<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Informational and Procedural Description of an Energy-active Control Object Behavior Under Active Threats Conditions</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Liubomyr Sikora</string-name>
          <email>lssikora@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lysa</string-name>
          <email>lysa.nataly@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rostyslav Tkachuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olga Fedevych</string-name>
          <email>olha.y.fedevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>28a Bandery Str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv State University of Life Safety</institution>
          ,
          <addr-line>35 Kleparivska Str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Infrastructure activities and energy-active objects management involves formation and processing of multifaceted information on production and sale of energy resources by its operative personnel system. The synergistic management effect will be achieved thanks to system's emergent property, with formation of an integrated information environment in spatio-temporal dimension, which will reflect "life's multifacetedness" in the context of combining main activity with society's value demands. Activity and decision-making of operational personnel creates characteristics of energy-active object and becomes a reflection of strategically verified cost-value content of its development in general. Such a motivational reference point manifests itself as acquisition of its informationprocedural image (characteristic "portrait") of integrative quality. The activity effect will be reflected in result and state of energy-active object, which are evaluated based on image's parametric information in space-time dimension. Integrative property of management system will be presented as an integration process that will continuously dynamically accompany executive processes that are activated by management influences and become integrated, just like management process. Integrative informational relevance of tactical and strategic assessments of energy-active facility activity and integrated decisions adoption that purposefully affect state and result of activity will be supported.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Integration</kwd>
        <kwd>system</kwd>
        <kwd>process</kwd>
        <kwd>risks</kwd>
        <kwd>decision-making</kwd>
        <kwd>information technology</kwd>
        <kwd>energy-active object</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>practical implementation as coordinated work of all compatible components (subsystems, sets of
tasks) of system.</p>
      <p>Therefore, it is necessary to manage the operation of system itself, with an assessment of
integration degree by management phases.</p>
    </sec>
    <sec id="sec-2">
      <title>2. References analysis</title>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], basics of hierarchical systems intellectual management by operative personnel are
substantiated.
      </p>
      <p>Basic principles of systemology and complex systems management are outlined in the works
[2</p>
      <p>
        In monographs [
        <xref ref-type="bibr" rid="ref4 ref5 ref6">4,5,6,7</xref>
        ], basics of management theory and decision-making by operational
personnel in complex systems under risk conditions and active factors effect on management systems
are substantiated.
      </p>
      <p>Work [8] provides an analysis of risks types that may arise during management in hierarchical
man-made systems.</p>
      <p>Work [9] substantiates systemic and logical-cognitive aspects of managing complex systems in
emergency situations. Procedures for decision-making by operational personnel and their problems in
making management decisions are considered in [10].</p>
      <p>The justification of methods and project control means, which require an integrated approach
using data protection and processing theory, interpretation of new data and situations, and
management decision- making are considered in [11,12].</p>
      <p>Works [14-16] consider management decisions problems in risk conditions and changes in
situation under active factors influence directly on management process.</p>
      <p>Work [13] provides basics of managing an energy-active facility under risk conditions.</p>
      <p>In [17-20], main methods of protecting hierarchical systems from external and internal attacks are
revealed.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Main research results</title>
      <p>In technological structures, it is impossible to manage processes without data selection, their
processing, and in case of incompleteness - replenishment due to scientific, engineering, professional
knowledge and experience of an expert in structure of decision support system (DSS).</p>
      <p>In fact, expert system in decision support system structure has two intellectual components to be
applied:</p>
      <p>1. Formalized knowledge acquired while processing situations, data, scientific and technical
theories and technologies, abstracting cognitive knowledge, logically ordered and recorded in
engineering-normative knowledge base, as a basis for supporting and correcting management
