<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>S. Martín-Béjar, F. J. T. Vilches, C. B. Gamboa, L. S. Hurtado, Fatigue behavior parametric
analysis of dry machined UNS A</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.5604/05096669.1194963</article-id>
      <title-group>
        <article-title>The concept of optimal behavior of a cyber object as a measure of its generalized uncertainty</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Andriy Goncharenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CMiGIN 2022: 2nd International Conference on Conflict Management in Global Information Networks</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Lubomyr Huzar Ave. 1, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2014</year>
      </pub-date>
      <volume>10</volume>
      <issue>5</issue>
      <fpage>27</fpage>
      <lpage>31</lpage>
      <abstract>
        <p>In this publication a concept of the generalized cyber object optimal behavior is considered. The situation with two alternatives is highlighted. The measure of the generalized uncertainty of a cyber object (subject of behavior) regarding the set of two alternatives achievable to this subject of behavior is the entropy of preferences with respect to achievable alternatives; that is the problem deals with the case when there are functions related to the alternatives with the properties of the controlled cyber object control and the reverse proportionality measure between the elementary effectiveness function parameter and its control. It is proposed to consider the cyber object effectiveness function of the integral dynamical form implanted into the objective functional analogical to such functional taken in the general view, which was developed in the theory of the entropy of subjective preferences; that theory is also known as Subjective Analysis. It is possible to make parallels with well-known theoretical statistical physics when using this approach. In particular, Jaynes' entropy maximum principle serves as a base. This subjective analysis principle allows one to establish the subjective maximum of entropy in the context of its conditional optimization. The Euler-Lagrange equation made it possible to obtain the best solution in the form of objective functional extrema for preferences as well as for the controlled parameter of the cyber object by identifying the requirements for the existence of the objective functional extremum of the subject of behavior. The maximum value of the functional, proven with variations, is illustrated. Cyber object, optimal behavior, multi-alternative situation, optimal control, effectiveness everywhere. Informational boom and information technologies penetrate into any sphere of our life and For example, in aviation industry and aircraft operation (including technical operation, maintenance, and aircraft airworthiness support techniques) [23] and [31], it is hard to imagine the absence of such important outcome measures as maintainability, reliability, risk [13] and [15], and so on, which symbolize the technical perfection of the professional activity field. Some aspects of a generalized cyber object behavior can be traced through the prism of the economic utility theory [26] and [27] as well.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>function, optimal
distribution, alternatives
preferences’ distribution
entropy, entropy
maximum principle, objective functional, variational principle</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <sec id="sec-2-1">
        <title>For nowadays it is absolutely obvious the presence of one or another type of a cyber object elements</title>
        <p>activity. Engineering is not an exception.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2. Related works</title>
      <p>2022 Copyright for this paper by its authors.</p>
      <sec id="sec-3-1">
        <title>As to the generalized cyber object concept literature survey the key point for the scientific</title>
        <p>considerations here is at the uncertainty measure applicability [17-20]. This, in a combination with the
purely economical categorization [16], gave birth to the theory of subjective preferences entropy [32].
Such composition has already had a prolific circle of applications, for instance, [33] and [4], and will
definitely instigate prospective research in the directions of [22; 24; 25; 28; 34].</p>
      </sec>
      <sec id="sec-3-2">
        <title>The developed in references [1-12; 14; 21; 29; 30] ideas should be continued to implement their results into the concept of the generalized cyber object control.</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Problem statement</title>
      <sec id="sec-4-1">
        <title>The formulation of the problem considers an active cyber object, which is controlled by a system of</title>
        <p>achievable alternative preferences [4; 32; 33].</p>
        <p>We consider the distribution of such preferenses as optimal. The uncertainty of the distribution of
preferences also needs to be taken into account. Therefore, the general postulated functional should be
used [17; 32]:
Φ
 =    + 
+ 
,
where  ,  ,  – structural parameters, which can take the form of the Lagrange coefficient or weighting
coefficients depending on the problem statement. We consider them as internal parameters of cyber
object control. These parameters make it possible to match the identified "stance" properties of a cyber
object with achievable alternatives;  – alternative preferences;   – entropy of alternative preferences;
 – the efficiency function, which determine the optimality conditions for the distribution of achievable
alternative preferences. It is used in parallel with the entropy of alternative preferences; 
–</p>
        <p>Thus, the solution requires the problem of finding the optimal distribution of achievable alternatives
preferences under conditions, which are considered as objective functional (1).
