<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Cognitive and Information Decision-Making Technologies and Risk Assessment in Technogenic Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Lubomir</forename><surname>Sikora</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12, Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Natalia</forename><surname>Lysa</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12, Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Jan</forename><surname>Krejčí</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Jan Evangelisty Purkynė University</orgName>
								<address>
									<addrLine>Ceske mladeze, 8, Usti nad Labem</addrLine>
									<postCode>40096</postCode>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Rostislav</forename><surname>Tkachuk</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Lviv State University of Life Safety</orgName>
								<address>
									<addrLine>35, Kleparivska str</addrLine>
									<postCode>79007</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olga</forename><surname>Fedevych</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12, Bandera str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Cognitive and Information Decision-Making Technologies and Risk Assessment in Technogenic Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8DC574CB23AB6ABC2D90E776AAA14D7C</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>System</term>
					<term>information</term>
					<term>situation</term>
					<term>knowledge</term>
					<term>risks</term>
					<term>decisions</term>
					<term>cognitive procedures</term>
					<term>conflicts</term>
					<term>logical rules</term>
					<term>management</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article considers information technology of formation and decision -making, in the conditions of risk construction methods, for technogenic systems management with use of cognitive model of operator activity as a basis of decision -making processes intellectualization. It is substantiated, on the basis of system analysis, the decomposition of the management problem on the problem of solving which is necessary for decision making. The structural interaction scheme of intellectual ACS with the management (team) person is constructed and the information technology of dialogue in technogenic system management structure is developed. The interaction scheme of conflicting active systems in the conditions of resources redistribution is substantiated. The classification of management tasks, using system analysis and information technology, to assess the situation in the system is presented. The structure of the cognitive-logical formation of management tasks procedure in risk conditions on the basis of the intellectual agent model and the generator of procedures for their solution, situational tasks is developed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Integrated human-machine systems, control structures, automated personnel training systems are hierarchical systems characterized by uncertainty in the structure and dynamics of control objects. Therefore, decision-making in such systems with incomplete data on the problem and functional structure of technological processes and under the influence of disturbing influences with a priori unknown statistical characteristics, is a complex intellectual procedure that includes the selection of adequate object models, algorithms for data selection and processing, and accordingly, the formation of approaches to the synthesis of decision-making procedures using the theory of possibility and the theory of fuzzy sets in the assessment of situations based on the object state images recognition CITRisk'2021: 2nd International Workshop on Computational &amp; Information Technologies for Risk-Informed Systems, September 16-17, 2021, Kherson, Ukraine EMAIL: lssikora@gmail.com (L.Sikora); lysa.nataly@gmail.com (N.Lysa); jan.krejci@ujep.cz (J.Krejčí); rlvtk@ukr.net (R.Tkachuk); olha.y.fedevych@lpnu.ua (O.Fedevych) ORCID: 0000-0002-7446-1980 (L.Sikora); 0000-0001-5513-9614 (N.Lysa); 0000-0003-4365-5413 (J.Krejčí); 0000-0001-9137-1891 (R.Tkachuk); 0000-0002-8170-3001 (O.Fedevych) <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref>.</p><p>Purpose. Substantiation of information technologies methods, system analysis, logicalcognitive models for control systems of technogenic structures in the conditions of threats creation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">References analysis</head><p>In the fundamental work <ref type="bibr" target="#b0">[1]</ref> the principles of complex control structures of automated humanmachine systems creation are considered and large systems development forecast is given. In <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref> the hierarchical systems construction methods using manager operator cognitive models are analyzed. Problems of operator activity on management in ACS and operative thinking at decision-making are considered in monographs <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. Management problems in the conditions of a situation change at action of disturbances on process of decision-making are shown in <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b7">8]</ref>. The monograph <ref type="bibr" target="#b6">[7]</ref> highlights the logical problems of artificial intelligence for use in control systems. The monograph <ref type="bibr" target="#b15">[16]</ref> is devoted to the study of mathematical modeling methods of data processing processes by a human operator in human-machine systems and the detection of errors due to factors influencing its activities. Monographs <ref type="bibr" target="#b14">[15,</ref><ref type="bibr" target="#b16">17]</ref> are devoted to data processing methods for decision making, artificial intelligence, theory of knowledge and learning, modern technologies of process analysis and technical logic.