<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Vol.</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.15587/1729-4061.2022.252988</article-id>
      <title-group>
        <article-title>Method of Construction of the Law of Safety Management of Critical Infrastructure Objects Under the Conditions of External Uncontrolled Influences</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Laptiev</string-name>
          <email>olaptiev@knu.ua</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleg Barabash</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Tsyganivska</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Obidin</string-name>
          <email>d.obidin@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"</institution>
          ,
          <addr-line>Peremohy Ave., 37, Kyiv</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University "Zaporizhzhia Polytechnic"</institution>
          ,
          <addr-line>Zhukovsky Street 64, Zaporizhzhia, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>Solomyanska street, 7, Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Volodymyrska street, 60, Kiev, 01033</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>9</volume>
      <issue>115</issue>
      <fpage>16</fpage>
      <lpage>28</lpage>
      <abstract>
        <p>The intensive development of information technologies with a high degree of autonomy requires the development of autonomous management systems for optimal management. This issue is especially acute for critical infrastructure objects that have been proven to be affected by extreme external factors and impacts. It is proposed to consider the management process as management in a system with incomplete a priori information about the managed process. The process of managing which changes as information is accumulated and is used to improve the operation of the entire security system in general. An identification approach to the synthesis of indirect adaptive control is used, which consists in specifying the model of the object during the control process. On the basis of the refined model, a safety control signal of the object is produced. The model of the object needs clarification because the system is constantly affected by external uncontrolled influences. The difference between the proposed method and the existing ones is that the proposed method is to build a robust control system that allows you to compensate for unknown disturbances with a certain accuracy in the required time. At the same time, by appropriate selection of the parameters of the closed system, it is possible to make the error and time values sufficiently small. The simulation of the operation of the security management system was carried out, the results of which proved that the quality of transient processes does not depend on disturbances that affect both the nature of the behavior of the solution of the differential equation describing the critical infrastructure object and its structure. Transient processes, first of all, depend on the initial conditions of the object model and parameters of the control system. And this means that if in the process of designing the security system, the initial conditions are correctly set and the changes (including uncontrolled) of the parameters of the system's functioning are properly monitored, it is possible to ensure the stable and safe operation of the facility over time.. Object of critical infrastructure, object model, robust system, disturbance transitional process ORCID: 0000-0002-4194-402X (O. Laptiev); 0000- 0003-1715-0761 (O. Barabash); 0000-0001-7632-3410 (I. Tsyganivska); 0000-00029923-9024 (D. Obidin); 0000-0003-3250-3799 (A. Sobchuk) Proceedings</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Modern society is characterized by the intensive development of information technologies with a
high degree of autonomy. This issue is particularly acute for critical infrastructure facilities that operate</p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>ceur-ws.org
under the influence of extreme factors and impacts. One of the factors of ensuring the safety of critical
infrastructure facilities is optimal facility management. Therefore, the management process should be
considered as management in a system with incomplete a priori information about the managed process,
which changes as information accumulates and is used to improve the operation of the entire safety
system in general. Using an identification approach to the synthesis of adaptive control (indirect
adaptive control), which consists in refining the model of the object during the control process and
producing a control signal based on the obtained model. Setting even such a management goal as
ensuring the stability of a closed system does not allow the direct use of purely descriptive models and
requires the development of special methods for parameter estimation (model selection). On the other
hand, the mentioned goal of management leaves wide freedom to choose the identification algorithm.
This circumstance can explain the existing diversity of evaluation algorithms that use one or another a
priori information about the object and disturbance and one or another function of the inconsistency of
the object and the model. At the same time, it is quite difficult to compare the quality of work of different
laws of adaptive control, synthesized even under conditions of the same a priori information.</p>
      <p>A natural way to strengthen the goal of adaptive management is to set an optimal task or the task
of ensuring a guaranteed result for a given quality indicator. We consider the mentioned tasks as
providing the adaptive regulator with the same control quality as when controlling an object with known
parameters. Therefore, modeling the process of ensuring the safety of management of critical
infrastructure objects under the conditions of external uncontrolled influences is a very relevant
scientific task.3</p>
    </sec>
    <sec id="sec-2">
      <title>2. Review of literary sources.</title>
      <p>The development of modern society requires intensive development of information technologies
with a high degree of autonomy. This issue is particularly acute in the management of critical
infrastructure facilities that operate under the influence of extreme factors. A general method for solving
such problems for stationary linear objects and asymptotic quality indicators was proposed in [1]. The
main idea of the method uses the concept of multiple estimation of parameters [2] and consists in
choosing at each moment of time the estimate that minimizes the optimal (or guaranteed) value of the
quality indicator as a function of the object parameters, on a set of parameters consistent with
observations and with a priori information about the system. In [3-4], this idea is independently used in
the problem of synthesis of adaptive robust control with a given guaranteed result.</p>
      <p>Robust means management under conditions of additive and multiplicative limited disturbances.