normalizing condition.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Main сontent</title>
      <p>(1)
(2)
(3)</p>
      <sec id="sec-5-1">
        <title>First of all let us formulate the general provisions for the problem described with the objective functional (2) that will define in some respect the possible solution of the stated problem.</title>
        <p>4.1.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Solution to the specific case</title>
      <p>For the entropy of the objective functional it is proposed to take the Shannon’s view entropy,
however modified with the preferences rather than probabilities; it is one of the cornerstones of the
theory [32]:
 2
 1

 =1

 =1
  = − ∑   ln   ,
Φ
 = ∫ ( − ∑   ( )ln   ( ) +  ∑   ( )  +  ∑   ( ))  ,

 =1

 =1
process. Let us present the objective functional from equality (1) in integral form:
where  – number of specified achievable alternative;  – total number of all achievable alternatives.</p>
      <p>Time functions  will play the role of preferences   =   ( ) in the dynamic development of the
normalizing condition.
where  ,</p>
      <p>– values of the structural parameter representing the objective functional from
the effectiveness function of the i-th achievable alternative of the cyber object.
expression (1). It takes into account the values of the specified parameters reduced by a value of  ;   –
In (3) term</p>
      <p>∑ =1   ( )  taking into account expression (2) within the defined integration period
[ 1 …  2], is related to the defined average value of the function  . Term ∑

 =1   ( ) represents the</p>
    </sec>
    <sec id="sec-7">
      <title>Specific case model construction</title>
      <p>It is proposed to consider the cyber object effectiveness function of the integral dynamical form
implanted as objective functional:</p>
      <p>2  =2  =2
[ 1( ) ̇ ( ) +   2( ) ( ) ̇ ( )].</p>
      <p>= − ln  2 − 1 + 
 ̇ +  = 0,
4.3.</p>
    </sec>
    <sec id="sec-8">
      <title>Specific case model construction</title>
      <sec id="sec-8-1">
        <title>Let us introduce</title>
        <p>=2</p>
      </sec>
      <sec id="sec-8-2">
        <title>Then, normalizing condition means</title>
        <p>1 +  2 = 1 =   −1   ̇ +   −1   ̇ =   −1(   ̇ +    ̇ )
and</p>
      </sec>
      <sec id="sec-8-3">
        <title>For the preferences it gives</title>
        <p>1
  −1 =    ̇ +    ̇ .</p>
        <p>̇
 1 =    ̇ +    ̇ ,  2 =    ̇ +    ̇ .
For the extremal of  0( ), at  ≠ 0, one can find
   ̇
(5)
(6)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
“0” to the objective functional (4).
parameter (30), the expression (4) is reduced to</p>
      </sec>
      <sec id="sec-8-4">
        <title>The found value (33) may be not taken into account since it will give just an additive component of</title>
      </sec>
      <sec id="sec-8-5">
        <title>As to the objective functional (4) itself, at the extremal value of the cyber object controlled methods. Consider varying preferences as</title>
        <p>( ) =
2
∑ =1 
[−   ( −  2)]
[−   ( −  2)]
,
time are not taken into account.</p>
      </sec>
      <sec id="sec-8-6">
        <title>Then, at the accepted values of</title>
        <p>and the time interval of
 1 = 2 ⋅ 10−4,  2 = 3 ⋅ 10−4,</p>
        <p>[ 1 = 0, … ,  2 = 100],
In order to simulate variations of the preferences numerically it is proposed one of the possible
(33)
(34)
(35)
(36)
(37)
where  1 =  and  2 =  . Here the cyber object controlled parameter and its rate of the change in
the cyber object preferences functions distribution, calculated by the system of equations (35), will be
as it is shown in Fig. 1.
