<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Valery Nicheporchuk[</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Applications of Analytical Technologies in Safety Management of Territories*</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of computational modelling of the Siberian Branch of the Russian Academy of Sciences</institution>
          ,
          <addr-line>50/44 Akademgorodok, Krasnoyarsk, 660036</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The methods of analytical data processing used for support information tasks for managing the security of territories are considered. The problem of data availability for operating analytics is investigated. The use of end-to-end decision-making support technologies in different territorial management tasks is shown. Identification of environmental and anthroposphere parameters by using the developed regulatory values is the basis for early response to hazards. Risk assessment using comprehensive data analysis is used to justify priority measures to improve the safety of the territories. The use of OLAP, Data Mining, Machine Learning to jointly processing Big Data of monitoring, hazard event catalogs and territory features allows quickly and effectively preventing threats to people life.</p>
      </abstract>
      <kwd-group>
        <kwd>Data Preprocessing</kwd>
        <kwd>Threat Identification</kwd>
        <kwd>Assessment of Territorial Risks</kwd>
        <kwd>Safety Management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        The growing number and scale of various danger manifestations, accumulation of
large amounts of data, and development of intelligent information processing
technologies necessitate the search for new methods to support the management of
natural and technogenic territorial security. The use of analytical tools makes it
possible to effectively solve complex and multifaceted problems of managing the
integrated territorial security, to predict emergency situations (ES) of particular types.
Sufficiently good scientific elaboration of analytical methods for assessing the
territory characteristics as complex systems is often poorly implemented in practice.
The main reason is the scarcity or inaccessibility of structured data. The data analysis
methods used nowadays allow obtaining generalized background safety assessments
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Such assessments are not enough for making decisions on reducing risks in taking
protective measures. Differences in the initial data used to compare different
territories lead to the need to apply correction factors that reduce the credibility of
* Copyright c 2020 for this paper by its authors. Use permitted under Creative Commons
License Attribution 4.0 International (CC BY 4.0).
estimates. The approaches based on the extreme statistics methods for processing
catalogs of emergencies and other dangerous events have not found wide practical
application [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It requires the development, standardization and replication of
integrated analytical models which allow studying territories on different scales (from
a country to a separate municipality).
      </p>
      <p>The paper presents a brief description of the developed approaches and promising
directions for solving management problems using analytical technologies.</p>
      <p>The paper is organized as follows. Section 2 reviews features of data
preprocessing. Section 3 presents a description of the on-line analytical processing for
integrated monitoring data. Analytical Methods for Assessing the Territorial Risks of
Emergencies are discussed in Sect. 4. Finally, the conclusion is given in Section 5.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Data Preprocessing</title>
      <p>
        The use of analytical methods in the management of territories, in contrast to that of
enterprises and corporations, is in its infancy [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. The identification of the
characteristics of the condition of technosphere objects, environmental parameters,
social systems which are significant for analytical processing, including the
construction of conceptual models of territories is a difficult task. In addition to
determining quantitative indicators characterizing the state of safety at different time
intervals, it is necessary to ensure their timely updating. The availability and quality
of monitoring data is constantly growing, but a significant part of information
resources of corporate systems is closed for researchers.
      </p>
      <p>
        The studies show that most of the data that ensure solving the problems of
prevention and elimination of emergencies in Russia require the development of new
approaches to data structuring [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This is connected not only with the prospects of
using Big Data, neural networks, but also with avoiding the practice of using office
systems for collecting, processing, and exchanging information. The existing
reporting procedure in the hierarchy of territorial security management has a few
problems, including:
 poorly elaborated data structure forces one to collect additional information, often
in a time pressure mode;
 large data volumes lead to duplicate data, whose consistency is difficult to verify;
 office data exchange formats do not support the independence of elements, and
names of disciplines, contributing to frequent changes in the structure of the
collected data;
 lack of services and data collection programs leads to overloading specialists at all
levels of territorial management with routine work on the consolidation or
transformation of reports;
 integrity of archives is not maintained, which worsens the starting conditions for
the application of analytical methods;
 lack of uniform reference books and classifiers complicates the use of analytical
technologies, and leads to ambiguous results.
      </p>
      <p>
        To fill the gaps in the generated arrays of formalized data, a distributed data
collection system was developed using the information model [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The system
provides effective support for all the stages of the information consolidation process,
from the tabular form preparation to the provision of collected data. A special toolkit
for operational modification of the information model allows one to adapt the system
when expanding the subject area, adding tabular forms for information providers. The
operation of the system in the territory administrations of the Krasnoyarsk Region for
10 years has made it possible to collect a large array of data on events requiring
prompt response of emergency services, and to consolidate information on hazards
coming directly from the population. The collected data do not need preprocessing;
their primary analysis is performed directly in the system.
