<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>November</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Information Technology Development for Social Services Consumers' Choice</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oksana Mulesa</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marian Tokar</string-name>
          <email>marian.tokar@uzhnu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tamara Radivilova</string-name>
          <email>tamara.radivilova@nure.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena Yatsyna</string-name>
          <email>olena.yacuna@uzhnu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariia Shnitser</string-name>
          <email>mariya.shnitser@uzhnu.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>ave.Nauki 14, Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Uzhhorod National University</institution>
          ,
          <addr-line>Narodna sq., 3, Uzhhorod, 88000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>2</volume>
      <fpage>0</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>The problem of processing and analyzing data in selecting consumers for the provision of social services is considered. The specifics of the actors' interaction in determining the rules and limitations for such analysis are identified. Methods and algorithms for data analysis that can be used to select or filter out potential consumers of social services are developed. The algorithm of the developed combined method of calculating scores to form a set of social service consumers based on the analysis of their socio-demographic portraits is illustrated. The algorithm of the adapted fuzzy consumer selection method using the procedure of fuzzy logical inference is presented. inference, linguistic variables Conceptual scheme of data processing, methods of filtering and selection, product rules, fuzzy ORCID: 0000-0002-6117-5846 (A.1); 0000-0001-8426-4481 (A.2); 0000-0001-5975-0269 (A.3); 0000-0003-0053-4814 (A.4); 0000-0003Proceedings</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Digitalization in Ukraine and the world is accelerates [1]. For example, in the European Union, 25
national plans focused on Industry 4.0 are being developed between 2011 and 2022 [2]. Industry 4.0
itself is characterized by information technology used to process a large amount of data required to
control automated production [3]. Industry 5.0, extending beyond the production of goods and services
for profit, encourages to combine human intelligence, and creativity with the capabilities of technology
[4]. Digitalization is spreading to more and more areas, including the social sphere. For example, in
Ukraine, the Unified Portal of Public Services [5], launched in 2019, is designed to allow citizens to
communicate with the state, receive public services, education, etc. The electronic healthcare system
eHealth [6] was introduced in 2016 and is a multi-component information and telecommunication
system that automates the record keeping of medical services and management of medical information
in electronic form. These and other innovations, which have been successfully implemented in various
areas of human activity, demonstrate the success of the digitalization process and the need to continue
it.</p>
      <p>Thus, the development and implementation of information technologies to automate processes in
the social sphere and beyond is an urgent and priority interdisciplinary task. Representatives of various
spheres of human activity are involved in its solution. The effectiveness of decisions made on their
basis depends on their adequacy of relevance to real processes. A large number of scientific works are
devoted to the study of this problem.</p>
      <p>Thus, in [7, 8] the introduction of digital technologies into the activities of various business entities
is analyzed. The positive and negative effects of digitalization are noted. Despite the dynamic
development of the social sphere, the appearance of new actors, requests, and services motivates
researchers to develop new approaches and tools for organizing and processing data in it [9, 10, 11].
Many modern scientific studies are devoted to analyzing and solving problems in the economic sphere
EMAIL:</p>
      <p>Oksana.mulesa@uzhnu.edu.ua
(A.1);
(A.2);
(A.3)</p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>ceur-ws.org
through information technology [12-14]. Scientists are also deeply studying the problems that occur in
the medical field [15, 16], etc. This study is devoted to the problem of data analysis and processing in
the process of social services provision [17]. Providers of such services are public, social institutions
whose activities are aimed at ensuring the interests of citizens. The main risks of their activities lie in
the threat to commit damage to service recipients and the social environment in which they live [9].
One of the most important problems is the consumer selection problem for the social services provision.
To reduce the probability of these risks, it is important to develop relevant methods, models, and tools
for data and knowledge processing to improve the efficiency of decision-making processes in this area.