Many works investigate evaluation algorithms that allow solving the task of synthesizing adaptive
robust regulators with guaranteed results in the "strong" sense" and demonstrate the influence of a given
quality indicator and a priori information about the system on the choice of an evaluation algorithm.</p>
      <p>In the class of problems of adaptive and robust management, there are many methods and approaches
to their solution. They are mainly based on the assumption that we know exactly the structure of the
critical infrastructure management object, that is, the order of the system of differential equations that
describe the features of the management object is known [5-7, 24]. At the same time, only parametric
and external actions directed at the research object are unknown. Note that, as of now, there are quite a
few works devoted to the study of the problems of managing critical infrastructure objects with
unknown orders [8, 10-12]. Moreover, in these works, problems of controlling linear stationary objects
with unknown but constant orders of the numerator and denominator of the transfer function, which
describe mathematical models in the simplest stationary cases, are considered. However, as evidenced
by works [9, 13-15, 24], the research of mathematical models that describe processes in systems where
there are disturbances capable of influencing not only changes in the object's parameters, but also its
order, deserve attention. In works [16-18, 20], an approach to the organization of management of objects
of critical infrastructure where there are non-linear non-stationary objects with unknown parameters
that are subjected to external and parametric uncontrolled influences is investigated. Moreover, these
perturbations affect the order of the object in an unknown way. The solution to this problem is based
on the application of a robust algorithm that allows compensating this class of uncertainties with a given
accuracy in finite time. Actually, this is the key to the organization of countering the consequences of
unauthorized impacts on critical infrastructure objects, which are constantly exposed to threats of
unauthorized external and parametric uncontrolled impacts.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Formulation of the problem</title>
      <p>The purpose of the work is to implement a method of constructing a law of safety management of
critical infrastructure objects under conditions of external uncontrolled influences. Definition of a
continuous control law for the critical infrastructure management object, which ensures the limitation
of all signals in a closed system and the fulfillment of the target condition of ensuring the safety of th e
critical infrastructure object.</p>
    </sec>
    <sec id="sec-4">
      <title>4. The main section</title>
    </sec>
    <sec id="sec-5">
      <title>4.1. Mathematical definition of a scientific task</title>
      <p>Let us have a non-stationary nonlinear control object, the dynamic processes of which are described
by a differential equation of the form:</p>
      <p>Qt ( p,t)x(t)  V ( p,t) (x,t)u(t)  K ( p,t)(x,t) (t) W ( p,t)w(t),
pix(0)  xi, i  1, n
where x(t) is an adjustable parameter, u(t) is a controlling influence, w(t) is an uncontrolled
disturbance. For example, in the control system of the main circuit of the heat exchanger of the power
unit of the thermal power plant, there may be temperature, or pressure or steam consumption at the
output of the power unit; u(t) – consumption of fuel supplied to the power unit; w(t) is the fluctuation
of the energy carrier supplied to the heating system of the heat exchanger, x(t) is the moisture
concentration at the outlet of the heat exchanger.</p>
      <p>
        We will use the following notations:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <p>Here Q(p,t), V(p,t), K(p,t), W(p,t) are linear nonstationary differential operators with unknown
parameters, σ(x,t) is a scalar function, ξ(t)∈R^n is a vector function, Φ(x,t)∈R^(1×n) is a matrix
function. For example, Φ(x,t) and σ(x,t) in the mathematical model of the ship's movement determine
the nonlinearity that depends on the maneuvering angle x(t), and ξ(t) are the unknown non-stationary
parameters of the nonlinearity Φ(x,t). In addition, note that x_i∈R are unknown initial conditions.</p>
      <p>Obviously, such an equation can be obtained for a wide class of mechanical, electromechanical and
