          <article-title>Development of the neural network model for prediction failure risk's of complex technical systems components</article-title>
          .
          <source>In: Informatics and mathematical methods in simulation</source>
          , Vol.
          <volume>6</volume>
          , №4, рр.
          <fpage>333</fpage>
          -
          <lpage>338</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Pohorletskyi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gritsuk</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zenkin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bulgakov</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Golovan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vichuzhanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>The Complex Application of Monitoring and Express Diagnosing for Searching Failures on Common Rail System Units</article-title>
          . In: SAE International,
          <year>2018</year>
          -
          <volume>01</volume>
          -1773, рр. 1-
          <fpage>10</fpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .4271/2018-01-1773
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Vichuzhanin</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rudnichenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mateichyk</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polyvianchuk</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Complex Technical System Condition Diagnostics and Prediction Computerization</article-title>
          . In: CMIS-2020
          <source>Computer Modeling and Intelligent Systems, Сeur-ws.org. 2608</source>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Kasti</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Bol'shiye sistemy</article-title>
          . Svyaznost', slozhnost' i katastrofy, M.:
          <string-name>
            <surname>Mir</surname>
          </string-name>
          (
          <year>1982</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Kochkarov</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochkarova</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khapayeva</surname>
            ,
            <given-names>L.K.</given-names>
          </string-name>
          :
          <article-title>Modelirovaniye fraktal'nogo razvitiya struktur prosteyshimi predfraktal'nymi grafami</article-title>
          .
          <source>In: Izvestiya YUFU. Tekhnicheskiye nauki, рр</source>
          .
          <fpage>90</fpage>
          -
          <lpage>101</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>