The aim of this study is to develop information technology for the automated selection of social services
consumers based on product rules and fuzzy inference methods.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Some aspects of social service delivery processes</title>
    </sec>
    <sec id="sec-3">
      <title>2.1. Analysis of actors' interaction in social service delivery processes</title>
      <p>The article considers the processes of data analysis that take place in the market of social services
provided by public organizations to the relevant consumers. This market is characterized by a
continuously expanding list of consumer categories, as well as an increasing number of potential
consumers of services. For effective interaction, experts from government agencies, local governments,
and non-governmental organizations should form a bank of social services based on the monitoring and
public surveys conducted. It is also necessary to develop tools to ensure the availability of effective
public services for the requestor, taking into account the capabilities of all subjects (actors). There are
three main actors in this process:</p>
      <p>- Service consumers are individuals who, according to their socio-demographic profile, medical
history or other personal characteristics, may be eligible for social service;</p>
      <p>- non-governmental organizations, whose employees directly provide social services, draw up a
comprehensive and goal-oriented (specific) work plan, monitor the appropriate service market, engage
the necessary resources (human and material) and direct them to achieve the goals ("execution of the
order");</p>
      <p>- Customers are the state, regional public authorities, and territorial communities that provide
legislative, organizational and managerial, tax and financial, and other support, i.e. organize the process
of service provision, regulate service provision processes in accordance with the law, partially or fully
pay for services, provide (control) restrictions, rules for selecting consumers, etc.</p>
      <p>The interaction between the main actors of the process is shown in Fig. 1.
As can be seen from Figure 1, consumers make requests for the relevant services to the main
customer, who sends the task to the contractors for consideration. In turn, the processes of service
provision are regulated by the customer - the government authority.</p>
      <p>At the same time, the following cases may occur, which require additional analysis for effective
interaction of the mentioned actors:</p>
      <p>1. The number of simultaneous requests for the same type of services may limit the contractor's
ability to provide quality, efficiency and effectiveness. In this case, there is a problem of making a
decision on filtering out potential service consumers, additional involvement of contractors or
modification of the services in order to ensure the continuity of the service provision process.</p>
      <p>2. Service consumers do not fully or partially fulfill the criteria established by the customer.
Management decisions regarding such consumers can range from rejection - their final elimination from
the service provision to adaptation - full or partial involvement by changing certain (rather than
principal) criteria that consumers must fulfill.</p>
      <p>Given that the considered processes take place primarily in large territorial communities,
settlements, and entire regions, such cases can occur frequently, so it is important to develop tools for
automated development of possible management solutions for them.
2.2.</p>
    </sec>
    <sec id="sec-4">
      <title>The problem of consumer choice in the provision of social services</title>
      <p>The article considers the problem of selecting consumers who will be provided with services from
the list of potential consumers. Management decisions on the selection of consumers take place both in
the case when all requests for services cannot be satisfied due to the large number, and also when not
all consumers fulfill the criteria established by the customer.</p>
      <p>Consider the problem of selection of the consumers to be provided with services from a given list in
the following aspects:</p>
      <p>- the problem of determining whether a person who is a potential consumer of a social service fullfils
the criteria for its provision;</p>
      <p>- the problem of ranking service consumers in accordance with the priority of its provision in the
case when the number of consumers exceeds the possible scope of service provision.</p>
      <p>At first thought, the aforementioned selection problem can be partially formulated as a
patternmatching problem [18]. However, it is important to understand that consumers of different categories
can request the same service, which are generally incomparable. Thus, if the total number of potential
consumers is large enough, it is not enough to match the sample to decide about the service.It is
necessary to develop additional mechanisms for numerical assessment of the potential consumer's
characteristics and to bring the scores for various characteristics to a universal scale to further rank or
classify them by priority of service provision. It is also worth noting that, in addition to the criteria that
consumers must fulfill, the service customer may provide additional conditions for the provision of
services, such as the minimum volume of services to be provided to certain categories of consumers,
the percentage of services provided to consumers of different categories, etc.</p>
      <p>All these arguments and the analysis of the relevant decision-making processes show that when
designing an information technology for automated consumer selection, it is necessary to ensure the
ability to solve the following tasks: classification [19], comparison with a sample [18], ranking [20],
numerical object evaluation [21], etc. However, since the final decision on the consumers' selection for
the provision of the relevant service is made by a person ("coordination center") who makes the decision
taking into account the existing limitations and rules, the technology of automated consumer selection
should have a flexible structure, be scalable and adaptable (it can be an online questionnaire or online
selection). At the same time, the selection criteria should be quite clear indicators that are the basis for
setting standards for the provision of relevant services and that can be used to predict how well the
consumer's data, the services requested and received, fulfill them.</p>
    </sec>
    <sec id="sec-5">
      <title>3. Design of information technology components</title>
    </sec>
    <sec id="sec-6">
      <title>3.1. Conceptual scheme of data processing in the selection of social service users</title>
      <p>The aim of developing an information technology for automated selection of social services
consumers is to process data and knowledge to improve the efficiency of decision-making processes in
the social sphere. In this context, efficiency improvement will be understood as the development and
application of such universal and unified tools for analyzing socio-demographic portraits of potential
service users that would allow the system to be customized to the specifics, rules and limitations
provided by the customer. These features include:</p>
      <p>- the ability to set several different standard socio-demographic portraits for consumers of the same
service;</p>
      <p>- ensuring compliance with quotas on the number of consumers with certain specified characteristics,
etc.</p>
      <p>Given that the initial data, depending on the type of social service, may have a different nature,
format, and content, and that knowledge may take the form of product rules, numerical limits, etc., the
information technology for automated selection of social service users must be flexible and
multifunctional. Data will be processed in several stages. The sequence and number of stages should be
determined depending on the characteristics of the input data and the knowledge received from the
service customer. The conceptual scheme of data processing is shown in Fig. 2</p>
      <p>As can be seen from Figure 2, information technology is based on a library of methods and
algorithms designed to process data and solve relevant problems (classification, filtering, ranking, etc.).
