<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Information Technology and Interactions, December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Support Systems for Computer Networks: Production-Logical F-Inference</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yurii Kravchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olesia Afanasyeva</string-name>
          <email>olesia.afanasyeva@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksym Tyshchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Mykus</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kyiv</institution>
          ,
          <addr-line>03049</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Defence University of Ukraine named after Ivan Cherniakhovskyi</institution>
          ,
          <addr-line>28 Povitroflotskyi Avenue</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Pedagogical University of Krakow</institution>
          ,
          <addr-line>2 Podchorazych Street, Krakow, 30084</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>60 Volodymyrska Street, Kyiv, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>0</volume>
      <fpage>2</fpage>
      <lpage>03</lpage>
      <abstract>
        <p>The article presents the models of production-logical inference based on algebraic structures. The conducted researches of abstract algebra and production inference models have established the principle of decision-making support in the development and operation of telecommunication systems based on the so-called FS-system. Mathematically, the FSsystem is a partial case of algebraic lattices. It is proven that the FS-system, as an abstract structure, with the product-logical properties of its signature, has the advantages of the efficiency of computational implementation experimentally that such an approach ensures minimization of appeals to external sources and, accordingly, reduction in computing costs. In particular, it was determined that the practical relevance of the findings is that the scientifically substantiated recommendations for an advanced communication management system are designed to consider the possibility of leveraging them in other complex technical systems. Such an approach allows to significantly increase the efficiency of the communication and management process gained by the modernization of hardware and software of the computer system. Thus, there are grounds to state that it is expedient to utilize the proposed set of mathematical models of the formal description of the production-logical inference of knowledge to automating the decision-making support in telecommunication systems at the design and operation stages. algebraic system, FS-system, relation, distributivity, production-logical inference.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Studies have shown that at present, the general scientific and applied problem of increasing
the efficiency of telecommunication systems becomes of particular importance. An important
direction of its solution is the creation and implementation of an appropriate intellectual decision
support system (DSS). This system solves various tasks at the design and operation stages. According
to experts, this approach will increase the efficiency of telecommunication systems to 15% at no
additional cost [1-3]. It should be emphasized that there an advanced way to improve the quality of
complex systems is to provide the system with the functional stability that allows to achieve the
greatest effect from the complexing. Functional stability of a complex technical system combines the
properties of reliability (fail-safe), fault tolerance and survivability. The stability is achieved by
application of various existing types of redundancy (hardware, structural, temporal, information,
functional, loading, etc.) in a complex system through redistribution of resources. It is fundamental</p>
      <p>2020 Copyright for this paper by its authors.
that at the design stage no additional redundancy should be introduced and the consequences of
emergency situations should be parried by redistribution of already existing resources. So, the priority
task of the intellectualized DSS is to support the telecommunication system Functional stability [1, 2,
4, 5].</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of literary data and problem statement</title>
      <p>
        An analysis of the latest research and publications in which the solution to this problem was
initiated allows us to emphasize the positive tendency of the DSS development [
        <xref ref-type="bibr" rid="ref23 ref25 ref29 ref3 ref7">1-17</xref>
        ] and the need
for further research to improve the mathematical and software systems of the systems. The most
complex and relevant is the scientific task of developing new mathematical models of the formal
description of knowledge, namely, production-logical inference in the automation of the decision
support process [18-25]. The given models have well-known advantages: simplicity without loss of
completeness due to modularity; efficiency and lack of complexity explaining the inference, which is
associated with the presence of analogy with the human cognitive process.
