<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>L. Sikora);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Decision-making logic in operational emergency situations for hierarchical systems management ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Liubomyr Sikora</string-name>
          <email>lssikora@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Lysa</string-name>
          <email>lysa.nataly@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olga Fedevych</string-name>
          <email>olha.y.fedevych@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Lysyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>IntelITSIS'2024: 5th International Workshop on Intelligent Information Technologies and Systems of Information Security</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>28a Bandery Str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Ukrainian Academy of Printing</institution>
          ,
          <addr-line>19 Pid Goloskom Str., Lviv, 79000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1980</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The article considers the mathematical and systematic apparatus for describing structures with subsystems and systems with decomposition with the corresponding functional links in the form of operators. In the analysis of literature sources, it is substantiated that the problem of managing complex systems is not fully solved under the influence of structural, informational, psychological threats, and the problem of structuring the system as a basis for the formation of targeted decisions by operational personnel under active threats is relevant in the future. The mathematical and systematic apparatus for describing structures with a set of relevant interconnected components is presented. The functional blocks of the system with the corresponding functions and characteristics such as functional transformations, cascade connection in the technological structure, models of adaptive and multiplicative interaction, systems with feedback and hybrid connections and mathematical operations are presented. A method for risk assessment in management decision-making in hierarchical systems under extreme conditions, taking into account the cognitive components of operators, has been developed.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;emergency situation</kwd>
        <kwd>system</kwd>
        <kwd>management</kwd>
        <kwd>logic</kwd>
        <kwd>risk assessment 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Systems analysis arose as a result of attempts to apply the methods and tools of systems theory
to solve problems of managing complex hierarchical systems in normal and emergency modes.
With the development of man-made structures, information barriers arose, which formed
complex management tasks [
        <xref ref-type="bibr" rid="ref1">1, 24</xref>
        ]:
increased bandwidth of data transmission channels and rapid growth of their
heterogeneity and blurring;
the complexity of the problems to be solved exceeded the ability to process data flows
by humans and the processor of the automated control system (technologic process).
      </p>
      <p>This led to the creation of information systems (as a tool for improving the validity and
efficiency of decision-making management) and information technologies for synthesizing
strategies for achieving goals, tactics, and system planning of actions at the facility.</p>
      <p>
        In the process of solving complex problems, there are the following levels of hierarchies [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
• the hierarchy of the lower level of the object's structure in terms of modules and units;
• hierarchy of the n-th order control structure depending on the target orientation and
the level of information processing (sensors, processing units, image formers of dynamic
situations);
• hierarchy of the decision tree and division of the target space into clusters.
• hierarchy of priorities in the procedures for ranking alternatives in the target space.
• hierarchy in the construction of sets of goal trees and corresponding classes of strategies
and evaluation of their effectiveness relative to the reference way of goal realization.
At this point, this work will investigate some aspects of mathematical and logical basis for
hierarchical systems management.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. References analysis</title>
      <p>
        Books [
        <xref ref-type="bibr" rid="ref2">2, 21</xref>
        ] substantiate the problem of integrating methods of situational analysis and causal
diagrams of the impact of factors on the management process.
      </p>
      <p>
        Work [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] consider the problems of management quality and methods of risk assessment in
information and control systems.
      </p>
      <p>
        Books [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5, 23</xref>
        ] consider logical and cognitive methods and their use in the process of
training operational management personnel for all levels of the hierarchy of integrated
management of production structures, and substantiate their effectiveness.
      </p>
      <p>Works [17, 18, 22] consider the problem of improving the quality of control processes in
complex systems with a hierarchical structure, intellectualization of situation control,
knowledge features of decision-making, synthesis of robust control strategies, cognitive
features of the ACS operator's thinking process, complex models of energy-active facilities
management in the face of threats and information attacks.</p>
      <p>
        Monograph and work [
        <xref ref-type="bibr" rid="ref6">6, 7, 14</xref>
        ] substantiate information and logic-cognitive technologies
for the implementation of control processes in the face of active threats and terminal
emergencies.