Customizing the data processing process for a particular situation will involve building a sequence of
blocks to analyze input data and develop management decision options. Although the blocks are
arranged linearly in the diagram, the decision to filter out or select a consumer can be made at any stage
of data processing. This approach makes information technology flexible, universal and open to
improvement [22]. Thus, the main stage of designing an information technology is the selection,
adaptation and development of new models, methods and algorithms relevant to the tasks to be
implemented in the relevant blocks.</p>
    </sec>
    <sec id="sec-7">
      <title>3.2. Formalization of the problem and development of methods for processing data on social service consumers</title>
      <p>The article considers the problem of choosing social service consumers, taking into account their
socio-demographic portraits and the rules established by customers, experts, regulations, etc. Let us
formalize the problem of choosing services consumers as follows.</p>
      <p>Let there be a service S, which can be provided in the volume of NSmax .</p>
      <p>Let the service S receive requests from N consumers, defined by   . We define the set of consumers
by СS  {cs1, cs2 ,..., csN }. Each consumer of services is characterized by a vector of feature values
X (i)  (x1i , x2i ,..., xMi ) , where M is the number of features, xij is the value of the feature with number j
for consumer   . In the case when N  NSmax it is necessary to select those consumers who will be
provided with the service. The selection can be carried out in several stages, taking into account the
category of consumers and the set of values of their feaches.</p>
      <p>To process data on social services consumers, in addition to the well-known methods of data
preprocessing [23], classification methods [19], matching with a sample [18], ranking [20], and
numerical evaluation of an object [21], it is proposed to use the following groups of methods.</p>
      <sec id="sec-7-1">
        <title>1. Methods of filtering out consumers from consideration:</title>
      </sec>
      <sec id="sec-7-2">
        <title>1.1. Filtering out consumers for non-compliance with the requirements.</title>
        <p>Let's define the criteria for a consumer's eligibility to receive a given service. Let's form the criteria
in the state of sets of values for each feature. Let’s denote by SI j - the set of values of the i-th feature
acceptable for receiving this service. These sets can be specified both by a direct list of their elements
and by a system of mathematical relations.</p>
        <p>If there are no initial limits for some feature, the corresponding set will be empty.</p>
        <p>
          The method consists in filtering out consumers who do not fulfill the requirements according to the
following rule:
i  1, N : if j {1, 2,..., M}: SI j   and xij  SI j then CS : CS \ {csi}
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
        </p>
        <p>Let's label N | CS | and renumber all consumers with numbers from 1 to N. We will do the same
after each filtering and in the following rules.</p>
      </sec>
      <sec id="sec-7-3">
        <title>1.2. Matching with a sample.</title>
        <p>
          The method is a generalization of the method of filtering out for non-compliance with the
requirements (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) and can be used when consumers of different categories can apply for a given service.
        </p>
        <p>
          For each category of consumers, we define a vector SI k , whose elements are the sets of permissible
values of the features. That is, SI k  (SI1k , SI2k ,..., SI Mk ) , where SI kj is the set of permissible values of
the feature number j for the category of persons with number k, and if the value of the j-th feature is not
important for the category of consumers k, then SI kj   , k  1, K . Then, the filtering of consumers
i  1, N : if k {1, 2,..., K}: ( j 1, M , SI kj  ) xij  SI j then CS : CS \ {csi}
based on the results of comparison with the sample is carried out according to the following rule:
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
        </p>
      </sec>
      <sec id="sec-7-4">
        <title>1.3. Filtering by scoring</title>
        <p>This method is based on a method similar to the one described in [24]. The method algorithm consists
of the following steps.</p>
        <p>
          Step 1. Define a system of functions (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) that assigns a nonnegative integer weight to each value from
the set of valid values SI kj :
        </p>
        <p>kj : S kj  ¥  {0}, k  1, K , j  1, M .</p>
        <p>For all consumers, do steps 2 and 3.</p>
        <p>
          Step 2. For a consumer, we calculate their score in each category (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ):
        </p>
        <p> 
SRik   j1,M: SI kj </p>
        <p>
           0, otherwise,
Step 3. Calculate the resulting consumer score using (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ):
kj (xij ), if j {1, 2,..., M }, SI kj   : xij  SI kj ,
        </p>
        <p>SRi  max(SRik )</p>
        <p>k1,K
Step 4. Apply one of the Rules to filter out consumers.</p>
        <p>
          Rule 3.1. By threshold:
, k  1, K ,
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
where SRmin is a nonnegative value of the permissible threshold of the resultant score.
