<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Intellectualisation of Decision Support Systems for Computer Networks: Production-Logical F-Inference</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Kravchenko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>60 Volodymyrska Street</addrLine>
									<postCode>01033</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Olesia</forename><surname>Afanasyeva</surname></persName>
							<email>olesia.afanasyeva@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Pedagogical University of Krakow</orgName>
								<address>
									<addrLine>2 Podchorazych Street</addrLine>
									<postCode>30084</postCode>
									<settlement>Krakow</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Maksym</forename><surname>Tyshchenko</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">National Defence University of Ukraine named after Ivan Cherniakhovskyi</orgName>
								<address>
									<addrLine>28 Povitroflotskyi Avenue</addrLine>
									<postCode>03049</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Serhii</forename><surname>Mykus</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">National Defence University of Ukraine named after Ivan Cherniakhovskyi</orgName>
								<address>
									<addrLine>28 Povitroflotskyi Avenue</addrLine>
									<postCode>03049</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">IT&amp;I-2020 Information Technology and Interactions</orgName>
								<orgName type="institution">KNU Taras Shevchenko</orgName>
								<address>
									<addrLine>December 02-03</addrLine>
									<postCode>2020</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Intellectualisation of Decision Support Systems for Computer Networks: Production-Logical F-Inference</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8464BD22E6B0A42F8AC409BC6A4879E7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T09:05+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>algebraic system</term>
					<term>FS-system</term>
					<term>relation</term>
					<term>distributivity</term>
					<term>production-logical inference</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article presents the models of production-logical inference based on algebraic structures. The conducted researches of abstract algebra and production inference models have established the principle of decision-making support in the development and operation of telecommunication systems based on the so-called FS-system. Mathematically, the FSsystem is a partial case of algebraic lattices. It is proven that the FS-system, as an abstract structure, with the product-logical properties of its signature, has the advantages of the efficiency of computational implementation over other models. It was established experimentally that such an approach ensures minimization of appeals to external sources and, accordingly, reduction in computing costs. In particular, it was determined that the practical relevance of the findings is that the scientifically substantiated recommendations for an advanced communication management system are designed to consider the possibility of leveraging them in other complex technical systems. Such an approach allows to significantly increase the efficiency of the communication and management process gained by the modernization of hardware and software of the computer system. Thus, there are grounds to state that it is expedient to utilize the proposed set of mathematical models of the formal description of the production-logical inference of knowledge to automating the decision-making support in telecommunication systems at the design and operation stages.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Studies have shown that at present, the general scientific and applied problem of increasing the efficiency of telecommunication systems becomes of particular importance. An important direction of its solution is the creation and implementation of an appropriate intellectual decision support system (DSS). This system solves various tasks at the design and operation stages. According to experts, this approach will increase the efficiency of telecommunication systems to 15% at no additional cost <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. It should be emphasized that there an advanced way to improve the quality of complex systems is to provide the system with the functional stability that allows to achieve the greatest effect from the complexing. Functional stability of a complex technical system combines the properties of reliability (fail-safe), fault tolerance and survivability. The stability is achieved by application of various existing types of redundancy (hardware, structural, temporal, information, functional, loading, etc.) in a complex system through redistribution of resources. It is fundamental that at the design stage no additional redundancy should be introduced and the consequences of emergency situations should be parried by redistribution of already existing resources. So, the priority task of the intellectualized DSS is to support the telecommunication system Functional stability <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Analysis of literary data and problem statement</head><p>An analysis of the latest research and publications in which the solution to this problem was initiated allows us to emphasize the positive tendency of the DSS development <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref> and the need for further research to improve the mathematical and software systems of the systems. The most complex and relevant is the scientific task of developing new mathematical models of the formal description of knowledge, namely, production-logical inference in the automation of the decision support process <ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref><ref type="bibr" target="#b24">[25]</ref>. The given models have well-known advantages: simplicity without loss of completeness due to modularity; efficiency and lack of complexity explaining the inference, which is associated with the presence of analogy with the human cognitive process.