      </p>
      <p>Works [8, 9, 13] consider the problem of cybersecurity based on logical and cognitive
methods, information and intelligent technologies for processing data flows and event scenarios
in infrastructure, taking into account the level of risks using categorical models for representing
the organization of complex man-made industries.</p>
      <p>In [10] substantiate information technologies for developing methods to ensure the cognitive
stability of operational management processes for personnel at all levels of the hierarchy of
complex systems.</p>
      <p>Works [11, 16] considers the categorical models of representation of the complex systems
structure and their effectiveness in forming strategies in infrastructure in case of internal and
external conflicts.</p>
      <p>In [12], information technologies for identifying the structure of systems, cognitive methods
for assessing situations when factors affect the management process and increasing
sustainability are developed.</p>
      <p>Works [15, 19, 20] substantiate the influence of the cognitive characteristics of operational
personnel in the implementation of management in extreme situations, assessing the level of
threats at the terminal intervals of formation and decision-making for targeted management,
and risk assessment in case of errors in strategic decisions.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Main research description and results</title>
      <p>
        Important in the procedure for finding a way to solve problems is the acquisition of data and a
model for identifying knowledge in an active diagnostic and expert mode, identifying their
logical and cognitive structure [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        The next step is to isolate the control object from the environment of the technogenic
system, and define its boundaries, functional and information structure [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], build a formalized
model, assess its adequacy, identify limit and emergency modes and, accordingly, observability
and controllability.
      </p>
      <p>
        The responsible procedure is the object aggregation scheme and the construction of a
mathematical model of the hierarchy of the resource and information components of the system
in the form of a scheme for structuring relations (linkage matrix, graphs, Petri nets) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the
Saaty model, and the n-level model for assessing local and global priorities.
      </p>
      <p>
        At the same time, there are hierarchies of the forward and reverse process [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
      </p>
      <p>
        The next stage is the hierarchy of procedures for streamlining the stages of action planning
and structuring the management system in accordance with the global goal [
        <xref ref-type="bibr" rid="ref2">2,8</xref>
        ].
      </p>
      <p>
        The following stages are carried out in accordance with the global goal [
        <xref ref-type="bibr" rid="ref2">2,9</xref>
        ]:
•
•
•
•
•
•
•
•
•
systematic analysis of the problem and its formalization, identification of critical zones
in the space of goals and states of the object;
decomposition of the problem and construction of scenarios of possible events;
selection of means to achieve the goal, both local and global, and appropriate scaling of
the goal space for its structuring;
methods and models for assessing the situation in the system as the main means of
identifying the information structure of processes in the system and the logic of
decision-making;
identification of logical contradictions in the processes of decision-making and
assessment of dynamic situations;
taking into account causal relationships in the scenario of events and building categories
as a way to display information structures;
building strategies for coordinating team actions and assessing the level of their
interaction under risk;
analysis of the degree of coordination of their actions in the context of the
implementation of the action plan and ways to resolve conflicts at all levels of the
integrated hierarchical automated control system (IHACS);
development of coordination strategies based on the information and regulatory
framework and construction of appropriate algorithms, with justification of their logical
structure.
      </p>
      <p>In accordance with the current situation, let’s describe hierarchical structures as an
organization for the implementation of targeted tasks, taking into account active attacks and
threats and the cognitive component of the operator.</p>
      <sec id="sec-3-1">
        <title>3.1. Mathematical and systematic apparatus for describing structures</title>
        <p>Definition. A subsystem S′ of a system S will be any subset of S′ ⊂ X × Y, and an element of
systems will be a set of appropriately connected components by which the systemS S =
(S1 … Sn) can be restored.</p>
        <p>Definition. Definition. A decomposition of a system S is a set of (S1, S2, … Sn), for which S =
(S1 + S2+. . . +Sn) and X = (X1 × X2 ×. . .× Xn), Y = (Y1 × Y2 ×. . .× Yn), are components of
the system.</p>
        <p>Functional relationships in the system are described in the form of operators.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.1.1. The system components connections design operator</title>
        <p>For two given systems S1 ⊂ X1 × Y1 and S2 ⊂ X2 × Y2, a design operator is introduced defining
the structure similarity class, whose representation is as follows:
Π 1: ( 1 ×  2) × ( 1 ×  2) → ( 1 ×  1),
Π 2: ( 1 ×  2) × ( 1 ×  2) → ( 2 ×  2)
(1)</p>
        <p>Accordingly then it is possible to carry out an independent decomposition  into two
subsystems of unrelated type:
 ⊂ ( 1 ×  2) × ( 1 ×  2),
 1 = Π 1( )   2 = Π 2( ),
Π 1: ( 1,  2,  1,  2) = ( 1 ×  1),
Π 2: ( 1,  2,  1,  2) → ( 2 ×  2).