      </p>
      <p>So to ensure functional stability it is necessary to have redundancy. The works [1-4] published
data on redundancy in the telecommunication system (table 1).</p>
    </sec>
    <sec id="sec-3">
      <title>3. Research goal and tasks</title>
      <p>The research was aimed at substantiating the new approach in the production models of knowledge
extraction, which, unlike existing ones, uses the advantages of algebraic systems in computer
programs and provides the necessary quality and efficiency with a significant reduction of
computational resources.</p>
      <p>To achieve this goal, the following tasks were solved:
Developing of the corresponding mathematical models.</p>
      <p>Computer simulations.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Productive-logical inference models</title>
      <p>Intellectualized DSS implements the so-called productive-logical model of knowledge
representation. The rationale for this is as follows. In fact, nowadays a sufficient number of models of
knowledge representation, used for implementation of knowledge-based systems, have been
developed. It is most expedient to represent knowledge by means of rules of the "if-then" type
(phenomenon - reaction). The production system can be considered the most widespread model of
knowledge representation. It is possible to provide many examples of real knowledge-based systems,
as well as examples of systems where the language of frame-type knowledge representation was
adopted to describe the local knowledge [7–9, 11, 12]. If the product system is considered as a model
of knowledge representation, then the rules can be added a clear meaning if from the human point of
view they are seen as the means of direct description of the method of logical conclusion for
addressing issues in the subject area. The distinctive feature of knowledge representation with high
modularity is simplicity of extension, modification and cancellation. In addition, on the computer
side, it is possible to define a simple and precise mechanism for using knowledge with high
homogeneity. These two distinctive features are the reasons why the knowledge representation
method is so widespread. The concept is supposed to consider the basic structures of the product
systems and various aspects related to the implementation of knowledge-based systems.</p>
      <p>As you know, a production system consists of three main components: a set of rules used as a
knowledge base, known as a rule base; working memory (or short-term memory), which stores the
prerequisites related to the specific tasks of the subject area, and output results; inference engine, that
applies the rules according to the content of working memory. In reality, various additional tools are
needed to build working (operating) systems [8, 9]. The major issue in the product systems is to
investigate (check) the availability of special data concerning the conditional part of the rule in the
working memory. Evaluation of the conditional part by searching and comparing has a wide scope of
application, in some respects, but in certain instances such direct evaluation is insufficient.</p>
      <p>In a real-case scenario, when using product systems these rules are extended as needed (e.g., they
use OR connection in the conditional part, enter the conditional part with calculations based on the
working memory content and other operations or enter the final part, that indicates the output without
the working memory content), so the rules can be considered classical.</p>
      <p>Such rules represent the output result established between the content of the working memory,
which is referenced from the conditional part, and the content specified in the final part [18].</p>
      <p>Process description of the logical output results allows to identify a false rule when a proof of
conclusion failed, despite the fact that the opposite should have happened, or an incorrect output was
obtained. It is an effective tool for systems development as it allows to explore their possibilities and
identify how to expand them.</p>
      <p>It is known that an algebraic system FF ,F ,R (in some literature, an algebraic structure) is a
nonempty set FF  Ø with a given set of operations F and relations  R satisfying some axioms. A set FF
is called the carrier of the algebraic system; sets F ,R are called the signature of an algebraic
system.</p>
      <p>The main task of abstract algebra (in modern scientific literature is simply algebra) as a section of
mathematics is the study of the properties of axiomatically given algebraic systems. The term
"abstract" emphasizes that objects of study are abstract structures, such as groups, rings, fields, and
modules, in contrast to algebraic expressions that are studied in elementary algebra [18].</p>
      <p>The general idea in forming the inference models is to provide the signature of the algebraic
system of production-logical properties of the general scheme "if... then". The article proposes to
consider the original algebraic system, the so-called FS-system, developed and proposed as a
theoretical justification for the mathematical support of the telecommunication system's DSS. The
abbreviation FS comes from "Functional Stability". It is the FS system that is part of the mathematical
support for the formation of a property such as functional stability. In any abnormal situation
associated with negative external and internal factors, the property of functional stability allows a
complicated system to continue to be in a workable state due to the use of redundancy.</p>
      <p>For a logical and understandable further introduction, we will introduce the basic notation and