</p><p>So to ensure functional stability it is necessary to have redundancy. The works <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref> published data on redundancy in the telecommunication system (table <ref type="table">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>Redundancy analysis in the communication system</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Subsystems Redundancy</head><p>Hardware Temporal Software Informational Structural Topology 0,15-0,45 0,2-0,4 0,1-0,25 0,1-0,5 0,2-0,4 Communication lines 0,2-0,25 0,2-0,4 0,2-0,5 0,1-0,5 0,2-0,25 Communication nodes 0,2 0,1-0,2 0,1-0,2 0,2-0,5 0,1-0,2 Control 0,05-0,1 0,1-0,2 0,1-0,2 0,1-0,3 0,1-0,15</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Research goal and tasks</head><p>The research was aimed at substantiating the new approach in the production models of knowledge extraction, which, unlike existing ones, uses the advantages of algebraic systems in computer programs and provides the necessary quality and efficiency with a significant reduction of computational resources.</p><p>To achieve this goal, the following tasks were solved: Developing of the corresponding mathematical models. Computer simulations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Productive-logical inference models</head><p>Intellectualized DSS implements the so-called productive-logical model of knowledge representation. The rationale for this is as follows. In fact, nowadays a sufficient number of models of knowledge representation, used for implementation of knowledge-based systems, have been developed. It is most expedient to represent knowledge by means of rules of the "if-then" type (phenomenon -reaction). The production system can be considered the most widespread model of knowledge representation. It is possible to provide many examples of real knowledge-based systems, as well as examples of systems where the language of frame-type knowledge representation was adopted to describe the local knowledge <ref type="bibr">[7-9, 11, 12]</ref>. If the product system is considered as a model of knowledge representation, then the rules can be added a clear meaning if from the human point of view they are seen as the means of direct description of the method of logical conclusion for addressing issues in the subject area. The distinctive feature of knowledge representation with high modularity is simplicity of extension, modification and cancellation. In addition, on the computer side, it is possible to define a simple and precise mechanism for using knowledge with high homogeneity. These two distinctive features are the reasons why the knowledge representation method is so widespread. The concept is supposed to consider the basic structures of the product systems and various aspects related to the implementation of knowledge-based systems.</p><p>As you know, a production system consists of three main components: a set of rules used as a knowledge base, known as a rule base; working memory (or short-term memory), which stores the prerequisites related to the specific tasks of the subject area, and output results; inference engine, that applies the rules according to the content of working memory. In reality, various additional tools are needed to build working (operating) systems <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>. The major issue in the product systems is to investigate (check) the availability of special data concerning the conditional part of the rule in the working memory. Evaluation of the conditional part by searching and comparing has a wide scope of application, in some respects, but in certain instances such direct evaluation is insufficient.</p><p>In a real-case scenario, when using product systems these rules are extended as needed (e.g., they use OR connection in the conditional part, enter the conditional part with calculations based on the working memory content and other operations or enter the final part, that indicates the output without the working memory content), so the rules can be considered classical.</p><p>Such rules represent the output result established between the content of the working memory, which is referenced from the conditional part, and the content specified in the final part <ref type="bibr" target="#b17">[18]</ref>.</p><p>Process description of the logical output results allows to identify a false rule when a proof of conclusion failed, despite the fact that the opposite should have happened, or an incorrect output was obtained. It is an effective tool for systems development as it allows to explore their possibilities and identify how to expand them.</p><p>It is known that an algebraic system F F R F , ,   (in some literature, an algebraic structure) is a nonempty set The main task of abstract algebra (in modern scientific literature is simply algebra) as a section of mathematics is the study of the properties of axiomatically given algebraic systems. The term "abstract" emphasizes that objects of study are abstract structures, such as groups, rings, fields, and modules, in contrast to algebraic expressions that are studied in elementary algebra <ref type="bibr" target="#b17">[18]</ref>.</p><p>The general idea in forming the inference models is to provide the signature of the algebraic system of production-logical properties of the general scheme "if... then". The article proposes to consider the original algebraic system, the so-called FS-system, developed and proposed as a theoretical justification for the mathematical support of the telecommunication system's DSS. The abbreviation FS comes from "Functional Stability". It is the FS system that is part of the mathematical support for the formation of a property such as functional stability. In any abnormal situation associated with negative external and internal factors, the property of functional stability allows a complicated system to continue to be in a workable state due to the use of redundancy.