other technical systems using special methods of parameterization and coordinate transformation or
linearization. The quality of transient processes at the output will be determined by the reference model:</p>
      <p>Qm ( p)xm(t)  k mv(t).</p>
      <p>Here, x_m (t) is the output of the reference model, v(t) is the delayed system effect, Q_m (p) is a
known linear normalized differential operator with constant coefficients, km is a known high-frequency
amplification factor [19, 21-25].</p>
      <p>Assumption 1. It will be assumed that the following conditions are met:
 Polynomials Q(p,t), V(p,t), K(p,t), W(p,t), their order degQ(p,t)≤n, degV(p,t)≤m, degK(p,t)≤n,
degW(p,t)≤n and negative degree η=n-m≥1 are unknown. The coefficients of the operators Q(p,t),
V(p,t), K(p,t), W(p,t) are bounded functions, and the non-zero coefficients at higher powers of Q(p,t)
and V(p,t) are positive functions.</p>
      <p> The coefficients of the operators Q(p,t), V(p,t), K(p,t), W(p,t) and the vector function ξ(t) depend
on the vector of unknown parameters ω∈M, where M is a known bounded set.</p>
      <p> It is known that ηu≥η is the upper limit of the relative power of η. The order of the operator Q_m
(p)-ηu, k_m&gt;0.</p>
      <p> The operator V(p,t) is stable, and for an arbitrary fixed instant of time t, the polynomial V(p,t) is
a Hurwitz polynomial, where λ is a complex variable of the Laplace transform. The polynomial Qm (p)
is a hurwitz polynomial.</p>
      <p> The elements Φi (x,t), i=(1,n) ̅ of the matrix function Φ(x,t) are unknown and satisfy the global
Lipschitz condition on x(t), smooth functions bounded on t; ξ(t) is an unknown vector whose
components are smooth bounded functions. The nonlinearity σ(x,t) is known, and σ(x,t)&gt;0 for any
x(t)∈R and t.</p>
      <p> System influence v(t) and disturbance w(t) are bounded functions.</p>
      <p> In the system, the equations are not available for measurements of derivative signals x(t), u(t),
and v(t).</p>
      <p>
        It follows from assumption 1 that the dynamic order of object (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is unknown. At the same time, the
object can change as a result of the influence of parametric disturbances on it. For example, if q_n (t)=0
and q(n-1) (t)≠0, then deg Q(p,t)=n-1, if qn (t)=q(n-1) (t)=0 and q(n-2) (t)≠0, then deg Q(p,t)=n-2, etc.
Similarly for the operator V(p,t): if vm (t)=0 and v_(m-1) (t) ≠0, then degV(p,t)=m-1, if vm (t)=v(m-1)
(t)=0 and v(m-2) (t)≠0, then deg V(p,t)=m-2, etc. The requirement to know the signs of the zero
coefficients at higher degrees of the operators Q(p,t) and V(p,t) (condition A) and the function σ(x,t)
(condition E) is related to the knowledge sign of the high-frequency gain of the object (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). This allows
for negative feedback in the control system. The goal of management is to find a continuous regulation
law for the critical infrastructure management object, which ensures the limitation of all signals in a
closed system and the fulfillment of the target condition:
 (t)  x (t)  xm(t)  ,
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
for a finite time T for all ω∈M, where δ&gt;0 is a sufficiently small number.
4.2.
      </p>
    </sec>
    <sec id="sec-6">
      <title>The method of determining the continuous regulation law</title>
      <p>Let's decompose the operators V(p,t) and Q(p,t) into components</p>
      <p>Q( p,t)  Q ( p)  Q( p,t),</p>
      <p>0
V ( p,t) V ( p)  V ( p,t).</p>
      <p>0</p>
      <p>
        Here ∆V(p,t)=c_01^T (t) [1,p,…,p^(n ̅-2) ]^T, c01 (t) is a vector given by the coefficients of the
operator V(p,t)-V_0 (p) and such that the second relation in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) is always fulfilled, V_0 (p) is an arbitrary
stationary linear differential operator of degree n ̅-η_u and the polynomial V0 (λ) is a covariant, n ̅ is
the upper limit of the order of the operator Q(p,t). Note that the value of n ̅ is necessary only for the
justification of the structure of the closed control system, and not for its implementation. Regarding the
structure of ∆V(p,t), we can say that :
 if m&lt;n ̅-ηu, then deg∆V(p,t)=n ̅-ηu;
 if m=n ̅-ηu, then deg∆V(p,t)≤n ̅-ηu;
 if m&gt;n ̅-ηu, then deg∆V(p,t)=m,
that is, there is always a vector c_01 that ensures the validity of the expansion of the operator V(p,t).