</p><p>In <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12]</ref> the analysis of risks models which arise in hierarchical technogenic systems is carried out.</p><p>In <ref type="bibr" target="#b8">[9]</ref> construction methods of information technology of formation and decision-making under risk conditions are considered for management of technogenic systems with use of cognitive model of operator activity. In <ref type="bibr" target="#b9">[10]</ref> the problem of decision-making in the risk conditions and conflict situations in the presence of terminal restrictions is considered at the time of resolving the crisis in the complex system management structure.</p><p>The results of research used in the <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14,</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref> are devoted to the analysis of information technologies, the concept of their development, platforms and standards, software and expert systems, fuzzy logic.</p><p>In <ref type="bibr" target="#b21">[22]</ref> the use of data mining to improve energy efficiency in complex systems is substantiated.</p><p>The paper <ref type="bibr" target="#b22">[23]</ref> is devoted to developing the Multi-hazard Risk Assessment Framework containing models, scenarios, and methods for analyzing the risk related to multi-hazards. The multi-layered spatial model and the model of the Human-Infrastructure System based on hierarchies and having great scalability in time and space are proposed. These models take into account all possible relations between people, objects of infrastructure, natural environment, and corresponding spatial areas <ref type="bibr" target="#b23">[24]</ref>. The proposed event-based scenario representation model provides sufficient detailization in space and time and can properly represent multi-hazards, including compound events, cascading effects, and risk-related processes driven by environmental and societal changes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Presentation of the main research material</head><p>Decision-making under active threats in hierarchical organizational and production systems is a complex problem and is characterized by both a game component and clear decision-making procedures in the management of technological processes (TP) and organizational and administrative structures (OAS), both in normal and in extreme conditions that arise due to information-type attacks and cognitive failures of managers.</p><p>Decomposition of making managerial decisions problem in terms of threats risks can be divided into a set of tasks:</p><p>-creation of new intelligent control systems for the processes of autonomous control systems functioning (ACS) of TP and SCA;</p><p>-existing ACS operating modes diagnostics, their optimization and adaptation to the effects of disturbances and threats and changes in their target orientation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Classification of intelligent control information systems</head><p>Here is the classification of intelligent information systems (IIS) <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>, which are components of automated control systems (human-machine complexes):</p><p>-problem-oriented expert systems using artificial intelligence for data processing and classification;</p><p>-intelligent information systems of man-made and organizational structures situational management that operate in the face of threats and attacks to change strategies and goals;</p><p>-сomputational and logical modeling systems of dynamics of potentially dangerous objects (PВO) -design objects;</p><p>-intelligent educational systems in the structure of universities; -intelligent simulators for special training of personnel working in conditions of threats and cognitive disruptions; -intelligent agents, as goal-oriented structures in hierarchical control systems of technogenic systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Consideration the classes of problems, the solution of which ensures the reliable operation of man-made (technogenic) systems in the face of active threats</head><p>Problem area and types of tasks that can be performed by the information-intellectual system (IIS) <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref> in the development of management strategies and ensuring resilience to active threats, information attacks on the ACS system and technogenic structures:</p><p>-ault diagnosis of complex systems and software products; -planning a targeted actions sequence for the strategies implementation; -observation of situations, recognition and classification of images; -object management in accordance with the setted strategies and goals.