</p><p>For a logical and understandable further introduction, we will introduce the basic notation and definition. Let R be a binary relation on a certain set F , which is transitive and reflexive. It is known that in discrete mathematics, for partially ordered sets there is the notion of a "minimal element" (for it, there is no smaller element) and "the smallest element" (it is least of all). The classic terms of "closure" and "reduction" are interpreted in a procedure for minimizing computational resources in the automation of logical programming, namely minimization of memory and the number of operations.</p><p>It is also known that there is a loop * R of arbitrary relation to the transitivity property, or the transitive closure. The transitive reduction '  R of the ratio R means the minimum ratio is such that its transitive closure coincides with the transient closure of R . The literature <ref type="bibr" target="#b16">[17]</ref> presents algorithms for constructing a transitive reduction of oriented graphs. This is an arbitrary graph with the minimum possible number of nodes, the transitive closure of which coincides with the transitive closure of this graph. It is proved that this problem is a computational equivalent to the construction of the transitive closure, and also the unity of the transitive reduction of the acyclic graph is established. Also, in <ref type="bibr" target="#b17">[18]</ref> it is proved that the construction of the least transitive reduction of an arbitrary graph is an NPcomplete problem. Definition 1. FS-system</p><formula xml:id="formula_0">F F R F , ,</formula><p>  is a system of algebra (algebraic structure, algebraic system), in which, along with operations over any pair of its elements (  ("intersection") and  ("union")) an additional binary relation is given with the production-logical properties.</p><p>The relation is called production-logical if it has reflectivity, transitivity, and other properties that are determined by a particular model. One of these properties is distributivity. Informally, distributivity refers to the possibility of logical inference in parts and to combine its results on the basis of operations  and  . Assigned to the FS-system, the relation R is called  -distributive, if</p><formula xml:id="formula_1">   1 2 A,B A,B R  leads to   1 2 A,B B R.   And called  -distributive, if    1 2 A ,B A ,B R  leads to   1 2 A A B R.  </formula><p>The relation is called distributive if both of these properties are specified. In order to simplify the symbols  ,  , and, ⊣, the theorems of plural operations  ,  , , and are used instead, and the elements of the FS system are indicated by uppercase letters. Also, for simplicity, the assumption is made that it is advisable to refer only to one of the two properties mentioned above under the distributive relationship.</p><p>Let the FS-system have some binary relation</p><formula xml:id="formula_2">R R   .</formula><p>The set of all atoms of the FS system, the relationship pairs R contained in the elements, will be called the set of atoms that the relation R relies on. Constructed on the associations of these atoms subset of the initial FS-systems we denote Definition 2. The binary relation R in the FS system is called production-logical, or logical, if it contains R  and also is distributive and transitive. Thus, in the FS-system, along with operations on any pair of its elements, a rule is given for their logical, so-called "comparison" or inference. The mathematical formalization of this rule allows us to develop management algorithms for automating the decision support process in a telecommunication system. The purpose of this management is to respond to non-emergency situations by redistributing redundancy.</p><formula xml:id="formula_3">F F . R F Obviously, . R F is a subsystem (subset) in .</formula><p>We propose a logical rule of the so-called "comparison". First, we draw attention to the fact that the closure of a set is a collection of all points of a given set. The closure of the set generally contains three types of points: isolated points; boundary points belonging to this set; boundary points that do not belong to this plurality themselves. Thus, the closure is the adherence to this set of all its boundary points. A closed set coincides with its closure.</p><p>The point of touch of a set is such a point (not necessarily belonging to the given set itself), any neighborhood of which contains at least one point from this set. It turns out that if the point belongs to this set, then it is already a point of contact (since it itself is always included in its own neighborhood, no matter how small this suburb was). We recall that in the theory of sets, the transitive closure of a binary relation on a plural is the least transitive relation on the set that includes it. In mathematics, the set is closed with respect to some operation, if the result of this operation on elements of the set will always be the element of this set.</p><p>In the theory of FS-systems, as in the theory of ordinary sets, it is expedient to consider the transitive closure and the reduction of the relation. Therefore, the task of finding a logical circuit and logically reducing relations on hierarchical sets, or different types of algebraic systems, is relevant. Definition 3. Let R relation be assigned to the FS-system F , then the ordered pair</p><formula xml:id="formula_4">A,B F</formula><p> is logically bound by the R relationship (written as</p><formula xml:id="formula_5">R A B</formula><p>  ) if one of the following conditions is true:</p><formula xml:id="formula_6"> A,B R ; (1) R A B  ;</formula><p>(2)</p><formula xml:id="formula_7">there are such 1 2 B ,B F  , 1 2 B B B  , that R 1 A B   , R 2 A B   ;</formula><p>(3)</p><p>there is an element</p><formula xml:id="formula_8">C F  such that R A C   and R C B   .