In one case, it has all non-zero components, in the other, the corresponding number of zero components.
Next, Q0 (p) is an arbitrary linear stationary differential operator such that the polynomial Q0 (λ) is a
Hurwitz polynomial and deg〖Q0 (p)〗=n ̅. Then the operator ∆Q(p,t) is the difference Q(p,t)-Q0(p),
and degQ(p,t)≤n ̅, i.e.:
 if degQ(p,t)&lt;deg〖Q0 (p)〗, then deg∆Q(p,t)=deg〖Q0 (p)〗;
 if degQ(p,t)=deg〖Q0 (p)〗, then deg∆Q(p,t)≤n ̅-1.
      </p>
      <p>It is this representation that allows solving the formulated problem, which differs from the known
methods of parametrizing the equation [1]. Due to the arbitrariness of the operators V0 (p) and Q0 (p),
we choose them in such a way that:</p>
      <p>
        Let's transform into the error equation (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ):
      </p>
      <p>Qm( p) (t)  T ( p)( v(t)  1(t) (t)),  1 </p>
      <p>T (t)</p>
      <p>Here α&gt;0, T(t) is a linear differential operator of degree η_u such that the polynomial T(λ) is a Hurtz
polynomial, and the roots of the polynomial T(λ) are the roots of the transfer function of the closed
system; υ ̅(t) – evaluation of the signal υ(t), υ(t) – auxiliary control influence (formation of the functions
υ ̅(t) and υ(t) will be described in more detail below); ∆(t)=υ ̅(t)-υ(t) is the estimation error of the signal
υ(t). Let's introduce an additional (auxiliary) contour:
 (t)
.</p>
      <p>
        Considering equations (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) and (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ), we write the discord equation ξ(t)=ε(t)-ε ̅(t):
      </p>
      <p>Qm( p) (t)   T ( p)v(t),   0.</p>
      <p>Qm( p) (t)  T ( p)((t)  1(t)),
 (t)
v(t)  </p>
      <p>Qm( p) (t)   1(t) .</p>
      <p> T (t) 
Where
 1(t)  (   )v(t) </p>
      <p>T (t)
and parametric uncertainty, ); ∆ ̅(t)=υ ̅(t)-υ(t) is the estimation error of the signal υ(t).</p>
      <p>Let us define the law of the auxiliary control influence υ(t) in the form:
a new perturbation function, which includes a priori functional
(Q0 (p))/(V0 (p) )=Qm (p).</p>
      <p>
        Then, taking into account relations (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) and (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), we write down the tracking error ε(t)=x(t)-xm(t)
in the following way:
      </p>
      <p>
        Qm( p) (t)  (x,t)u(t)  (t),
Where φ(t)=V/(V0^(p) ) [∆V(p,t)σ(x,t)u(t)-∆Q(p,t)x(t)+K(p,t)Φ(x,t)ξ(t)+W(p,t)w(t)-k_m v(t)].
To regulate the object (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), we set the control law:
      </p>
      <p>Solving equation (10) with respect to the variable υ(t), we obtain that</p>
      <p>υ(t)=-φ(t)/(α∙T(p) ).</p>
      <p>
        Let's substitute the last result in relation (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ). Then the equation of the closed system with respect to
the tracking error can be written in the form:
      </p>
      <p>To estimate η_u derivatives of the signal υ(t), we will use the approach proposed in [4].</p>
      <p>Qm( p) (t)  T ( p)(t).</p>
      <p>v(t)  G0v(t)  D0(v (t)  v(t)), v (t)  Lv(t).</p>
      <p>
        Here ϑ(t)∈R^(ηu), D0=-[d1 μ^(-1),d2 μ^(-2),…,d(ηu ) μ^(-ηu ) ]^T, and d1,d2,…,d(η_u ) are chosen
from the condition of the density of the matrix:
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(9)
(10)
(11)
(12)
(13)
(14)
      </p>
      <p>0 </p>
      <p>
        I(ηu-1) is a unit matrix of order ηu-1, D=[d1,d2,...,d(ηu) ]^T, μ is a sufficiently small value,
L=[1,0,...,0]. Using the filter (12) allows you to estimate ηu of the derivatives of the signal υ(t) and,
thereby, to implement relation (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ).