(2)
with state spaces, control objects (   ), control systems (   ), information structures (   ),
and mode parameters (  ).</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.1.2. The operator of systems cascade decomposition and their functional organizations</title>
        <p>The decomposition procedure is the basis for the allocation of functional blocks with
appropriate characteristics and functions.</p>
        <p>П1 – functional transformations  ∶  →  that define resource, technological, and
measurement transformations, executive team actions, and one-step operations.
П2 – cascade connection in the technological unit structure, information and measurement
→ Y1 →</p>
        <p>S1 : X1 → S2 : (У1* ⊕ У*2 ) }SitПi
operations</p>
        <p>П3 – model of additive and multiplicative interaction in the course of technological and
information operations:</p>
        <p>Transformation of material and energy resources (units, power units) into a product
(</p>
        <p>→   (  ) →    );
Transformation of data flows into an information resource based on data processing
operations {  } →   ({  /  }) →  (  );
Transformation of information resource and data flows into a cognitive knowledge
on goal-oriented strategies Sens [Sitou (  ,   )]
StratU
⟶</p>
        <p>(  ) →   (  /  )
Х1</p>
        <p>X2</p>
        <p>Z1
(S1 / S2)
X</p>
        <p>Y1
Y2
(4)
(5)
(6)</p>
        <p>
          According to the components of the structure, dynamics models are formed.
( ,  ′) ∈  
( ,  ′) ∈  
⇔  ( ) =  ( ′)
⇔ ( ) = ( ′)
control operations:
control actions:
with canonical representations of transformations in the form of a chain of information and
 →  → 
→  →  

accordingly, the transformation coordinates of state parameters will be set according to the
  :  →  /
  :  →  /
([ ],  ) ∈   −1 ⇔ [ ] =   ( ) - determine the transformation of the parameters of the state
spaces of the system S when management actions affect the object and then   :   (  ) →
    +   ,   ∈  (  +   ) - output state.
3.1.3. Autonomy of functional systems that are part of a hierarchical organization
In the informational sense, decision-making in the autonomous functioning of the system is
achieved by introducing feedback, which provides a logical structure for the decision-making
process. The decision-making logic is based on [
          <xref ref-type="bibr" rid="ref1 ref2">1, 2, 7</xref>
          ]:
1. detecting the difference between the real and target trajectories in the state space of the
power-active object and control system;
alternative areas (NORMA, ALARM, AVAR);
2. assessment of the degree of difference object state trajectories;
3. classification of trajectory differences based on the division of the goal space into
4. assessment of the situation according to the classification and synthesis of control
actions, according to the strategies for achieving the goal, which ensures access to the
target area of management systems in the face of threats.
        </p>
        <p>Let’s consider some aspects of the systems' functionality.</p>
      </sec>
      <sec id="sec-3-4">
        <title>3.1.4. The concept of complex systems functionality (categorical models of structures) by Mesarovych</title>
        <p>functionality;
 ) ( ′,  ,  ) ∈</p>
        <sec id="sec-3-4-1">
          <title>The system</title>
          <p>Consider a system  ⊂ ( ×  3) × ( 1 ×  4) whose feedback loop link includes the element
  ⊂   ×   . Accordingly, the condition
fulfilled for the system, and the system is defined in (
 ,   ,  ,  
∈</p>
          <p>⇒  =   ,   ∈   ⊂ 
×   ) ×  space.</p>
          <p>
            The structure of the feedback control system is represented as follows (Fig. 4).
Let’s define additional properties of feedback systems according to [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]:
1.
          </p>
          <p>A functional system     :</p>
          <p>→  is mutually unambiguous if a number of conditions
are met in terms of structure, goals, strategies:
2. a) the condition of the target functionality (   ): ∃  : ( ) →  
⇒       
3. b) the functionality of the systems is determined according to the goals (( ,  ,  ) ∈
is
⇒ ( =  ′) - unambiguity.