      </p>
      <p>
        The basis for structuring monitoring data is the ontology of the subject area. The
methodology for building ontology is described in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The ontology contains a
description of the relationship of control tasks, types of dangerous situations, data
types, data assessment methods, including centralized and distributed storage.
      </p>
      <p>The advantage of the approach is the co-processing of monitoring data, hazardous
event catalogs and territory features. This allows a complete description of the state of
security of the territory. Frequently occurring events, such as mining-related calls,
mercury spills, etc. are difficult to monitor by usual means. The ontology allows us to
determine the structure and content of analytical models at the conceptual level,
considering the tasks of management.</p>
      <p>An additional source of data is mapping information used both for visualization
and modeling. For example, spatial analysis can identify areas of pipelines with an
increased risk of accidents based on relief models, or assess the characteristics of
rivers, roads, and protective belts as obstacles for the spread of natural fires.</p>
      <p>Providing instant access to data is especially important in the event of an
emergency when it is required to formulate solutions in the shortest possible time. For
example, the automatic location and identification of the phone owner can reduce the
critical call time of emergency services. A request for the actual characteristics of
buildings in the process of modeling the consequences of an emergency is necessary
to clarify the consequences of the impact of hazardous factors on the protected objects
and to form groups of forces and means corresponding to the scale of the event.</p>
      <p>
        The full implementation of the structure of information resources described in the
ontology requires the creation of standardized API services for monitoring data
sources and their meta descriptions. The development of data exchange protocols is
relevant, for example, the international standards SDMX and OGC [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. This will
make it possible to provide direct calls to systems within the framework of web
services technologies using the XML / SOAP / HTTP protocols, while observing the
independence of the hardware and software for the implementation of external
systems.
      </p>
    </sec>
    <sec id="sec-3">
      <title>On-Line Analytical Processing for Integrated Monitoring</title>
    </sec>
    <sec id="sec-4">
      <title>Data</title>
      <p>
        One of the simplest but most important analytical tasks is identifying hazards and
threats in monitoring data streams. The detection of events related to the parameters
of environmental conditions and technosphere objects exceeding the normative values
allows one to promptly notify the emergency services and inform the population. A
list of parametric and logical criteria for identifying pre-emergency and hazardous
states of the controlled objects, processes and systems is proposed in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The OLAP
analytical models use the critical values established by the industry regulatory
documents, as well as results of a joint analysis of observation archives and data on
dangerous events which previously occurred. Hazard and threat identification for the
current and forecast data is integrated with the situational modeling technology. This
allows describing the consequences of the hazardous situation and making decisions
on early warning of the population and the response of emergency services.
      </p>
      <p>
        The joint analytical processing of the parameters for monitoring hazards and object
characteristics in the protected areas allows evaluating the possible consequences of
signaling dangers and threats. A comprehensive hazard assessment is implemented
using the OLAP technology. For example, abnormal weather events such as
extremely low temperatures, squally winds, and prolonged precipitation do not harm
infrastructure and facilities located in the Arctic zone but pose a great threat in
southern latitudes. Operational estimates of the hazards magnitude with the same
parameters can also change, depending on the capabilities of the rescue services. The
preliminary ranking of territories according to the risk degree makes it possible to
justify different criteria of hazards, depending on the location of the observation
point, frequency of the controlled events and other conditions [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        Information support for management decisions in the conditions of uncertainty is
formalized in the form of information processes, including analytical modeling [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
The main processes of analytical processing using OLAP are implemented in the
ESPLA-M information and analytical system. The system is used in the Territorial
Center for Emergency Monitoring and Forecasting of the Krasnoyarsk Region for
early detection of dangers and threats, and prompt provision of detailed information
about the situation. Using the system, a data warehouse for complex operational
monitoring of the situation was built, its volume allowing one to solve a few related
tasks of control support. This includes the analysis of the natural and man-made
emergency risks, formation of analytical reports, etc.
      </p>
      <p>Operational analytical data processing is shown in Figure 1. Hazard identification
is carried out in several stages. First, the received data packets from an external
source are verified for false signals. Then, the identification of hazards is performed
based on a single parameter. The regression analysis allows predicting 3-5 values, and
on its basis warnings about threats are made. Analytical modules that process data
from different sources work independently. This allows one to customize them for a
specific data update schedule (from minutes to days), to match the expected values to
the base of text templates of informational messages. Multivariate analysis is used to
analyze the types of situations depending on weather, for example, flood dangers,
occurrence and development of wildfires, and traffic situation.</p>
      <p>A website and a mobile application for displaying the results of the analytical
processing, as well as a service for information messages were developed. To
improve the information perception, a dynamic mapping technology was developed
which illustrates monitoring data in the form of special symbols and explanations for
each observation point. Multivariate results are visualized using infographic libraries.