</p><p>Here is a block diagram of the interaction of intelligent systems (IS) -Figure <ref type="figure" target="#fig_0">1</ref>. Such a complex intellectual structure performs the function of object management with a certain type of technological process {ТПj ← Fi}, which is affected by disturbing factors from the external environment and the dynamics of market environment changes in the parameters. The task of the system is to keep the object in the target operation area in case of resource type failures and interferences. To effectively solve management problems, it is necessary that the structure of decision-making procedures and data structure have a conjugate, consistent, formalized, logical-mathematical and informational representation Figure <ref type="figure" target="#fig_1">2</ref> and appropriate meaning in the perception of the situation content by the operator cognitive system. The task, in the general case, is a situation with uncertainty that motivates purposeful actions of the intelligent system to achieve a certain goal at a given time interval and its effective solution based on proven strategies, methods, algorithms, procedures and cognitive methods.</p><p>The target in such a system is encoded in the solving system (IPS -intelligent problem solver). Then it acts as requirements description for the state of the system in which the target is formed. An intelligent system (IPS) is characterized by an algorithm and a procedure for finding a strategy for problem task and situation solving, based on a given goal orientation.</p><p>V. Glushkov pointed out the important role of information technologies for the creation of problems solving methods and procedures that arise in the design of systems (man-made, publishing and organizational) in his research <ref type="bibr" target="#b7">[8]</ref>.</p><p>Substantiating their automation based on the use of information models of dialog mode, inference, generating hypotheses and decision making methods, it was first identified the role of management intellectualization in schemes for constructing procedures for the algorithms synthesis for solving constructive problems. This did not take into account the cognitive, but only the energy aspects of the operator's behavior when assessing the situation in the system under the influence of active type interference and threats -Figure <ref type="figure" target="#fig_1">2</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Models of data perception in the ACS-TP operator field of attention in the limit modes of energy-active object operation</head><p>The operator's perception of analog and digital data from the control devices of the control object state has its own features in assessing their content in the field of attention, which are that when analyzing the situation in the object:</p><p>-digital data is stored in memory but not visible from previous trajectory history ) trak F ( n ; -fuzzy orientation, according to the data on the distance to the modes boundary lines ) r α F ( Δ ; -the tendencies change trajectory dynamics at control actions performance on a short terminal time interval is not traced ( )</p><formula xml:id="formula_0">) t ( trakX F * Δ ;</formula><p>-the input of the system usually has border loads of the technological structure at maximum power, it is impossible to clearly determine the allowable distance to the limit mode and the time of transition to the emergency state in a short time interval (t02-t04) of energy-intensive object,   <ref type="figure">ALARM , (</ref> ) AVAR -state of alarm and accident, IMSinformation measuring system, ACS -automated control system, TS (EICO) -technological system with energy-intensive control object, RS -source of resources.</p><p>Based on the analysis of real load modes and standards, critical parameters are determined and a permissible states regime map of the energy-active control object is formed, which is the basis for developing a situations system classifiers based on the choice of power scale class ( )</p><formula xml:id="formula_1">P Sh .</formula><p>With the target task of increasing the power of the energy-active object, the operator performs complex (tracking) control according to on a given trajectory -Figure <ref type="figure" target="#fig_4">4</ref>.</p><p>On a certain control cycle to the maximum load, the operator ( ) Zi , depending on the value of power load, perceives the situation on the basis of data with different levels of mental stress, which can lead his neurocognitive system, from fear of an accident, to systemic-cognitive failure.</p><p>Data perception distortion scheme (Fig. <ref type="figure" target="#fig_4">4</ref>) by a person operator of ACS-TP reflects the influence of many factors and interpretation of the situation content depending on the uncertainty in the description of dynamic objects and units according to the confidence degree in the readings of devices (correct), which are the part of IMS-ASU structure using current state change trajectory images and assessment of membership functions { } Mi . The reason for the existence of uncertainties should be considered incompleteness and inconsistency of data from different devices that control the unit, incompleteness of the selected information base of the IMS, aging of devices during long service life, measurement errors from the type of control and management problem (which is being solved) according to the event development scenario -Figure <ref type="figure" target="#fig_3">3</ref>. According to the type of tasks to be solved by the operator, uncertainties are formed in the generated situations under the influence of obstacles:</p><p>-Uncertainty due to the ambiguity of existing knowledge about the object in the database and knowledge base and blurring and ambiguity, incomplete professional knowledge of the operator and his ability to make decisions in stressful situations; -Uncertainty caused by incomplete knowledge about the object for different subject-oriented area hierarchy levels of control object units and blocks description, which have a physical or linguistic nature.