<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Basic Scenario Reports and Information Algorithms Intelligent System of Financial Monitoring</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Pavel</forename><surname>Petrov</surname></persName>
							<email>petrov@ue-varna.bg</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Economics</orgName>
								<address>
									<settlement>Varna</settlement>
									<country key="BG">Bulgaria</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yaroslav</forename><surname>Petrivskyi</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Rivne State Humanitarian University</orgName>
								<address>
									<addrLine>St. Bandery str. 12</addrLine>
									<postCode>33000</postCode>
									<settlement>Rivne</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Derkach</surname></persName>
							<affiliation key="aff2">
								<orgName type="department">Information and analytical enterprise «</orgName>
								<address>
									<addrLine>Analityk 1»</addrLine>
									<postCode>33000</postCode>
									<settlement>Rivne</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Petrivskyi</surname></persName>
							<email>vovapetrivskyi@gmail.com</email>
							<affiliation key="aff3">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Bohdan Hawrylyshyn str. 24</addrLine>
									<postCode>01001</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff4">
								<orgName type="department">Information Technology and Implementation (IT&amp;I-2023)</orgName>
								<address>
									<addrLine>November 20-21</addrLine>
									<postCode>2023</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Basic Scenario Reports and Information Algorithms Intelligent System of Financial Monitoring</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F278056626A31E707F5D3AFD15340B39</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:00+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Information systems</term>
					<term>anti-money laundering</term>
					<term>financial monitoring</term>
					<term>scenario report</term>
					<term>criterion algorithm</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the article the main principles of creating intelligent information systems for monitoring and controlling the financial sector of the circulation of funds are discussed. The conceptual foundations of the design of a flexible model of the Integrated Software Package for Preventing Abuses in Financial Practices are proposed, which uses seventeen basic scenarios as reliability criteria, which is successfully integrated with various banking products (the bank's operational day), solves the issue of multifaceted testing and detection of abuses in banking practice. A statistical approach to selecting the number of payments to check with results for different payment groups is presented.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Undoubtedly for all countries is the question of the importance of combating the illegal circulation of funds, which is a financial source of ensuring the possibility of criminal activities, such as drug and arms trafficking, human trafficking, terrorist attacks, and others. Unfortunately, the entire progressive world felt the dangerous burden of the consequences of neglecting the obvious signs of a crime, including in the field of banking monitoring, as a result of the aggression of the Russian Federation against Ukraine. Wartime conditions determine the need to apply strengthened measures of a practical and organizational nature to combat the legalization of proceeds of crime, the financing of terrorism, and the financing of the proliferation of weapons of mass destruction <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>.</p><p>The global independent intergovernmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist financing, and the financing of the proliferation of weapons of mass destruction is the Financial Action Task Force (FATF), which was established in 1989 to combat money laundering and terrorist financing. It is an intergovernmental agency made up of 35 member jurisdictions and two regional organizations. Ukraine is a member of the Committee of Experts of the Council of Europe as part of the FATF on the assessment of measures to combat money laundering and terrorist financing -MONEYVAL <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>.</p><p>Ukraine strictly adheres to the important rules adopted by the European Union (EU) (officially known as General Data Protection Regulations-GDPR) regarding the collection, storage, and use of personal information, which entered into force as law throughout the EU in May 2018 and replaced the EU Data Protection Directive 1995. In terms of scope, the new provision applies equally to industries, EU organizations, and organizations of other countries that trade with the EU. Data-driven regulations focus on some specific issues, including ownership of data, explainability, trustworthiness, and transparency of algorithms that are trained or built on such data. A detailed analysis of these rules can be found in <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10]</ref>. Thus, according to the data of the State Financial Monitoring Service of Ukraine, for 2022, State Financial Monitoring sent 934 materials to law enforcement agencies (of which 550 were generalized materials and 384 additional generalized materials), where the amount of financial transactions that may be related to the legalization of funds and the commission of a criminal offense, amounts to 75.7 billion hryvnias, and for 2022, the total amount of financial transactions stopped by the State Financial Monitoring and blocked funds is equivalent to 7.7 billion hryvnias <ref type="bibr" target="#b10">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Current results overview and formulation of the problem</head><p>Among the modern automated applications of intelligent decision-making support with the help of agents in the field of logistics and anti-money laundering are known, for example, Real-Time Exception Management Decision Model <ref type="bibr" target="#b11">[12]</ref>, multi-channel data-driven, real-time anti-money laundering systems for electronic payment cards <ref type="bibr" target="#b12">[13]</ref>, Scalable graph learning for anti-money laundering <ref type="bibr" target="#b13">[14]</ref> and others.