      </p>
      <p>To assess the accuracy of observations, we will additionally consider the vector of deviations
where</p>
      <p>τ ̅(t)=Γ^(-1) (ϑ(t)-θ(t)),
Γ=diag {μ^(ηu-1),μ^(ηu-2),…,μ,1},θ(t)=[υ(t),υ ̇(t),…,υ^(ηu ) (t)].</p>
      <p>Differentiating τ ̅(t) with respect to t taking into account (12), we obtain</p>
      <p>τ ̅ ̇(t)=μ^(-1) Gτ ̅(t)+b ̅υ^((η_u+1) ) (t),∆ ̅(t)=μ^(η_u-1) Lτ ̅(t),b ̅=[0,…,0,1]^T.</p>
      <p>We perform the transformation in the equation ∆ ̅(t)=μ^(ηu-1) Lτ ̅(t) relative to ∆ ̅(t). Then:
Here:</p>
      <p> (t) G (t)  bv(t), (t)  u1L (t).
τi (t)=τ ̅i (t)-μ^(1+i-ηu ) υ^((i-1) ) (t),i=(2,ηu )</p>
      <p>τ1 (t)=τ ̅1 (t), b=[μ^(2-η),0,…,0]^T.</p>
      <p>The last two equations are equivalent with respect to the variables τ1 (t)=τ ̅1 (t), since they are
different vector-matrix forms of writing the same equation</p>
      <p>(p^(ηu )+d1 μ^(-1) p^(ηu-1)+⋯+d(ηu ) μ^(-ηu ) ) τ ̅1 (t)=p^(ηu ) υ(t).</p>
      <p>Considering equations (12) and (13), the tracking error equation (11) takes the form:
 (t)  Am (t)  u1bg(t),  (t)  L (t).</p>
      <p>where ε(t)∈R^(ηu ), A_m∈R^(ηu×ηu ) is a matrix in the form of Frobenius with the characteristic
polynomial Q_m (λ), ∆(t)=[η1(t),η1(t),...,η1^(ηu ) (t)], g is a vector composed of coefficients of the
polynomial T(λ) [21-24].</p>
    </sec>
    <sec id="sec-7">
      <title>4.3. Results of simulation of the control law built according to the proposed method</title>
      <p>
        Consider a non-linear non-stationary critical infrastructure management object of the form (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
q4(t) p4  q3(t) p3  q2(t) p2  q1(t)  q0(t) x(t)  v1(t) p  v0(t) (x,t)u(t) 
 k 4(t) p4  k 3(t) p3  k 2(t) p2  k 1(t)  k 0(t) (x,t) (t) 
 w4(t) p4  w3(t) p3  w2(t) p2  w1(t)  w0(t) w(t).
      </p>
      <p>The uncertainty class M is given by the inequalities:
0≤q4≤5, 0≤q3≤15, 0,5≤q2≤20, -10≤q1≤10, -10≤q0≤10,
0≤v1 (t)≤3, 0.5≤v0 (t)≤3,
-4≤k ̅i (t)≤4, -5≤wi (t)≤5,-2≤ξi (t)≤2,i=(1,n) ̅,|w(t)|≤10</p>
      <p>We will assume that the polynomial v1 (t) p^ +v0 (t) is stable and the polynomial L{v1 (t) p^ +v0(t)}
is Hurwitz for any fixed instant of time t; L{∙} is the Laplace transform operator; upper estimate relative
to the degree η of the control object (а) η ̅u=4;</p>
      <p>σ(x,t)=1+|x(t)|+|x(t)|^2 sin^2 2t.</p>
      <p>The remaining parameters in equation (a) are unknown. Analyzing the uncertainty class M, it can be
stated that in the process of operation (a) the order of the characteristic polynomial Q(p,t) can take
values from the set {2,3,4}, and the polynomial V(p,t) 0 and 1. Since η ̅u=4, then deg〖Q_m (p)=4〗.