definition. Let R be a binary relation on a certain set F , which is transitive and reflexive. It is known
that in discrete mathematics, for partially ordered sets there is the notion of a "minimal element" (for
it, there is no smaller element) and "the smallest element" (it is least of all). The classic terms of
"closure" and "reduction" are interpreted in a procedure for minimizing computational resources in
the automation of logical programming, namely minimization of memory and the number of
operations.</p>
      <p>It is also known that there is a loop R* of arbitrary relation to the transitivity property, or the
transitive closure. The transitive reduction R' of the ratio R means the minimum ratio is such that its
transitive closure coincides with the transient closure of R . The literature [17] presents algorithms for
constructing a transitive reduction of oriented graphs. This is an arbitrary graph with the minimum
possible number of nodes, the transitive closure of which coincides with the transitive closure of this
graph. It is proved that this problem is a computational equivalent to the construction of the transitive
closure, and also the unity of the transitive reduction of the acyclic graph is established. Also, in [18]
it is proved that the construction of the least transitive reduction of an arbitrary graph is an
NPcomplete problem.</p>
      <p>Definition 1. FS-system FF ,F ,R is a system of algebra (algebraic structure, algebraic system), in
which, along with operations over any pair of its elements (  ("intersection") and  ("union")) an
additional binary relation is given with the production-logical properties.</p>
      <p>The relation is called production-logical if it has reflectivity, transitivity, and other properties that
are determined by a particular model. One of these properties is distributivity. Informally,
distributivity refers to the possibility of logical inference in parts and to combine its results on the
basis of operations  and  . Assigned to the FS-system, the relation R is called  -distributive, if
 A,B1  A,B2  R leads to  A,B1  B2  R. And called  -distributive, if  A1,B A2 ,B R leads to  A1  A2B R. The
relation is called distributive if both of these properties are specified. In order to simplify the symbols
 ,  , and, ⊣, the theorems of plural operations  ,  , , and are used instead, and the elements of
the FS system are indicated by uppercase letters. Also, for simplicity, the assumption is made that it is
advisable to refer only to one of the two properties mentioned above under the distributive
relationship.</p>
      <p>Let the FS-system have some binary relation R  R . The set of all atoms of the FS system, the
relationship pairs R contained in the elements, will be called the set of atoms that the relation R relies
on. Constructed on the associations of these atoms subset of the initial FS-systems we denote FF FR.</p>
      <sec id="sec-4-1">
        <title>Obviously, FR. is a subsystem (subset) in F.</title>
        <p>For a given R we introduce a binary relation R , a subset of partial order  that the elements of all
pairs R belong to FR. We also denote R . A subset R that does not contain pairs of reflections (type
 A, A )</p>
        <p>Definition 2. The binary relation R in the FS system is called production-logical, or logical, if it
contains R and also is distributive and transitive.</p>
        <p>Thus, in the FS-system, along with operations on any pair of its elements, a rule is given for their
logical, so-called "comparison" or inference. The mathematical formalization of this rule allows us to
develop management algorithms for automating the decision support process in a telecommunication
system. The purpose of this management is to respond to non-emergency situations by redistributing
redundancy.</p>
        <p>We propose a logical rule of the so-called "comparison". First, we draw attention to the fact that
the closure of a set is a collection of all points of a given set. The closure of the set generally contains
three types of points: isolated points; boundary points belonging to this set; boundary points that do
not belong to this plurality themselves. Thus, the closure is the adherence to this set of all its boundary
points. A closed set coincides with its closure.</p>
        <p>The point of touch of a set is such a point (not necessarily belonging to the given set itself), any
neighborhood of which contains at least one point from this set. It turns out that if the point belongs to
this set, then it is already a point of contact (since it itself is always included in its own neighborhood,
no matter how small this suburb was). We recall that in the theory of sets, the transitive closure of a
binary relation on a plural is the least transitive relation on the set that includes it. In mathematics, the
set is closed with respect to some operation, if the result of this operation on elements of the set will
always be the element of this set.</p>
        <p>In the theory of FS-systems, as in the theory of ordinary sets, it is expedient to consider the
transitive closure and the reduction of the relation. Therefore, the task of finding a logical circuit and
logically reducing relations on hierarchical sets, or different types of algebraic systems, is relevant.</p>
        <p>Definition 3. Let R relation be assigned to the FS-system F , then the ordered pair A,B  F is
logically bound by the R relationship (written as A R B ) if one of the following conditions is true:
A,B  R ; (1)</p>
        <p>A R B ; (2)
there are such B1,B2  F , B1 B2  B , that A R B1 , A R B2 ; (3)
there is an element C  F such that A RC and C R B . (4)</p>
        <p>This definition 3 on the given R forms another binary relation R on the FS system F . As can be