</p><p>As a rule, the algorithms of such software complexes are based on a sequential multi-step analysis using Simon's decision-making model. First, the data is described, and then there is a transition to the weighted assessment of transactions <ref type="bibr" target="#b14">[15]</ref>. In <ref type="bibr" target="#b15">[16]</ref>, the authors proposed a system for identifying transactions with a high risk of illegality. The article <ref type="bibr" target="#b16">[17]</ref> describes an intelligent anti-money laundering system that uses human agents to train and adapt such a system. The publications contain meaningful recommendations for the use of modern automated applications of intelligent decision-making support in the prevention and fight against money laundering, but they do not provide details about how the specified technology should be developed and implemented and what is the real result of its implementation.</p><p>The modern Ukrainian market already offers separate "complex solutions" for the study of financial flows for the purpose of financial monitoring. But at their core, these are financial constructors that provide only general information data that is already available in banking institutions <ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref><ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref>. In the publication <ref type="bibr" target="#b23">[24]</ref>, the authors proposed a prototype of an automated system for financial monitoring of banking operations from the design of a smart value system for business process modeling, expansion of the Business Process Management Initiative (BPMN), and software package with two complementary products: Process Modeler and BPM Suite Bizagi Studio. The proposed information system is based on the thirteen rules of potential risk: compliance of the funds credited to a bank account with the financial status of the client; regularity of receipt of funds, and further cash withdrawals; signs of evasion from the mandatory financial monitoring procedure on the part of a client; status of a beneficiary in the case of crediting funds from many individuals or legal entities; payment by the client for remote services; payment of the royalty fee, crediting foreign currency to the card account of the client; paying off client's loan for elite goods or real estate; similar IP-addresses of client transactions with other transactions; transactions exceeding 150,000 UAH. This approach allowed the authors to assess the risk of money laundering for each transaction. In the article <ref type="bibr" target="#b24">[25]</ref> the main conceptual principles of creating intelligent information systems for monitoring and controlling the financial sector of the circulation of funds, which meets the requirements of the regulatory framework of the world community regarding the prevention and counteraction of the legalization of income obtained through criminal means are examined.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Main part</head><p>The development of information technology, increasing the rigidity of requirements for the reliability of financial transactions, defines a number of new tasks for specialists in the field of financial analytics to improve existing and develop new banking audit service software products in the areas of developing combined scenarios for solving individual problems, constantly updating algorithms (tasks) with taking into account the trends of the global financial market.</p><p>To solve the above problems that arise in banking institutions in modern conditions, a group of specialists from the Analyst-1 information and analytical company has developed and is constantly improving ISPPA in FP (Integrated Software Package for Reventing Abuses in Financial Practices -a package of integrated software for preventing abuse in financial practice. It provides automation of control over the activities of bank customers based on the analysis of banking operations performed by customers, the status of customer accounts, the risk levels of their legalization of proceeds from crime, as well as the identification of affiliated customers by their counterparties, the timeliness of updating personal data and their correspondence to real activity. <ref type="bibr" target="#b24">25</ref> To write the ISPPA in FP software product, the object-oriented programming language JAVA was chosen, which provides reliability, security, and functionality and is a universal a powerful means of connecting users with various sources of information, regardless of their location. And "architecture independence" allows you to run the software on any platform that has a JAVA virtual machine installed. The main repository of information for the operation of the ISPPA in FP software is the PostgreSQL object-relational database management system. This DBMS provides high stability, fault tolerance, functionality, and speed, has a wide range of tools for storing, processing, and retrieving information, and also supports full compliance with the SQL standard. Identification of funding sources and other support, and thanks to individuals and groups that assisted in the research and the preparation of the work should be included in an acknowledgment section, which is placed just before the reference section in your document.</p><p>When tracking cash flows, the system used an innovative approach to analyse cash flows using mathematical models. This is a scoring of client risks -the identification of atypical (doubtful) cash flows using 20 multi-level mathematical scenario cases with their further ranking according to the degree of riskiness. In an in-depth study of the client, in order to increase the accuracy of identifying a dubious transaction, we also use an assessment of reputational risks, as well as simplified operational indicators. To date, we have automated the identification of more than 70 risks and indicators in order to obtain additional data for the final decision on the client.