Then the equations of the reference model are given in the form (p+1)^4 x_m (t)=v(t),
km=1,v(t)=2+sin0,5t+2 sint+P1, P1 – rectangular pulses with an amplitude of 2, a period of 4 and a
duration of 2s. Let's choose β=50. The distribution of zeros of the transfer function of the closed system
(11) is determined by the operator : T(p)=1/100 p^4+2p^3+200p^2+200p+100.</p>
      <p>
        Then, in accordance with relations (
        <xref ref-type="bibr" rid="ref8">8</xref>
        ) and (10), the equation of the auxiliary control influence and
the auxiliary circuit will be written in the form:
v(t) 
      </p>
      <p>(1 p)4
0, 01p4  2 p3  200 p2  200 p  100</p>
      <p> (t),
 (t) 
0,01p42 p3200 p2200 p 100
(1  p)4
v(t),
(15)
(16)
(17)
(18)
(19)</p>
      <p>
        Here ξ(t)=ε(t)-ε ̅(t), ε(t)=x(t)-xm (t) misalignment and tracking errors, respectively. Using the
observation equation (12), we obtain estimates of υ^((i)) (t), i=(
        <xref ref-type="bibr" rid="ref4">0,4</xref>
        ) ̅:
ϑ1(t)=-ϑ2(t)-d1 μ^(-1) (ϑ1 (t)-υ(t)),
ϑ2(t)=-ϑ3(t)-d_2 μ^(-1) (ϑ2 (t)-υ(t)),
ϑ3(t)=-ϑ4(t)-d_3 μ^(-1) (ϑ3 (t)-υ(t)),
ϑ4(t)=-d4μ^(-1) (ϑ4 (t)-υ(t)),
where D=[d1,d2,d3,d4 ]=[20,150,500,625]^T, μ=〖10〗^(-2). When α=50 is set, the control law, in
accordance with equation (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ), will be written in the form:
      </p>
      <p>,
h(t)  500,01v42v4(t)200v3(t)200v2(t)100v1(t).</p>
      <p>We will assume that the initial conditions in the system are zero. At the same time, in equation (a),
the nonlinearities are specified in the following way:
(x,t)  ln 4(1 x ), ln 4(1 x ), cos 3x2 sin x, ln 4(1 x ) x2  ,
 (t)  0,5 sin t, cos 2t, 1sin t, 2T
and external disturbances to the object of critical infrastructure act according to the law:

w(t)  1,5 1,5sin1,5t  cos(0,8t </p>
      <p>)  P1(t  0,5).
3</p>
      <p>Then the law of managing the security system of critical infrastructure objects under the conditions
of external uncontrolled influences built according to the given methodology in a graphic form will
have the form depicted in Fig. 1. It should be noted that Fig. 1 shows the control law for external
disturbances, which are simulated by rectangular pulses with an amplitude of 1 (in relative units), a
period of 15 s and a duration of 5, 8, and 12 s, respectively.
(20)
(21)
(22)
(23)</p>
      <p>The law of managing the safety system of critical infrastructure objects under the conditions of
external uncontrolled influences, built according to the given methodology, in graphic form will have
the form depicted in Fig. 2. The simulation was carried out under external disturbances, which are
simulated by rectangular pulses with an amplitude of 2 (in relative units), a period of 15 s and a duration
of 7, 9, and 15 s, respectively (the second option).</p>
      <p>The law of managing the security system of critical infrastructure objects under the conditions of
external uncontrolled influences, built according to the given methodology, in graphic form will have
the form depicted in Fig. 3. The simulation was carried out under external disturbances, which are
simulated by rectangular pulses with an amplitude of 3 (in relative units), a period of 15 s and a duration
of 9, 11, and 17 s, respectively (the second option).</p>
    </sec>
    <sec id="sec-8">
      <title>5. Conclusion</title>
      <p>For critical infrastructure objects, a method of constructing a law of safety management of critical
infrastructure objects under the conditions of external uncontrolled influences is proposed. Namely, the
method of building a robust control system that allows you to compensate for uncontrolled external
influences and parametric uncertainty. The difference of the proposed method lies in the fact that the robust
control system allows to compensate for unknown disturbances with a certain accuracy in the required time.