the cyber object objective functional with the exremal preferences (32), which hardly noticeable
in Fig. 2.</p>
        <p>0.562
p1(t)
p2(t)
0.55
0.5
0.45
preferences functions versus varying preferences functions distribution
50
t
50
t
100
100
100
100</p>
        <p>In Fig. 2, Φ(t) stands for Φ calculated by formula (4) with the deliberate omitting of or neglecting
normalizing conditions, however they are satisfied, thus, simulation has been conducted by the formula
of the entropy integral (34) with (32); and Φδ(t) stands for the value of the entropy (34), but with the
varying preferences functions of the cyber object, obtained by formulas of (35) respectively.</p>
      </sec>
      <sec id="sec-8-7">
        <title>Numerical integrations of the expressions of (4) or (34) have been performed with the varying upper end of the integration in order to obtain the result as a function of time. Both models have been calculated with the data of (36) and (37).</title>
        <p>The practically invisible, due to the preferences functions small variation, prevalence of Φ(t) over
Φδ(t) becomes more tangible with the use of the tabulated results of the calculation experimentation
illustrated in Fig. 3.</p>
        <p>(t) </p>
        <p>(t) 
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
0</p>
        <p>0</p>
      </sec>
      <sec id="sec-8-8">
        <title>From the shown in Fig. 3 numerical results of simulation, now it is visible the extremallity of the optimal solution.</title>
      </sec>
      <sec id="sec-8-9">
        <title>In accordance with the values demonstrated in Fig. 3, starting from the time point of “4” and on, the optimal solution prevails delivering the maximal value to the cyber object objective functional. Of course, that dominance would be the greater the larger the variation of the preferences functions were.</title>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>5. Discussion</title>
      <sec id="sec-9-1">
        <title>Thus, the result of the approach expressed with the procedures of (1) – (37) proven to be optimal.</title>
      </sec>
      <sec id="sec-9-2">
        <title>Although the simulation of (32) – (37) was conducted without the cyber object controlled parameter</title>
        <p>varying, nonetheless the result would have been the same for any constant controlled parameter.</p>
      </sec>
      <sec id="sec-9-3">
        <title>In the case of absence of the controlled parameter and its change in time rate (control) in the varying preferences there is one more remark (35). The point is that the variations are not the extremal solutions (16). The variations (35) and extremals (16) basically coincide at the boundary points of integration for the tested objective functional (4).</title>
      </sec>
      <sec id="sec-9-4">
        <title>However it looks prospective to try varying the controlled parameter function as well in order to ensure of its optimality too.</title>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>Analysis of comparability with previously reported findings</title>
      <sec id="sec-10-1">
        <title>Presented herewith research helps create a formulation of the general theoretical provisions of the</title>
        <p>generalized cyber object study.</p>
        <p>In general terms, this study is to formulate the problem of managing the operation of an active
cybernetic element and control of the support of its safety in terms of the multi-alternativeness and
uncertainty. Such kind of operation inevitably happens in the vast majority of situations; moreover it
occurs in the presence of possible conflicts [32]. This problem is formulated in terms of subjective
analysis. Its solution is performed by applying the extremality principles, for example, as it was
illustrated in the given research likewise for the individual preferences’ subjective entropy of the active
elements (subjects) of a control system. The proposed approach involves a compilation of the
appropriate objective functional of a cyber object in order to solve the variational problem of the
operational management process.</p>
      </sec>
      <sec id="sec-10-2">
        <title>The basic conceptual framework is very similar to [4; 32; 33]. At the same time, work [32] talks</title>
        <p>about the controllability of an active system through an active element and an active element of an
active system as one of its features. For example, in the aviation sector, uncertainties in operational
situations can lead to some dangerous situations; that is why the active element (the decision-maker) is
forced to act in a multi-alternative situation and in a conflict-prone way. Activity in conditions of
scarcity of time, altitude, distance and other resources is the cause of such cases.</p>
      </sec>
      <sec id="sec-10-3">
        <title>In aviation, safety is without a doubt of the utmost importance. And the study of the influence of the human factor on all types of safety is an extremely relevant scientific and practical problem. This problem is urgent and requires the expression of individual preferences through a certain function in an explicit form.</title>
        <p>A systematic and fundamental study of multi-alternativeness within the approach to the development
of problem-resource conditions is represented in [32]. Mainly two related problems of the general form
are considered:</p>
      </sec>
      <sec id="sec-10-4">