</p><p>When assessing reputational risks, information registers are used, and only those that are in the public domain. A deep professional understanding of the processes taking place in the banking sector allows us to develop and improve for our clients exactly those databases that are directly needed for high-quality financial monitoring. The gradual filling of our information platform with new databases is not our desire, this is a market requirement, because the market is developing, mutating, and unscrupulous clients are constantly looking for new and new ways to conduct dubious transactions. We, on the other hand, are on guard and monitor risky areas that appear on the market, which financial institutions need to control more deeply and carefully.</p><p>Currently, there are two ways for ISPPA in FP to interact with automated accounting systems: integration and conditional integration. In the case of interaction between ISPPA in FP and an automated accounting system using the integration method, the ISPPA in FP system is directly connected via a local network to data arrays (DBMS) formed in an automated accounting system, and in the reading, mode receives data online for further processing. As a result of data processing, templates of dubious transactions and schemes are formed that can be used by clients when carrying out transactions in a financial institution. A library of such templates is formed into a protective shield designed to prevent dubious operations or the use of dubious schemes for such operations.</p><p>The results obtained during data processing, intermediate and final forms of ISPPA in FP work reports can be used to make appropriate management decisions. In the case of interaction between ISPPA in FP and an automated accounting system using conditional integration, the ISPPA in FP system receives data in file mode -offline. As a result of data processing, templates of dubious transactions and schemes are formed that can be used by clients when carrying out transactions in a financial institution. A library of such templates is formed into a protective shield in the form of template files, which are loaded into the system to ensure the timely termination of dubious operations or the use of dubious schemes for such operations. The results obtained during data processing, intermediate and final forms of ISPPA in FP work reports can be used to make appropriate management decisions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Simple designed software overview</head><p>The financial analytical tool in the form of the ISPPA in FP software package of the Analyst-1 company, with the help of the developed "scoring ranking", allows the use of "case" indicators in order to identify risky cash flows. The presented model includes customer segmentation by type, turnover, etc., superimposed on library templates of designed scenarios for suspicious transactions of a customer or a group of customers. The complex makes it possible to carry out analysis on individual indicative indicators, such as "Financial assistance", "Assignment of debt", "Transit operations", "Return of funds", "Currency operations", etc., as well as to form mixed "cases" using the score scales. It allows you to set risk-based points of contact for scenario models to determine the degree of responsibility using the developed mechanism for establishing the categoricalness of decisions in accordance with the vertical of subordination in the structure of the financial monitoring unit.</p><p>These features help:  minimizing the decision-making time for individual scenario "cases";  conducting operational analysis of selected and ranked clients depending on the number of scenario mix "cases";</p><p> conducting an early response based on the results of the consolidation of scenario criteria. The developed analytical system is based on a dynamically configured analytical platform. The use of already configured mathematical and analytical algorithms and their testing on real banking bases allow us to model the logic of clients' cash flows and understand the principles of their activities. To process large data arrays, Analytic-1 uses the latest integrated technological approaches, such as big data. The company's extensive experience in data processing has been focused on optimizing analysis methods. Thus, the use of a hybrid method of analysis, which is a combination of clear (digital) and fuzzy (textual phrases) matches, made it possible to create unified libraries of "assignments" for greater coverage of the payment "audience" and a clearer understanding of the essence of cash flows of both the client and his counterparty (s). Based on the above, the company's specialists are actively using a consolidated single platform with improved architectural and analytical capabilities, flexible configuration, and modular expansion.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Description of basic script reports and their concise descriptive algorithm</head><p>We will provide a description of the basic scenario reports and their concise descriptive algorithm. Consolidated reporting is defined in a period of one month.</p><p>1. The "Financial Assistance" limitation provides for the possibility of making samples for the assignment of payments (according to the "FINANCIAL ASSISTANCE" directories) within the defined turnover and with established interest limits:</p><p> customer operations are selected according to a set of control words in the "Financial assistance" group of the assignment directory that is included in the payment assignment. Transactions that the client performs on his own within the bank (payer of MFI, the payer of EDRPOU) &lt;&gt; (recipient of MFI, recipient of EDRPOU) are removed from the set. We select clients in which the amount of credit turnover for the month is more than indicated in the report parameters, the amount of financial assistance is greater than indicated, or the percentage of the amount of financial assistance to the amount of credit turnover is more than indicated.</p><p>2. The "Securities" limitation provides for the possibility of making samples for the assignment of payments (according to the "SECURITIES" directories) within the defined turnover and with the established interest limits:</p><p> customer operations are selected according to a set of control words in the "Payment for goods, without VAT" group of the assignment directory, which is included in the payment assignment. Transactions that the client carries out on his own within the bank (MFI payer, EDRPOU payer) &lt;&gt; (MFI recipient, EDRPOU recipient) are removed from the set. Customers are selected in which the amount of credit turnover for the month is more than specified in the report parameters, the amount for "without VAT" is greater than the specified amount, or the percentage of the amount for "without VAT" to the amount of credit turnover is more than specified.