4.</p>
          <p>⊂ ( 1,  …  ,   ) is functionally controlled if the condition of goals
alignment with the structure and strategies is met:
∀ ∈  (∃ ∈  ) ( ,  ) ∈ 
→ ∃   
,  

 
A multidimensional system will be autonomous as a result of feedback closure only if
the condition of structural and information-management resilience against the impact
of complex threat factors (additive and multiplicative models) is met.</p>
          <p>Accordingly, a description of the dynamic state will be the next:
∀  ⊂ ( 1,× … ×   ) ×   × ( 1,× … ×   )
∃    ⊂ ( 1,× … … ×   ) ×   , if
(7)</p>
          <p>
            The concept of autonomy means that after the introduction of feedback, each component of
the output signal {  } can be changed only after changing the input action {  }, while the output
  ,  ≠  the control action does not affect the change in the state of the system with the target
strategy [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ].
          </p>
          <p>The functional controllability of the system means that an appropriately selected input
control action ( / /Start  ( )), according to the target control strategy, can bring the
system to the target area   , i.e.</p>
          <p>∀   (  )∃(  ): ∃ Start (  /  ); ∃ ≡   ;   :  →   ∈   → [   
Autonomous operation of the energy-active system.</p>
          <p>If S is a multidimensional functional system
].</p>
          <p>: (    ) →  ,  = ( 1 × … ×   ) 
  = (  1 × … ×    ),  = ( 1 ×  2 × … ×   ),
then there is a feedback given in the form of the structure   , then it is autonomous and
represented in the form of a parametric (  ×  ) description</p>
          <p>(∀ ∈  ) ∃( ×   ) ; ( ×   ) ⇒ ( =  ( ,  )),
where   :  →   is the substructure that ensures the autonomy of the system.</p>
          <p>To implement the operation of mixing the input signal with the feedback signal, the element
H is introduced, which is an operation   (+, −,   ) of positive and negative feedback and
implements the input stage of the system with feedback (Fig. 5), which represents the dynamics
of changes in the state trajectory (y is a parameter,  (  ) ∈  ,   ∈   ) of an energy-active object
due to the impact of threats or information disorientation on the control process.</p>
          <p>In accordance with the target task, a structural diagram of an automatic tracking system
with information feedback is formed, which transmits signals of changes in the state of the
object under the influence of the input control signal and interference with the functioning of
the control object (Fig. 5):
(8)
[ ⊗ ( −   )] → (  ) → (  ,   ) → (State)
  = [ (  ) ⊗   ] → (shifting... trajectory)</p>
          <p>To ensure functional stability, the trajectory stabilization condition is met according to the
specified conditions:
(∀ ∈  , ∀ 0 ∈  0, ∃z ∈  x): [ 0 =  ( ,  )], and
[H( ,  ) = H( ′,  )] ⇒ ( =  ′),
[H( ,  ) = H( 1,  1′ )] ⇒ ( =  ′),
∀ , ∃( ,  ̂): ( = ( ◻  0)( ,  ̂)),</p>
          <p>∀ , ∃  0 :  =  0  0 .</p>
        </sec>
      </sec>
      <sec id="sec-3-5">
        <title>3.1.5. Terminal dynamic systems of energy-active class</title>
        <p>Terminal dynamic   - systems are functional and, due to the internal development of control
actions, are determined on the basis of a representation in the form of a logical structure
[14,15,16]:
( ×   )     =    
equation has the form:</p>
        <p>∀ , ∀ ,   , X/  =  /  ⇒ (S0(x)/  = S0(x)/  ), (9)
that is (S0/  ), the system is functional ∀t ∈/  .</p>
        <p>For such systems, the unambiguity of functionality is determined in accordance with the
condition of management sustainability and adequacy of the structure to the goals:
If ∃ ,  ⊂ ( ×   ) ×  ) - the system, then according to goals ∃strat 
  ∃  ,   ⊂
determines that is functional and unbiased, then the trajectory
∀ ∈  , (∃( ,  ,  ) ∈  ) (( ,  ,  ̂) ∈  ) (( ,  )|  = ( ̂,  )|  ) ⇒ ( |  =  |  ) (10)
and the system     ∣   is unambiguously functional.</p>
        <p>For hierarchical systems, the condition of unambiguous functioning of all systems ensures
the functional stability of the structure; if such conditions are violated, the system will
experience limit and emergency modes, structural collapse, loss of controllability, and disasters.