        <title>1. Acquire the distributions of subjective functions of the preferences of the active element (subject);</title>
        <p>on the set of alternatives achievable for him, which delivers the extreme value of the subjective entropy
under the conditions of a certain “isoperimetric constraints”. Here, the obtained solution, where there
is the number of two alternatives; follows that developed delivering the extreme value of subjective
entropy under the conditions of a specified view cyber object effectiveness function, which plays the
role of those “isoperimetric constraints”.</p>
      </sec>
      <sec id="sec-10-5">
        <title>This function is close in description to the subjective effectiveness’ function or the function of</title>
        <p>subjective utility, which can be the “isoperimetric constraint” for the subjective effectiveness’ function.</p>
      </sec>
      <sec id="sec-10-6">
        <title>2. Acquire the distributions that deliver the extreme value to the function of subjective efficiency in the presence of the “isoperimetric” conditions for the subjective entropy. Such problem also seems very important, however it was not considered in the presented paper.</title>
        <p>5.2.</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>Evidently promising investigations</title>
      <sec id="sec-11-1">
        <title>The postulated view cyber object objective functional has the optimal solution illustrated in computer simulation results (see Fig. 1 – 3). Nonetheless, there was no answer to the question about which alternative of the two is better and how much.</title>
      </sec>
      <sec id="sec-11-2">
        <title>Such problem is solved with the use of the notion of the degree of confidence that can be presented as hybrid model of the subjective preferences’ combined pseudo-entropy function which was proposed in reference [8].</title>
      </sec>
      <sec id="sec-11-3">
        <title>That measure of certainty is a composition on one hand of the ratio of the traditional view Shannon’s</title>
        <p>entropy exceed by the maximum entropy to the entropy maximum value, which makes an index of a
relative certainty, and on the other hand it relates with the factor/index of the preferences
prevalence/domination, which gives to the expression the sign of that certainty.</p>
      </sec>
      <sec id="sec-11-4">
        <title>Thus, the required measure combines the certainty and uncertainty values, and channeling certainty and uncertainty in the "right" or "wrong" ("good" or "bad") direction.</title>
      </sec>
      <sec id="sec-11-5">
        <title>For the study herein, this value was not applicable on the reason that optimal distribution of the cybernetic object preferences happens to be equal, see the result of the extremals in the equations (34). Therefore, at this special case, the maximum of the preferences entropy is realized. Any of the alternatives is equally preferable.</title>
      </sec>
      <sec id="sec-11-6">
        <title>The elementary effectiveness functions are the first complete derivative of the cyber object</title>
        <p>controlled parameter with respect to time (its control) and the product of the parameter and its control.
This, at the constant value in time of the cyber object controlled parameter, gives the “zero” magnitudes
to both elementary effectiveness functions. Therefore, both preferences are equal and the preferences
entropy undergoes its maximum.</p>
      </sec>
      <sec id="sec-11-7">
        <title>Nevertheless, such situation of the complete indifference of the cyber object concerning achievable</title>
        <p>for its goals alternatives may be not ever, and in that case the described relative combined
pseudoentropy function could be of a great help in determination of the cyber object preferences
uncertainty/certainty perfection. Thus, that powerful tool can be used for the next step in the research
dealing with the multi-alternativeness and uncertainty in order to evaluate and decrease the potential
conflict-proneness of the operational situation.</p>
      </sec>
      <sec id="sec-11-8">
        <title>Also, a disputable portion of the study remains a model of the cyber object effectiveness function view itself. Since every specific case requires its own unique approach, there is a necessity of the attempt for the general concept implementation.</title>
      </sec>
    </sec>
    <sec id="sec-12">
      <title>6. Conclusions</title>
      <sec id="sec-12-1">
        <title>The calculus of variations' basic problem is presented in research. It has the optimal solution in the</title>
        <p>interpretation of the cyber object preferences for the attainable set of two alternatives.</p>
      </sec>
      <sec id="sec-12-2">
        <title>Necessary conditions for the extremum existence provide an opportunity to obtain results that delivers the maximal value to objective functional measure. In further investigations it seems rational also to vary the controlled parameter function for verification of the cyber object’s optimality with respect to it as well.</title>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>7. References</title>
      <p>[1] A. Goncharenko, A multi-optional hybrid functions entropy as a tool for transportation means
repair optimal periodicity determination, Aviation 22(2) (2018) 60–66. doi:
https://doi.org/10.3846/aviation.2018.5930.