</p><p>3. The restriction "Payment for goods "without VAT" implements the possibility of making samples for the assignment of payments (according to the directories) "FOR GOODS WITHOUT VAT" within the defined turnover and with established interest limits:</p><p> customer operations are selected according to a set of control words in the "Payment for goods, without VAT" group of the assignment directory, which is included in the payment assignment. Transactions that the client performs on his own within the bank (payer of MFI, the payer of EDRPOU) &lt;&gt; (recipient of MFI, recipient of EDRPOU) are removed from the set. We select clients in which the amount of credit turnover for a month is greater than specified in the report parameters, the amount "without VAT" is greater than the specified amount, or the percentage of the amount "without VAT" to the amount of credit turnover is greater than the specified amount.</p><p>4. Crediting to the accounts of individuals from legal entities (J---&gt;P) allows you to identify the total amounts of turnover per month on the account(s) of an individual that exceeds the established limited threshold:</p><p> the selection of clients of legal entities that carry out operations on individuals for a total amount per month greater than/equal to the specified amount is carried out. Turnovers are taken from accounts 2600, 2650, and 2605 to accounts 2620, and 2650, excluding transactions in which the Bank is the payer.</p><p>5. Reimbursement of insurance payments involves the return of insurance payments to the client's account exceeding the total established limit of more than:</p><p> customer operations are selected according to a set of control words in the "Refund of insurance payments" group of the assignment directory, which is included in the payment assignment. We select clients in which the number of returns per month is greater than specified in the report parameters.</p><p>6. Balance at the end of the day. (In the period of one month, the client's balance at the end of the day is less than given % of the credit turnover for the day):</p><p> credit turnover and balances at the end of the day are selected to generate data on Class 2 accounts. The report includes clients whose credit turnover is greater than/equal to that specified in the report parameters, and the ratio of the average daily balance at the end of the day to the average daily turnover is less than/equal to the specified percentage in the report.</p><p>7. The restriction "Assignment of claim rights" allows you to implement the possibility of carrying out samples for the assignment of payments (according to the directories) "ASSIGNMENT OF CLAIM RIGHTS" within the defined turnovers and with established percentage limits with the exclusion of defined GROUPS of clients from the reports:</p><p> the selection of customer operations is carried out according to a set of control words in the "Assignment of the right of claim" group of the assignment directory, which are included in the payment assignment. Transactions that the client carries out on his own within the bank are removed from the set (MFI payer, EDRPOU payer) &lt;&gt; (MFI recipient, EDRPOU recipient). claim" is greater than the specified amount or a percentage of the amount "Assignment of the right of claim" to the credit amount.</p><p>8. The restriction "Refunds" allows the possibility to carry out samples on the assignment of payments (according to the directories) "REFUNDS (ERRORLY CALCULATED COSTS)" within the defined turnovers and with the established percentage limits with the exclusion of defined GROUPS of clients from the reports:  customer operations are selected according to a set of control words in the "Refund" group of the assignment directory, which are included in the payment assignment. Transactions that the client performs on his own within the bank (payer of MFI, the payer of EDRPOU) &lt;&gt; (recipient of MFI, recipient of EDRPOU) are removed from the set. We select clients in which the amount of credit turnover for a month is greater than specified in the report parameters, the amount of "Refund" is greater than the specified amount, or the percentage of the amount of "Refund" to the amount of credit turnover. 9. Transfers from legal entities to individuals. (For a period of one month, the generally limited threshold of transfers by legal entities (Dt. Turnover) of funds to the accounts of individuals (Ct. Turnover) exceeds 55% of all debits from the accounts of legal entities.):</p><p> the selection of clients, and legal entities that carry out operations for individuals or FOPs is carried out. Turnovers on accounts from 2600, 2650 to 2620, 2625, and from 2600, 2650 to 2600 are selected (FOP EDRPOU&gt;9 characters). Customers have selected in which the amount of the total debit turnover is greater than/equal to the specified amount in the report parameters, the percentage of the ratio of the number of transfers (physical persons + FOP) to the amount of the total debit turnover.</p><p>10. Foreign exchange payments (import). (Selection of all clients who transfer funds abroad under contracts with a threshold amount in hryvnia equivalent):</p><p> clients who carry out operations from accounts 2600, 2932, and 2952 to account 1500 with a currency code other than 980 are selected. At the same time, the total amount of operations must be greater than/equal to that specified in the report parameters.</p><p>11. Transit transactions (turnovers with a difference in amounts of +-5% within 60 min).</p><p> the selection of customers is formed by operations, the amount of which is greater than/equal to the amount indicated in the report parameters, which are received on the accounts of 2600, 2650 clients (operations in which the payer's EDPOOU = the Bank's EDROPOU are excluded). At the same time, these clients sent the payment to another client within an hour after receipt with the amount +the percentage indicated in the report parameters, from the amount of the receipt payment.