</p><p>According to the situation, the uncertainties are divided into: Linguistic uncertainty -is caused by the vagueness and ambiguity of individual words of grammatical constructions, which have syntactic, semantic and pragmatic components and represent a description of the situation.</p><p>Cognitive uncertainty -is generated by the perception peculiarity of different types of data devices in the field of operators attention and their interpretation.</p><p>Physical uncertainty -is caused by a low level of knowledge about physico-chemical energy processes in the management object and misunderstanding of their essence, which leads to incorrect management decisions, increased risk of accidents, technological process instability.</p><p>Physical uncertainty is associated with the stochasticity of events, phenomena, processes, their causal relationships, the error in the data selection at different times when changing the technological process dynamic modes in the object units and blocks.</p><p>When approaching the limit modes, the operator on the basis of information from the data stream from the multimedia board and analog and digital devices that are in his field of vision forms situation image in the system target space according to the mode specified by the manager.</p><p>According to the load, the operator decides to correct the situation in the event of resource disturbances, information threats, system attacks, malfunctions appearances, that can cause accidents and risks in the system. The modes dependence on the load level, leads to cognitive stress when making decisions on the correction of state control and the anxiety growth when approaching the allowable normative values.</p><p>In such a situation, the operator as a cognitive intellectual agent must have a certain intellectual potential that ensures effective management decisions. Intellectual potential depends on the knowledge of professional training, the ability to make decisions in unusual situations. Accordingly, this approach is the basis for the separation of activity factors. Selected factors of ability to manage, in terms of risk and extreme situations, are formed in the tables:</p><p>Table <ref type="table" target="#tab_0">1</ref> -factors of operator disorientation while decision making; Table <ref type="table">2</ref> -uncertainties factors in the data selection on the object state to assess the situation by the operator; Table <ref type="table">3</ref> -cognitive factors in assessing the reliability of data and management decisions; Table <ref type="table">4</ref> -knowledge required to perform the management decisions by the operator. The values of factors (coefficients) are obtained in the process of testing according to the logical-cognitive approach of their construction <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Factors of operator disorientation in decision makingce</head><formula xml:id="formula_2">№ Facts Factor content F k 1 ( ) i n X trak F</formula><p>When digitally represented Xi N the state change trajectory is not traced ( )</p><formula xml:id="formula_3">X N F 2 ( ) r n α F Δ</formula><p>Loss of orientation by the operator when the under the action of management U in conditions of noise</p><formula xml:id="formula_4">U F Δ 4 ( ) G U L L F − Δ Δ</formula><p>Disorientation of the operator when approaching the emergency state of systems under the control and interference action ( )</p><formula xml:id="formula_5">A L F Δ 5 ( ) ( ) X A N max L HL F</formula><p>Occurrence of stress in the operator when approaching the emergency line and when estimating the maximum devices readings</p><formula xml:id="formula_6">( N max F 6 ( ) i X N F Δ ±</formula><p>Distortion of data perception by the operator at disturbances action</p><formula xml:id="formula_7">( D sen F 7 ( ) X D N F</formula><p>The operators confidence degree in the devices readings on the reliability level ( )</p><formula xml:id="formula_8">X D N F 8 ( ) ПG sit F N</formula><p>The situation uncertainty factor in the operator imagination under the interference influence ( )</p><formula xml:id="formula_9">X FN Table 2</formula><p>Uncertainties factors in selecting object status data for operator for event assessment Cognitive factors in assessing the data reliability and management decisions</p><formula xml:id="formula_10">№ Facts Factor content F k 1 ( ) U i pi nd | V F 1 =</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Data incompleteness and inconsistency from different devices</head><formula xml:id="formula_11">№ Facts Factor content F k 1 0 nZ F</formula><p>Low, disordered professional knowledge of a professional operator about the object</p><formula xml:id="formula_12">0 nZ K 2 nR F Low level of training nR K 3 VR F</formula><p>Ability and ability to make operational decisions</p><formula xml:id="formula_13">UR K 4 ( ) sit F S</formula><p>Ability to make decisions in a stressful situation Knowledge that needed to make management decisions by the operator № Facts Factor content Based on the testing and the results obtained, it is possible to assess the level of operational staff training at existing enterprises and optimize them to minimize incorrect decisions that lead to emergencies due to incorrect assessment of measurement data about objects state and their interpretation under threats and information attacks.</p><p>According to the situation that occurs in the system, table 5 and table 6 are constructed, which characterize the ability of the operator to make management decisions.