[2] A. Goncharenko, Aircraft operation depending upon the uncertainty of maintenance alternatives,</p>
      <p>Aviation 21(4) (2017) 126–131. doi: https://doi.org/10.3846/16487788.2017.1415227.
[3] A. Goncharenko, Development of a theoretical approach to the conditional optimization of aircraft
maintenance preference uncertainty, Aviation 22(2) (2018) 40–44. doi:
https://doi.org/10.3846/aviation.2018.5929.
[4] A. V. Goncharenko, Active systems communicational control assessment in multi-alternative
navigational situations, in: Proceedings of the IEEE International Conference on Methods and
Systems of Navigation and Motion Control, MSNMC, Kyiv, Ukraine, 2018, pp. 254–257. doi:
10.1109/MSNMC.2018.8576285.
[5] A. V. Goncharenko, Aeronautical and aerospace materials and structures damages to failures:
theoretical concepts, International Journal of Aerospace Engineering 2018 (2018). doi:
https://doi.org/10.1155/2018/4126085
[6] A. V. Goncharenko, Airworthiness support measures analogy to the prospective roundabouts
alternatives: theoretical aspects, Journal of Advanced Transportation 2018 (2018). doi:
https://doi.org/10.1155/2018/9370597.
[7] A. V. Goncharenko, Applicable aspects of alternative UAV operation, in: Proceedings of the IEEE
International Conference on Actual Problems of UAV Developments, APUAVD, Kyiv, Ukraine,
2015, pp. 316–319. doi: 10.1109/APUAVD.2015.7346630.
[8] A. V. Goncharenko, Cyber object state maximal probability timing obtained through
multioptional technique, CEUR Workshop Proceedings 2654 (2019) 132–143. URL:
http://ceurws.org/Vol-2654/.
[9] A. V. Goncharenko, Multi-optional hybrid effectiveness functions optimality doctrine for
maintenance purposes, in: Proceedings of the IEEE International Conference on Advanced Trends
in Radioelectronics, Telecommunications and Computer Engineering, TCSET, Lviv-Slavske,
Ukraine, 2018, pp. 771–775. doi: 10.1109/TCSET.2018.8336313.
[10] A. V. Goncharenko, Multi-optional hybridization for UAV maintenance purposes, in: Proceedings
of the IEEE International Conference on Actual Problems of UAV Developments, APUAVD,
Kyiv, Ukraine, 2019, pp. 48–51. doi: 10.1109/APUAVD47061.2019.8943902.
[11] A. V. Goncharenko, Optimal UAV maintenance periodicity obtained on the multi-optional basis,
in: Proceedings of the IEEE International Conference on Actual Problems of UAV Developments,
APUAVD, Kyiv, Ukraine, 2017, pp. 65–68. doi: 10.1109/APUAVD.2017.8308778..
[12] A. V. Goncharenko, Relative pseudo-entropy functions and variation model theoretically adjusted
to an activity splitting, in: Proceedings of the International Conference on Advanced Computer</p>
      <sec id="sec-13-1">
        <title>Information Technologies, ACIT ’2019, Ceske Budejovice, Czech Republic, 2019, pp. 52–55. doi:</title>
        <p>10.1109/ACITT.2019.8779876
[13] B. S. Dhillon, Maintainability, Maintenance, and Reliability for Engineers, Taylor &amp; Francis</p>
      </sec>
      <sec id="sec-13-2">
        <title>Group, New York, NY, 2006.</title>
        <p>[14] D. Hulek, M. Novák, Expediency analysis of unmanned aircraft systems, in: Proceedings of the</p>
      </sec>
      <sec id="sec-13-3">
        <title>International Conference on Transport Means, Palanga, Lithuania, 2019, pp. 959–962. URL:</title>
        <p>https://dk.upce.cz/bitstream/handle/10195/75141/TM2019_Hulek_Novak.pdf?sequence=1.