<label>(4)</label></formula><p>This definition 3 on the given R forms another binary relation R   on the FS system F . As can be seen from this definition, any logical bond</p><formula xml:id="formula_9">R A B</formula><p>  is formed on the basis of a finite subset of the pairs of relations F . It is also worth noting that the relations R and R   make sense for all elements of the FS system. Definition 3 is the inference rules of the FS system. When inferring a logical connection</p><formula xml:id="formula_10">R A B</formula><p>  , the inference step will be called the usage of exactly one rule, possibly simultaneously to some finite set of elements of the FS system. Formally this is as follows:</p><p>if</p><formula xml:id="formula_11">R 1 i i A B   , R 2 i i A B   , i 1,...,n,  then R 1 2 i i i A B B   , i 1,...,n  ; or R i i A C   , R i i C B   , i = 1 ... n, then R i i A B   , i 1,...,n  .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The level of recursion in the ratio</head><formula xml:id="formula_12">R A B</formula><p>  is called the number of inference steps needed to get this connection. In addition, only usage of the rules given in definition 3 is taken into account.</p><p>Since in the general case the connection</p><formula xml:id="formula_13">R A B</formula><p>  can be obtained not by a single set of rules, then it is expedient only to evaluate its maximum recursion level without specifying its exact value. With regard to the steps of withdrawal of the ratio</p><formula xml:id="formula_14">R A B</formula><p>  we will use the terms "initial", "last", "next" and so on. This implies the progress in the direction of direct logical inference, that is, from the pairs of initial relation R R  to the pair of relations R   . Definition 4. Let R be a logical relation to F and</p><formula xml:id="formula_15">A,B F  . Then, if R A B   is true, then   A,B R. </formula><p>The justification for this is done by induction by m , the upper estimate of the recursion rate in the relation Let us assume further that the definition is true for some m 0  , and prove its assertion at the level m1  . In this case, new options for consideration may be given by rules (3) -(4).</p><p>If (3) occurs, then, by induction, the level of recursion in the corresponding ratios</p><formula xml:id="formula_16">R 1 A B   , R 2 A B  </formula><p>does not exceed m , therefore It is not difficult to conclude that there is a logical closure for an arbitrary binary relation R in the FS system and it coincides with the set R   of all pairs logically related by the relation R . The production-logical relations are the mathematical basis for solving applied problems associated with the automation of logical inference and other aspects of logical programming. In connection with this circumstance, there are questions of the automatic transformation of relations, in which the logic closure remains unchanged. Such transformations can be used, for example, to bring the knowledge base to the form which is convenient for research and implementation. The next reasonable step is to introduce the concept of equivalent relations.</p><p>Two relations 1 R , 2 R are called equivalent if their logic matches are the same. For such relations, we use the notation</p><formula xml:id="formula_17">1 2 R R</formula><p> . An equivalent transformation of this relation is called a certain replacement of a subset of its pairs, which leads to an equivalent relation.</p><p>Therefore, the following is true: let R be the relation in FS-system and</p><formula xml:id="formula_18">R j j A B   , j 1,...,m  . Then the relation     ' j j R R A ,B j 1,...m  </formula><p>is equivalent to R . Proof. Let us first notice that relations R and ' R operate with the general large number of atoms of the FS system, hence ' R R   . Further, by definition, any logical relation is its own logical closure. This conclusion also applies to the relation R   . Further, it follows that for any</p><formula xml:id="formula_19">1 2 R R</formula><p> the following is true:</p><formula xml:id="formula_20">1 2 R R     . In our case of the construction of the relation ' R inclusions R ' R R     are made.</formula><p>Turning to the logical closures and taking into account what is said above, we find that relations R and '  R have a common logical closure R   . Let us consider the logical reduction model. It is known that in the case of software implementation of information technology DSS it is appropriate to avoid unnecessary duplication of code or data. In applications of logic systems, there is also the question of their equivalent minimization. In mathematical logic, the minimal system of axioms is called the basis. Problems of the existence of rules of bases for different logic were considered in <ref type="bibr" target="#b17">[18]</ref>. The theory of artificial intelligence emphasizes the fact of additional possibilities of minimization in systems of production type.