The main advantage of the approach is a quick transition from the aggregated
characteristics of a situation (danger signals and threats) to individual detailed
parameters and their dynamics.</p>
      <p>The implementation of this analytical processing made it possible to control the
environmental parameters throughout the region, as well as those of pilot industrial
facilities and communication in industrial centers. The problems identified during the
operation which are related to the quality of data and the presentation of the
processing results were considered in the projects of the system development for
integrated operational emergency situations monitoring.
4</p>
    </sec>
    <sec id="sec-5">
      <title>Analytical Methods for Assessing the Territorial Risks and</title>
    </sec>
    <sec id="sec-6">
      <title>Emergencies</title>
      <p>The priority area of using analytical methods is the assessment of territorial risks to
justify strategic measures to prevent man-made disasters, mitigate consequences of
natural disasters. The early studies of the risk constituents were based mainly on the
expert judgment. Such coefficients, considering the peculiarities of territories,
situation types, conditions of their occurrence, make it possible to assess the
interaction of the system elements of any complexity. This requires the same type of a
collection of experts’ opinions, which in a real situation is difficult to perform.</p>
      <p>
        Using Big Data of complex monitoring, providing the interdepartmental
information exchange solves the problem concerning the lack of information
necessary for the risk assessment [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ]. Methods were developed for comparing
heterogeneous indicators along with assigning the priorities for managing measures to
reduce the risks for territories. The methods are based on the systematic analysis of
the entire set of risk factors, considering their mutual influences. The factors can be
grouped according to the degree of management complexity, and influence on the
estimated risk value, taking into account the information sources and other
characteristics.
      </p>
      <p>Analytical assessment makes it possible to justify the choice of the location and
extent of measures to prevent emergencies and mitigate their consequences. The
design of the models is implemented graphically using the Ishikawa cause-effect
diagrams. The first level of charts describes the statistics of hazardous events;
territory characteristics, including natural, demographic, socio-economic factors; data
block for monitoring environmental parameters affecting the likelihood and scale of
hazardous events. At the second level, the detailed factors are represented by
independent indicators, which allow building analytical data cubes. Assessment of the
state of territory security is made by comparing the indicators or calculating the
integral values.
5</p>
    </sec>
    <sec id="sec-7">
      <title>Conclusion</title>
      <p>Using analytical processing technologies in combination with services for the
consolidation of complex monitoring data has increased the efficiency of the
territorial security management. The efficiency and reliability of the data used for
decision-making have qualitatively changed, and the possibilities for informing the
population have been expanded. Early warning about dangers and threats allows
saving resources by eliminating emergencies at the inception stage, and timely help to
casualties reduces losses from accidents.</p>
      <p>
        Decision support implemented using the analytical technologies and big data,
provides the possibility for self-learning in the situations that have already occurred
[
        <xref ref-type="bibr" rid="ref15 ref16">15,16</xref>
        ]. Information and analytical systems instantly providing numerous solutions
will assist specialists in most areas of management in the foreseeable future [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. For
example, the intellectualization of the call processing in call centers allows
virtualizing emergency message reception System 112 (such as 911 in the United
States), if used as one of the providers of Big Data. The analytics used at all territory
administration levels will allow one not only to reduce losses from emergencies by
deeply justifying preventive measures, but also to change the structure of the
territorial security system, minimizing the bureaucracy [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ].
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>1. A practical guide to Local HFA: Local Self-Assessment of Progress in Disaster Risk Reduction First Cycle (</article-title>
          <year>2011</year>
          -2013)
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Beirlant</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taugels</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vynckier</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Practical analysis of extreme</article-title>
          . Leuven University Press, Leuven, Belgium (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Moskvichev</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shokin</surname>
            ,
            <given-names>Yu.I.</given-names>
          </string-name>
          :
          <article-title>Anthropogenic and natural risks on the territory of Siberia</article-title>
          .
          <source>Herald of the Russian Academy of Sciences</source>
          <volume>82</volume>
          (
          <issue>1</issue>
          ),
          <volume>69</volume>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Osipov</surname>
            ,
            <given-names>V.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Larionov</surname>
            ,
            <given-names>V.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burova</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frolova</surname>
            ,
            <given-names>N.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sushchev</surname>
            ,
            <given-names>S.P.</given-names>
          </string-name>
          :
          <article-title>Methodology of natural risk assessment in Russia</article-title>
          .