</p><p>12. Verification of relation to Public Persons. (Selection of all clients who are public entities and who conducted transactions with their counterparties):</p><p> selected according to the client's questionnaire from OBD Bank. 13. Verification of the client's compliance with the segment. (Selection of all customers that exceed the declared segment turnover):</p><p> the report works if there is customer segmentation in relation to the amount of its turnover. For the calculation, the sum of all credit turnover on accounts with the mask "26%" is taken, minus the amount that passes through operations from "2600" to "2900" with currency code=980. The amount of the determined turnover is compared with the amounts from the Bank's segmentation guide to determine the current segment.</p><p>14. Turnovers with counterparties who had NVR or are included in the Bank's emergency situation (Selection of clients who have turnover with clients from NVR):</p><p> from the customer questionnaire, we determine the list of customers who have NVR in the calculation period. The report includes all clients who had transactions with clients from the list.</p><p>15. Transactions with counterparties from external emergencies. (Selection of clients who have turnover with clients from emergency situations.):</p><p> the bank fills in the so-called blacklist of clients. The report includes all clients who had transactions with clients from the list. <ref type="bibr" target="#b15">16</ref>. Receiving budget payments. (Receipts to client accounts from budgetary organizations):  legal entities that had income from treasury accounts are selected, and the selection of treasury accounts is carried out according to the MFI directory. Clients whose transaction amount is greater than/equal to the specified transaction amount in the report parameters or the total amount for the period is greater than/equal to the specified total amount in the report parameters are included in the selection. 17. Grinding. "Grinding" includes a client who performs transactions, or for whom another counterparty performs transactions with a total number of &gt;=3, for a total amount of &gt;=450000.00 during one day. At the same time, the purpose of operations must match by &gt;= 70 percent.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Developed software modules overview 3.3.1. Database of public figures, their ranking, and processing</head><p>Full automation of archival activities, the creation of electronic archives is no longer a dream, but a reality of our days. All archival information, including all program libraries, should be integrated into a single program, on the basis of which it will be possible to provide information to users on many indicators. In the ISPPA in FP software package, achieving the goal of automating the processes of verification of public persons is ensured by implementing a number of interrelated activities aimed at an integrated approach to searching, ranking, collecting, and processing information. When forming the database of public, close, and related persons, the company put forward a number of requirements:</p><p> the database schema should be as simple as possible to understand without much effort;  the database schema should be relatively complicated in order to build scenario "cases";  the database scheme should be filled with data of various profiles, both external and internal, which will be connected using algorithmic chains;</p><p> the scheme of the base should be adjusted depending on sectoral changes, both of a national and regional nature.</p><p>The ISPPA in FP software package implements a model for the accumulation of multidimensional information, it's processing and updating. The use of a stepwise automated mode to identify and identify the affiliation of bank customers with national, and foreign public figures and figures performing political functions in international organizations, persons close to them, or persons related to them on the basis of a valid and constantly (daily) updated database allows with maximum accuracy conduct a sample of clients of this category. In general, the functional solution of the ISPPA in FP software package allows using the developed "cases" to conduct cash flow studies on a new scenario level using a full set of algorithms integrated into the complex.</p><p>The functionality of the "Public Persons" module of the ISPPA in FP software package consists of four sections:</p><p> list of public persons;  personal data;  identification of public figures;  service.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.2.">List of public persons.</head><p>This section includes the following blocks:  General information. The block contains a list of all public and related persons;  Associated individuals. The block provides access to the list of relatives and related individuals of a particular public person;</p><p> Associated entities. The block provides access to the list of related legal entities of a specific public entity;</p><p> Search. In addition to searching by the specified parameters, you can use the filter by "Sectors of activity" and "Regions". It is also possible to view only new or changed entries. Activating the "Photo" option allows you to view photos of a public person directly when you select it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.3.">Personal data</head><p>The section allows you to view information about the institution's clients, and search for them by name or EDRPOU code, TIN. In addition, you can view a list of customers who are identified as public persons in this institution, as well as view a list of persons who are identified as non-public and are not included in automatic searches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.4.">Identification of public figures</head><p>The section allows you to search in the bank's customer base and identify "public persons" who did not indicate in the questionnaire information about belonging to "public persons", by priority (high, medium, low). This section also displays information about the identified person from the database of public persons, with the ability to view supporting information with a link to the source of information.</p><p>The result of the samples is the formation of reporting:  report on selected public persons -a summary report on selected entries;  report on identified persons -a complete report on all records, indicating the place of work;  list of public persons with related organizationslist of persons with related organizations existing in the institution;</p><p> another.