        </p>
        <p>
          Rule 3.2. By the average score:
where SRavg calculates by (
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
i  1, N : if SRi  SRavg then CS : CS \ {csi} ,
        </p>
        <p>SRavg 
1 N</p>
        <p> SRi .</p>
        <p>
          N i1
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
(
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
        </p>
      </sec>
      <sec id="sec-7-5">
        <title>2. Methods of consumer selection.</title>
      </sec>
      <sec id="sec-7-6">
        <title>2.1. Selection of consumers by compliance with the requirements.</title>
        <p>A method similar to the method of filtering out for non-compliance. The rule for this method is as
follows:</p>
        <p>i  1, N : if j  1, M , SI j  :xij  SI j then W : W {csi}, CS : CS \ {csi} ,
where W is the set of winners, i.e., persons selected to provide services (initially W   ).</p>
      </sec>
      <sec id="sec-7-7">
        <title>2.2 Matching the model.</title>
        <p>
          Let each category of consumers be given an "ideal portrait" of a consumer to whom the service is
guaranteed. Similarly to the pattern matching method, we introduce notation. For each category of
consumers, we define a vector SI k , whose elements are sets of desired values of the features. That is,
SI k  (SI1k , SI2k ,..., SI Mk ) , where SI kj is the set of desirable values of the feature number j for the
category of persons with number k, and if the value of the j-th feature is not important for the category
of consumers k, then SI kj   , k  1, K . Let’s construct a consumer selection rule in the form (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ).
        </p>
        <p>then W : W  {csi }, CS : CS \ {csi}.</p>
        <p>i  1, N : if k {1, 2,..., K}: ( j  1, M , SI kj  ) xij  SI j .</p>
        <p>
          Using rule (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ), it is possible to divide potential consumers into groups by priority. To do this, it is
enough to change the concept of "consumer category" to "consumer priority". After such a division, it
is reasonable to conduct further research for each group separately, taking into account the quotas and
standards received from the service customer.
        </p>
      </sec>
      <sec id="sec-7-8">
        <title>2.3 Selection by scoring.</title>
        <p>
          In this method, similarly to method 1.3, we build a rule for selecting consumers whose total score
exceeds a given threshold SR in the form (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ):
        </p>
        <p>i  1, N : if SRi  SR then W : W {csi}, CS : CS \ {csi} .</p>
        <p>
          Similarly to (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ), rule (
          <xref ref-type="bibr" rid="ref11">11</xref>
          ) can also be used to categorize potential service consumers.
        </p>
        <p> j : S j  R , j  1, M .</p>
      </sec>
      <sec id="sec-7-9">
        <title>3. Combined scoring method</title>
        <p>
          The method is similar to [25]. We assume that all consumers belong to the same category, and their
features are ordered in descending order of importance in making decisions about providing a service
to a consumer. Then, similarly to (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), define the system of functions (
          <xref ref-type="bibr" rid="ref12">12</xref>
          ).
        </p>
        <p>Let Sumi is the cumulative value of the sum of score for the consumer csi , W is the set of winners,
i.e., the persons selected to provide the service (initially W   ).</p>
        <p>Let the decision maker, based on other studies and considerations, set two thresholds for the sum:
Sum is the smallest value of the sum of scores that is sufficient to provide the service to the
consumer;</p>
        <p>if Sumi  Sum then W : W {csi}, CS : CS \ {csi}.</p>
        <p>
          If condition (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ) is true, that is, a decision is made to provide the service to this consumer, and the
procedure is stopped for him. Otherwise, go to Step 4.
        </p>
        <p>
          Step 4. Check if condition (
          <xref ref-type="bibr" rid="ref14">14</xref>
          ) is true:
        </p>
        <p>if Sumi  Sum then CS : CS \ {csi}.</p>
        <p>
          If condition (
          <xref ref-type="bibr" rid="ref14">14</xref>
          ) is true, the consumer is filtered out of consideration and the procedure is completed.