For the functional controllability of the required system, it is enough to make the system
( S = H  S )</p>
        <p>0 autonomous with the help of a communication loop Sf.</p>
        <p>Based on the above analysis of the structure and functionality of hierarchical systems and
the impact of external and internal threats on control modes, there is a draw of conclusion about
the training of operational personnel and their knowledge.</p>
        <p>
          The modern development of the science of intelligence is based [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] on three aspects of
cognitive functioning that were not taken into account in the IQ-concept, respectively:
competence (conscious knowledge base); pragmatism of thinking procedures; mental potential
for problem solving.
        </p>
        <p>The blocks of knowledge necessary for performing professionally oriented activities are
formed in the process of learning and work based on the ordering of the knowledge acquired
in the past and the amount of new knowledge.</p>
        <p>Gradation of stages of knowledge accumulation:
1. quality of school education as a basis for professional orientation;
2. technical education (vocational schools, colleges, workshops);
3. engineering and university education in the area of specialization of each student;
4. professional activity in the chosen field and assessment of compatibility with the
requirements for efficiency and responsibility;
5. professional work of the highest rank, understanding of the independence of training,
internships, doctoral studies for strategic level positions.</p>
        <p>In accordance with the stages of knowledge accumulation, let’s build a table of information
and cognitive suitability of operational personnel (Table 2).</p>
        <p>S g KV (Аі ) ZpKV (Аj ))</p>
        <sec id="sec-3-5-1">
          <title>Operator confidence in their actions ( KV sp )</title>
          <p>Comprehensive operator confidence and intelligence (</p>
        </sec>
        <sec id="sec-3-5-2">
          <title>Operator confidence in their knowledge ( SKV (Аі ) )</title>
        </sec>
        <sec id="sec-3-5-3">
          <title>Professional self-confidence of the operator ( SZ КV (Аі ) )</title>
          <p>Trust of external experts in the identity of the operator (
Rd (Аі ))</p>
        </sec>
        <sec id="sec-3-5-4">
          <title>Professional credibility of a cognitive agent ( KZP (Аі ) )</title>
          <p>Self-confidence in the ability to solve the problem
(
Кcogn(Аі ) Кdu (А ) )
Кd (D(Сі))
Determination to act in the face of risk ( Кd (Drisk )
α r &gt; 0.2
α r &gt; 0.3
where (α risk ) - risk assessment, ( K d ) - cognitive trust coefficient, ( КV ) - coefficients of
knowledge requirements.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>The article considers certain aspects of the use of logical and intellectual procedures that form
the basis of the scheme for synthesizing hierarchical control systems.</p>
      <p>Based on the construction of hierarchical systems with different functional structure, an
approach using the logic of actions and the theory of situational management is proposed,
models of the structure of systems for active control of technological processes under conditions
of dynamic disturbances, both systemic, structural and cognitive-informational types, are
developed.</p>
      <p>The concept of goal orientation and coordination of the logical and cognitive model of
forming control decisions of a system with a hierarchical structure under conditions of threats
and information attacks as a basis for the synthesis of robust decision-making strategies in crisis
emergency situations is substantiated.
[7] J. O'Connor, I. McDermott, The Art of Systems Thinking: Essential Skills for Creativity and</p>
      <p>Problem Solving, Thorsons, London, UK, 2018.
[8] K. Vellani, Strategic Security Management: A Risk Assessment Guide for Decision Makers,
2st ed., CRC Press, Boca Raton, FL, USA, 2019.
[9] V. Khoroshchko, B. Bobalo, V. Dudykevych, Procurement of Integrated Information</p>
      <p>Security Systems, NU LP PH, Lviv, Ukraine, 2020. (In Ukrainian).
[10] M. Groover, Automation, Production Systems, and Computer-Integrated Manufacturing,
5th ed., Pearson, London, UK, 2018.
[11] B. Durniak, L. Sikora, M.Antonyk, R. Tkachuk, Cognitive Models of Formation of Strategies
for Operational Management of Integrated Hierarchical Structures in Conditions of Risks
and Conflicts, Ukrainian Academy of Printing PH, Lviv, Ukraine, 2013. (In Ukrainian).
[12] J. Girdhar, Management information systems, New Delhi Oxford University Press, New</p>
      <p>Delhi, India, 2013.