seen from this definition, any logical bond A R B is formed on the basis of a finite subset of the
pairs of relations F . It is also worth noting that the relations R and R make sense for all elements
of the FS system.</p>
        <p>Definition 3 is the inference rules of the FS system. When inferring a logical connection A R B ,
the inference step will be called the usage of exactly one rule, possibly simultaneously to some finite
set of elements of the FS system. Formally this is as follows:
if Ai R Bi1 , Ai R Bi2 , i  1,...,n, then Ai R Bi1</p>
        <p>Bi2 , i  1,...,n ;
or Ai RCi , Ci R Bi , i = 1 ... n, then Ai R Bi , i  1,...,n .</p>
        <p>The level of recursion in the ratio A R B is called the number of inference steps needed to get this
connection. In addition, only usage of the rules given in definition 3 is taken into account.</p>
        <p>Since in the general case the connection A R B can be obtained not by a single set of rules, then it
is expedient only to evaluate its maximum recursion level without specifying its exact value. With
regard to the steps of withdrawal of the ratio A R B we will use the terms "initial", "last", "next" and
so on. This implies the progress in the direction of direct logical inference, that is, from the pairs of
initial relation R R to the pair of relations R .</p>
        <p>Definition 4. Let R be a logical relation to F and A,B  F . Then, if A R B is true, then  A,B R.</p>
        <p>The justification for this is done by induction by m , the upper estimate of the recursion rate in the
relation A R B . For m  0 , one of the conditions (1) – (2) of definition 3 takes place. Case (1) directly
indicates the necessary statement. If (2) is true, then А, В  F as well, since the logical relation R ,
by definition, contains such pairs.</p>
        <p>Let us assume further that the definition is true for some m  0 , and prove its assertion at the level
m 1. In this case, new options for consideration may be given by rules (3) – (4).</p>
        <p>If (3) occurs, then, by induction, the level of recursion in the corresponding ratios A R B1 ,
A R B2</p>
        <p>does not exceed m , therefore A,B1  R , A,B2  R . Then, through the property of the
distributivity of the logical relation R , we obtain  A,B R . The option of the origin of A R B
connection from condition 4) is considered similarly.</p>
        <p>It is not difficult to conclude that there is a logical closure for an arbitrary binary relation R in the
FS system and it coincides with the set R of all pairs logically related by the relation R .</p>
        <p>The production-logical relations are the mathematical basis for solving applied problems
associated with the automation of logical inference and other aspects of logical programming. In
connection with this circumstance, there are questions of the automatic transformation of relations, in
which the logic closure remains unchanged. Such transformations can be used, for example, to bring
the knowledge base to the form which is convenient for research and implementation. The next
reasonable step is to introduce the concept of equivalent relations.</p>
        <p>Two relations R1 , R2 are called equivalent if their logic matches are the same. For such relations,
we use the notation R1  R2 . An equivalent transformation of this relation is called a certain
replacement of a subset of its pairs, which leads to an equivalent relation.</p>
        <p>Therefore, the following is true: let R be the relation in FS-system and Aj RBj , j  1,...,m . Then
the relation R'  R  Aj ,Bj  j  1,...m is equivalent to R .</p>
        <p>Proof. Let us first notice that relations R and R' operate with the general large number of atoms of
the FS system, hence R R' . Further, by definition, any logical relation is its own logical closure. This
conclusion also applies to the relation R . Further, it follows that for any R1  R2 the following is
true: R1  R2. In our case of the construction of the relation R' inclusions R  R'  R are made.
Turning to the logical closures and taking into account what is said above, we find that relations R
and R' have a common logical closure R .</p>
        <p>Let us consider the logical reduction model. It is known that in the case of software
implementation of information technology DSS it is appropriate to avoid unnecessary duplication of
code or data. In applications of logic systems, there is also the question of their equivalent
minimization. In mathematical logic, the minimal system of axioms is called the basis. Problems of
the existence of rules of bases for different logic were considered in [18]. The theory of artificial
intelligence emphasizes the fact of additional possibilities of minimization in systems of production
type.</p>
        <p>Since the FS system is a mathematical model of the algebra of the production system, the obvious
solution to the minimization problem is to provide a binary representation, when only a unique part of
the information about this relation is stored in the computer memory, and other information can be
obtained from the general properties of logical relations. By the unique part a relation R0  R is meant
which is selected according to certain criteria of relations, from which R turns out as a logical closure.</p>
        <p>Next, let us turn to the method of reduction. We should recall that the method of reduction is
aimed at reducing from complex to simpler. The logical reduction of the relation R in the FS system
is called its equivalent minimum relation R0 . Minimality in this definition is understood in the sense of
partially ordered large quantities. Firstly, for this R the logical reduction R0 may not be the only one.