</p><p>Expert assessments of cognitive components ( )</p><formula xml:id="formula_14">і i PR , CF</formula><p>decision making by the manager. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>CF1</head><p>goal realization 0,8-10 0,6-0,9 CF2 goal orientation 0,8-1,0 0,5-,8 CF3 generation of strategies 0,7-1,0 0,5-0,8 CF4 control logic 0,6-1,0 0,4-0,7 CF5 assessment of actions taken 0,5-1,0 0,5-0,7 PR1 action planning 0,5-0,8 PR2 choice of alternatives 0,6-1,0 0,5-0,8 PR3</p><p>wrong choice і Ω 0,5-1,0 0,3-0,7 PR4 creativity 0,7-1,0 0,6-0,9 PR5 goal generation 0,8-1,0 0,6-0,8 PR6 assessment of situations 0,5-1,0 0,5-0,9 PR7 logic procedure RZ 0,7-1,0 0,7-0,9 PR8 coordination procedures 0,8-1,0 0,7-0,9</p><p>Expert evaluation (ІІ) logic of thinking </p><formula xml:id="formula_15">n i PRi 1 = , [ ] { } 0 1 5 0 , , PR і − ∈ ∀ , { } ь і KCi 1 = , [ ] { } 0 1 7 0 , , KCi − ∈ ∀</formula><p>, and determine the quality of decision-making by the operator in the face of threats. Accordingly, there are assessments of the decision-making quality for the intelligent agent management</p><formula xml:id="formula_16">{ } [ ] [ ] [ ] [ ] [ ] [ ]          → − → → − → → → − → = ∧ Norma , , Alarm , , n Rick , , n , і PR ІА і і n 0 1 8 0 8 0 7 0 7 0 5 0 1 .</formula><p>The assessment of the risk level is based on the following models that characterize the processes of management decisions by the IA operator:</p><p>1. Probabilistic model of risk at the moment ( )</p><formula xml:id="formula_17">nk T t ∈ ( { } { } Alarm С / Р С / Р L T t Risk ti in і ti і і pi nk і → → = ∈ + + 1 1</formula><p>where i P -the probability of wrong decisions that lead to consequences { } i С -failure of the target task in the emergency area.</p><p>2. Unprofitable risk assessment model <ref type="bibr" target="#b21">[22]</ref> when assessing an emergency situation:</p><formula xml:id="formula_18">( ) ( ) ( )       → → ∉ → → ∈ → ∅ → 1 0 2 r v і i r V і ij α С С : H α С С : H Сui / Р Risk .</formula><p>Determines the maximum loss when exiting the target control area )</p><p>V C . 3. Risk assessment based on the decision tree in the threats management of the maximum load of man-made system energy-intensive units -Figure <ref type="figure" target="#fig_9">5</ref>.</p><p>4. Methods of payment functions for the loss of structure, resources, products. 5. To assess the risk level in the face of threats and management failures, hypothesis testing procedures were used in the form: These chains can be blocked under stress, which leads to the failure of management actions and emergencies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The logical substantiation problem of decision-making rules in intellectual systems is considered, the dialogue scheme and the decision -making scheme are substantiated as bases of persons admissible behavior strategies synthesis (active agent). It is shown that in stupor state, the deployment circuits in the process of logical goal-oriented output inference and event scenario evaluation can be blocked, which leads to the IACS loss of control for a certain terminal time.</p><p>The problem of forming target decision-making strategies for managing complex objects on the basis of an active intelligent agent as a target-made system in the integrated automated control systems structure is considered. The expert assessments construction methods for checking the operators-intelligent agents cognitive abilities are substantiated.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Block diagram of the intelligent systems interaction (ACS-LPR)</figDesc><graphic coords="4,96.95,80.75,411.15,138.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Information technology and interaction scheme of the agent with artificial intelligence with the expert and the coordinating managing agent (IACS-TP) of the control system</figDesc><graphic coords="5,127.30,80.75,350.40,472.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>maximum values changes the perception of the data content by the operator and puts him in a stress state due to the alarm of the system transition to an uncontrolled emergency state (t04, t05) () of analog signals in the graphic form there are some lacks, and possibility of the trajectory forecast the operator in terminal time is complexed at the expense of associative figurative display of data in the attention field and scenario interpretation of events. (Ті) by classifier of the situation -Figure3. Only the trajectory interpretation leads to distortion of the display scale values in different intervals of numerical values of measurement and when the trajectory enters the mode boundary areas, causing stress in decision-making on management (t04, t05), of ACS operator cognitive system.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :t</head><label>3</label><figDesc>Figure 3: Situation classifier block diagram Designation to the structural scheme: { } Si -system state,</figDesc><graphic coords="6,89.75,360.60,425.20,194.