</p><p>Since the FS system is a mathematical model of the algebra of the production system, the obvious solution to the minimization problem is to provide a binary representation, when only a unique part of the information about this relation is stored in the computer memory, and other information can be obtained from the general properties of logical relations. By the unique part a relation 0 R R  is meant which is selected according to certain criteria of relations, from which R turns out as a logical closure. Next, let us turn to the method of reduction. We should recall that the method of reduction is aimed at reducing from complex to simpler. The logical reduction of the relation R in the FS system is called its equivalent minimum relation 0 R . Minimality in this definition is understood in the sense of partially ordered large quantities. Firstly, for this R the logical reduction 0 R may not be the only one. Secondly, after being excluded from 0 R at least one pair, the resulting relation is not equivalent to R . On the basis of studies of other algebraic systems, it is expedient to conclude that these results can be transferred to the FS-system as well: namely, that the logical closure of this relation R is a transitive closure of some other relation</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>R R</head><p> . This result is useful for developing efficient algorithms for constructing logic closures and reductions. It allows us to reduce the study of questions of locating a logical closure and reduction of the order relations to considering the corresponding properties of transitive relations. From the previous material of the article it turns out that the relation</p><formula xml:id="formula_21">R  is equivalent to</formula><p>R . This is proved as follows. Let R be a binary relation in the FS system. Then, if</p><formula xml:id="formula_22">R A B   then   A,B R  . Also let R A B  </formula><p>take place. If the indicated relationship occurred directly from the condition of production-logical properties, then we have   A,B R  at once. We still have to consider the case of applying step 3). All the reflexive pairs necessary for this can be prepared at the very beginning of the inference process. In this case, pairs of type</p><formula xml:id="formula_23">R A B </formula><p>will not be required. So step 3) can only finish this process.</p><p>If we compare the specified 2 stages of the inference with the sequence of construction of the relation R , then it turns out that the inference The next conclusion is that if</p><formula xml:id="formula_24">1 2 R R  , then 1 2 R R     .</formula><p>Proof. Firstly, from the description of the R construction it is easy to see that if </p><formula xml:id="formula_25">1 2 R R  , then<label>1</label></formula><formula xml:id="formula_26">R  is equivalent to R .</formula><p>It should be noted that this approach to constructing a transitive reduction -"to remove all transitive pairs"would be erroneous. The reason is that in some situations (the presence of cycles), the transitive reduction is not unique, and the simultaneous removal of all available transitive pairs can lead to loss of connections. However, since the FS system itself is acyclic, removing all of the above "coupled" pairs   A,B leads to the same result, regardless of the order of deletion. For this reason, we can talk about the simultaneous removal of all such pairs. Let R be a binary relation in the FS system. In order for R to be a logical reduction, it is necessary and sufficient that R does not contain any such pair   A,B that the correlation</p><formula xml:id="formula_27">    R\ A,B A B   is executed.</formula><p>This is proved as follows. Let the relation R be a logical reduction, that is, it is a minimal logical To prove the opposite statement we assume that there is no pair  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A,B R</head><p> for which</p><formula xml:id="formula_28">    R\ A,B A B</formula><p>  is true. It is necessary to prove that in this case R is a logical reduction. Suppose the inverse: let there be a relation Any logical connection can be constructed in such a way that all applications of the transitive rule will be made only in the final stage of its inference. This fact means that there is a chain of elements </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Simulation results</head><p>In order to substantiate the effectiveness of the proposed models used in the corresponding algorithms of the so-called F-inference, 2100 automated tests were conducted with the knowledge base of DSS, control and management of the Zabbix communication system. Test tasks are generated randomly with the ability to control the depth of inference, the number of generated rules and objects.</p><p>The described experiments allow to determine the number of requests to external sources of information, depending on the volume of initial facts and rules. Obtained results are compared by the number of external requests with the procedures of normal reverse inference, F-inference and its modifications. Experiment results were processed in the Statistica 13.3 package. The treatment of the results of the experiment is carried out by checking statistical hypotheses (Figure <ref type="figure" target="#fig_4">1</ref>). A quantitative estimate of the increase in efficiency based on the ratio of the average number of external requests indicates their decrease (increase in efficiency) from 10.6% when substantiating the dynamic routing option to 23.8% in substantiating the construction of the core of the reference network (Figure <ref type="figure" target="#fig_11">2</ref>). On average, by using the F-inference method, you can state the efficiency increase by 13.5%.</p><p>The practical application of the decision support system based on the use of a model example allowed to form a number of recommendations for building a functionally stable communication system. These recommendations are based on the thesis that the main direction of improving the field reference network of the communication system is to create a single information and telecommunications environment using the latest digital communications based on the information and telecommunications system. The obtained results emphasize the prospects of the chosen direction of research for the creation of information technologies for the synthesis of intelligent systems based on products, as well as in the development and improvement of other types of complex information systems designed to ensure their functional stability in a wide range of applications. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Summary</head><p>Thus, the further development of the conceptual apparatus of the artificial intelligence theory with respect to the intellectualized telecommunications management system, including a set of mathematical models of the formal description of production-logical inference of knowledge in the automation of decision support process, has received further development. The theoretical and mathematical basis for information technology of DSS in the telecommunication system are the original algebraic systems where the possibilities of production-logical systems for the emergence of new knowledge for managerial decisions are implemented. The proposed conceptual apparatus allows to mathematically formalize the technology of logical programming based on the use of algebraic structures in computer algorithms, namely, the ratio of partial order with the production-logical content, which results in reduction in the number of operations and a boost in efficiency.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>are called the signature of an algebraic system.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>FF</head><label></label><figDesc>For a given R we introduce a binary relation R  , a subset of partial order  that the elements of all pairs R  belong to . R We also denote R  . A subset R  that does not contain pairs of reflections (type   , AA )</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>of the conditions (1) -(2) of definition 3 takes place. Case (1) directly indicates the necessary statement. If (2) is true, then F В А  , as well, since the logical relation R , by definition, contains such pairs.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>. Then, through the property of the distributivity of the logical relation R , we obtain   A,B R  . The option of the origin of R A B   connection from condition 4) is considered similarly.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>For 1 R</head><label>1</label><figDesc>an arbitrary binary relation R in the FS system, let us consider the relation R constructed from R by the sequential implementation of the following steps: 1) add to R all pairs of the type   A,A , where   all pairs of type   A,B with elements of the type the obtained relation with the inclusion relation R  .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>, the relation R is equivalent to R . Consequently, by definition of logical closure, we have R R    . Hence, since the relation R   is transitive, we obtain * R R    . Thus, for an arbitrary relation R in the FS-system, the logical closure R   is the transitive closure * R of the corresponding relation R .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>1 R 1 R</head><label>11</label><figDesc>holds for transient closures of these relations, which means a proven fact. Next, for an arbitrary relation R , let us consider the relation R  built from this R by the consistent implementation of the steps inverse to the R construction, namely: 1) to exclude from R the pairs of type contained in it  all pairs   A,B with elements of the type  and do not coincide with   A,B ; 3) to exclude all couples of reflections from the obtained relation. Conclusion: the relation</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head></head><label></label><figDesc>relation equivalent to itself. If there existed a pair   , then it could be excluded from R , with obtaining a lesser equivalent relation. Thus, in the presence of the specified pair the relation R cannot be a logical reduction.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head></head><label></label><figDesc>the assumption made -such pairs A,B are absent in R . The resulting contradiction proves the necessary statement. Let us formulate a sufficient condition of existence and the method of constructing the logical reduction of this relation.For the binary relation R given in the FS system, let there be a corresponding constructed relation R . Then, if for R there is a transitive reduction 0 R , then according to it the relation 0 R is a logical reduction of the initial relation R . This is justified by the fact that from the construction of R and to R . It remains to show that 0 R is a logical reduction. Let   A,B be an arbitrary pair of the relation 0 R . It is necessary to show that a logical connection  is impossible. Let's assume the opposite, namely, that this connection exists. Then the relation the pair   A,B is not contained in the set</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>N</head><label></label><figDesc>C ,...,C B   such that the executed relations k 1,...,N , when inferring each of them, as a rule, there is an element C F  such that ˃1, the pair  A,B is transitive in R . Consequently, it cannot be contained in 0 R  , that is a subset of a transitive reduction relation R .The result is a contradiction to the initial assumption   0 a result, it was found that in each such case, the presence of the connection</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>KFigure 1 :</head><label>1</label><figDesc>-S d=,05411, p&gt; .20; Lillief ors p&gt; .20 Shapiro-Wilk W=,97587, p=,Checking the normalcy of distribution while substantiating the construction of a telecommunication network: a) usual inference; b) F-inference</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_11"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Number of requests to external sources when substantiating the construction of a telecommunication network</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Russell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Norvig</surname></persName>
		</author>
		<title level="m">Artificial Intelligence, A Modern Approach</title>
				<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Effectiveness of Targeting Informational Technology Application</title>
		<author>