decisions in the structure of ACS-TP (technological process of automated control system) at the
operational level;</p>
      <p>2. Scientific-engineering knowledge and personal professional experience of a high-level expert,
whose cognitive system, based on creative logical-analytical system thinking, forms abstract
structures, which are basis of categorical models of strategic coordination goal-oriented management
for the upper level of man-made system infrastructure hierarchy that is affected by active threat
factors and targeted information attacks.</p>
    </sec>
    <sec id="sec-4">
      <title>3.1. Methodology for object account operator’s nervous system management determination, taking into</title>
      <p>Subject-oriented information-procedural description of an energy- active facility behavior of
infrastructure management under active threats conditions will be described below.</p>
      <p>Structural diagram of formation of management object subject-oriented description based on
production hierarchical structure and activity cognitive structure and operator's nervous system way of
thinking has the form (Fig. 1) and includes following components of information and intellectual
technology.</p>
      <p>According to the hierarchical system structure, a data exchange interface is built between
technological, operational and strategic management layers, which is necessary for intelligent data
processing formation and management operations.</p>
      <p>The acquisition of expert knowledge by operational personnel in process of working in
energyactive units’ limit modes is characterized by the fact that expert system performs cognitive intellectual
functions, which consist in assessing image of situation and making decisions based on the processed
data (CIA →ACS) (Fig. 1) obtained during process of professional activity at all infrastructure
hierarchy levels.</p>
      <p>Designation in Fig. 1. ITS – information-technological system, IMS – information-measuring
system, ACS – automated control system, MO – management object, CIA – cognitive intelligent
agent, {Fn }– factors of active actions on system,αrisk</p>
      <p>– risks.Therefore, role of a cognitive intellectual agent person is reduced to the fact that an
expert- consultant performs in an active cognitive mode an intellectual operation (IA) of the type:
IA1 – processes data and knowledge of subject area;</p>
      <p>IA2 – in accordance with target task chooses a scheme, procedure, algorithm and strategy for its
solution based on risk factors identification due to action of threats and attacks;</p>
      <p>IA3 – in case of insufficient data and incomplete knowledge, searches for methods of
supplementing their knowledge within basic theory management framework, system analysis,
logiccognitive methods of generating ideas and creative solutions;
IA4 – based on heuristics, generates hypotheses about problem solving schemes;</p>
      <p>IA5 – chooses procedures or algorithms, according to reference models of production system
functioning and goal-oriented strategies;</p>
      <p>IA6 – finding the appropriate scheme for problem solving, expert describes problem area in the
form of a set of facts and rules (proof, solution) and ties them to target tasks;</p>
      <p>IA7 – fills ES with new knowledge (as basis of ES self-learning process), organizes and formalizes
on basis of logical rules and system analysis;</p>
      <p>IA8 – transmits data to operational personnel for decisions formation. On the basis of system
approach and cognitive diagrams, appropriate stages of searching for a method of solving
management problems in dialog mode are developed with appropriate sequence, for target task and
problem situation;</p>
      <p>IA9 – generation of infrastructure functioning strategic and local goals.</p>
      <p>In accordance with the target expert tasks, lets highlight management consulting modes (Fig. 2)
R1 – ES mode of client-IA consultation: during operator-intelligent agent (IA) with ES dialogue,
problem solution is ensured from subject-oriented area, using formed knowledge base and DB, ES,
and situational data of certain reliability level;</p>
      <p>R2 – ES awareness mode of one's own essence of cognitive component through self-testing
includes decision-making procedures based on logical explanation schemes, scheme mechanisms,
proof procedures when solving test problems (self-diagnosis) in production system structure – a
system involved in strategic management.</p>
      <p>R3 – Filling database and knowledge by expert mode, formation of interface, strategies and
dialogue modes (operator – ES – DSS) in the initial and current operation mode.</p>
      <p>R4 – Testing mode, when an expert and a knowledge engineer (ІАе, ІАd) using dialogue and
explanatory tools check ES competence to a given level of plausibility and correctness according to
the model and a specific interpretation of production situation;</p>
      <p>R5 – Working mode with clients at all levels of operational and strategic management hierarchy.</p>
      <p>To increase cyber security level, following data processing and selection procedures are used on
the basis of intelligent operations using information technology methods (Fig. 2), which, accordingly,
is the reason for minimizing risk level in the event of threats complex to infrastructure.