Secondly, after being excluded from R0 at least one pair, the resulting relation is not equivalent to R .</p>
        <p>On the basis of studies of other algebraic systems, it is expedient to conclude that these results can
be transferred to the FS-system as well: namely, that the logical closure of this relation R is a
transitive closure of some other relation R  R . This result is useful for developing efficient algorithms
for constructing logic closures and reductions. It allows us to reduce the study of questions of locating
a logical closure and reduction of the order relations to considering the corresponding properties of
transitive relations.</p>
        <p>For an arbitrary binary relation R in the FS system, let us consider the relation R constructed from
R by the sequential implementation of the following steps:
1) add to R all pairs of the type  A, A , where  A FR  , and indicate the new relation R1 ;
2) add to R1 all pairs of type  A,B with elements of the type A  A , B  B , where all  Ai ,Bi 
i i i i
i  1,...,n belong to R1 ;
3) combine the obtained relation with the inclusion relation R .</p>
        <p>From the previous material of the article it turns out that the relation R is equivalent to R . This is

proved as follows. Let R be a binary relation in the FS system. Then, if A R B then  A,B R . Also
let A R B take place. If the indicated relationship occurred directly from the condition of
production-logical properties, then we have  A,B R at once.</p>
        <p>We still have to consider the case of applying step 3). All the reflexive pairs necessary for this can
be prepared at the very beginning of the inference process. In this case, pairs of type A R B will not be
required. So step 3) can only finish this process.</p>
        <p>If we compare the specified 2 stages of the inference with the sequence of construction of the
relation R , then it turns out that the inference A R B corresponds to the construction of a certain
subset R , which proves the inclusion  A,B R .</p>
        <p>As was noted, the relation R is equivalent to R . Consequently, by definition of logical closure, we
*
have R  R . Hence, since the relation R is transitive, we obtain R  R . Thus, for an arbitrary
*
relation R in the FS-system, the logical closure R is the transitive closure R of the corresponding
relation R .</p>
        <p>Proof. Firstly, from the description of the R construction it is easy to see that if R1  R2 , then R1  R2 .
A similar statement holds for transient closures of these relations, which means a proven fact. Next,
for an arbitrary relation R , let us consider the relation R built from this R by the consistent

implementation of the steps inverse to the R construction, namely:
1) to exclude from R the pairs of type contained in it A R B and to designate the new relation R1 ;
2) exclude from R1 all pairs  A,B with elements of the type A  A , B  B , where all  Ai ,Bi  i
i i i i
i  1,...,n belong to R1 and do not coincide with  A,B ;
3) to exclude all couples of reflections from the obtained relation.</p>
        <p>Conclusion: the relation R is equivalent to R .</p>
        <p></p>
        <p>It should be noted that this approach to constructing a transitive reduction – "to remove all
transitive pairs" – would be erroneous. The reason is that in some situations (the presence of cycles),
the transitive reduction is not unique, and the simultaneous removal of all available transitive pairs
can lead to loss of connections. However, since the FS system itself is acyclic, removing all of the
above "coupled" pairs  A,B leads to the same result, regardless of the order of deletion. For this
reason, we can talk about the simultaneous removal of all such pairs.</p>
        <p>Let R be a binary relation in the FS system. In order for R to be a logical reduction, it is necessary
and sufficient that R does not contain any such pair  A,B that the correlation A R\A,B B is
executed.</p>
        <p>This is proved as follows. Let the relation R be a logical reduction, that is, it is a minimal logical
relation equivalent to itself. If there existed a pair  A,B R , logically connected by the relation
R \  A,B, then it could be excluded from R , with obtaining a lesser equivalent relation. Thus, in the
presence of the specified pair the relation R cannot be a logical reduction.</p>
        <p>To prove the opposite statement we assume that there is no pair  A,B R for which A R\A,B B is
true. It is necessary to prove that in this case R is a logical reduction. Suppose the inverse: let there be
a relation R0  R equivalent to R and moreover,  A,B R \ R0 . Then, since  A,B R , because of the
equivalence of these relations A R0 B is valid. Since the relation R0 does not contain a pair  A,B ,
then R  R \  A,B, and the logical connection A R0 B contradicts the assumption made - such pairs
0
 A,B are absent in R . The resulting contradiction proves the necessary statement.</p>
        <p>Let us formulate a sufficient condition of existence and the method of constructing the logical
reduction of this relation.</p>
        <p>For the binary relation R given in the FS system, let there be a corresponding constructed relation
R . Then, if for R there is a transitive reduction R0 , then according to it the relation R0 is a logical
reduction of the initial relation R .</p>
        <p>This is justified by the fact that from the construction of R and R it follows that the relation R0 is
 
logical and equivalent to R . It remains to show that R0 is a logical reduction. Let  A,B be an arbitrary
pair of the relation R0 . It is necessary to show that a logical connection A R0\A,B B is impossible.