			<persName><forename type="first">O</forename><surname>Barabash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Shevchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Dakhno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><surname>Leshchenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/SAIC51296.2020.9239154</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on System Analysis &amp; Intelligent Computing, SAIC&apos;2020, Proceedings</title>
				<imprint>
			<biblScope unit="page" from="193" to="196" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The problem of providing functional stability properties of information security systems, Modern Problems of Radio Engineering</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vialkova</surname></persName>
		</author>
		<idno type="DOI">10.1109/tcset.2016.7452105</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Conference on TCSET</title>
				<meeting>the 13th International Conference on TCSET</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="526" to="530" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Analytical aspects of providing a feature of the functional stability according to the choice of technology for construction of wireless sensor networks</title>
		<author>
			<persName><forename type="first">А</forename><surname>Sobchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Tyshchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gawliczek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Afanasyeva</surname></persName>
		</author>
		<idno type="DOI">10.1109/ATIT49449.2019.9030474</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IEEE International Conference on Advanced Trends in Information Theory, ATIT&apos;2019</title>
				<meeting>IEEE International Conference on Advanced Trends in Information Theory, ATIT&apos;2019<address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="102" to="106" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Optimization of digital automatic systems, fault tolerance</title>
		<author>
			<persName><forename type="first">О</forename><forename type="middle">A</forename><surname>Mashkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">M</forename><surname>Artiushyn</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The method of inverse problems of dynamics for the synthesis of a system of stabilization of the movement of a dynamic object on operatively programmable trajectories</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Mashkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">A</forename><surname>Chumakevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">V</forename><surname>Mamchur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">R</forename><surname>Kosenko</surname></persName>
		</author>
		<idno type="DOI">10.23939/mmc2020.01.029</idno>
	</analytic>
	<monogr>
		<title level="j">Mathematical Modeling and Computing</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="29" to="38" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Vector logics: The matrix-vector representation of logical calculus</title>
		<author>
			<persName><forename type="first">E</forename><surname>Mizraji</surname></persName>
		</author>
		<idno type="DOI">10.1016/0165-0114(92)90216-Q</idno>
	</analytic>
	<monogr>
		<title level="m">Fuzzy Sets and Systems</title>
				<imprint>
			<date type="published" when="1992">1992</date>
			<biblScope unit="page" from="179" to="185" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">F</forename><surname>Luger</surname></persName>
		</author>
		<title level="m">Artificial Intelligence. Strategies and methods for solving complex problems</title>
				<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">A logical approach to artificial intelligence: from classical logic to logical programming</title>
		<author>
			<persName><forename type="first">A</forename><surname>Teise</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Gribomon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Applying Petri Nets to Modeling of Many-Core Processor Self-Testing when Tests are Performed Randomly</title>
		<author>
			<persName><forename type="first">V</forename><surname>Mashkov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Barilla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Simr</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10836-012-5346-8</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Electronic Testing Theory and Applications</title>
		<imprint>
			<biblScope unit="page" from="25" to="34" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Generation of Fuzzy Rules by Mountain Clustering</title>
		<author>
			<persName><forename type="first">R</forename><surname>Yager</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Filev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Intelligent &amp; Fuzzy Systems</title>
		<imprint>
			<biblScope unit="page" from="209" to="219" />
			<date type="published" when="1994">1994</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Nilsson</surname></persName>
		</author>
		<title level="m">Principles of Artificial Intelligence</title>
				<imprint>
			<date type="published" when="1985">1985</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Telecommunication node clustering with node compatibility and network survivability requirements</title>
		<author>
			<persName><forename type="first">K</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lee</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Management Science</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="363" to="374" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Choice Manipulation in Multicriteria Optimization Problems</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Selected Papers of the XIX International Scientific and Practical Conference Information Technologies and Security, ITS&apos;2019</title>
				<meeting><address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="234" to="245" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Methods for Determining the Group Ranking of Alternatives for Incomplete Expert Rankings</title>