          <source>Natural hazards</source>
          ,
          <volume>88</volume>
          (
          <issue>8</issue>
          ),
          <fpage>17</fpage>
          -
          <lpage>41</lpage>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1007/s11069-017-2780-z
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Bychkov</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vladimirov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ya</surname>
          </string-name>
          .,
          <string-name>
            <surname>Oparin</surname>
            ,
            <given-names>V. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potapov</surname>
            ,
            <given-names>V. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shokin</surname>
            ,
            <given-names>Yu. I.</given-names>
          </string-name>
          :
          <article-title>Mining information science and Big Data concept for integrated safety monitoring in subsoil management</article-title>
          .
          <source>Journal of Mining Science</source>
          <volume>52</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1195</fpage>
          -
          <lpage>1209</lpage>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1134/S1062739116061747
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>A.V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kolosova</surname>
          </string-name>
          , E.B,
          <string-name>
            <surname>Korobko</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          :
          <article-title>Constructing the model-driven system for scientific researches support on the original software platform for primary data consolidation</article-title>
          .
          <source>In: Proceedings of the 18th International Multidisciplinary Scientific GeoConference “Surveying Geology and Mining Ecology Management, SGEM”</source>
          , vol.
          <volume>18</volume>
          ,
          <string-name>
            <surname>Is</surname>
          </string-name>
          .
          <volume>2</volume>
          .
          <issue>1</issue>
          , pp.
          <fpage>255</fpage>
          -
          <lpage>262</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Gruber</surname>
          </string-name>
          , T.R.:
          <string-name>
            <surname>Ontologua</surname>
          </string-name>
          .
          <article-title>A mechanism to support portable ontologies</article-title>
          .
          <source>Technical report KSL91-66</source>
          . Stanford University. Knowledge System Laboratory (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>8. The official site for the SDMX community. A global initiative to improve statistical data and metadata eXchange (</article-title>
          <year>2020</year>
          ), https://sdmx.org
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>OpenGIS</given-names>
            <surname>Web Processing Service (WPS). Implementation Specification</surname>
          </string-name>
          (
          <year>2018</year>
          ), http://www.opengeospatial.org/standards/wps
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Nicheporchuk</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          :
          <article-title>Method of using hazard criteria for identifying hazardous situations</article-title>
          .
          <source>In: CEUR Workshop Proceedings</source>
          , vol.
          <volume>2534</volume>
          , pp.
          <fpage>427</fpage>
          -
          <lpage>433</lpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Penkova</surname>
            ,
            <given-names>T.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nicheporchuk</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Metus</surname>
            <given-names>A.M.</given-names>
          </string-name>
          :
          <article-title>Comprehensive Operational Control of the Natural and Anthropogenic Territory Safety Based on Analytical Indicators In: International Joint Conference IJCRS</article-title>
          . Proceedings, Part I. pp.
          <fpage>263</fpage>
          -
          <lpage>270</lpage>
          .
          <string-name>
            <surname>Poland</surname>
          </string-name>
          (
          <year>2017</year>
          ), DOI 10.1007/978-3-
          <fpage>319</fpage>
          -60837-2.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Nicheporchuk</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nozhenkov</surname>
            <given-names>A.I.:</given-names>
          </string-name>
          <article-title>The technology of situational modeling of dangerous events for territorial management information support</article-title>
          .
          <source>Procedia Structural Integrity. №20С</source>
          . pp.
          <fpage>248</fpage>
          -
          <lpage>253</lpage>
          . (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Warden</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Big Data glossary</article-title>
          .
          <source>O'reilly media Inc</source>
          .
          <volume>1005</volume>
          . Gravenstein Highway North, Sebastopol (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lea</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Internet of thing for architects packet publishing</article-title>
          , Birmingham-Mumbai (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Zaki</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wagner</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          :
          <article-title>Data Mining and Machine Learning: fundamental concepts and algorithms</article-title>
          , Cambridge University Press, UK (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Goodfellow</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bengio</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Courville</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Deep Learning</article-title>
          . The MIT Press Cambridge, Massachusetts, London (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Moskvichev</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bychkov</surname>
            ,
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potapov</surname>
            ,
            <given-names>V.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taseiko</surname>
            ,
            <given-names>O.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shokin</surname>
            ,
            <given-names>Yu.I.</given-names>
          </string-name>
          :
          <article-title>Information system for territorial management of development and safety risks</article-title>
          .
          <source>Bulletin of the Russian Academy of Sciences</source>
          <volume>87</volume>
          (
          <issue>8</issue>
          ),
          <fpage>696</fpage>
          -
          <lpage>705</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Franks</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>The analytics revolution: how to improve your business by making analytics operational in the Big Data era</article-title>
          , Wiley. New Jersey (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Bernard</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matt</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Artificial intelligence in practice: how 50 successful used artificial intelligence to solve problems</article-title>
          , Wiley, New Jersey (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>