Let's assume the opposite, namely, that this connection exists. Then the relation R0 \  A,B is

R0 \A,B
equivalent to R0 . Note that the use of the condition  A,B R for inference A  B is impossible,

since the pair  A,B is not contained in the set R0 \  A,B.</p>
        <p></p>
        <p>Any logical connection can be constructed in such a way that all applications of the transitive rule
will be made only in the final stage of its inference. This fact means that there is a chain of elements
R0 \A,BCk , k  1,...,N , when inferring each of them,
A  C0 ,C1,...,CN  B such that the executed relations Ck1 </p>
      </sec>
      <sec id="sec-4-2">
        <title>Lemma 1, we have Ck1Ck  R . Thus, with</title>
      </sec>
      <sec id="sec-4-3">
        <title>N ˃1, the pair  A,B is transitive in R . Consequently, it</title>
        <p>cannot be contained in R0 , that is a subset of a transitive reduction relation R . The result is a

contradiction to the initial assumption  A,B R0 .</p>
        <p></p>
        <p>Thus, potentially possible situations for the intended logical conclusion A R0\A,B B are
investigated. As a result, it was found that in each such case, the presence of the connection</p>
        <p>R0 \A,B
A  B contradicts the fact  A,B R0 . Consequently, the relation R0 is a logical reduction.</p>
        <p> </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Simulation results</title>
      <p>In order to substantiate the effectiveness of the proposed models used in the corresponding
algorithms of the so-called F-inference, 2100 automated tests were conducted with the knowledge
base of DSS, control and management of the Zabbix communication system. Test tasks are generated
randomly with the ability to control the depth of inference, the number of generated rules and objects.</p>
      <p>The described experiments allow to determine the number of requests to external sources of
information, depending on the volume of initial facts and rules. Obtained results are compared by the
number of external requests with the procedures of normal reverse inference, F-inference and its
modifications. Experiment results were processed in the Statistica 13.3 package. The treatment of the
results of the experiment is carried out by checking statistical hypotheses (Figure 1).
-20
0
20 40 60 80
X &lt;= Category Boundary
100
120
-20
0
20</p>
      <p>40 60 80
X &lt;= Category Boundary</p>
      <p>A quantitative estimate of the increase in efficiency based on the ratio of the average number of
external requests indicates their decrease (increase in efficiency) from 10.6% when substantiating the
dynamic routing option to 23.8% in substantiating the construction of the core of the reference
network (Figure 2). On average, by using the F-inference method, you can state the efficiency
increase by 13.5%.</p>
      <p>The practical application of the decision support system based on the use of a model example
allowed to form a number of recommendations for building a functionally stable communication
system. These recommendations are based on the thesis that the main direction of improving the field
reference network of the communication system is to create a single information and
telecommunications environment using the latest digital communications based on the information
and telecommunications system. The obtained results emphasize the prospects of the chosen direction
of research for the creation of information technologies for the synthesis of intelligent systems based
on products, as well as in the development and improvement of other types of complex information
systems designed to ensure their functional stability in a wide range of applications.
Звич.</p>
      <p>FS</p>
    </sec>
    <sec id="sec-6">
      <title>6. Summary</title>
      <p>Thus, the further development of the conceptual apparatus of the artificial intelligence theory with
respect to the intellectualized telecommunications management system, including a set of
mathematical models of the formal description of production-logical inference of knowledge in the
automation of decision support process, has received further development. The theoretical and
mathematical basis for information technology of DSS in the telecommunication system are the
original algebraic systems where the possibilities of production-logical systems for the emergence of
new knowledge for managerial decisions are implemented. The proposed conceptual apparatus allows
to mathematically formalize the technology of logical programming based on the use of algebraic
structures in computer algorithms, namely, the ratio of partial order with the production-logical
content, which results in reduction in the number of operations and a boost in efficiency.</p>
    </sec>
    <sec id="sec-7">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          139 151 [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Norvig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Artificial</given-names>
            <surname>Intelligence</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Modern</given-names>
            <surname>Approach</surname>
          </string-name>
          , Prentice Hall,
          <year>2003</year>
          . [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Barabash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. Shevchenko. N.</given-names>
            <surname>Dakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Leshchenko</surname>
          </string-name>
          , Effectiveness of
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>Analysis &amp; Intelligent</given-names>
            <surname>Computing</surname>
          </string-name>
          , SAIC'
          <year>2020</year>
          , Proceedings, рр.
          <fpage>193</fpage>
          -
          <lpage>196</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          10.1109/SAIC51296.
          <year>2020</year>
          .
          <volume>9239154</volume>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Vialkova</surname>
          </string-name>
          ,
          <article-title>The problem of providing functional stability properties of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Computer</given-names>
            <surname>Science</surname>
          </string-name>
          ,
          <source>Proceedings of the 13th International Conference on TCSET 2016</source>
          . pp.