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Data perception distortion scheme in the field of view of the ACS-TP operator in the conditions of loading traffic growth</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>9 (</head><label>9</label><figDesc>The ability to imagine the image of the situationPU K Iconsit F ПСAbility to correctly assess the situation in the space of goals</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>→</head><label></label><figDesc>Ability to use knowledge to predict changes in the state under the action of management and threats Ability to evaluate cause-and-effect diagrams of the threat factors influence on the cognitive agent management actions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Block diagram of risk assessment, where PVi -selection procedure, { } і Str -strategies for choosing control actions</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 5</head><label>5</label><figDesc></figDesc><table><row><cell cols="2">operations for management</cell><cell></cell><cell></cell></row><row><cell>Factor</cell><cell>Cognitive acts</cell><cell>Kd intervals</cell><cell>Kr value</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 6</head><label>6</label><figDesc>IT-technology cognitive components (КСі)</figDesc><table><row><cell>Components</cell><cell>Information operations</cell><cell cols="2">Intervals Kd, Kr</cell></row><row><cell>KCm</cell><cell>whole oriented thinking cognitive models</cell><cell>0,6-0,95</cell><cell>0,50-0,95</cell></row><row><cell>KCd</cell><cell>analytical data analysis</cell><cell>0,5-0,95</cell><cell>0,50-0,95</cell></row><row><cell>KCe</cell><cell>logic of thinking, CІА</cell><cell>0,15-0,95</cell><cell>0,4-0,95</cell></row><row><cell>KCa</cell><cell>cognitive processes algorithmization</cell><cell>0,10-0,95</cell><cell>0,25-0,90</cell></row><row><cell>KCz</cell><cell>situational tasks and problems essence cognitive analysis</cell><cell>0,15-0,85</cell><cell>0,40-0,55</cell></row><row><cell>KCp</cell><cell>cognitive procedures for forming problem-solving schemes</cell><cell>0,14-0,90</cell><cell>0,4-0,85</cell></row><row><cell>KCi</cell><cell cols="2">identification of the problem tasks information essence 0,25-0,90</cell><cell>0,60-0,95</cell></row><row><cell>KCr</cell><cell>use of information technology to solve problems</cell><cell>0,30-0,90</cell><cell>0,60-0,95</cell></row><row><cell>KCdv</cell><cell>cognitive processing of CIA data streams received from the object</cell><cell>0,30-0,85</cell><cell>0,40-0,90</cell></row><row><cell>KCl</cell><cell>cognitive models of decision-making logic by an intelligent agent</cell><cell>0,4-0,90</cell><cell>0,40-0,90</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Hlushkov</surname></persName>
		</author>
		<title level="m">Introduction to ACS</title>
				<meeting><address><addrLine>Kyiv, Technics</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1974">1974</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Automated human-machine control systems of integrated hierarchical organizational and production structures in risk and conflicts conditions</title>
		<author>
			<persName><forename type="first">B</forename><surname>Durniak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Antonyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Ukraine Academy of printing</publisher>
			<pubPlace>Lviv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Cognitive models of strategies formation of integrated hierarchical structures operative management in the risks and conflicts conditions</title>
		<author>
			<persName><forename type="first">B</forename><surname>Durniak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Antonyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Ukraine Academy of printing</publisher>
			<pubPlace>Lviv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">System analysis of operator activity</title>
		<author>
			<persName><forename type="first">V</forename><surname>Zaitsev</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1990">1990</date>
			<pubPlace>Moscow, USSR Radio</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Economical risk and its measurement methods</title>
		<author>
			<persName><forename type="first">N</forename><surname>Machina</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<pubPlace>Kyiv, TSNL</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Situational management</title>
		<author>
			<persName><forename type="first">H</forename><surname>Pospielov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1986">1986</date>
			<pubPlace>Moscow</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Science</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Cognitive models and logic of operational management in hierarchical integrated systems in risk conditions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<pubPlace>Lviv, TSSD EBTETS</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Man and computer technology</title>
		<author>
			<persName><forename type="first">V</forename><surname>Hlushkov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1971">1971</date>
			<pubPlace>Kyiv</pubPlace>
		</imprint>
		<respStmt>
			<orgName>, Science thought</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Information technologies of formation of intellectual decision-making strategies under conditions of cognitive failures</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Navytka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of Computational &amp; Information Technologies for Risk-Informed Systems, CITRisk-2020</title>
				<meeting>Computational &amp; Information Technologies for Risk-Informed Systems, CITRisk-2020<address><addrLine>Kherson, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="233" to="254" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Information and logic cognitive technologies of decision-making in risk conditions</title>
		<author>
			<persName><forename type="first">L</forename><surname>Sikora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lysa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Dronyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Fedevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security, IntellTSIS 2020</title>