Otherwise, proceed to step 5.
        </p>
        <p>Step 5. If j  N , then go to Step 2, otherwise, conclude that it is impossible to make a decision on
this consumer according to this procedure.</p>
      </sec>
      <sec id="sec-7-10">
        <title>4. Fuzzy method of consumer selection</title>
        <p>This method is based on the analysis of the socio-demographic portrait of a potential consumer of
social service and its comparison with linguistic variables that describe the degree of a person's
belonging to the set of consumers W selected for the provision of the service.</p>
        <p>The algorithm of the method is as follows. At the initial stage, let's fix   0; 1 is the threshold of
the belonging function for the degree of a person's belonging to the set W.</p>
        <p>
          Step 1. Organize the features that are used to evaluate individuals according to their impact on the
formation of the socio-demographic portrait of the service consumer and build a hierarchy of features.
Note that the L-th level of the hierarchy includes features that satisfy condition (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ):
        </p>
        <p>Sum is the highest value of the sum of scores, which is sufficient to decide not to provide the service
to the consumer.</p>
        <p>Then we will build the algorithm of the method in the form of the next procedure. For each consumer
csi , we will perform the next steps.</p>
        <p>Step 1. Set the initial values of Sumi  0 , j  0 .</p>
        <p>Step 2. j : j  1, Sumi : Sumi   j (xij ) .</p>
        <p>
          Step 3. Check the condition (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ):
(
          <xref ref-type="bibr" rid="ref13">13</xref>
          )
(
          <xref ref-type="bibr" rid="ref14">14</xref>
          )
(
          <xref ref-type="bibr" rid="ref15">15</xref>
          )
(
          <xref ref-type="bibr" rid="ref16">16</xref>
          )
(
          <xref ref-type="bibr" rid="ref17">17</xref>
          )
(
          <xref ref-type="bibr" rid="ref18">18</xref>
          )
(
          <xref ref-type="bibr" rid="ref19">19</xref>
          )
max
t1,M
KtI j ,l1,2,...,L1


rt , j  1, M  .
        </p>
        <p>

 si  A1s1  x1i   A1s2  x2i   L  A1sT1  xTi1  , s  1, 1 ,</p>
        <p>Csi  y : si  Cs  y  , s  1, 1 ,.</p>
        <p> Ci  y   C1i  y   C2i  y   L  C1i  y  ,.</p>
        <p>Calculate the values of the interval limits according to the following rules:
where rj is the rank of the feature X j is predefined by the service customer.</p>
        <p>
          Step 2. Based on the data obtained from the expert surveys, build a fuzzy knowledge base for the
features of the first level of the hierarchy from the rules of the formula (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ):
        </p>
        <p>if x1  A111 , and x2  A121 , …, and xT1  A1T11 , then y C1 ,
where  1 is the number of rules in the fuzzy knowledge base for the features of the first level of the
hierarchy; T1 is the number of features at the level I1 ; xi is input variables; A is belonging functions;
functions C s : 0,1  0,1 , s  1, 1 .</p>
        <p>Step 3. For each consumer, find the degrees of truth of the corresponding functions: Asj  xij  , s  1, 1
, j  1,T1 .</p>
        <p>Perform the procedure of logical data output and composition of fuzzy sets [26].</p>
        <p>a1i  min  y| C  y   C 0,   0 C  y     C 0 .</p>
        <p>y0,1
b1i  max y| C  y   C 1,   0 C  y    C 1 .</p>
        <p>y0,1
As a result of the calculations for each object, the interval of scores a1i ,b1i  is obtained.</p>
        <p>Step 4. Exclude from consideration persons for which b1i   . If all persons are excluded, the
algorithm stops working.</p>
        <p>Step 5. Repeat steps 2-4 for the features of the next hierarchy levels. When switching between
iterations, match the evaluation intervals according to predefined rules.</p>
        <p>After completing the iterations, for each person remaining in the consideration, determine the
resulting belonging function of the fuzzy set, which characterizes the degree of its belonging to the set
W according to the following rule:
C s ai , if y  0,ai  , C s  y   Cs  y   ,  0,

Csi  y  : С s bi , if y  bi ,1 ,C s  y   C s  y  ,  0, .</p>
        <p>
C s  y , otherwise.