          <fpage>526</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          530. doi:
          <volume>10</volume>
          .1109/TCSET.
          <year>2016</year>
          .
          <volume>7452105</volume>
          [4]
          <string-name>
            <given-names>А.</given-names>
            <surname>Sobchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tyshchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gawliczek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Afanasyeva</surname>
          </string-name>
          , Analytical aspects
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>Advanced Trends in Information Theory</source>
          , ATIT'
          <year>2019</year>
          , Kyiv,
          <year>2019</year>
          , pp.
          <fpage>102</fpage>
          -
          <lpage>106</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          10.1109/ATIT49449.
          <year>2019</year>
          .
          <volume>9030474</volume>
          . [5]
          <string-name>
            <given-names>О.A.</given-names>
            <surname>Mashkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.M.</given-names>
            <surname>Artiushyn</surname>
          </string-name>
          ,
          <article-title>Optimization of digital automatic systems</article-title>
          , fault tolerance,
          <year>1991</year>
          . [6]
          <string-name>
            <given-names>O.A.</given-names>
            <surname>Mashkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.A.</given-names>
            <surname>Chumakevich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.V.</given-names>
            <surname>Mamchur</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.R.</given-names>
            <surname>Kosenko</surname>
          </string-name>
          ,
          <article-title>The method of inverse</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Computing</surname>
          </string-name>
          (
          <year>2020</year>
          ) Vol.
          <volume>7</volume>
          , No.
          <issue>1</issue>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .23939/mmc2020.
          <fpage>01</fpage>
          .029. [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mizraji</surname>
          </string-name>
          ,
          <article-title>Vector logics: The matrix-vector representation of logical calculus, Fuzzy Sets and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          (
          <year>1992</year>
          ) pp.
          <fpage>179</fpage>
          -
          <lpage>185</lpage>
          . doi:
          <volume>10</volume>
          .1016/
          <fpage>0165</fpage>
          -
          <lpage>0114</lpage>
          (
          <issue>92</issue>
          )
          <fpage>90216</fpage>
          -
          <lpage>Q</lpage>
          . [8]
          <string-name>
            <given-names>J.F.</given-names>
            <surname>Luger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Artificial</given-names>
            <surname>Intelligence</surname>
          </string-name>
          .
          <article-title>Strategies and methods for solving complex problems</article-title>
          ,
          <year>2003</year>
          . [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Teise</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gribomon</surname>
          </string-name>
          ,
          <article-title>A logical approach to artificial intelligence: from classical logic to</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>logical programming</source>
          ,
          <year>1998</year>
          . [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mashkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Barilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Simr</surname>
          </string-name>
          , Applying Petri Nets to Modeling of Many-Core
          <string-name>
            <surname>Processor</surname>
          </string-name>
          Self-
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Applications</surname>
          </string-name>
          (
          <year>2013</year>
          ) pp.
          <fpage>25</fpage>
          -
          <lpage>34</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10836-012-5346-8. [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Yager</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Filev</surname>
          </string-name>
          ,
          <article-title>Generation of Fuzzy Rules by Mountain Clustering</article-title>
          ,
          <source>Journal of Intelligent &amp;</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>Fuzzy</given-names>
            <surname>Systems</surname>
          </string-name>
          (
          <year>1994</year>
          ) pp.
          <fpage>209</fpage>
          -
          <lpage>219</lpage>
          . [12]
          <string-name>
            <given-names>N.</given-names>
            <surname>Nilsson</surname>
          </string-name>
          ,
          <source>Principles of Artificial Intelligence</source>
          ,
          <year>1985</year>
          . [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Telecommunication node clustering with node compatibility and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <article-title>network survivability requirements</article-title>
          ,
          <source>Management Science</source>
          , vol.
          <volume>46</volume>
          (
          <issue>3</issue>
          ),
          <year>2000</year>
          , pp.
          <fpage>363</fpage>
          -
          <lpage>374</lpage>
          . [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          , Choice Manipulation in Multicriteria Optimization Problems, Selected Papers of
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Security</surname>
            ,
            <given-names>ITS</given-names>
          </string-name>
          '
          <year>2019</year>
          , Kyiv,
          <year>2019</year>
          , pp.
          <fpage>234</fpage>
          -
          <lpage>245</lpage>
          . [15]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tmienova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kruglov</surname>
          </string-name>
          , Methods for Determining the Group Ranking of
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <source>Mathematical Modeling and Simulation of Systems, MODS 2020</source>
          .