{ Fi}
{Fn}
{FR}</p>
      <p>IMS
ACS</p>
      <p>MO
Х</p>
      <p>Situation</p>
      <p>Operations
type selection
Strategic infrastructure management level
Σαrisk
Expert system</p>
      <p>{KTAi} - experts
IA5</p>
      <p>IA1
IA2
IA3
IA4
IA6
IA7
IA8
IA9</p>
      <p>CІА1
CІА2
CІАn
Х</p>
      <p>α1 risk
α2 risk
α3 risk
α4 risk
α5 risk
α6 risk
α7 risk
α8 risk
α9 risk
R1
R2
R3
R4</p>
      <p>Consultation
Cognitive crisis situation</p>
      <p>essence</p>
      <p>Situations intelligent
assessment and scheme
selection for problem</p>
      <p>solving</p>
      <p>Management strategies choice
Intelligent procedures of system structuring:</p>
      <p>PR1 – extracting knowledge from the expert and operational staff to fill procedural knowledge
base;</p>
      <p>PR2 – management hierarchy organization for effective operation of production structure based on
corporate agreement strategy;</p>
      <p>PR3 – submission of requests and knowledge in a form understandable by ES in dialogue mode in
access mode according to access level;</p>
      <p>The essence of knowledge discovery process by experts consists in procedures for conducting
heuristic and logical analyzes of problem area in accordance with target tasks, taking into account the
cognitive characteristics of each agent, and formation of system knowledge models that provide
situations awareness of their information structure, which is basic for problem solving.</p>
      <p>Informational and intellectual knowledge assessment about CIA operation, about effective
management processes includes:</p>
      <p>PI1 – objects and concepts of subject area for identifying goals, assessing situations, building
procedures, decision-making schemes;</p>
      <p>PI2 – characteristics of object and situations state (probability of events occurrence, goals
significance coefficients, alternatives ranking, identification of advantages signs);</p>
      <p>PI3 – comparison indicators of situations in (threat management) mode to establish
cause-andeffect relationships between objects and influence degree in objects hierarchy and management
structures.</p>
      <sec id="sec-4-1">
        <title>Infrastructure problematic situation</title>
      </sec>
      <sec id="sec-4-2">
        <title>Expert consultation _(КІАЕ)</title>
      </sec>
      <sec id="sec-4-3">
        <title>R1 – consultations</title>
      </sec>
      <sec id="sec-4-4">
        <title>R2 – cognitive operations</title>
      </sec>
      <sec id="sec-4-5">
        <title>R3,4 – testing knowledge</title>
        <p>replenishment</p>
      </sec>
      <sec id="sec-4-6">
        <title>R5 – teamwork</title>
      </sec>
      <sec id="sec-4-7">
        <title>Intelligent procedures ПR1 – knowledge formation ПR2 - structuring ПR3 – consultations</title>
      </sec>
      <sec id="sec-4-8">
        <title>Assessing situation procedures in IASU</title>
        <p>Pri
РІ1 – DSS mode
РІ2 – situation assessment in ACS
object
РІ3 – threats signs detection
Еі
Е1
Е2
Е3
Е4
PRK
Z1
Gi
Di
Rj
Is
Iz</p>
        <p>X
X
X</p>
        <p>KFi</p>
        <p>M (sit ПCi (t))</p>
      </sec>
      <sec id="sec-4-9">
        <title>Team of experts DSS</title>
      </sec>
      <sec id="sec-4-10">
        <title>Dialogue</title>
      </sec>
      <sec id="sec-4-11">
        <title>IACS management system infrastructure Si SIi</title>
      </sec>
      <sec id="sec-4-12">
        <title>Technology production infrastructure</title>
        <p>FR</p>
        <p>FE</p>
        <p>Fn</p>
        <p>Accordingly, information ensures preparation of scheme and management process procedure.</p>
        <p>VSS1 – hierarchical management structure, which includes strategic, administrative, operational
management and ACS-TP;</p>
        <p>VSS 2 – information module that includes strategy synthesis, problem generators, situations
identification, data processing unit, logic-mathematical processor, knowledge jams structures,
diagnostic system and test generators;</p>
        <p>VSS3 – management object model with aggregated series-parallel connected, active blocks of
processing of material and energy resources.</p>
        <p>VSS4 – logical-cognitive model of knowledge organization structure of operator (CIAi) - agent,
which ensures decision-making process in hierarchical management system.</p>
        <p>3.2.</p>
        <p>Information and management interaction in infrastructure</p>
        <p>The interrelationship of informational and managerial interaction components, respectively, is
based on informational-systemic and logical-cognitive procedures that reflect the agent's thinking
process in formation and implementation of targeted countermeasures against threats and active
attacks on infrastructure.</p>
        <p>Let's define basic components of informational-systemic and logical-cognitive activity:
1</p>
        <p>PR LK – generation of target task using operator’s cognitive system based on acquired experience
and knowledge;</p>
        <p>1
PR IC – formation of subject knowledge hierarchy for management;
PR I2C – creation of knowledge terms subject-oriented field dictionary;
PR 2LК – strategies generation and procedures of its solving according to tasks purpose;
6.