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.5.">Service</head><p>The tasks of this section include:  work with users of the module "Public persons";  performance of other functions. Constant modernization of the ISPPA in FP complex with the involvement of leading experts in financial monitoring, operational improvements in accordance with customer requirements, and training taking into account the latest program changes are the priority of the developers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.6.">Customers</head><p>For large and medium-sized banks, Analyst 1 specialists have developed software packages ISPPA in FP (Integrated Software Package to Preventing Abuses in Financial Practices), and for small banks, </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>The ISPPA in FP software product, which uses seventeen basic scenario reports as criteria algorithms, allows the creation of a flexible information model that makes it possible to quickly integrate with a variety of banking products (the bank's operating day), as well as the creation of a technological map of diverse testing of the integration with using functional analysis, analysis of limit values broken down into equivalence classes and taking into account multi-level mathematically integrated components to test the structural and functional criteria of software. Conducting multi-vector statistical and dynamic testing of the software package confirms the correctness of the mathematical model of the software product and ensures successful certification and verification. The cross-platform nature of the ISPPA in FP software package allows you to easily and quickly integrate with the environment of a financial institution. The implementation of the ISPPA in FP software package makes it possible to use: typical information search scenarios with the possibility of using "alerts"; new unified algorithms that are already successfully operating in banking institutions and developed by practicing financial analysts; the latest developments in the field of processing large data arrays and systematization of technological processes that allow you to quickly and efficiently operate information. Also, in the article a statistical approach to selecting the number of payments to check is presented. With use of described approach count of payments to check for each layer was presented.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 Table title</head><label>1title</label><figDesc></figDesc><table><row><cell>Layer (thousand</cell><cell>Payments count</cell><cell>Estimation of the</cell><cell>Datasets</cell><cell></cell></row><row><cell>hryvnas)</cell><cell></cell><cell>amount in the</cell><cell>A</cell><cell>B</cell></row><row><cell></cell><cell></cell><cell>interval</cell><cell></cell><cell></cell></row><row><cell>&gt; 10(5)</cell><cell>2500</cell><cell>12,5</cell><cell>67,28766</cell><cell>0,789761</cell></row><row><cell>10-100(55)</cell><cell>1500</cell><cell>82,5</cell><cell>40,37259</cell><cell>5,212424</cell></row><row><cell>100-1000(550)</cell><cell>700</cell><cell>385</cell><cell>18,84054</cell><cell>24,32465</cell></row><row><cell>1000-10000(5500)</cell><cell>300</cell><cell>1650</cell><cell>8,074519</cell><cell>104,2485</cell></row><row><cell>Total</cell><cell>5000</cell><cell>2130</cell><cell>134,5753</cell><cell>134,5753</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>a complex for studying individual risky assets DORA (Research of Risk Assets). Both applications are capable of handling large data sets. They can be used autonomously and at the same time are easily integrated into various information banking systems. For non-banking financial institutions, there is the ISPPA for NBFI (Integrated Software Package to Preventing Abuses for Non-Bank Financial Institutions) application. Also, the specified scenario report and the proposed algorithms for its implementation made it possible to create software for tracking reputational risks -Check Lists FinAP.</p><p>The integrated software package has proven itself, has been tested, and is successfully used in a number of leading banks. Among the users of the developed software products are Ukreximbank, Alfa-Bank, TASCOMBANK, PUMB, Raiffeisen Bank, OTP Bank, Kredobank, Piraeus Bank, and others. The information system is trusted by more than 25 insurance companies, including "Universalna", "Oranta", "Etalon", "Providna", "Persha", UPSK. TAS Group and Eximleasing are also our clients. Financial companies' "SS LOUN", "CASH TO GO", "FREEDOM FINANCE Ukraine", Money4You cooperate with us. And there are many other clients that are equally important to us.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">A statistical approach to selecting the number of payments to check</head><p>Let the observation units (payments) be characterized by a wide range of value parameters -from several thousand hryvnias to values exceeding 1 million hryvnias. It was decided to check payments for a certain period of time, the total number of which is 5,000. Since the range of value indicators is large, the observation units will be divided into 4 value intervals according to the selective method of stratification (the first column of Table <ref type="table">1</ref>). Based on considerations about determining the minimum required sample size of the researched observation units, which representatively characterize the entire general population, with the corresponding indicators of confidence probability and confidence error of observations, it is determined according to the formula:</p><p>where tthe critical value of the Student's criterion at the appropriate level of significance (as a rule, in statistical studies, 0.05 is used as the critical level of significance, then at this level of significance 𝑡 is 1.96), ∆maximum permissible error (usually 5% in statistical studies), Ngeneral volume, Pthe proportion of cases in which the trait under study occurs, Qthe proportion of cases in which the feature under study does not occur (100-𝑃). Thus, the minimum number of selected payments for verification is 𝑛 = 1,96 </p><p>Thus, it is necessary to select 135 observation units with value parameters below the threshold of significance, from the total number of them, equal to 5000. There are two options for this:</p><p>1. Randomly select this quantity without taking into account the cost characteristics in each layer (proportional placement);</p><p>2. Taking them into account.