[13] D. Tattam, A Short Guide to Operational Risk; 1st edn. Routledge, London, UK, 2011. doi:
10.4324/9781315263649
[14] R. Watt, Visual Processing: Computational, Psychophysical, and Cognitive Research:
Computational Psychophysical and Cognitive Research; 1st edn., Psychology Press,
London, UK, 1988; doi: 10.4324/9781315785080
[15] M. Wiggins, Introduction to Human Factors for Organizational Psychologists; CRC Press,
Taylor &amp; Francis Group, Boca Raton, FL, USA, 2022.
doi: 10.1201/9781003229858
[16] P. Yu, Multiple-Criteria Decision Making: Concepts Techniques and Extensions; Plenum</p>
      <p>Press, New-York-London, USA-UK, 1985 doi: 10.1007/978-1-4684-8395-6.
[17] H. Yousef, Power System Load Frequency Control: Classical and Adaptive Fuzzy</p>
      <p>Approaches, CRC Press, Boca Raton, FL, USA, 2017. doi: 10.1201/9781315166292
[18] P. Melin, O. Castillo, Modelling, Simulation and Control of Non-Linear Dynamical Systems:
An Intelligent Approach Using Soft Computing and Fractal Theory, CRC Press, Boca Raton,
FL, USA, 2019. doi: 10.1201/9781420024524
[19] V. Bhise, Decision-Making in Energy System, CRC Press, Boca Raton, FL, USA, 2022. doi:
10.1201/9781003107514
[20] H. Jantan, A. Hamdan, Z. Othman, Intelligent techniques for decision support system in
human resource management, International Journal of Innovative Computing, Information
and Control, 7(1) (2011)13-24. doi: 10.5772/39401
[21] A. Nejad, Fundamentals of System Analysis &amp; Design Publisher, LAP LAMBERT Academic</p>
      <p>Publishing, Saarbrücken, Germany, 2014. doi:10.13140/2.1.1469.7280
[22] S. Demri, V. Goranko, M. Lange, Temporal Logics in Computer Science, Cambridge</p>
      <p>University Press, Cambridge, UK, 2016. doi: 10.1017/CBO9781139236119
[23] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville,
Y. Bengio, Generative adversarial nets, Advances in neural information processing
systems, 27 (2014) 2672–2680. doi: 10.48550/arXiv.1406.2661
[24] E. Manziuk, Intelligent information technology for obtaining trust decisions based on the
ontology of trust using a human-centered approach, Computer Systems and Information
Technologies, 1 (2022), 83-88. doi: 10.31891/CSIT-2022-1-11 (In Ukrainian).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Kendall</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kendall</surname>
          </string-name>
          ,
          <source>Systems Analysis and Design</source>
          , 10th ed.,
          <string-name>
            <surname>Prentice</surname>
            <given-names>Hall</given-names>
          </string-name>
          , New York, NJ, USA,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Durniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tkachuk</surname>
          </string-name>
          ,
          <string-name>
            <surname>O. Mashkov O.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lysa</surname>
          </string-name>
          ,
          <article-title>Information and LogicalCognitive Technologies for Training Operational Personnel to Work in Terminal Emergencies</article-title>
          ,
          <source>UAP PH, Lviv, Ukraine</source>
          ,
          <year>2022</year>
          . (In Ukrainian)
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Henly</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kimamoto</surname>
          </string-name>
          ,
          <article-title>Reliable Technical System Design and Risk Assessment, High School</article-title>
          , Kyiv, Ukraine,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Boy</surname>
          </string-name>
          ,
          <article-title>The Handbook of Human-Machine Interaction: A Human-Centered Design Approach</article-title>
          . 2st ed. , CRC Press, Boca Raton, FL,
          <year>2017</year>
          . doi:
          <volume>10</volume>
          .1201/9781315557380
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>T.</given-names>
            <surname>Aven</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Thekdi</surname>
          </string-name>
          ,
          <source>Enterprise Risk Management: Advances on Its Foundation and Practice</source>
          , 1st ed. Routledge, London, UK,
          <year>2019</year>
          . doi:
          <volume>10</volume>
          .4324/9780429425028
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Stirzaker</surname>
          </string-name>
          ,
          <source>Stochastic Processes and Models</source>
          , Cambridge University Press, Cambridge, UK,
          <year>2016</year>
          . doi:
          <volume>10</volume>
          .1017/CBO9781316576532
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>