 Ci  y  C1i  y   C2i  y   L  C Li  y  .</p>
        <p>Next, defuzzify the fuzzy sets using the formula:
С2 u   С1 1  u  .
where a is a fixed parameter, a  0,1 .</p>
        <p>Step 3. Interviewing experts by including potential rules of the fuzzy knowledge base in the expert
questionnaire.
 i</p>
        <p>Then, for individuals with  i   , conclude that csi W ; for individuals with  i   , conclude that
csi W . That is,
 Oi    i , for person who are still in processing, .</p>
        <p>0, for person who are filtering.</p>
        <p>
          To build the fuzzy knowledge base (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ), it is proposed to use the following algorithm:
Let there be a set of features X1, X 2 ,..., XT  that form the socio-demographic portrait of a person.
Step 1. Constructing linguistic variables for each feature from the set of features.
        </p>
        <p>Step 2. Constructing the linguistic variable "Degree of belonging to the set of consumers". It is
proposed to use the fuzzy subsets C  "High degree of belonging to the set of consumers", C2 ="Low
1
degree of belonging to the set of consumers". Build membership functions for such fuzzy sets as
follows:

0, if
  u  a 2
С1 u   2 1  a  , if a  u 
  1  u 2
1  2   , if
  1  a  2</p>
        <p>Step 4. Calculating the total rank of the rules that the experts marked as correct, and then including
those rules in the fuzzy knowledge base whose total rank exceeds a fixed value.</p>
        <p>In accordance with the algorithm described above, the rules for matching the intervals of scores
obtained at different levels of the feature hierarchy play an important role.</p>
        <p>
          Suppose that for the upper level of the feature hierarchy with rank 1 , an interval of scores a1,b1 
was obtained for the next level with rank  2 – a2 ,b2  . Then the limits of the agreed interval  a, b
can be calculated according to one of the next heuristics (
          <xref ref-type="bibr" rid="ref28">28</xref>
          )-(30):
b : max b1,b2  , a : max a1, a2  ..
        </p>
        <p> 
b : b1  b1  b2 2 , a : a1  a1  a2 2 .</p>
        <p>
          1 1
a : min a1, a2  , b : max b1,b2  ..
(
          <xref ref-type="bibr" rid="ref28">28</xref>
          )
(29)
(30)
        </p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>4. Experimental results and evaluations</title>
      <p>To demonstrate the results of using the developed methods and approaches, let us consider a
simplified case. Let's assume that consumers can be provided with the social service "Psychological
counseling for internally displaced persons", which is provided to people who were forced to leave their
homes and move to safer areas due to the fighting in Ukraine.</p>
      <p>To analyze the service, the customer selected the features of the socio-demographic portrait of such
persons and built the corresponding linguistic variables (Table 1).</p>
      <p>Thus, in accordance with Table 2 and Fig. 3, at the first stage, the sets of features of potential
consumers are analyzed and those that do not fulfill the specified requirements are filtered out, that is,
the values of the features go beyond the sets of acceptable values. At the second stage, a fuzzy selection
method is used to build a fuzzy set of social service consumers.</p>
    </sec>
    <sec id="sec-9">
      <title>5. Conclusions</title>
      <p>In this paper, the methods and algorithms that underlie the information technology of automated
selection of social services consumers are analyzed and developed. The specifics of the processing and
analysis of potential clients' personal data during the selection of social services consumers were
analyzed. The proposed conceptual scheme of data processing provides a flexible and scalable structure.
These properties make the developed information technology more universal and comfortable for
editing.</p>
      <p>Several groups of methods for analyzing data on potential customers have been developed: customer
filtering methods, customer selection methods, and a combined scoring method. All the developed
methods allow taking into account the requirements and limitations of social services customers and
forming a set of consumers to whom these services will be provided.</p>
      <p>Screening methods allow for the initial stages of data analysis to exclude from consideration those
individuals who do not fulfill the initial requirements for receiving the service in question.</p>
      <p>In turn, consumer selection methods should be applied at the next stages to rank potential consumers
or form the resulting set of consumers.</p>
      <p>The developed fuzzy method of consumer selection for each potential consumer allows to calculate
their degree of belonging to the resulting set based on the results of the socio-demographic portrait
analysis.</p>
      <p>The choice of methods and the construction of the data analysis sequence depends on the specifics
of the social service and the limitations received from the customers of such services [27, 28].
6. References</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhosan</surname>
          </string-name>
          <article-title>Development of digitalization in Ukraine</article-title>
          . Ekonomichnyy analiz,
          <volume>30</volume>
          (
          <issue>1</issue>
          (
          <issue>2</issue>
          )),
          <year>2020</year>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. E.</given-names>
            <surname>Teixeira</surname>
          </string-name>
          , A. T. C.