</p><p>The second method of selection, where disproportionate placement takes place, more reliably reflects the properties of the general population.</p><p>In column A of the "Sample volume" column of the table. sample sizes proportional to the number of payments in each interval (2.7% of the number of payments in a stratum) are shown.</p><p>When dividing the sample volume by intervals taking into account cost characteristics to estimate cost indicators by intervals, multiply the central values of each cost interval (shown in parentheses) by the number of payments it includes.</p><p>The estimate of the total amount of value indicators is 2.13 million hryvnias. So, for every million hryvnias. this amount accounts for 135/2130 = 0.063 sample units. In this case, the sample size for the first interval will be 12.5 0.063 = 0.78 for the second interval -55 0.063 = 5.2, etc. The corresponding data are given in column B of calculation table 1. As we can see, even a very approximate accounting of the cost factor (column B) significantly changed the distribution of sample sizes by strata in favor of observation units with higher cost characteristics.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The Law of Ukraine</title>
		<ptr target="https://zakon.rada.gov.ua/laws/show/361-20#Text" />
	</analytic>
	<monogr>
		<title level="m">On Prevention and Counteraction of Legalization (Laundering) of Criminal Proceeds, Financing of Terrorism and Financing of the Proliferation of Weapons of Mass Destruction</title>
				<imprint/>
	</monogr>
	<note>asset of the Cabinet of Ministers of Ukraine and the Ministry of Finance of Ukraine</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">of the proliferation of weapons of mass destruction in Ukraine for the period until 2023 and the plan of measures for their implementation</title>
		<ptr target="https://zakon.rada.gov.ua/laws/show/435-2021-%D1%80#Text" />
	</analytic>
	<monogr>
		<title level="m">system of prevention and countermeasures against the legalization (laundering)</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page">435</biblScope>
		</imprint>
	</monogr>
	<note>The main directions of the development of the. of proceeds obtained through crime, the financing of terrorism and the financing. Decree of the Cabinet of Ministers dated 12</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://fiu.gov.ua/pages/dijalnist/koordinacija/koordinaciini-plani/plan-dii-sczodo-udoskonalennja-nacionalno-sistemi-finansovogo-monitoringu-za-rezultatami-5go-raundu-ocinki-ukrani-komitetom-MONEYVAL.html" />
		<title level="m">Action plan for improving the national system of financial monitoring based on the results of the 5th round of assessment of Ukraine by the MONEYVAL Committee of the Council of Europe</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Strategic development programs of the State Financial Monitoring for the period until</title>
		<ptr target="https://fiu.gov.ua/assets/userfiles/0350/strategy/16.pdf" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="https://finap.com.ua/derzhfinmonitoryng-informuvannya-pro-rezultaty-roboty-za-2022-rik/" />
		<title level="m">Priorities of State Financial Monitoring for the period of martial law agreed by the Ministry of Finance of Ukraine</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="www.fatf-gafi.org/" />
		<title level="m">FATF Annual Report 2020-2021</title>
				<meeting><address><addrLine>Marcus Pleyer of Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020-07-30">July 2020 to 30 June 2021</date>
			<biblScope unit="page">78</biblScope>
		</imprint>
	</monogr>
	<note>, Under the Presidency of Dr</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="https://www.fatf-gafi.org/publications/fatfrecommendations/?hf=10&amp;b=0&amp;s=desc" />
		<title level="m">Financial Action Task Force (FATF): website</title>
				<imprint/>
	</monogr>
	<note>FATF Recommendations</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">European union regulations on algorithmic decision-making and a right to explanation</title>
		<author>
			<persName><forename type="first">B</forename><surname>Goodman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Flaxman</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.1606.08813</idno>
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Kamarinou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Millard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Singh</surname></persName>
		</author>
		<ptr target="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2865811#" />
		<title level="m">Machine learning with personal data: Profiling, decisions and the EU General Data Protection Regulation</title>
				<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Machine learning with personal data: is data protection law smart enough to meet the challenge?</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kuner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J B</forename><surname>Svantesson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">H</forename><surname>Cate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lynskey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Millard</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipx003</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="2" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="https://fiu.gov.ua/en/" />
		<title level="m">The State Financial Monitoring Service of Ukraine</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Real-Time Exception Management Decision Model (RTEMDM): Applications in Intelligent Agent-Assisted Decision Support in Logistics and Anti-Money Laundering Domains</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Xu</surname></persName>
		</author>
		<idno type="DOI">10.1109/HICSS.2010.314</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 43rd Hawaii International Conference on System Sciences</title>
				<meeting>the 43rd Hawaii International Conference on System Sciences<address><addrLine>Honolulu, HI, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Kolhatkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Fatnani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Matsumoto</surname></persName>