          <article-title>Advances in Intelligent</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>Systems and Computing</source>
          , vol
          <volume>1265</volume>
          . Springer, Cham. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -58124-4_
          <fpage>21</fpage>
          . [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Luger</surname>
          </string-name>
          , W. Stubblefield, Artificial Intelligence:
          <article-title>Structures and Strategies for Complex Problem</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Solving</surname>
          </string-name>
          ,
          <year>2004</year>
          . [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Poole</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mackworth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Goebel</surname>
          </string-name>
          , Computational Intelligence:
          <string-name>
            <given-names>A Logical</given-names>
            <surname>Approach</surname>
          </string-name>
          ,
          <year>1998</year>
          . [18]
          <string-name>
            <given-names>S.D.</given-names>
            <surname>Makhortov</surname>
          </string-name>
          ,
          <article-title>Mathematical foundations of artificial intelligence: the theory of LP-structures</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <article-title>for the construction and study of production-type knowledge models</article-title>
          ,
          <year>2009</year>
          . [19]
          <string-name>
            <given-names>S.D.</given-names>
            <surname>Makhortov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Nogikh</surname>
          </string-name>
          , LP Structures Theory Application to Building Intelligent
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>Information</given-names>
            <surname>Technologies for Industry</surname>
          </string-name>
          ,
          <source>IITI'19. Advances in Intelligent Systems and Computing.</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          Cham: Springer,
          <year>2020</year>
          , pp.
          <fpage>403</fpage>
          -
          <lpage>411</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -50097-9_
          <fpage>41</fpage>
          . [20]
          <string-name>
            <given-names>S.D.</given-names>
            <surname>Makhortov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Nogikh</surname>
          </string-name>
          , Application of LP Structures Theory to Intelligent Attribute
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>Merger</given-names>
            <surname>Refactoring</surname>
          </string-name>
          ,
          <source>in Proceedings of the 18th Russian Conference on Artificial Intelligence,</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <source>RCAI 2020. Lecture Notes in Artificial Intelligence</source>
          . Cham: Springer,
          <year>2020</year>
          , pp.
          <fpage>437</fpage>
          -
          <lpage>447</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          10.1007/978-3-
          <fpage>030</fpage>
          -59535-7_
          <fpage>32</fpage>
          . [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Leshchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Trush</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Makhovych</surname>
          </string-name>
          , Evaluating the
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <source>Trends in Information Theory</source>
          , ATIT'
          <year>2019</year>
          , Kyiv,
          <year>2019</year>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>124</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <source>doi: 10.1109/ATIT49449</source>
          .
          <year>2019</year>
          .
          <volume>9030430</volume>
          . [22]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Ming</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>General Framework for Network Survivability Testing</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          and Evaluation”,
          <source>Journal of Networks</source>
          , vol.
          <volume>6</volume>
          , №6,
          <issue>2011</issue>
          , pp.
          <fpage>831</fpage>
          -
          <lpage>841</lpage>
          . [23]
          <string-name>
            <given-names>O.</given-names>
            <surname>Korostil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Korostil</surname>
          </string-name>
          ,
          <article-title>Human Factor in the Tasks of Ensuring Functioning Safety of Complex</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Technical</surname>
            <given-names>Objects</given-names>
          </string-name>
          ,
          <source>Journal of Konbin</source>
          , (
          <year>2017</year>
          ),
          <volume>43</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>313</fpage>
          -
          <lpage>320</lpage>
          . doi:
          <volume>10</volume>
          .1515/jok-2017-
          <volume>0052</volume>
          . [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yu</surname>
          </string-name>
          . Rakushev,
          <article-title>Computational scheme of ordinary differential equations integration on the</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <surname>Automation</surname>
            and
            <given-names>Information</given-names>
          </string-name>
          <string-name>
            <surname>Sciences</surname>
          </string-name>
          ,
          <year>2012</year>
          ,
          <volume>44</volume>
          (
          <issue>12</issue>
          ) pp.
          <fpage>12</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <source>doi: 10</source>
          .1615/JAutomatInfScien.v44.
          <year>i12</year>
          .
          <fpage>20</fpage>
          . [25]
          <string-name>
            <given-names>M.</given-names>
            <surname>Rakushev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Permiakov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kovbasiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kravchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavrinchuk</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <source>Science and Technology, PIC S&amp;T`</source>
          <year>2019</year>
          , Proceedings. pp.
          <fpage>675</fpage>
          -
          <lpage>678</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>