				<meeting>the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security, IntellTSIS 2020<address><addrLine>Khmelnytskyi; Ukraine</addrLine></address></meeting>
		<imprint>
			<biblScope unit="volume">2623</biblScope>
			<biblScope unit="page" from="340" to="356" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Orel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Malʹovanyy</surname></persName>
		</author>
		<title level="m">Risk</title>
				<meeting><address><addrLine>Lviv, LPNU</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Hlushkov</surname></persName>
		</author>
		<title level="m">Cybernetics institute, Investigation models and methods for risks and reliablility theory operations</title>
				<imprint>
			<date type="published" when="1992">1992</date>
		</imprint>
		<respStmt>
			<orgName>Kyiv, Cybernetics institute</orgName>
		</respStmt>
	</monogr>
	<note>Complete works of</note>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Expert methods in decision making</title>
		<author>
			<persName><forename type="first">M</forename><surname>Barankevych</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Ivan Franko LNU PC</publisher>
			<pubPlace>Lviv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m">CASE -evaluation of critical software systems</title>
				<meeting><address><addrLine>Khmelnytsk-Kharkiv, NAU</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">1</biblScope>
		</imprint>
		<respStmt>
			<orgName>National Aerospace University Kharkiv Aviation Institute</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Barsyegian</surname></persName>
		</author>
		<title level="m">Data and process analysis</title>
				<meeting><address><addrLine>Sankt-Petersburg; BHV-Peterburg</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<title level="m" type="main">Information processing mathematical modeling conducted by the human-machine systems operator</title>
		<author>
			<persName><forename type="first">V</forename><surname>Prisnyakov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Prisniakova</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1990">1990</date>
			<pubPlace>Moscow, Machinebuilding</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<author>
			<persName><forename type="first">I</forename><surname>Chubukova</surname></persName>
		</author>
		<title level="m">Data Mining</title>
				<meeting><address><addrLine>Moscow, IUIH Binom</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Theory and methods of decision making</title>
		<author>
			<persName><forename type="first">O</forename><surname>Larichev</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<pubPlace>Moscow, LOGOS</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Sukhomlyn</surname></persName>
		</author>
		<title level="m">Introduction to information technology analysis</title>
				<meeting><address><addrLine>Moscow,</addrLine></address></meeting>
		<imprint>
			<publisher>Hotline Telekom</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Software design of economic information systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Vendrov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Finance and Statistics</title>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">Fundamentals of economic expert systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Belz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Ivan Franko LNU PC</publisher>
			<pubPlace>Lviv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Use of Machine Learning Technologies for the Electric Consumption Forecast</title>
		<author>
			<persName><forename type="first">M</forename><surname>Medykovskvi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pavliuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sydorenko</surname></persName>
		</author>
		<idno type="DOI">10.1109/STC-CSIT.2018.8526617</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the13th International Scientific and Technical Conference on Computer Sciences and Information Technologies CSIT-2018</title>
				<meeting>the13th International Scientific and Technical Conference on Computer Sciences and Information Technologies CSIT-2018<address><addrLine>Lviv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="432" to="435" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Risk assessment framework based on the model of humaninfrastructure system</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sherstjuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Zharikova</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2740/20200037.pdf" />
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">2740</biblScope>
			<biblScope unit="page" from="37" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Information technology of operative formation and evaluation of relevant alternatives of decision-making in human-machine systems of critical application</title>
		<author>
			<persName><forename type="first">V</forename><surname>Peredery</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Voronenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Borchik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Krejci</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Scientific and Technical Conference on Computer Sciences and Information Technologies</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">8526750</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