area.</p>
        <p>7.</p>
        <p>PR 3LK – logical-cognitive procedures synthesis for getting out of conflict on the basis of a
conceptual model which is based on existing knowledge structure and intellectual agent experience;</p>
        <p>PR 4LК – logical-mathematical procedure development for choosing management strategies, based
on a typical procedure and algorithms for solving object management non-standard problems under
conflict risk conditions;</p>
        <p>PR 3IC – building a model of structure and a model of states space as well as taking into account
space of goals, which is parameterized using operator's knowledge organization cognitive structure;</p>
        <p>PR 5LК – creation of diagnostic system for choice adequacy of decision-making strategies for target
management task implementation.</p>
        <p>In combating attacks and resource threats system, let’s highlight following IACS levels (Fig. 3.):
1. Strategic management level with problem situation assessment and indication system in
(IACS) – an integrated automated control system.</p>
        <p>2. Basic components of informational and intellectual activity of management cognitive states
and (CIA4S ) - (CIA40 ) strategic and operational.</p>
        <p>3. Cognitive expert's knowledge base (CEKB), which is personally formed by an intellectual
agent with a creative way of thinking and intelligence.</p>
        <p>4. Blocks (1,2,3), which characterize methods, processes, procedures necessary for assessing
situations and expert support.</p>
        <p>5. Data flows information processing blocks about dynamic situation in IASU and control
object (OC) based on crisis states selection of indicators and limit control modes from mode data.</p>
        <p>Management risks control block (α rKisk (C,U )) in case of object mode deviation from target
Risk level classification block (α risk Ci ≥ α d ) according to the permissible level.</p>
        <p>Expert active consultations formation block for new strategies (ACE – experts) formation.
• – team for forming an active attacks complex on infrastructure.</p>
        <p>In accordance with target task, let’s consider system, information and intellectual operations and
their integration while formation of management procedures and countering attacks (Fig. 3).</p>
        <p>According to the scheme in Fig. 2. of information-cognitive interaction of IACS and (IFij (A))
integrated attack system on management process -, two components of risk integration can be
distinguished, which, if level is exceeded, lead to accidents:</p>
        <p>• logical-cognitive errors in decision-making procedures due to incomplete knowledge and
incorrect decisions;</p>
        <p>• systemic, logical and cognitive errors in selection of mathematical models of management
objects dynamics and structure as well as procedures and algorithms for processing heterogeneous
data.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Results &amp; Discussion</title>
      <p>If take into account that management structure includes an automatic system for
implementation of object management process (ACS – TP-ACS) and management operators team
(cognitive agents) than behavior of such structure has a high risk of failure under threats
influence.</p>
      <p>Accordingly, lets provide list of active threat attacks on man-made systems, both internal and
external (Table 1).</p>
      <p>Accordingly, cognitive and intellectually logical operations are performed by intelligent agents
both inside structure of management team and individually:
• {CIAEi } – a team of experts;</p>
      <p>{CIAEp } – an expert with appropriate level of decision-making authority;
•
•
•
•
{CIAU0 }
{IATESR } – strategic level experts;
{IFij (AAS )}
– system management experts team;
– operational management agents team at IACS;</p>
      <sec id="sec-5-1">
        <title>Problematic situation in IACS</title>
      </sec>
      <sec id="sec-5-2">
        <title>Strategic level</title>
        <p>CIAus</p>
      </sec>
      <sec id="sec-5-3">
        <title>Cognitive KDB</title>
        <p>CІАЕ
ПRЛК +</p>
        <p>ZU1
ПRic 1</p>
        <p>ZU2
ПRic 2</p>
        <p>ZU3
ПRлк 3</p>