          <article-title>Tavares-Lehmann, Industry 4.0 in the European union: Policies and national strategies</article-title>
          .
          <source>Technological Forecasting and Social Change</source>
          ,
          <volume>180</volume>
          (
          <year>2022</year>
          )
          <fpage>121664</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Marinič</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pecina</surname>
          </string-name>
          ,
          <article-title>Industry 5.0 in Vocational Education</article-title>
          .
          <source>In INTED2023 Proceedings</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>3805</fpage>
          -
          <lpage>3811</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D. G.</given-names>
            <surname>BrooKaynak</surname>
          </string-name>
          , S. M.
          <article-title>Sait Rethinking engineering education at the age of industry 5.0</article-title>
          .
          <source>Journal of Industrial Information Integration</source>
          <volume>25</volume>
          (
          <year>2022</year>
          )
          <fpage>100311</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>State</surname>
            <given-names>services online</given-names>
          </string-name>
          ,
          <year>2023</year>
          . URL: https://diia.gov.ua/
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Electronic healthcare system in Ukraine, 2023</article-title>
          . URL: https://ehealth.gov.ua/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Lupei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shlahta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mitsa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Horoshko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Tsybko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gorbachuk</surname>
          </string-name>
          ,
          <article-title>Development of an Interactive Map Within the Implementation of Actual State and Public Directions</article-title>
          .
          <source>In 2022 12th International Conference on Advanced Computer Information Technologies (ACIT)</source>
          , (
          <year>2022</year>
          ).
          <fpage>384</fpage>
          -
          <lpage>387</lpage>
          . IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>U.</given-names>
            <surname>Brinkmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Heiland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Seeliger</surname>
          </string-name>
          ,
          <article-title>Corporate public spheres between refeudalization and revitalization</article-title>
          .
          <source>Theory, Culture &amp; Society</source>
          ,
          <volume>39</volume>
          (
          <issue>4</issue>
          ), (
          <year>2022</year>
          ),
          <fpage>75</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Gu</given-names>
            <surname>Bingmei</surname>
          </string-name>
          , Liu Jiaguo,
          <string-name>
            <given-names>Ji</given-names>
            <surname>Qiang</surname>
          </string-name>
          .
          <article-title>The effect of social sphere digitalization on green total factor productivity in China: Evidence from a dynamic spatial Durbin model</article-title>
          .
          <source>Journal of Environmental Management</source>
          ,
          <year>2022</year>
          ,
          <volume>320</volume>
          :
          <fpage>115946</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Myronyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kachmar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Jakab</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Yatsyna</surname>
          </string-name>
          ,
          <article-title>"Decision-Making Modeling in Educational Process Organization Under the Conditions of Crisis Situations Forecasting,"</article-title>
          <source>2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>460</fpage>
          -
          <lpage>465</lpage>
          , doi: 10.1109/ICETA57911.
          <year>2022</year>
          .
          <volume>9974909</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dolgikh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          , “
          <article-title>Covid-19 epidemiological factor analysis: Identifying principal factors with machine</article-title>
          ,
          <source>” CEUR Workshop Proceedings</source>
          , vol.
          <volume>2833</volume>
          , pp.
          <fpage>114</fpage>
          -
          <lpage>123</lpage>
          ,
          <year>2021</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Yoo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. G.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <article-title>Economic innovation caused by digital transformation and impact on social systems</article-title>
          .
          <source>Sustainability</source>
          <volume>14</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>2600</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Machine learning approach for a circular economy with waste recycling in smart cities</article-title>
          .
          <source>Energy Reports</source>
          <volume>8</volume>
          (
          <year>2022</year>
          )
          <fpage>3127</fpage>
          -
          <lpage>3140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Giglio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kelly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Xiu</surname>
          </string-name>
          ,
          <article-title>Factor models, machine learning, and asset pricing</article-title>
          .
          <source>Annual Review of Financial Economics</source>
          <volume>14</volume>
          (
          <year>2022</year>
          )
          <fpage>337</fpage>
          -
          <lpage>368</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>F.</given-names>
            <surname>Salami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bozorgi-Amiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tavakkoli-Moghaddam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Datta</surname>
          </string-name>
          ,
          <article-title>Designing a clinical decision support system for Alzheimer's diagnosis on OASIS-3 data set</article-title>
          .
          <source>Biomedical Signal Processing and Control</source>
          <volume>74</volume>
          (
          <year>2022</year>
          )
          <fpage>103527</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Khare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Bajaj</surname>
          </string-name>
          ,
          <article-title>A hybrid decision support system for automatic detection of Schizophrenia using EEG signals</article-title>
          .