		<author>
			<persName><forename type="first">H</forename><surname>Hnatiienko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Tmienova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kruglov</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-58124-4_21</idno>
	</analytic>
	<monogr>
		<title level="m">Mathematical Modeling and Simulation of Systems, MODS 2020</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Shkarlet</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Morozov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Palagin</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<biblScope unit="volume">1265</biblScope>
		</imprint>
	</monogr>
	<note>Advances in Intelligent Systems and Computing</note>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Luger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Stubblefield</surname></persName>
		</author>
		<title level="m">Artificial Intelligence: Structures and Strategies for Complex Problem Solving</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Computational Intelligence: A Logical Approach</title>
		<author>
			<persName><forename type="first">D</forename><surname>Poole</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mackworth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Goebel</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Makhortov</surname></persName>
		</author>
		<title level="m">Mathematical foundations of artificial intelligence: the theory of LP-structures for the construction and study of production-type knowledge models</title>
				<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">LP Structures Theory Application to Building Intelligent Refactoring Systems</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Makhortov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Nogikh</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-50097-9_41</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Fourth International Scientific Conference Intelligent Information Technologies for Industry, IITI&apos;19. Advances in Intelligent Systems and Computing</title>
				<meeting>the Fourth International Scientific Conference Intelligent Information Technologies for Industry, IITI&apos;19. Advances in Intelligent Systems and Computing<address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="403" to="411" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Application of LP Structures Theory to Intelligent Attribute Merger Refactoring</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Makhortov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Nogikh</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-59535-7_32</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 18th Russian Conference on Artificial Intelligence</title>
		<title level="s">Lecture Notes in Artificial Intelligence</title>
		<meeting>the 18th Russian Conference on Artificial Intelligence<address><addrLine>RCAI; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="437" to="447" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Evaluating the effectiveness of cloud services</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Leshchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Dakhno</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Trush</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Makhovych</surname></persName>
		</author>
		<idno type="DOI">10.1109/ATIT49449.2019.9030430</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of IEEE International Conference on Advanced Trends in Information Theory, ATIT&apos;2019</title>
				<meeting>IEEE International Conference on Advanced Trends in Information Theory, ATIT&apos;2019<address><addrLine>Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="120" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">General Framework for Network Survivability Testing and Evaluation</title>
		<author>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ming</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Networks</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="831" to="841" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Human Factor in the Tasks of Ensuring Functioning Safety of Complex Technical Objects</title>
		<author>
			<persName><forename type="first">O</forename><surname>Korostil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Korostil</surname></persName>
		</author>
		<idno type="DOI">10.1515/jok-2017-0052</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Konbin</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="313" to="320" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Computational scheme of ordinary differential equations integration on the basis of differential taylor transformation with automatic step and order selection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><surname>Rakushev</surname></persName>
		</author>
		<idno type="DOI">10.1615/JAutomatInfScien.v44.i12.20</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Automation and Information Sciences</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">12</biblScope>
			<biblScope unit="page" from="12" to="22" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Numerical Method of Integration on the Basis of Multidimensional Differential-Taylor Transformations</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rakushev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Permiakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tarasenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kovbasiuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kravchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lavrinchuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S&amp;T</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="675" to="678" />
		</imprint>
	</monogr>
	<note>Proceedings.</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