        <p>K1l
ПКлк2</p>
        <p>K2l
ПRлк4</p>
        <p>K3l
ПRR 3</p>
        <p>K4l
ПR1k 5
K5l</p>
      </sec>
      <sec id="sec-5-4">
        <title>Goal generation</title>
      </sec>
      <sec id="sec-5-5">
        <title>Management knowledge hierarchy</title>
      </sec>
      <sec id="sec-5-6">
        <title>Subject-oriented knowledge base</title>
      </sec>
      <sec id="sec-5-7">
        <title>Subject-oriented knowledge base</title>
      </sec>
      <sec id="sec-5-8">
        <title>Cognitive procedures for getting out of conflict</title>
      </sec>
      <sec id="sec-5-9">
        <title>Strategy for solving nonstandard problems</title>
      </sec>
      <sec id="sec-5-10">
        <title>Cognitive structuring</title>
      </sec>
      <sec id="sec-5-11">
        <title>Adequacy of goals to strategies W1</title>
        <p>W2
W3
W4
W5
W6
W7
W8
KSU</p>
      </sec>
      <sec id="sec-5-12">
        <title>CIAu</title>
      </sec>
      <sec id="sec-5-13">
        <title>Logical - cognitive procedures</title>
        <p>α risk (Ci,U)</p>
      </sec>
      <sec id="sec-5-14">
        <title>Intellectual operations</title>
        <p>ІАCЕ - strategies</p>
      </sec>
      <sec id="sec-5-15">
        <title>Cognitive logic mathematical operations</title>
        <p>αriskCi&gt;αd</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Conclusion</title>
      <p>µn (CF )
(0.7 ÷ 0.9)
µn (Bd )
(0.7 ÷ 0.9) αr1(0.1 ÷ 0.9)
αr2 (0.1 ÷ 0.9) αr3 (0.1 ÷ 0.4)</p>
      <p>According to informational and procedural description of target task of infrastructure and
energy- active object management, the following was carried out:</p>
      <p>• Analysis of literature sources about intellectual management of man-made systems
and infrastructure problems, and their resistance to external and internal attacks;
• Problem of infrastructure and energy-active object complex management under
complex threats conditions to management is substantiated;</p>
      <p>• Role of cognitive intellectual agent on management process in difficult conditions is
substantiated;</p>
      <p>• Structural diagram of subject-oriented description formation of management object
based on production hierarchical structure and cognitive activity structure as well as way of
thinking of operator's nervous system is presented;</p>
      <p>• Relationship between informational and managerial interaction components, which is
based on informational-systemic and logical-cognitive procedures, is substantiated;
• System, information and intellectual operations and their integration in management
procedures formation and countering attacks were considered;</p>
      <p>• A list of active threat attacks on man-made systems, both internal and external, and an
infrastructure integration risk assessment table were given.</p>
      <p>Solving the above problems at system, procedural and information levels can help modernize
existing infrastructure management and improve their design and management process.</p>
    </sec>
    <sec id="sec-7">
      <title>6. References</title>
      <p>[7] L.Sikora, R. Tkachuk, N. Lysa, I. Dronyuk, O. Fedevych, R. Talanchyk.
Informationresource and cognitive concept of threat's influence identification on technogenic system
based on the cause and category diagrams integration in: Proceedings of the 2nd
international workshop on intelligent information technologies &amp; systems of information
security IntellTSIS 2021, Khmelnytskyi, Ukraine, 2853 (2021) 398-416.
[8] P. Melin and O. Castillo, Modelling, simulation and control of non-linear dynamical
systems: An intelligent approach using soft computing and fractal theory. Boca Raton, FL:
CRC Press, 2019. doi: 10.1201/9781420024524
[9] H. Yousef, Power system load frequency control: Classical and adaptive fuzzy approaches.</p>
      <p>Boca Raton, FL: CRC Press, 2017. doi: 10.1201/9781315166292
[10] T.Aven, S. Thekdi, Enterprise risk management: advances on its foundation and practice 1st
ed. London, UK, Routledge, 2019. doi: 10.4324/9780429425028
[11] D. O'Connor, I. McDermat, Systemic thinking and search for extraordinary creative
solutions. Kyiv: Nash format, 2018. (In Ukrainian).