          <source>Computers in Biology and Medicine</source>
          ,
          <volume>141</volume>
          (
          <year>2022</year>
          )
          <fpage>105028</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>O. I.</given-names>
            <surname>Borodkina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Starshinova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. B.</given-names>
            <surname>Arkhipova</surname>
          </string-name>
          ,
          <article-title>Social investment: Problems and development strategies</article-title>
          .
          <source>Terra Economicus</source>
          ,
          <volume>20</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>6</fpage>
          -
          <lpage>31</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>W.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          , S. Liu,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <article-title>A few shot classification methods based on multiscale relational networks</article-title>
          .
          <source>Applied Sciences</source>
          <volume>12</volume>
          (
          <issue>8</issue>
          ) (
          <year>2022</year>
          )
          <fpage>4059</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>L.</given-names>
            <surname>Guan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tibshirani</surname>
          </string-name>
          ,
          <article-title>Prediction and outlier detection in classification problems</article-title>
          .
          <source>Journal of the Royal Statistical Society</source>
          . Series B,
          <string-name>
            <surname>Statistical</surname>
            <given-names>Methodology</given-names>
          </string-name>
          ,
          <volume>84</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>524</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>G.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Centroid coordinate ranking of Pythagorean fuzzy numbers and its application in group decision making</article-title>
          .
          <source>Cognitive Computation</source>
          <volume>14</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>602</fpage>
          -
          <lpage>623</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>H.C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. Y.</given-names>
            <surname>Duan</surname>
          </string-name>
          ,
          <article-title>An integrated behavior decision-making approach for large group quality function deployment</article-title>
          .
          <source>Information Sciences</source>
          <volume>582</volume>
          (
          <year>2022</year>
          )
          <fpage>334</fpage>
          -
          <lpage>348</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Kachmar</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Myronyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Horvat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Radivilova</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kykyna</surname>
          </string-name>
          ,
          <article-title>Designing SemiAutomated Decision-Making Expert Systems for Healthcare Tasks</article-title>
          ,
          <source>2022 IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>235</fpage>
          -
          <lpage>238</lpage>
          , doi: 10.1109/CSIT56902.
          <year>2022</year>
          .10000448
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T. A.</given-names>
            <surname>Alghamdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Javaid</surname>
          </string-name>
          ,
          <article-title>A survey of preprocessing methods used for analysis of big data originated from smart grids</article-title>
          .
          <source>IEEE Access</source>
          <volume>10</volume>
          (
          <year>2022</year>
          )
          <fpage>29149</fpage>
          -
          <lpage>29171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          ,
          <article-title>Methods of considering the subjective character of input data in voting</article-title>
          .
          <source>EasternEuropean Journal of Enterprise Technologies</source>
          ,
          <volume>1</volume>
          .3 (
          <year>2015</year>
          ):
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mulesa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yatsyna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Melnyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Myronyuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Povkhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Batyuk</surname>
          </string-name>
          .
          <article-title>Prediction of the Occurrence of Threatening Conditions in Individuals as a Problem of Assigning an Object to a Class</article-title>
          .
          <source>In: 2022 IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT)</source>
          . IEEE,
          <year>2022</year>
          . p.
          <fpage>332</fpage>
          -
          <lpage>335</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Batubara</surname>
          </string-name>
          ,
          <article-title>Analisis perbandingan metode fuzzy mamdani dan fuzzy sugeno untuk penentuan kualitas cor beton instan</article-title>
          .
          <source>IT Journal Research and Development</source>
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Hnatiienko</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiktev</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Babenko</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Desiatko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Myrutenko</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <article-title>Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data</article-title>
          .
          <source>Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS</source>
          <year>2021</year>
          ), Kyiv, Ukraine, December 9,
          <year>2021</year>
          . CEUR Workshop Proceedings,
          <year>2021</year>
          ,
          <volume>3241</volume>
          , pp.
          <fpage>169</fpage>
          -
          <lpage>180</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Palko</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ; Babenko,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Bigdan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Kiktev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ;
            <surname>Hutsol</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ;
            <surname>Kuboń</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ;
            <surname>Hnatiienko</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          ; Tabor,
          <string-name>
            <given-names>S.</given-names>
            ;
            <surname>Gorbovy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            ;
            <surname>Borusiewicz</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Cyber Security Risk Modeling in Distributed Information Systems</article-title>
          .
          <source>Applied Sciences (Switzerland)</source>
          <year>2023</year>
          ,
          <volume>13</volume>
          , 2393. https://doi.org/10.3390/app13042393
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>