		</author>
		<ptr target="https://patents.google.com/patent/US20130018796" />
		<title level="m">Multi-channel data driven, real-time antimoney laundering system for electronic payment cards</title>
				<meeting><address><addrLine>U.S. Patent</addrLine></address></meeting>
		<imprint>
			<date>US20130018796A1</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Scalable graph learning for anti-money laundering: a first look</title>
		<author>
			<persName><forename type="first">M</forename><surname>Weber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Suzumura</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pareja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kanezashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kaler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Leiserson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Schardl</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.1812.00076</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.48550/arXiv.1812.00076" />
	</analytic>
	<monogr>
		<title level="m">NeurIPS 2018 Workshop on Challenges and Opportunities for AI in Financial Services: the Impact of Fairness, Explainability, Accuracy, and Privacy</title>
				<meeting><address><addrLine>Montreal, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A framework for data mining-based anti-money laundering research</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ye</surname></persName>
		</author>
		<idno type="DOI">10.1108/13685200710746875</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Money Laundering Control</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="170" to="179" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Intelligent Anti-money Laundering System</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE International Conference on Service Operations and Logistics and Informatics</title>
				<meeting>the IEEE International Conference on Service Operations and Logistics and Informatics<address><addrLine>Shanghai, Peoples Republic of China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006-06-23">21-23 June 2006</date>
			<biblScope unit="page" from="851" to="856" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Xu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.eswa.2007.11.059</idno>
	</analytic>
	<monogr>
		<title level="j">Expert Systems with Applications</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="1493" to="1504" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Ensuring information security in the field of banking as an element of the development of the digital economy in Ukraine</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">G</forename><surname>Ivanova</surname></persName>
		</author>
		<ptr target="http://nbuv.gov.ua/UJRN/molv_2018_7(1)62" />
	</analytic>
	<monogr>
		<title level="j">Young scientist</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="270" to="274" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">I</forename><surname>Zubok</surname></persName>
		</author>
		<title level="m">Security of banking activity</title>
				<meeting><address><addrLine>KNUE; Kyiv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page">190</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<ptr target="http://www.pinbank.ua/wpcontent/uploads/2017/02/Polityka_IB_2016_2.0_2_KT-1.pdf" />
		<title level="m">Information security policy of First Investment Bank PJSC</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<ptr target="https://bank.gov.ua/document/download?docId=56426049" />
		<title level="m">of measures to ensure information security in the banking system of Ukraine</title>
				<imprint/>
	</monogr>
	<note>On the approval of the Regulation on the organization</note>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<ptr target="http://www.sdfm.gov.ua/content/file/Site_docs/2018/20180103/2017%20Nalichka" />
		<title level="m">Risks of using cash</title>
				<imprint/>
		<respStmt>
			<orgName>State Financial Monitoring Service of Ukraine</orgName>
		</respStmt>
	</monogr>
	<note>Typological study</note>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<ptr target="http://www.sdfm.gov.ua/content/file/Site_docs/2018/20180103/typ_terror.pdf" />
		<title level="m">Risks of terrorism and separatism</title>
				<imprint/>
		<respStmt>
			<orgName>State Financial Monitoring Service of Ukraine</orgName>
		</respStmt>
	</monogr>
	<note>Typological study</note>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Information System for Monitoring Banking Transactions Related to Money Laundering</title>
		<author>
			<persName><forename type="first">S</forename><surname>Leonov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yarovenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Boiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Dotsenko</surname></persName>
		</author>
		<ptr target="https://lib.iitta.gov.ua/716845/1/papers.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Selected Papers of the8th International Conference on Monitoring, Modeling &amp; Management of Emergent Economy (M3E2 2019)</title>
				<meeting>the Selected Papers of the8th International Conference on Monitoring, Modeling &amp; Management of Emergent Economy (M3E2 2019)<address><addrLine>Odessa</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">May 22-24, 2019</date>
			<biblScope unit="page" from="297" to="307" />
		</imprint>
	</monogr>
	<note>Machine Learning for Prediction of Emergent Economy Dynamics</note>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Principles and Algorithms for Creating Automated Intelligent Control Systems of Electronic Banking</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Petrivskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Derkach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kravchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Petrivskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th International Scientific Conference &quot;Information Technology and Implementation</title>
				<imprint>
			<date type="published" when="2022">2022. 2022</date>
			<biblScope unit="volume">3384</biblScope>
			<biblScope unit="page" from="219" to="226" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings, IT and I-WS</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