[12] L. Sikora, N. Lysa, R. Tkachuk, B. Fedyna, O. Fedevych. Information and cognitive
components of knowledge formation in procedures for assessing dynamic situations in
cyberphysical in: Proceedings of the 3rd international workshop on intelligent information
technologies &amp; systems of information security IntellTSIS 2022, Khmelnytskyi, Ukraine,
3156 (2022) 129–139.
[13] S. Demri, V. Goranko, M.Lange, Temporal Logics in Computer Science, Cambridge,</p>
      <p>Cambridge University Press, 2016. https://doi.org/10.1017/CBO9781139236119
[14] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville,
Y. Bengio. Generative adversarial nets: in Advances in neural information processing
systems, NIPS Foundation, Montreal (2014) 2672–2680.
[15] D. Stirzaker, Stochastic processes and models. Cambridge University Press, 2016. doi:
10.1017/CBO9781316576532
[16] M. Groover, Automation, Production Systems, and Computer-Integrated Manufacturing. 4th
ed. London, UK, Pearson, 2013.
[17] A. S. Nejad, Fundamentals of System Analysis &amp; Design Publisher. LAP LAMBERT</p>
      <p>Academic Publishing, 2014. doi:10.13140/2.1.1469.7280
[18] J. Girdhar, Management information systems. New Delhi Oxford University Press, 2013.
[19] NATO Strategic Communication: More to be Done? / Steve Tatham, Rita Le Page; National
Defence Academy of Latvia Center for Security and Strategic Research. – Rīga, 2014. URL:
http://www.academia.edu/6808986/NATO_Strategic_ Communication_More_to_be_done.
[20] V. Bhise, Decision-making in energy systems 1st ed. Boca Raton, FL: CRC Press, 2021.
doi:10.1201/9781003107514</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Xing</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <article-title>Adaptive control of dynamic systems with uncertainty and quantization</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1201/9781003176626
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>G. Boy,</surname>
          </string-name>
          <article-title>The handbook of human-machine interaction: A human-centered design approach</article-title>
          . 1st ed. Boca Raton, FL: CRC Press,
          <year>2011</year>
          . doi:
          <volume>10</volume>
          .1201/9781315557380
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiggins</surname>
          </string-name>
          ,
          <article-title>Introduction to human factors for organisational psychologists 1st ed</article-title>
          . Boca Raton, FL: CRC Press,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1201/9781003229858
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Jantan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hamdan</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Othman</surname>
          </string-name>
          <article-title>Intelligent Techniques for Decision Support System in Human Resource Management</article-title>
          : in
          <source>International Journal of Innovative Computing, Information and Control</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ), ICIC International, Hong Kong,
          <year>2011</year>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .5772/39401
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hovorushchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          <article-title>Pavlova Method of activity of ontology-based intelligent agent for evaluating the initial stages of the software lifecycle: in Oleg Chertov</article-title>
          , Tymofiy Mylovanov, Yuriy Kondratenko, Janusz Kacprzyk, Vladik Kreinovich, Vadim Stefanuk (Eds.),
          <source>Recent Developments in Data Science and Intelligent Analysis of Information</source>
          , volume
          <volume>836</volume>
          <source>of Advances in Intelligent Systems and Computing</source>
          , Springer-Verlag, London,
          <year>2019</year>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>178</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -97885-7_
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Dronyuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>O.</surname>
          </string-name>
          <article-title>Fedevych Information and logic cognitive technologies of decision-making in risk conditions in:</article-title>
          <source>Proceedings of the 1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security IntellTSIS</source>
          <year>2020</year>
          , Khmelnytskyi, Ukraine,
          <volume>2623</volume>
          (
          <year>2020</year>
          )
          <fpage>340</fpage>
          -
          <lpage>356</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>