[15] D. J. Smith, Reliability, Maintainability and Risk. Practical Methods for Engineers, Elsevier,</p>
        <p>London, 2005.
[16] E. Silberberg, W. Suen, The Structure of Economics. A Mathematical Analysis, McGraw-Hill</p>
        <p>Higher Education, New York, NY, 2001.
[17] E. T. Jaynes, Information theory and statistical mechanics, Physical review 106(4) (1957) 620–
630.
[18] E. T. Jaynes, Information theory and statistical mechanics. II, Physical review 108(2) (1957) 171–
190.
[19] E. T. Jaynes, On the rationale of maximum-entropy methods, Proceedings of the IEEE 70(9) (1982)
939–952. doi: 10.1109/PROC.1982.12425.
[20] F. C. Ma, P. H. Lv, M. Ye, Study on global science and social science entropy research trend, in:</p>
      </sec>
      <sec id="sec-13-4">
        <title>Proceedings of the IEEE International Conference on Advanced Computational Intelligence,</title>
        <p>ICACI, Nanjing, Jiangsu, China, 2012, pp. 238–242. doi: 10.1109/ICACI.2012.6463159.
[21] G. C. M. Patel, G. R. Chate, M. B. Parappagoudar, K. Gupta, Intelligent modelling of hard
materials machining, Springer Briefs in Applied Sciences and Technology (2020) 73–102. doi:
https://doi.org/10.1007/978-3-030-40102-3_4.
[22] K. Szafran, Bezpieczeństwo lotu – zasada maksymalnej entropii, Bezpieczeństwo na Lądzie,</p>
      </sec>
      <sec id="sec-13-5">
        <title>Morzu i w Powietrzu w XXI Wieku 1 (2014) 247–251.</title>
        <p>[23] M. J. Kroes, W. A. Watkins, F. Delp, R. Sterkenburg, Aircraft Maintenance and Repair, 7th. ed.,</p>
      </sec>
      <sec id="sec-13-6">
        <title>McGraw-Hill, Education, New York, NY, 2013.</title>
        <p>[24] M. Zaliskyi, O. Solomentsev, Method of sequential estimation of statistical distribution parameters
in control systems design, in: Proceedings of the IEEE International Conference on Methods and</p>
      </sec>
      <sec id="sec-13-7">
        <title>Systems of Navigation and Motion Control, MSNMC, Kyiv, Ukraine, 2014, pp. 135–138. doi:</title>
        <p>10.1109/MSNMC.2014.6979752.
[25] O. Solomentsev, M. Zaliskyi, T. Herasymenko, O. Kozhokhina, Yu. Petrova, Data processing in
case of radio equipment reliability parameters monitoring, in: Proceedings of the International</p>
      </sec>
      <sec id="sec-13-8">
        <title>Conference on Advances in Wireless and Optical Communications, RTUWO, Riga, Latvia, 2018,</title>
        <p>pp. 219–222. doi: 10.1109/RTUWO.2018.8587882.
[26] R. D. Luce, D. H. Krantz, Conditional expected utility, Econometrica 39 (1971) 253–271.
[27] R. D. Luce, Individual Choice Behavior: A theoretical analysis, Dover Publications, Mineola, NY,
2014.
[28] R. S. Odarchenko, S. O. Gnatyuk, T. O. Zhmurko, O. P. Tkalich, Improved method of routing in</p>
      </sec>
      <sec id="sec-13-9">
        <title>UAV network, in: Proceedings of the IEEE International Conference on Actual Problems of UAV</title>
        <p>Developments, APUAVD, Kyiv, Ukraine, 2015, pp. 294–297. doi:
10.1109/APUAVD.2015.7346624.
[29] S. Martín-Béjar, F. J. T. Vilches, C. B. Gamboa, L. S. Hurtado, Cutting speed and feed influence
on surface microhardness of dry-turned UNS A97075-T6 alloy, Applied Sciences (Switzerland)
10(3) (2020). doi: https://doi.org/10.3390/app10031049.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>