At the same time, by appropriate selection of the parameters of the closed system, it is possible to make the
error and time sufficiently small.</p>
      <p>The simulation results proved that the quality of transient processes does not depend on disturbances that
affect both the nature of the behavior of the solution of the differential equation describing the critical
infrastructure object and its structure. Transient processes, first of all, depend on the initial conditions of the
object model and parameters of the control system. And this means that if in the process of designing the
security system, the initial conditions are correctly set and the changes (including uncontrolled) of the
parameters of the system's functioning are properly monitored, it is possible to ensure the stable and safe
operation of the facility over time.</p>
    </sec>
    <sec id="sec-9">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalimullah</surname>
            .
            <given-names>A Multimodal</given-names>
          </string-name>
          <string-name>
            <surname>Improved</surname>
          </string-name>
          <article-title>Particle Swarm Optimization for High Dimensional Problems in Electromagnetic Devices</article-title>
          .
          <source>Energiesthis link is disabled</source>
          ,
          <year>2021</year>
          ,
          <volume>14</volume>
          (
          <issue>24</issue>
          ),
          <fpage>8575</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Elahi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gul</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.U.</given-names>
          </string-name>
          <article-title>EigenSpace-Based Generalized Sidelobe Canceler Applied for Sidelobe Suppression in Cognitive Radio Systems</article-title>
          . Wireless Personal Communicationsthis link is disabled,
          <year>2021</year>
          ,
          <volume>121</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>3009</fpage>
          -
          <lpage>3028</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fahad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>J.A. A Modified</given-names>
          </string-name>
          <string-name>
            <surname>Particle</surname>
          </string-name>
          <article-title>Swarm Optimization for the Applications of Electromagnetic Devices Proceedings -</article-title>
          2021
          <source>2nd International Conference on Electronics, Communications and Information Technology, CECIT</source>
          <year>2021</year>
          ,
          <year>2021</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>96</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Fahad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          <article-title>A multimodal smart quantum particle swarm optimization for electromagnetic design optimization problems Energiesthis link is disabled</article-title>
          ,
          <year>2021</year>
          ,
          <volume>14</volume>
          (
          <issue>15</issue>
          ),
          <fpage>4613</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Nikodem</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nikodem</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klempous</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gawlowski</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <article-title>Wi-Fi Communication and IoT Technologies to Improve Emergency Triage Training</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          ,
          <year>2020</year>
          ,
          <volume>1173</volume>
          AISC, pp.
          <fpage>451</fpage>
          -
          <lpage>460</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Lukova-Chuiko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herasymenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toliupa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , ...
          <string-name>
            <surname>Laptievа</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laptiev</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <article-title>The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation 2021</article-title>
          <source>IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings</source>
          ,
          <year>2021</year>
          , рр.
          <fpage>67</fpage>
          -
          <lpage>70</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Oleksandr</given-names>
            <surname>Laptiev</surname>
          </string-name>
          , Volodymyr Tkachev, Oleksii Maystrov, Oleksandr Krasikov, Pavlo Open'ko, Volodimir Khoroshko,
          <string-name>
            <given-names>Lubomir</given-names>
            <surname>Parkhuts</surname>
          </string-name>
          .
          <article-title>The method of spectral analysis of the determination of random digital signals</article-title>
          .
          <source>International Journal of Communication Networks and Information Security (IJCNIS)</source>
          . Vol
          <volume>13</volume>
          ,
          <string-name>
            <surname>No</surname>
            <given-names>2</given-names>
          </string-name>
          ,
          <year>August 2021</year>
          Р.
          <fpage>271</fpage>
          -
          <lpage>277</lpage>
          . ISSN:
          <fpage>2073</fpage>
          -
          <lpage>607X</lpage>
          (
          <article-title>Online)</article-title>
          .
          <source>DOI : 10</source>
          .54039/ijcnis.v13i2.5008 https://www.ijcnis.org/index.php/ijcnis/article/view/5008
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Volodymyr</given-names>
            <surname>Petrivskyi</surname>
          </string-name>
          , Viktor Shevchenko, Serhii Yevseiev, Oleksandr Milov, Oleksandr Laptiev,Oleksii Bychkov, Vitalii Fedoriienko, Maksim Tkachenko, Oleg Kurchenko,
          <string-name>
            <given-names>Ivan</given-names>
            <surname>Opirsky</surname>
          </string-name>
          .
          <article-title>Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors</article-title>
          .
          <source>Eastern-European journal of enterprise technologies.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>